To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Simply typed λ-calculus with fixpoint combinators, λY-calculus, offers an interesting method for approximating program semantics. The Böhm tree of a λY-term represents the meaning of the program up to the meaning of built-in constants. It is much easier to reason about properties of such trees than properties of interpreted programs. Moreover, some interesting properties of programs are already expressible on the level of these trees.
Collapsible pushdown automata (CPDA) give another way of generating the same class of trees as λY-terms. We clarify the relationship between the two models. In particular, we present two relatively simple translations from λY-terms to CPDA using Krivine machines as an intermediate step. The latter are general machines for describing computation of the weak head normal form in the λ-calculus. They provide the notions of closure and environment that facilitate reasoning about computation.
Clustering a graph, i.e., assigning its nodes to groups, is an important operation whose best known application is the discovery of communities in social networks. Graph clustering and community detection have traditionally focused on graphs without attributes, with the notable exception of edge weights. However, these models only provide a partial representation of real social systems, that are thus often described using node attributes, representing features of the actors, and edge attributes, representing different kinds of relationships among them. We refer to these models as attributed graphs. Consequently, existing graph clustering methods have been recently extended to deal with node and edge attributes. This article is a literature survey on this topic, organizing, and presenting recent research results in a uniform way, characterizing the main existing clustering methods and highlighting their conceptual differences. We also cover the important topic of clustering evaluation and identify current open problems.
A spelling error detection and correction application is typically based on three main components: a dictionary (or reference word list), an error model and a language model. While most of the attention in the literature has been directed to the language model, we show how improvements in any of the three components can lead to significant cumulative improvements in the overall performance of the system. We develop our dictionary of 9.2 million fully-inflected Arabic words (types) from a morphological transducer and a large corpus, validated and manually revised. We improve the error model by analyzing error types and creating an edit distance re-ranker. We also improve the language model by analyzing the level of noise in different data sources and selecting an optimal subset to train the system on. Testing and evaluation experiments show that our system significantly outperforms Microsoft Word 2013, OpenOffice Ayaspell 3.4 and Google Docs.
Web of Linked Data introduces common format and principles for publishing and linking data on the Web. Such a network of linked data is publicly available and easily consumable. This paper introduces a calculus for modelling networks of linked data with encoded privacy preferences.
In that calculus, a network is a parallel composition of users, where each user is named and consists of data, representing the user's profile, and a process. Data is a parallel composition of triples with names (resources) as components. Associated with each name and each triple of names are their privacy protection policies, that are represented by queries. A data triple is accessible to a user if the user's data satisfies the query assigned to that triple.
The main contribution of this model lies in the type system which together with the introduced query order ensures that static type-checking prevents privacy violations. We say that a network is well behaved if
— access to a triple is more restrictive than access to its components and less restrictive than access to the user name it is enclosed with,
— each user can completely access their own profile,
— each user can update or partly delete profiles that they own (can access the whole profiles), and
— each user can update the privacy preference policy of data of another profile that they own or write data to another profile only if the newly obtained profile stays fully accessible to their owner.
We prove that any well-typed network is well behaved.
The Commercial Users of Functional Programming workshop (CUFP) is an annual workshop held in association with the International Conference on Functional Programming (ICFP). The aim of the CUFP workshops is to publicize the use of functional programming in commercial ventures. Its motto is “functional programming as a means, not an end.
Figure 3 was left out in the article (Gottlob et al. 2013). The figure that is given there as figure 3 should in fact be figure 4. Further, the reference to figure 3 on the 4th line of page 889 should be a reference to figure 4. The correct figure 3 (missing in the paper) is supplied below. We apologise for this error.
In [1], the authors consider a random walk (Zn,1, . . ., Zn,K+1) ∈ ${\mathbb{Z}}$K+1 with the constraint that each coordinate of the walk is at distance one from the following coordinate. A functional central limit theorem for the first coordinate is proved and the limit variance is explicited. In this paper, we study an extended version of this model by conditioning the extremal coordinates to be at some fixed distance at every time. We prove a functional central limit theorem for this random walk. Using combinatorial tools, we give a precise formula of the variance and compare it with that obtained in [1].
