Skip to main content

Showing 1–21 of 21 results for author: David, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.12948  [pdf, other

    cs.CR

    POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft

    Authors: Joshua Smailes, Razvan David, Sebastian Kohler, Simon Birnbach, Ivan Martinovic

    Abstract: Recent years have seen a rapid increase in the number of CubeSats and other small satellites in orbit - these have highly constrained computational and communication resources, but still require robust secure communication to operate effectively. The QUIC transport layer protocol is designed to provide efficient communication with cryptography guarantees built-in, with a particular focus on netw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 2 pages, 2 figures; the first two authors contributed equally to this paper

  2. arXiv:2211.15432  [pdf, other

    cs.CL

    E2E Segmentation in a Two-Pass Cascaded Encoder ASR Model

    Authors: W. Ronny Huang, Shuo-Yiin Chang, Tara N. Sainath, Yanzhang He, David Rybach, Robert David, Rohit Prabhavalkar, Cyril Allauzen, Cal Peyser, Trevor D. Strohman

    Abstract: We explore unifying a neural segmenter with two-pass cascaded encoder ASR into a single model. A key challenge is allowing the segmenter (which runs in real-time, synchronously with the decoder) to finalize the 2nd pass (which runs 900 ms behind real-time) without introducing user-perceived latency or deletion errors during inference. We propose a design where the neural segmenter is integrated wi… ▽ More

    Submitted 5 March, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: ICASSP 2023

  3. arXiv:2207.14296  [pdf

    q-bio.OT cs.DB

    EOSC-LIFE WP4 TOOLBOX: Toolbox for sharing of sensitive data -- a concept description

    Authors: Jan-Willem Boiten, Christian Ohmann, Ayodeji Adeniran, Steve Canham, Monica Cano Abadia, Gauthier Chassang, Maria Luisa Chiusano, Romain David, Maddalena Fratelli, Phil Gribbon, Petr Holub, Rebecca Ludwig, Michaela Th. Mayrhofer, Mihaela Matei, Arshiya Merchant, Maria Panagiotopoulou, Luca Pireddu, Alex Sanchez Pla, Irene Schlünder, George Tsamis, Harald Wagener

    Abstract: The Horizon 2020 project EOSC-Life brings together the 13 Life Science 'ESFRI' research infrastructures to create an open, digital and collaborative space for biological and medical research. Sharing sensitive data is a specific challenge within EOSC-Life. For that reason, a toolbox is being developed, providing information to researchers who wish to share and/or use sensitive data in a cloud envi… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  4. arXiv:2204.06164  [pdf, other

    eess.AS cs.LG cs.SD

    A Unified Cascaded Encoder ASR Model for Dynamic Model Sizes

    Authors: Shao** Ding, Weiran Wang, Ding Zhao, Tara N. Sainath, Yanzhang He, Robert David, Rami Botros, Xin Wang, Rina Panigrahy, Qiao Liang, Dongseong Hwang, Ian McGraw, Rohit Prabhavalkar, Trevor Strohman

    Abstract: In this paper, we propose a dynamic cascaded encoder Automatic Speech Recognition (ASR) model, which unifies models for different deployment scenarios. Moreover, the model can significantly reduce model size and power consumption without loss of quality. Namely, with the dynamic cascaded encoder model, we explore three techniques to maximally boost the performance of each model size: 1) Use separa… ▽ More

    Submitted 24 June, 2022; v1 submitted 13 April, 2022; originally announced April 2022.

    Comments: Accepted by INTERSPEECH 2022

  5. arXiv:2109.07513  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    Tied & Reduced RNN-T Decoder

    Authors: Rami Botros, Tara N. Sainath, Robert David, Emmanuel Guzman, Wei Li, Yanzhang He

    Abstract: Previous works on the Recurrent Neural Network-Transducer (RNN-T) models have shown that, under some conditions, it is possible to simplify its prediction network with little or no loss in recognition accuracy (arXiv:2003.07705 [eess.AS], [2], arXiv:2012.06749 [cs.CL]). This is done by limiting the context size of previous labels and/or using a simpler architecture for its layers instead of LSTMs.… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Journal ref: Proc. Interspeech 2021, 4563-4567

  6. Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation

    Authors: Ronen Ben David, Anat Bremler Barr

    Abstract: In recent years, we have witnessed a new kind of DDoS attack, the burst attack(Chai, 2013; Dahan, 2018), where the attacker launches periodic bursts of traffic overload on online targets. Recent work presents a new kind of Burst attack, the YoYo attack (Bremler-Barr et al., 2017) that operates against the auto-scaling mechanism of VMs in the cloud. The periodic bursts of traffic loads cause the au… ▽ More

    Submitted 8 May, 2021; v1 submitted 2 May, 2021; originally announced May 2021.

