id stringlengths 9 16 | title stringlengths 4 278 | categories stringlengths 5 104 | abstract stringlengths 6 4.09k |
|---|---|---|---|
1003.0095 | Multiuser MIMO Downlink Beamforming Design Based on Group Maximum SINR
Filtering | cs.IT math.IT | In this paper we aim to solve the multiuser multi-input multi-output (MIMO)
downlink beamforming problem where one multi-antenna base station broadcasts
data to many users. Each user is assigned multiple data streams and has
multiple antennas at its receiver. Efficient solutions to the joint
transmit-receive beamform... |
1003.0120 | Learning from Logged Implicit Exploration Data | cs.LG cs.AI | We provide a sound and consistent foundation for the use of \emph{nonrandom}
exploration data in "contextual bandit" or "partially labeled" settings where
only the value of a chosen action is learned.
The primary challenge in a variety of settings is that the exploration
policy, in which "offline" data is logged, i... |
1003.0146 | A Contextual-Bandit Approach to Personalized News Article Recommendation | cs.LG cs.AI cs.IR | Personalized web services strive to adapt their services (advertisements,
news articles, etc) to individual users by making use of both content and user
information. Despite a few recent advances, this problem remains challenging
for at least two reasons. First, web service is featured with dynamically
changing pools... |
1003.0205 | Detecting Weak but Hierarchically-Structured Patterns in Networks | cs.IT cs.LG math.IT math.ST stat.TH | The ability to detect weak distributed activation patterns in networks is
critical to several applications, such as identifying the onset of anomalous
activity or incipient congestion in the Internet, or faint traces of a
biochemical spread by a sensor network. This is a challenging problem since
weak distributed pat... |
1003.0206 | Why has (reasonably accurate) Automatic Speech Recognition been so hard
to achieve? | cs.CL | Hidden Markov models (HMMs) have been successfully applied to automatic
speech recognition for more than 35 years in spite of the fact that a key HMM
assumption -- the statistical independence of frames -- is obviously violated
by speech data. In fact, this data/model mismatch has inspired many attempts to
modify or ... |
1003.0219 | Sequential Compressed Sensing | cs.IT math.IT | Compressed sensing allows perfect recovery of sparse signals (or signals
sparse in some basis) using only a small number of random measurements.
Existing results in compressed sensing literature have focused on
characterizing the achievable performance by bounding the number of samples
required for a given level of s... |
1003.0242 | Peak to Average Power Ratio Reduction for Space-Time Codes That Achieve
Diversity-Multiplexing Gain Tradeoff | cs.IT math.IT | Zheng and Tse have shown that over a quasi-static channel, there exists a
fundamental tradeoff, known as the diversity-multiplexing gain (D-MG) tradeoff.
In a realistic system, to avoid inefficiently operating the power amplifier,
one should consider the situation where constraints are imposed on the peak to
average ... |
1003.0248 | Outage Probability of General Ad Hoc Networks in the High-Reliability
Regime | cs.IT cs.NI math.IT math.ST stat.TH | Outage probabilities in wireless networks depend on various factors: the node
distribution, the MAC scheme, and the models for path loss, fading and
transmission success. In prior work on outage characterization for networks
with randomly placed nodes, most of the emphasis was put on networks whose
nodes are Poisson ... |
1003.0319 | Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier
and Time Windows | cs.AI cs.CR cs.NE | As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces
promising performances in the field of anomaly detection. This paper presents
the application of the DCA to a standard data set, the KDD 99 data set. The
results of different implementation versions of the DXA, including the antigen
multipl... |
1003.0332 | On the Optimal Number of Cooperative Base Stations in Network MIMO
Systems | cs.IT math.IT | We consider a multi-cell, frequency-selective fading, uplink channel (network
MIMO) where K user terminals (UTs) communicate simultaneously with B
cooperative base stations (BSs). Although the potential benefit of multi-cell
cooperation grows with B, the overhead related to the acquisition of channel
state informatio... |
1003.0337 | Change of word types to word tokens ratio in the course of translation
(based on Russian translations of K. Vonnegut novels) | cs.CL | The article provides lexical statistical analysis of K. Vonnegut's two novels
