id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0708.2462 | Deepak Sridhara | Christine A. Kelley and Deepak Sridhara | Eigenvalue bounds on the pseudocodeword weight of expander codes | Journal on Advances of Mathematics of Communications, vol. 1, no. 3,
pp. 287 -- 307, Aug. 2007 | Journal on Advances of Mathematics of Communications, vol. 1, no.
3, pp. 287 -- 307, Aug. 2007 | null | null | cs.IT math.IT | null | Four different ways of obtaining low-density parity-check codes from expander
graphs are considered. For each case, lower bounds on the minimum stopping set
size and the minimum pseudocodeword weight of expander (LDPC) codes are
derived. These bounds are compared with the known eigenvalue-based lower bounds
on the minimum distance of expander codes. Furthermore, Tanner's
parity-oriented eigenvalue lower bound on the minimum distance is generalized
to yield a new lower bound on the minimum pseudocodeword weight. These bounds
are useful in predicting the performance of LDPC codes under graph-based
iterative decoding and linear programming decoding.
| [
{
"version": "v1",
"created": "Sat, 18 Aug 2007 19:01:38 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Kelley",
"Christine A.",
""
],
[
"Sridhara",
"Deepak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2514 | Arash Rafiey | Arvind Gupta, Pavol Hell, Mehdi Karimi, Arash Rafiey | Minimum Cost Homomorphisms to Reflexive Digraphs | null | null | null | null | cs.DM cs.CC | null | For digraphs $G$ and $H$, a homomorphism of $G$ to $H$ is a mapping $f:\
V(G)\dom V(H)$ such that $uv\in A(G)$ implies $f(u)f(v)\in A(H)$. If moreover
each vertex $u \in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then
the cost of a homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed
digraph $H$, the {\em minimum cost homomorphism problem} for $H$, denoted
MinHOM($H$), is the following problem. Given an input digraph $G$, together
with costs $c_i(u)$, $u\in V(G)$, $i\in V(H)$, and an integer $k$, decide if
$G$ admits a homomorphism to $H$ of cost not exceeding $k$. We focus on the
minimum cost homomorphism problem for {\em reflexive} digraphs $H$ (every
vertex of $H$ has a loop). It is known that the problem MinHOM($H$) is
polynomial time solvable if the digraph $H$ has a {\em Min-Max ordering}, i.e.,
if its vertices can be linearly ordered by $<$ so that $i<j, s<r$ and $ir, js
\in A(H)$ imply that $is \in A(H)$ and $jr \in A(H)$. We give a forbidden
induced subgraph characterization of reflexive digraphs with a Min-Max
ordering; our characterization implies a polynomial time test for the existence
of a Min-Max ordering. Using this characterization, we show that for a
reflexive digraph $H$ which does not admit a Min-Max ordering, the minimum cost
homomorphism problem is NP-complete. Thus we obtain a full dichotomy
classification of the complexity of minimum cost homomorphism problems for
reflexive digraphs.
| [
{
"version": "v1",
"created": "Sat, 18 Aug 2007 23:34:45 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Oct 2007 13:31:36 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Gupta",
"Arvind",
""
],
[
"Hell",
"Pavol",
""
],
[
"Karimi",
"Mehdi",
""
],
[
"Rafiey",
"Arash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.2544 | Gregory Gutin | G. Gutin and E.J. Kim | On the Complexity of the Minimum Cost Homomorphism Problem for Reflexive
Multipartite Tournaments | null | null | null | null | cs.DM cs.DS | null | For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of
$D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed digraph $H$,
the homomorphism problem is to decide whether an input digraph $D$ admits a
homomorphism to $H$ or not, and is denoted as HOMP($H$). Digraphs are allowed
to have loops, but not allowed to have parallel arcs.
A natural optimization version of the homomorphism problem is defined as
follows. If each vertex $u \in V(D)$ is associated with costs $c_i(u), i \in
V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(D)}c_{f(u)}(u)$.
For each fixed digraph $H$, we have the {\em minimum cost homomorphism problem
for} $H$ and denote it as MinHOMP($H$). The problem is to decide, for an input
graph $D$ with costs $c_i(u),$ $u \in V(D), i\in V(H)$, whether there exists a
homomorphism of $D$ to $H$ and, if one exists, to find one of minimum cost.
In a recent paper, we posed a problem of characterizing polynomial time
solvable and NP-hard cases of the minimum cost homomorphism problem for acyclic
multipartite tournaments with possible loops (w.p.l.). In this paper, we solve
the problem for reflexive multipartite tournaments and demonstrate a
considerate difficulty of the problem for the whole class of multipartite
tournaments w.p.l. using, as an example, acyclic 3-partite tournaments of order
4 w.p.l.\footnote{This paper was submitted to Discrete Mathematics on April 6,
2007}
| [
{
"version": "v1",
"created": "Sun, 19 Aug 2007 13:00:59 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Kim",
"E. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.2545 | Gregory Gutin | E.J. Kim and G. Gutin | Complexity of the Minimum Cost Homomorphism Problem for Semicomplete
Digraphs with Possible Loops | null | null | null | null | cs.DM cs.DS | null | For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of
$D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed digraph $H$,
the homomorphism problem is to decide whether an input digraph $D$ admits a
homomorphism to $H$ or not, and is denoted as HOM($H$).