    Comments: Paper contains 14 pages, 4 figures. This paper was presented in CLOSER 2021 conference on April 28,2021. CLOSER 2021 is the 11th International Conference on Cloud Computing and Services Science, which was organized by INSTICC. The paper is available soon at SCITEPRESS Digital Library

    Journal ref: Volume 1: CLOSER 2021,ISBN 978-989-758-510-4, pages 34-44

  7. arXiv:2012.08325  [pdf

    q-bio.OT cs.DB

    39 Hints to Facilitate the Use of Semantics for Data on Agriculture and Nutrition

    Authors: Caterina Caracciolo, Sophie Aubin, Clement Jonquet, Emna Amdouni, Romain David, Leyla Garcia, Brandon Whitehead, Catherine Roussey, Armando Stellato, Ferdinando Villa

    Abstract: In this paper, we report on the outputs and adoption of the Agrisemantics Working Group of the Research Data Alliance (RDA), consisting of a set of recommendations to facilitate the adoption of semantic technologies and methods for the purpose of data interoperability in the field of agriculture and nutrition. From 2016 to 2019, the group gathered researchers and practitioners at the crossing poin… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

    Journal ref: CODATA Data Science Journal, Committee on Data for Science and Technology (CODATA), 2020, 19 (1)

  8. arXiv:2010.08678  [pdf, other

    cs.LG cs.AI

    TensorFlow Lite Micro: Embedded Machine Learning on TinyML Systems

    Authors: Robert David, Jared Duke, Advait Jain, Vijay Janapa Reddi, Nat Jeffries, Jian Li, Nick Kreeger, Ian Nappier, Meghna Natraj, Shlomi Regev, Rocky Rhodes, Tiezhen Wang, Pete Warden

    Abstract: Deep learning inference on embedded devices is a burgeoning field with myriad applications because tiny embedded devices are omnipresent. But we must overcome major challenges before we can benefit from this opportunity. Embedded processors are severely resource constrained. Their nearest mobile counterparts exhibit at least a 100 -- 1,000x difference in compute capability, memory availability, an… ▽ More

    Submitted 13 March, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

  9. arXiv:1911.00153  [pdf, other

    cs.IT eess.SP

    On hybrid precoder/combiner for downlink mmWave massive MU-MIMO systems

    Authors: Alvaro Javier Ortega, Raimundo Sampaio-Neto, Rodrigo Pereira David

    Abstract: We propose four hybrid combiner/precoder for downlink mmWave massive MU-MIMO systems. The design of a hybrid combiner/precoder is divided in two parts, analog and digital. The system baseband model shows that the signal processed by the mobile station can be interpreted as a received signal in the presence of colored Gaussian noise, therefore, since the digital part of the combiner and precoder do… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

    Comments: 28 pages, 11 figures

  10. arXiv:1706.01347  [pdf, ps, other

    cs.DS

    Balanced Facilities on Random Graphs

    Authors: Roee David, Nimrod Talmon

    Abstract: Given a graph G with n vertices and k players, each of which is placing a facility on one of the vertices of G, we define the score of the i'th player to be the number of vertices for which, among all players, the facility placed by the i'th player is the closest. A placement is balanced if all players get roughly the same score. A graph is balanced if all placements on it are balanced. Viewing ba… ▽ More

    Submitted 5 June, 2017; originally announced June 2017.

  11. arXiv:1612.05675  [pdf, other

    cs.CR cs.SE

    Targeting Infeasibility Questions on Obfuscated Codes

    Authors: Robin David, Sébastien Bardin, Jean-Yves Marion

    Abstract: Software deobfuscation is a crucial activity in security analysis and especially, in malware analysis. While standard static and dynamic approaches suffer from well-known shortcomings, Dynamic Symbolic Execution (DSE) has recently been proposed has an interesting alternative, more robust than static analysis and more complete than dynamic analysis. Yet, DSE addresses certain kinds of questions enc… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

    ACM Class: D.4.6; K.6.5; D.2.4

  12. arXiv:1608.03245  [pdf, ps, other

    cs.CG cs.CC math.MG

    On the Complexity of Closest Pair via Polar-Pair of Point-Sets

    Authors: Roee David, Karthik C. S., Bundit Laekhanukit

    Abstract: Every graph $G$ can be represented by a collection of equi-radii spheres in a $d$-dimensional metric $Δ$ such that there is an edge $uv$ in $G$ if and only if the spheres corresponding to $u$ and $v$ intersect. The smallest integer $d$ such that $G$ can be represented by a collection of spheres (all of the same radius) in $Δ$ is called the sphericity of $G$, and if the collection of spheres are no… ▽ More

    Submitted 15 November, 2018; v1 submitted 10 August, 2016; originally announced August 2016.