and their Russian translations. It is found out that there happen some changes
between the speed of word types and word tokens ratio change in the source and
target texts. The author hypothesizes that these changes are typical for
English-R... |
1003.0339 | libtissue - implementing innate immunity | cs.AI cs.NE | In a previous paper the authors argued the case for incorporating ideas from
innate immunity into articficial immune systems (AISs) and presented an outline
for a conceptual framework for such systems. A number of key general properties
observed in the biological innate and adaptive immune systems were hughlighted,
a... |
1003.0358 | Deep Big Simple Neural Nets Excel on Handwritten Digit Recognition | cs.NE cs.AI | Good old on-line back-propagation for plain multi-layer perceptrons yields a
very low 0.35% error rate on the famous MNIST handwritten digits benchmark. All
we need to achieve this best result so far are many hidden layers, many neurons
per layer, numerous deformed training images, and graphics cards to greatly
speed... |
1003.0367 | Stopping Set Distributions of Some Linear Codes | cs.IT math.IT | Stopping sets and stopping set distribution of an low-density parity-check
code are used to determine the performance of this code under iterative
decoding over a binary erasure channel (BEC). Let $C$ be a binary $[n,k]$
linear code with parity-check matrix $H$, where the rows of $H$ may be
dependent. A stopping set ... |
1003.0381 | Modelling and Verification of Multiple UAV Mission Using SMV | cs.LO cs.MA cs.RO | Model checking has been used to verify the correctness of digital circuits,
security protocols, communication protocols, as they can be modelled by means
of finite state transition model. However, modelling the behaviour of hybrid
systems like UAVs in a Kripke model is challenging. This work is aimed at
capturing the... |
1003.0396 | Developing Experimental Models for NASA Missions with ASSL | cs.SE cs.RO | NASA's new age of space exploration augurs great promise for deep space
exploration missions whereby spacecraft should be independent, autonomous, and
smart. Nowadays NASA increasingly relies on the concepts of autonomic
computing, exploiting these to increase the survivability of remote missions,
particularly when h... |
1003.0400 | Collaborative Hierarchical Sparse Modeling | cs.IT math.IT | Sparse modeling is a powerful framework for data analysis and processing.
Traditionally, encoding in this framework is done by solving an l_1-regularized
linear regression problem, usually called Lasso. In this work we first combine
the sparsity-inducing property of the Lasso model, at the individual feature
level, w... |
1003.0404 | Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus | cs.AI cs.LO | As one of the newest members in Artificial Immune Systems (AIS), the
Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These
applications mainly belong to the field of anomaly detection. However,
real-time detection, a new challenge to anomaly detection, requires improvement
on the real-time cap... |
1003.0415 | The Sparsity Gap: Uncertainty Principles Proportional to Dimension | cs.IT math.IT | In an incoherent dictionary, most signals that admit a sparse representation
admit a unique sparse representation. In other words, there is no way to
express the signal without using strictly more atoms. This work demonstrates
that sparse signals typically enjoy a higher privilege: each nonoptimal
representation of t... |
1003.0445 | On The Design of Signature Codes in Decentralized Wireless Networks | cs.IT math.IT | This paper addresses a unified approach towards communication in
decentralized wireless networks of separate transmitter-receiver pairs. In
general, users are unaware of each other's codebooks and there is no central
controller to assign the resources in the network to the users. A randomized
signaling scheme is intr... |
1003.0470 | Unsupervised Supervised Learning II: Training Margin Based Classifiers
without Labels | cs.LG | Many popular linear classifiers, such as logistic regression, boosting, or
SVM, are trained by optimizing a margin-based risk function. Traditionally,
these risk functions are computed based on a labeled dataset. We develop a
novel technique for estimating such risks using only unlabeled data and the
marginal label d... |
1003.0487 | Scalable Large-Margin Mahalanobis Distance Metric Learning | cs.CV | For many machine learning algorithms such as $k$-Nearest Neighbor ($k$-NN)
classifiers and $ k $-means clustering, often their success heavily depends on
the metric used to calculate distances between different data points.