Empirical data on contacts between individuals in social contexts play an important role in providing information for models describing human behavior and how epidemics spread in populations. Here, we analyze data on face-to-face contacts collected in an office building. The statistical properties of contacts are similar to other social situations, but important differences are observed in the contact network structure. In particular, the contact network is strongly shaped by the organization of the offices in departments, which has consequences in the design of accurate agent-based models of epidemic spread. We consider the contact network as a potential substrate for infectious disease spread and show that its sparsity tends to prevent outbreaks of rapidly spreading epidemics. Moreover, we define three typical behaviors according to the fraction f of links each individual shares outside its own department: residents, wanderers, and linkers. Linkers (f ~ 50%) act as bridges in the network and have large betweenness centralities. Thus, a vaccination strategy targeting linkers efficiently prevents large outbreaks. As such a behavior may be spotted a priori in the offices' organization or from surveys, without the full knowledge of the time-resolved contact network, this result may help the design of efficient, low-cost vaccination or social-distancing strategies.
In this paper, we investigate dynamic walking as a convergence to the system's own limit cycles, not to artificially generated trajectories, which is one of the lessons in the concept of passive dynamic walking. For flexible walking, gait transitions can be performed by moving from one limit cycle to another one, and thus, the flexibility depends on the range in which limit cycles exist. To design a bipedal walker based on this approach, we explore period-1 passive limit cycles formed by natural dynamics and analyze them. We use a biped model with knees and point feet to perform numerical simulations by changing the center of mass locations of the legs. As a result, we obtain mass distributions for the maximum flexibility, which can be attained from very limited location sets. We discuss the effect of parameter variations on passive dynamic walking and how to improve robot design by analyzing walking performance. Finally, we present a practical application to a real bipedal walker, designed to exhibit more flexible walking based on this study.
This paper presents the design, kinematics, dynamics and control of a low-cost parallel rehabilitation robot developed at the Universitat Politècnica de Valencia. Several position and force controllers have been tested to ensure accurate tracking performances. An orthopedic boot, equipped with a force sensor, has been placed over the platform of the parallel robot to perform exercises for injured ankles. Passive, active-assistive and active-resistive exercises have been implemented to train dorsi/plantar flexion, inversion and eversion ankle movements. In order to implement the controllers, the component-based middleware Orocos has been used with the advantage over other solutions that the whole scheme control can be implemented modularly. These modules are independent and can be configured and reconfigured in both configuration and runtime. This means that no specific knowledge is needed by medical staff, for example, to carry out rehabilitation exercises using this low-cost parallel robot. The integration between Orocos and ROS, with a CAD model displaying the actual position of the rehabilitation robot in real time, makes it possible to develop a teleoperation application. In addition, a teleoperated rehabilitation exercise can be performed by a specialist using a Wiimote (or any other Bluetooth device).
With regard to the small basin of attraction of the passive limit cycles, it is important to start from a proper initial condition for stable walking. The present study investigates the passive dynamic behaviors of two-dimensional bipedal walkers of a compass gait model with different foot shapes. In order to find proper initial conditions for stable and unstable period-one gait limit cycles, a method based on solving the nonlinear equations of motion is presented as a boundary value problem (BVP). An initial guess is required to solve the related BVP that is obtained by solving an initial value problem (IVP). For parametric analysis purposes, a continuation method is applied. Simulation results reveal two, period-one gait cycles and the effects of parameters variation for all models.
As one of the next-generation wireless communication systems, the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) is committed to providing technologies for high data rates and system capacity. Further, LTE-Advanced (LTE-A) was defined to support new components for LTE to meet higher communication demands [1]. In particular, the performance and quality of service (QoS) of local area services need to be improved significantly by reusing the spectrum resources. However, reuse of the unlicensed spectrum might not provide a stable controlled environment [2]. Therefore, the approach of exploiting the licensed spectrum for local area services has attracted much attention. In this chapter, we present the basic concepts of device-to-device (D2D) communications in the licensed spectrum bands. We first provide an overview of D2D communications underlaying the cellular network. We then discuss access methods, device synchronization, and discovery mechanisms. Next, mode selection, spectrum sharing, power control, and multiple-input-multiple-output (MIMO) techniques are briefly introduced. The concepts of D2D direct and D2D local area networks (LANs) are proposed, a simulation scenario for D2D direct is given as an example, and, finally, the issues and challenges in D2D communications are outlined.