    Comments: The paper was previously titled, "The Curse of Medium Dimension for Geometric Problems in Almost Every Norm"

    ACM Class: F.2.2

  13. arXiv:1604.08326  [pdf, other

    math.PR cs.DM

    Random walks with the minimum degree local rule have $O(n^2)$ cover time

    Authors: Roee David, Uriel Feige

    Abstract: For a simple (unbiased) random walk on a connected graph with $n$ vertices, the cover time (the expected number of steps it takes to visit all vertices) is at most $O(n^3)$. We consider locally biased random walks, in which the probability of traversing an edge depends on the degrees of its endpoints. We confirm a conjecture of Abdullah, Cooper and Draief [2015] that the min-degree local bias rule… ▽ More

    Submitted 18 July, 2016; v1 submitted 28 April, 2016; originally announced April 2016.

    Comments: 19 pages. 4 figures

  14. arXiv:1603.05183  [pdf, other

    cs.CC cs.DM cs.DS

    On the effect of randomness on planted 3-coloring models

    Authors: Roee David, Uriel Feige

    Abstract: We present the hosted coloring framework for studying algorithmic and hardness results for the $k$-coloring problem. There is a class ${\cal H}$ of host graphs. One selects a graph $H\in{\cal H}$ and plants in it a balanced $k$-coloring (by partitioning the vertex set into $k$ roughly equal parts, and removing all edges within each part). The resulting graph $G$ is given as input to a polynomial t… ▽ More

    Submitted 16 March, 2016; originally announced March 2016.

    Comments: 56 pages, one figure. To be appear in STOC 2016

    MSC Class: 68Q01

  15. About the range property for H

    Authors: René David, Karim Nour

    Abstract: Recently, A. Polonsky has shown that the range property fails for H. We give here some conditions on a closed term that imply that its range has an infinite cardinality.

    Submitted 21 January, 2014; v1 submitted 2 November, 2013; originally announced November 2013.

    Journal ref: Logical Methods in Computer Science, Volume 10, Issue 1 (January 21, 2014) lmcs:849

  16. A short proof that adding some permutation rules to $β$ preserves $SN$

    Authors: Rene David

    Abstract: I show that, if a term is $SN$ for $β$, it remains $SN$ when some permutation rules are added.

    Submitted 5 November, 2010; originally announced November 2010.

    Comments: Theoretical Computer Science, 2010

  17. arXiv:0905.2892  [pdf, ps, other

    math.LO cs.LO

    Strong normalization results by translation

    Authors: René David, Karim Nour

    Abstract: We prove the strong normalization of full classical natural deduction (i.e. with conjunction, disjunction and permutative conversions) by using a translation into the simply typed lambda-mu-calculus. We also extend Mendler's result on recursive equations to this system.

    Submitted 18 May, 2009; originally announced May 2009.

    Comments: Submitted to APAL

  18. Counting proofs in propositional logic

    Authors: René David, Marek Zaionc

    Abstract: We give a procedure for counting the number of different proofs of a formula in various sorts of propositional logic. This number is either an integer (that may be 0 if the formula is not provable) or infinite.

    Submitted 18 May, 2009; originally announced May 2009.

    Journal ref: Archive for Mathematical Logic 48 (2009) P 185-199

  19. arXiv:0905.2545  [pdf, ps, other

    math.LO cs.LO

    A direct proof of the confluence of combinatory strong reduction

    Authors: René David

    Abstract: I give a proof of the confluence of combinatory strong reduction that does not use the one of lambda-calculus. I also give simple and direct proofs of a standardization theorem for this reduction and the strong normalization of simply typed terms.

    Submitted 15 May, 2009; originally announced May 2009.

    Comments: To appear in TCS

  20. arXiv:0904.2955  [pdf, ps, other

    math.LO cs.LO

    A short proof that adding some permutation rules to beta preserves SN

    Authors: René David

    Abstract: I show that, if a term is $SN$ for $β$, it remains $SN$ when some permutation rules are added.

    Submitted 27 April, 2009; v1 submitted 20 April, 2009; originally announced April 2009.

  21. arXiv:0903.5505  [pdf, ps, other

    math.LO cs.DM cs.LO math.CO

    Asymptotically almost all λ-terms are strongly normalizing

    Authors: René David, Katarzyna Grygiel, Jakub Kozic, Christophe Raffalli, Guillaume Theyssier, Marek Zaionc

    Abstract: We present quantitative analysis of various (syntactic and behavioral) properties of random λ-terms. Our main results are that asymptotically all the terms are strongly normalizing and that any fixed closed term almost never appears in a random term. Surprisingly, in combinatory logic (the translation of the λ-calculus into combinators), the result is exactly opposite. We show that almost all term… ▽ More

    Submitted 13 February, 2013; v1 submitted 31 March, 2009; originally announced March 2009.

    ACM Class: G.2.1

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 1 (February 15, 2013) lmcs:848