An effective solution for defining such a metric is to learn it from a set of
labeled traini... |
1003.0488 | On Secure Distributed Data Storage Under Repair Dynamics | cs.IT cs.CR math.IT | We address the problem of securing distributed storage systems against
passive eavesdroppers that can observe a limited number of storage nodes. An
important aspect of these systems is node failures over time, which demand a
repair mechanism aimed at maintaining a targeted high level of system
reliability. If an eave... |
1003.0514 | The finite-dimensional Witsenhausen counterexample | cs.IT cs.CC math.IT math.OC | Recently, a vector version of Witsenhausen's counterexample was considered
and it was shown that in that limit of infinite vector length, certain
quantization-based control strategies are provably within a constant factor of
the optimal cost for all possible problem parameters. In this paper, finite
vector lengths ar... |
1003.0516 | Model Selection with the Loss Rank Principle | cs.LG | A key issue in statistics and machine learning is to automatically select the
"right" model complexity, e.g., the number of neighbors to be averaged over in
k nearest neighbor (kNN) regression or the polynomial degree in regression with
polynomials. We suggest a novel principle - the Loss Rank Principle (LoRP) -
for ... |
1003.0520 | Information embedding meets distributed control | cs.IT math.IT | We consider the problem of information embedding where the encoder modifies a
white Gaussian host signal in a power-constrained manner to encode the message,
and the decoder recovers both the embedded message and the modified host
signal. This extends the recent work of Sumszyk and Steinberg to the
continuous-alphabe... |
1003.0529 | A Unified Algorithmic Framework for Multi-Dimensional Scaling | cs.LG cs.CG cs.CV | In this paper, we propose a unified algorithmic framework for solving many
known variants of \mds. Our algorithm is a simple iterative scheme with
guaranteed convergence, and is \emph{modular}; by changing the internals of a
single subroutine in the algorithm, we can switch cost functions and target
spaces easily. In... |
1003.0590 | A new model for solution of complex distributed constrained problems | cs.AI | In this paper we describe an original computational model for solving
different types of Distributed Constraint Satisfaction Problems (DCSP). The
proposed model is called Controller-Agents for Constraints Solving (CACS). This
model is intended to be used which is an emerged field from the integration
between two para... |
1003.0617 | Agent Based Approaches to Engineering Autonomous Space Software | cs.MA cs.AI | Current approaches to the engineering of space software such as satellite
control systems are based around the development of feedback controllers using
packages such as MatLab's Simulink toolbox. These provide powerful tools for
engineering real time systems that adapt to changes in the environment but are
limited w... |
1003.0628 | Linguistic Geometries for Unsupervised Dimensionality Reduction | cs.CL | Text documents are complex high dimensional objects. To effectively visualize
such data it is important to reduce its dimensionality and visualize the low
dimensional embedding as a 2-D or 3-D scatter plot. In this paper we explore
dimensionality reduction methods that draw upon domain knowledge in order to
achieve a... |
1003.0642 | Text Region Extraction from Business Card Images for Mobile Devices | cs.CV | Designing a Business Card Reader (BCR) for mobile devices is a challenge to
the researchers because of huge deformation in acquired images, multiplicity in
nature of the business cards and most importantly the computational constraints
of the mobile devices. This paper presents a text extraction method designed in
ou... |
1003.0645 | Binarizing Business Card Images for Mobile Devices | cs.CV | Business card images are of multiple natures as these often contain graphics,
pictures and texts of various fonts and sizes both in background and
foreground. So, the conventional binarization techniques designed for document
images can not be directly applied on mobile devices. In this paper, we have
presented a fas... |
1003.0659 | Particle Filtering on the Audio Localization Manifold | cs.AI cs.SD | We present a novel particle filtering algorithm for tracking a moving sound
source using a microphone array. If there are N microphones in the array, we
track all $N \choose 2$ delays with a single particle filter over time. Since
it is known that tracking in high dimensions is rife with difficulties, we
instead inte... |
1003.0691 | Statistical and Computational Tradeoffs in Stochastic Composite
Likelihood | cs.LG | Maximum likelihood estimators are often of limited practical use due to the
intensive computation they require. We propose a family of alternative
estimators that maximize a stochastic variation of the composite likelihood
function. Each of the estimators resolve the computation-accuracy tradeoff
differently, and tak... |
1003.0696 | Exponential Family Hybrid Semi-Supervised Learning | cs.LG | We present an approach to semi-supervised learning based on an exponential
family characterization. Our approach generalizes previous work on coupled
priors for hybrid generative/discriminative models. Our model is more flexible
and natural than previous approaches. Experimental results on several data sets
show that... |
1003.0723 | Securing Interactive Sessions Using Mobile Device through Visual Channel
and Visual Inspection | cs.CR cs.CV | Communication channel established from a display to a device's camera is
known as visual channel, and it is helpful in securing key exchange protocol.