Overview of D2D communications
The term D2D communications commonly refers to the techniques that enable devices to communicate directly without an infrastructure of access points or base stations. D2D communications amount to a technology component for LTE-A, where user equipments (UEs) transmit data signals to each other over a direct link/connection using the cellular resources instead of through the eNB (i.e., a base station). As an underlay to the cellular network, D2D communications allow one to increase the spectral efficiency [1, 3, 4, 5, 6, 7, 8, 9]. While D2D communications is considered as an add-on component in the 4G systems, it is expected to be a native feature supported by the next-generation (e.g., fifth-generation [5G]) cellular networks.
Since the co-channel interference between cellular and D2D links causes performance degradation, resource management is necessary for D2D communications underlaying cellular networks. This chapter introduces the subchannel allocation and time-domain scheduling schemes, which improve the system performance effectively.
Subchannel allocation
Note that, with regard to the underlay approach, to mitigate cross- and co-layer interference, there would be a central entity in charge of intelligently telling each cell which subchannels to use. This entity would need to collect information from the D2D users, and use it to find an optimal or at least a good solution within a short period of time. The presence of a large number of D2D users, and the allowance for the coexistence of multiple D2D users with cellular users, makes the optimization problem too complex. Additionally, latency issues arise when trying to facilitate the communication of femto cells with the central subchannel broker throughout the backhaul. A distributed approach to mitigate cross- and co-layer interference, whereby the D2D users can manage their own subchannels, is thus more suitable in this case (i.e., self-organization). In a noncooperative solution, i.e., a self-organized approach, each D2D user would planits subchannels so as to maximize the throughput and QoS for its users. Furthermore, this would be done independently of the effects its allocation might cause for co-channel D2D and cellular users, even if this implies greater interference. The access to the sub-channels then becomes opportunistic, and it is possible that the method decays to greedy. By contrast, in a cooperative approach (the network-assisted approach), the D2D users can gather partial information about the subchannel usage situation and may perform its allocation taking into account the effect this would have on co-channel neighbors. In this way, the average cellular and D2D users' throughput and QoS, as well as their global performance, can be locally optimized.
An innovative resource-allocation scheme is proposed to improve the performance of a mobile peer-to-peer, i.e., D2D communication, system as an underlay in downlink (DL) cellular networks.
Now that more and more new mobile multimedia-rich services are becoming available to mobile users, there is an ever-increasing demand for higher-data-rate wireless access. Therefore, new wireless technologies such as Long Term Evolution Advanced (LTEA) and WiMAX have been introduced, which are capable of providing high-speed, large-capacity, and guaranteed-quality-of-service (QoS) mobile services. Apart from the new technologies, new techniques such as small-cell networks and heterogeneous networks (HetNets) have also been developed, which are able to improve network capacity by reducing cell size and effectively controlling the interference. However, all these attempts still rely on a centralized network topology, which entails mobile devices communicating with a base station or access point. Such a centralized network topology is inherently limited by the capabilities of the base station and access point, which could be congested due to the presence of a large number of communicating devices. Also, the base station and access point might not have complete information about transmission parameters among devices, which is required in order to achieve the optimal network performance. To mitigate this problem, the concept of device-to-device (D2D) communications has been introduced to allow local peer-to-peer transmission among mobile devices offloading traffic from the base station and access point. Also, it is crucial to increase the wireless network capacity to accommodate the bandwidth-consuming mobile applications and services. Device-to-device communications is a promising concept to improve user experience and resource utilization in cellular networks, operating in both licensed and unlicensed spectrum bands.
The D2D communications can underlay or overlay a cellular network, using the same resources to improve the system throughput. Specifically, besides cellular operation, where user equipment (UE) is served by the network via the evolved NodeBs (eNBs) in the LTE architecture, UEs may communicate with each other directly over the D2D links. The UE in D2D connections still has to be loosely controlled by the eNBs in a network-controlled manner, thus continuing cellular operation.