In this paper, we study how visual channel can be exploited by a network
terminal and mobile device to jointly verify information in an interactive
session, and how su... |
1003.0727 | On the comparison of volumes of quantum states | quant-ph cs.IT math-ph math.FA math.IT math.MP | This paper aims to study the $\a$-volume of $\cK$, an arbitrary subset of the
set of $N\times N$ density matrices. The $\a$-volume is a generalization of the
Hilbert-Schmidt volume and the volume induced by partial trace. We obtain
two-side estimates for the $\a$-volume of $\cK$ in terms of its Hilbert-Schmidt
volume... |
1003.0729 | On the Secure Degrees-of-Freedom of the Multiple-Access-Channel | cs.IT math.IT | A $K$-user secure Gaussian Multiple-Access-Channel (MAC) with an external
eavesdropper is considered in this paper. An achievable rate region is
established for the secure discrete memoryless MAC. The secrecy sum capacity of
the degraded Gaussian MIMO MAC is proven using Gaussian codebooks. For the
non-degraded Gauss... |
1003.0735 | Compress-and-Forward Performance in Low-SNR Relay Channels | cs.IT math.IT | In this paper, we study the Gaussian relay channels in the low
signal-to-noise ratio (SNR) regime with the time-sharing compress-and-forward
(CF) scheme, where at each time slot all the nodes keep silent at the first
fraction of time and then transmit with CF at a higher peak power in the second
fraction. Such a sile... |
1003.0746 | Automatically Discovering Hidden Transformation Chaining Constraints | cs.AI | Model transformations operate on models conforming to precisely defined
metamodels. Consequently, it often seems relatively easy to chain them: the
output of a transformation may be given as input to a second one if metamodels
match. However, this simple rule has some obvious limitations. For instance, a
transformati... |
1003.0776 | Properties of the Discrete Pulse Transform for Multi-Dimensional Arrays | cs.CV | This report presents properties of the Discrete Pulse Transform on
multi-dimensional arrays introduced by the authors two or so years ago. The
main result given here in Lemma 2.1 is also formulated in a paper to appear in
IEEE Transactions on Image Processing. However, the proof, being too technical,
was omitted ther... |
1003.0789 | Information Fusion for Anomaly Detection with the Dendritic Cell
Algorithm | cs.AI cs.CR cs.NE | Dendritic cells are antigen presenting cells that provide a vital link
between the innate and adaptive immune system, providing the initial detection
of pathogenic invaders. Research into this family of cells has revealed that
they perform information fusion which directs immune responses. We have derived
a Dendritic... |
1003.0888 | Support Recovery of Sparse Signals | cs.IT math.IT | We consider the problem of exact support recovery of sparse signals via noisy
measurements. The main focus is the sufficient and necessary conditions on the
number of measurements for support recovery to be reliable. By drawing an
analogy between the problem of support recovery and the problem of channel
coding over ... |
1003.0931 | A student's guide to searching the literature using online databases | physics.ed-ph cs.DL cs.IR | A method is described to empower students to efficiently perform general and
literature searches using online resources. The method was tested on
undergraduate and graduate students with varying backgrounds with scientific
literature. Students involved in this study showed marked improvement in their
awareness of how... |
1003.0953 | Information Flow in One-Dimensional Vehicular Ad Hoc Networks | cs.IT math.IT | We consider content distribution in vehicular ad hoc networks. We assume that
a file is encoded using fountain code, and the encoded message is cached at
infostations. Vehicles are allowed to download data packets from infostations,
which are placed along a highway. In addition, two vehicles can exchange
packets with... |
1003.1010 | Verifying Recursive Active Documents with Positive Data Tree Rewriting | cs.DB cs.OH | This paper proposes a data tree-rewriting framework for modeling evolving
documents. The framework is close to Guarded Active XML, a platform used for
handling XML repositories evolving through web services. We focus on automatic
verification of properties of evolving documents that can contain data from an
infinite ... |
1003.1018 | Zipf's law and log-normal distributions in measures of scientific output
across fields and institutions: 40 years of Slovenia's research as an example | physics.data-an cs.DB stat.AP | Slovenia's Current Research Information System (SICRIS) currently hosts
86,443 publications with citation data from 8,359 researchers working on the
whole plethora of social and natural sciences from 1970 till present. Using
these data, we show that the citation distributions derived from individual
publications have... |
1003.1020 | Learning by random walks in the weight space of the Ising perceptron | cond-mat.dis-nn cond-mat.stat-mech cs.LG q-bio.NC | Several variants of a stochastic local search process for constructing the
synaptic weights of an Ising perceptron are studied. In this process, binary
patterns are sequentially presented to the Ising perceptron and are then
learned as the synaptic weight configuration is modified through a chain of
single- or double... |
1003.1048 | Tag Clusters as Information Retrieval Interfaces | cs.IR | The paper presents our design of a next generation information retrieval
system based on tag co-occurrences and subsequent clustering. We help users
getting access to digital data through information visualization in the form of
tag clusters. Current problems like the absence of interactivity and semantics
between ta... |
1003.1072 | An Offline Technique for Localization of License Plates for Indian
Commercial Vehicles | cs.CV | Automatic License Plate Recognition (ALPR) is a challenging area of research
due to its importance to variety of commercial applications. The overall
problem may be subdivided into two key modules, firstly, localization of
license plates from vehicle images, and secondly, optical character recognition
of extracted li... |
1003.1141 | From Frequency to Meaning: Vector Space Models of Semantics | cs.CL cs.IR cs.LG | Computers understand very little of the meaning of human language. This
profoundly limits our ability to give instructions to computers, the ability of
computers to explain their actions to us, and the ability of computers to
analyse and process text. Vector space models (VSMs) of semantics are beginning
to address t... |
1003.1179 | View Synthesis from Schema Mappings | cs.DB | In data management, and in particular in data integration, data exchange,
query optimization, and data privacy, the notion of view plays a central role.
In several contexts, such as data integration, data mashups, and data
warehousing, the need arises of designing views starting from a set of known
correspondences be... |
1003.1251 | Minimum Spanning Tree on Spatio-Temporal Networks | cs.DS cs.DB | Given a spatio-temporal network (ST network) where edge properties vary with
time, a time-sub-interval minimum spanning tree (TSMST) is a collection of
minimum spanning trees of the ST network, where each tree is associated with a
time interval. During this time interval, the total cost of tree is least among
all the... |
1003.1256 | Integrating Innate and Adaptive Immunity for Intrusion Detection | cs.AI cs.CR cs.NE | Network Intrusion Detection Systems (NDIS) monitor a network with the aim of
discerning malicious from benign activity on that network. While a wide range
of approaches have met varying levels of success, most IDS's rely on having
access to a database of known attack signatures which are written by security
experts. ... |
1003.1257 | On the symbol error probability of regular polytopes | cs.IT math.IT | An exact expression for the symbol error probability of the four-dimensional
24-cell in Gaussian noise is derived. Corresponding expressions for other
regular convex polytopes are summarized. Numerically stable versions of these
error probabilities are also obtained.
|
1003.1266 | Hitting and commute times in large graphs are often misleading | cs.DS cs.LG math.PR | Next to the shortest path distance, the second most popular distance function
between vertices in a graph is the commute distance (resistance distance). For
two vertices u and v, the hitting time H_{uv} is the expected time it takes a
random walk to travel from u to v. The commute time is its symmetrized version
C_{u... |
1003.1343 | What does Newcomb's paradox teach us? | cs.GT cs.AI math.OC math.PR | In Newcomb's paradox you choose to receive either the contents of a
particular closed box, or the contents of both that closed box and another one.
Before you choose, a prediction algorithm deduces your choice, and fills the
two boxes based on that deduction. Newcomb's paradox is that game theory
appears to provide t... |
1003.1354 | Faster Rates for training Max-Margin Markov Networks | cs.LG cs.CC | Structured output prediction is an important machine learning problem both in
theory and practice, and the max-margin Markov network (\mcn) is an effective
approach. All state-of-the-art algorithms for optimizing \mcn\ objectives take
at least $O(1/\epsilon)$ number of iterations to find an $\epsilon$ accurate
soluti... |
1003.1399 | Automatic derivation of domain terms and concept location based on the
analysis of the identifiers | cs.CL | Developers express the meaning of the domain ideas in specifically selected
identifiers and comments that form the target implemented code. Software
maintenance requires knowledge and understanding of the encoded ideas. This
paper presents a way how to create automatically domain vocabulary. Knowledge
of domain vocab... |
1003.1410 | Local Space-Time Smoothing for Version Controlled Documents | cs.GR cs.CL cs.LG | Unlike static documents, version controlled documents are continuously edited
by one or more authors. Such collaborative revision process makes traditional
modeling and visualization techniques inappropriate. In this paper we propose a
new representation based on local space-time smoothing that captures important
rev... |
1003.1422 | Polar Coding for Secure Transmission and Key Agreement | cs.IT cs.CR math.IT | Wyner's work on wiretap channels and the recent works on information
theoretic security are based on random codes. Achieving information theoretical
security with practical coding schemes is of definite interest. In this note,
the attempt is to overcome this elusive task by employing the polar coding
technique of Ar{... |
1003.1450 | A New Clustering Approach based on Page's Path Similarity for Navigation
Patterns Mining | cs.LG | In recent years, predicting the user's next request in web navigation has
received much attention. An information source to be used for dealing with such
problem is the left information by the previous web users stored at the web
access log on the web servers. Purposed systems for this problem work based on
this idea... |
1003.1455 | A Computational Algorithm based on Empirical Analysis, that Composes
Sanskrit Poetry | cs.CL | Poetry-writing in Sanskrit is riddled with problems for even those who know
the language well. This is so because the rules that govern Sanskrit prosody
are numerous and stringent. We propose a computational algorithm that converts
prose given as E-text into poetry in accordance with the metrical rules of
Sanskrit pr... |
1003.1457 | The Comparison of Methods Artificial Neural Network with Linear
Regression Using Specific Variables for Prediction Stock Price in Tehran
Stock Exchange | cs.NE | In this paper, researchers estimated the stock price of activated companies
in Tehran (Iran) stock exchange. It is used Linear Regression and Artificial
Neural Network methods and compared these two methods. In Artificial Neural
Network, of General Regression Neural Network method (GRNN) for architecture is
used. In ... |
1003.1458 | Secured Cryptographic Key Generation From Multimodal Biometrics: Feature
Level Fusion of Fingerprint and Iris | cs.CR cs.CV | Human users have a tough time remembering long cryptographic keys. Hence,
researchers, for so long, have been examining ways to utilize biometric
features of the user instead of a memorable password or passphrase, in an
effort to generate strong and repeatable cryptographic keys. Our objective is
to incorporate the v... |
1003.1460 | Ontology Based Query Expansion Using Word Sense Disambiguation | cs.IR | The existing information retrieval techniques do not consider the context of
the keywords present in the user's queries. Therefore, the search engines
sometimes do not provide sufficient information to the users. New methods based
on the semantics of user keywords must be developed to search in the vast web
space wit... |
1003.1493 | Integration of Rule Based Expert Systems and Case Based Reasoning in an
Acute Bacterial Meningitis Clinical Decision Support System | cs.AI | This article presents the results of the research carried out on the
development of a medical diagnostic system applied to the Acute Bacterial
Meningitis, using the Case Based Reasoning methodology. The research was
focused on the implementation of the adaptation stage, from the integration of
Case Based Reasoning an... |
1003.1494 | Formal Concept Analysis for Information Retrieval | cs.IR | In this paper we describe a mechanism to improve Information Retrieval (IR)
on the web. The method is based on Formal Concepts Analysis (FCA) that it is
makes semantical relations during the queries, and allows a reorganizing, in
the shape of a lattice of concepts, the answers provided by a search engine. We
proposed... |
1003.1499 | Evaluation of E-Learners Behaviour using Different Fuzzy Clustering
Models: A Comparative Study | cs.CY cs.LG | This paper introduces an evaluation methodologies for the e-learners'
behaviour that will be a feedback to the decision makers in e-learning system.
Learner's profile plays a crucial role in the evaluation process to improve the
e-learning process performance. The work focuses on the clustering of the
e-learners base... |
1003.1500 | Hierarchical Approach for Online Mining--Emphasis towards Software
Metrics | cs.DB | Several multi-pass algorithms have been proposed for Association Rule Mining
from static repositories. However, such algorithms are incapable of online
processing of transaction streams. In this paper we introduce an efficient
single-pass algorithm for mining association rules, given a hierarchical
classification amo... |
1003.1504 | Indexer Based Dynamic Web Services Discovery | cs.AI | Recent advancement in web services plays an important role in business to
business and business to consumer interaction. Discovery mechanism is not only
used to find a suitable service but also provides collaboration between service
providers and consumers by using standard protocols. A static web service
discovery m... |
1003.1510 | Hierarchical Web Page Classification Based on a Topic Model and
Neighboring Pages Integration | cs.LG | Most Web page classification models typically apply the bag of words (BOW)
model to represent the feature space. The original BOW representation, however,
is unable to recognize semantic relationships between terms. One possible
solution is to apply the topic model approach based on the Latent Dirichlet
Allocation al... |
1003.1511 | Clinical gait data analysis based on Spatio-Temporal features | cs.CV | Analysing human gait has found considerable interest in recent computer
vision research. So far, however, contributions to this topic exclusively dealt
with the tasks of person identification or activity recognition. In this paper,
we consider a different application for gait analysis and examine its use as a
means o... |
1003.1588 | On the Failure of the Finite Model Property in some Fuzzy Description
Logics | cs.AI | Fuzzy Description Logics (DLs) are a family of logics which allow the
representation of (and the reasoning with) structured knowledge affected by
vagueness. Although most of the not very expressive crisp DLs, such as ALC,
enjoy the Finite Model Property (FMP), this is not the case once we move into
the fuzzy case. In... |
1003.1598 | Information Fusion in the Immune System | cs.AI cs.NE | Biologically-inspired methods such as evolutionary algorithms and neural
networks are proving useful in the field of information fusion. Artificial
Immune Systems (AISs) are a biologically-inspired approach which take
inspiration from the biological immune system. Interestingly, recent research
has show how AISs whic... |
1003.1655 | Inner and Outer Bounds for the Public Information Embedding Capacity
Region Under Multiple Access Attacks | cs.IT math.IT | We consider a public multi-user information embedding (watermarking) system
in which two messages (watermarks) are independently embedded into two
correlated covertexts and are transmitted through a multiple-access attack
channel. The tradeoff between the achievable embedding rates and the average
distortions for the... |
1003.1658 | A multivalued knowledge-base model | cs.AI | The basic aim of our study is to give a possible model for handling uncertain
information. This model is worked out in the framework of DATALOG. At first the
concept of fuzzy Datalog will be summarized, then its extensions for
intuitionistic- and interval-valued fuzzy logic is given and the concept of
bipolar fuzzy D... |
1003.1738 | MISO Capacity with Per-Antenna Power Constraint | cs.IT math.IT | We establish in closed-form the capacity and the optimal signaling scheme for
a MISO channel with per-antenna power constraint. Two cases of channel state
information are considered: constant channel known at both the transmitter and
receiver, and Rayleigh fading channel known only at the receiver. For the first
case... |
1003.1787 | Vulnerability of MRD-Code-based Universal Secure Network Coding against
Stronger Eavesdroppers | cs.IT math.IT | Silva et al. proposed a universal secure network coding scheme based on MRD
codes, which can be applied to any underlying network code. This paper
considers a stronger eavesdropping model where the eavesdroppers possess the
ability to re-select the tapping links during the transmission. We give a proof
for the imposs... |
1003.1792 | A Hybrid System based on Multi-Agent System in the Data Preprocessing
Stage | cs.MA | We describe the usage of the Multi-agent system in the data preprocessing
stage of an on-going project, called e-Wedding. The aim of this project is to
utilize MAS and various approaches, like Web services, Ontology, and Data
mining techniques, in e-Business that want to improve responsiveness and
efficiency of syste... |
1003.1795 | A Survey of Na\"ive Bayes Machine Learning approach in Text Document
Classification | cs.LG cs.IR | Text Document classification aims in associating one or more predefined
categories based on the likelihood suggested by the training set of labeled
documents. Many machine learning algorithms play a vital role in training the
system with predefined categories among which Na\"ive Bayes has some intriguing
facts that i... |
1003.1803 | Nonlinear Filter Based Image Denoising Using AMF Approach | cs.CV | This paper proposes a new technique based on nonlinear Adaptive Median filter
(AMF) for image restoration. Image denoising is a common procedure in digital
image processing aiming at the removal of noise, which may corrupt an image
during its acquisition or transmission, while retaining its quality. This
procedure is... |
1003.1810 | Reconfigurable Parallel Data Flow Architecture | cs.MA | This paper presents a reconfigurable parallel data flow architecture. This
architecture uses the concepts of multi-agent paradigm in reconfigurable
hardware systems. The utilization of this new paradigm has the potential to
greatly increase the flexibility, efficiency, expandability of data flow
systems and to provid... |
1003.1814 | An Analytical Approach to Document Clustering Based on Internal
Criterion Function | cs.IR | Fast and high quality document clustering is an important task in organizing
information, search engine results obtaining from user query, enhancing web
crawling and information retrieval. With the large amount of data available and
with a goal of creating good quality clusters, a variety of algorithms have
been deve... |
1003.1816 | Role of Data Mining in E-Payment systems | cs.DB | Data Mining deals extracting hidden knowledge, unexpected pattern and new
rules from large database. Various customized data mining tools have been
developed for domain specific applications such as Biomedicine, DNA analysis
and telecommunication. Trends in data mining include further efforts towards
the exploration ... |
1003.1819 | Facial Gesture Recognition Using Correlation And Mahalanobis Distance | cs.CV | Augmenting human computer interaction with automated analysis and synthesis
of facial expressions is a goal towards which much research effort has been
devoted recently. Facial gesture recognition is one of the important component
of natural human-machine interfaces; it may also be used in behavioural
science, securi... |
1003.1826 | A GA based Window Selection Methodology to Enhance Window based Multi
wavelet transformation and thresholding aided CT image denoising technique | cs.CV | Image denoising is getting more significance, especially in Computed
Tomography (CT), which is an important and most common modality in medical
imaging. This is mainly due to that the effectiveness of clinical diagnosis
using CT image lies on the image quality. The denoising technique for CT images
using window-based... |
1003.1827 | Investigation and Assessment of Disorder of Ultrasound B-mode Images | cs.CV | Digital image plays a vital role in the early detection of cancers, such as
prostate cancer, breast cancer, lungs cancer, cervical cancer. Ultrasound
imaging method is also suitable for early detection of the abnormality of
fetus. The accurate detection of region of interest in ultrasound image is
crucial. Since the ... |
1003.1888 | Biology-Derived Algorithms in Engineering Optimization | math.OC cs.CE cs.NE q-bio.QM | Biology-derived algorithms are an important part of computational sciences,
which are essential to many scientific disciplines and engineering
applications. Many computational methods are derived from or based on the
analogy to natural evolution and biological activities, and these biologically
inspired computations ... |
1003.1891 | Handwritten Arabic Numeral Recognition using a Multi Layer Perceptron | cs.CV | Handwritten numeral recognition is in general a benchmark problem of Pattern
Recognition and Artificial Intelligence. Compared to the problem of printed
numeral recognition, the problem of handwritten numeral recognition is
compounded due to variations in shapes and sizes of handwritten characters.
Considering all th... |
1003.1894 | A comparative study of different feature sets for recognition of
handwritten Arabic numerals using a Multi Layer Perceptron | cs.CV | The work presents a comparative assessment of seven different feature sets
for recognition of handwritten Arabic numerals using a Multi Layer Perceptron
(MLP) based classifier. The seven feature sets employed here consist of shadow
features, octant centroids, longest runs, angular distances, effective spans,
dynamic ... |
1003.1931 | Hypergraph model of social tagging networks | physics.soc-ph cs.IR | The past few years have witnessed the great success of a new family of
paradigms, so-called folksonomy, which allows users to freely associate tags to
resources and efficiently manage them. In order to uncover the underlying
structures and user behaviors in folksonomy, in this paper, we propose an
evolutionary hyperg... |
1003.1954 | Estimation of R\'enyi Entropy and Mutual Information Based on
Generalized Nearest-Neighbor Graphs | stat.ML cs.AI | We present simple and computationally efficient nonparametric estimators of
R\'enyi entropy and mutual information based on an i.i.d. sample drawn from an
unknown, absolutely continuous distribution over $\R^d$. The estimators are
calculated as the sum of $p$-th powers of the Euclidean lengths of the edges of
the `ge... |
1003.2005 | Control of Complex Maneuvers for a Quadrotor UAV using Geometric Methods
on SE(3) | math.OC cs.SY | This paper provides new results for control of complex flight maneuvers for a
quadrotor unmanned aerial vehicle (UAV). The flight maneuvers are defined by a
concatenation of flight modes or primitives, each of which is achieved by a
nonlinear controller that solves an output tracking problem. A mathematical
model of ... |
1003.2022 | Fast space-variant elliptical filtering using box splines | cs.CV cs.CE cs.IT cs.NA math.IT | The efficient realization of linear space-variant (non-convolution) filters
is a challenging computational problem in image processing. In this paper, we
demonstrate that it is possible to filter an image with a Gaussian-like
elliptic window of varying size, elongation and orientation using a fixed
number of computat... |
1003.2138 | Need-based Communication for Smart Grid: When to Inquire Power Price? | cs.IT math.IT | In smart grid, a home appliance can adjust its power consumption level
according to the realtime power price obtained from communication channels.
Most studies on smart grid do not consider the cost of communications which
cannot be ignored in many situations. Therefore, the total cost in smart grid
should be jointly... |
1003.2142 | QoS Routing in Smart Grid | cs.IT math.IT | Smart grid is an emerging technology which is able to control the power load
via price signaling. The communication between the power supplier and power
customers is a key issue in smart grid. Performance degradation like delay or
outage may cause significant impact on the stability of the pricing based
control and t... |
1003.2218 | Supermartingales in Prediction with Expert Advice | cs.LG | We apply the method of defensive forecasting, based on the use of
game-theoretic supermartingales, to prediction with expert advice. In the
traditional setting of a countable number of experts and a finite number of
outcomes, the Defensive Forecasting Algorithm is very close to the well-known
Aggregating Algorithm. N... |
1003.2226 | Interference Focusing for Mitigating Cross-Phase Modulation in a
Simplified Optical Fiber Model | cs.IT math.IT | A memoryless interference network model is introduced that is based on
non-linear phenomena observed when transmitting information over optical fiber
using wavelength division multiplexing. The main characteristic of the model is
that amplitude variations on one carrier wave are converted to phase variations
on anoth... |
1003.2257 | Bit Allocation Law for Multi-Antenna Channel Feedback Quantization:
Single-User Case | cs.IT math.IT | This paper studies the design and optimization of a limited feedback
single-user system with multiple-antenna transmitter and single-antenna
receiver. The design problem is cast in form of the minimizing the average
transmission power at the base station subject to the user's outage probability
constraint. The optimi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.