An optimization version of the homomorphism problem was motivated by a
real-world problem in defence logistics and was introduced in
\cite{gutinDAM154a}. If each vertex $u \in V(D)$ is associated with costs
$c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in
V(D)}c_{f(u)}(u)$. For each fixed digraph $H$, we have the {\em minimum cost
homomorphism problem for} $H$ and denote it as MinHOM($H$). The problem is to
decide, for an input graph $D$ with costs $c_i(u),$ $u \in V(D), i\in V(H)$,
whether there exists a homomorphism of $D$ to $H$ and, if one exists, to find
one of minimum cost.
Although a complete dichotomy classification of the complexity of MinHOM($H$)
for a digraph $H$ remains an unsolved problem, complete dichotomy
classifications for MinHOM($H$) were proved when $H$ is a semicomplete digraph
\cite{gutinDAM154b}, and a semicomplete multipartite digraph \cite{gutinDAM}.
In these studies, it is assumed that the digraph $H$ is loopless. In this
paper, we present a full dichotomy classification for semicomplete digraphs
with possible loops, which solves a problem in \cite{gutinRMS}.\footnote{This
paper was submitted to SIAM J. Discrete Math. on October 27, 2006}
| [
{
"version": "v1",
"created": "Sun, 19 Aug 2007 13:47:00 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Kim",
"E. J.",
""
],
[
"Gutin",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.2566 | Taesup Moon | Taesup Moon, Tsachy Weissman | Discrete Denoising with Shifts | 30 pages, 3 figures, submitted to IEEE Trans. Inform. Theory | null | 10.1109/TIT.2009.2030461 | null | cs.IT math.IT | null | We introduce S-DUDE, a new algorithm for denoising DMC-corrupted data. The
algorithm, which generalizes the recently introduced DUDE (Discrete Universal
DEnoiser) of Weissman et al., aims to compete with a genie that has access, in
addition to the noisy data, also to the underlying clean data, and can choose
to switch, up to $m$ times, between sliding window denoisers in a way that
minimizes the overall loss. When the underlying data form an individual
sequence, we show that the S-DUDE performs essentially as well as this genie,
provided that $m$ is sub-linear in the size of the data. When the clean data is
emitted by a piecewise stationary process, we show that the S-DUDE achieves the
optimum distribution-dependent performance, provided that the same
sub-linearity condition is imposed on the number of switches. To further
substantiate the universal optimality of the S-DUDE, we show that when the
number of switches is allowed to grow linearly with the size of the data,
\emph{any} (sequence of) scheme(s) fails to compete in the above senses. Using
dynamic programming, we derive an efficient implementation of the S-DUDE, which
has complexity (time and memory) growing only linearly with the data size and
the number of switches $m$. Preliminary experimental results are presented,
suggesting that S-DUDE has the capacity to significantly improve on the
performance attained by the original DUDE in applications where the nature of
the data abruptly changes in time (or space), as is often the case in practice.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 03:00:20 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Moon",
"Taesup",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2571 | Milton Chowdhury | M. M. Chowdhury | On the Security of the Cha-Ko-Lee-Han-Cheon Braid Group Public Key
Cryptosystem | null | null | null | null | cs.CR | null | We show that a number of cryptographic protocols using non-commutative
semigroups including the Cha-Ko-Lee-Han-Cheon braid group public-key
cryptosystem and related public-key cryptosystems such as the Shpilrain-Ushakov
public-key cryptosystems are based on the MSCSP.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 00:47:15 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Aug 2007 12:58:05 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Aug 2007 02:54:51 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Aug 2007 00:56:05 GMT"
},
{
"version": "v5",
"created": "Thu, 15 Nov 2007 22:28:36 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Chowdhury",
"M. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.2575 | Gregory Wornell | Uri Erez, Mitchell D. Trott and Gregory W. Wornell | Rateless Coding for Gaussian Channels | 18 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A rateless code-i.e., a rate-compatible family of codes-has the property that
codewords of the higher rate codes are prefixes of those of the lower rate
ones. A perfect family of such codes is one in which each of the codes in the
family is capacity-achieving. We show by construction that perfect rateless
codes with low-complexity decoding algorithms exist for additive white Gaussian
noise channels. Our construction involves the use of layered encoding and
successive decoding, together with repetition using time-varying layer weights.
As an illustration of our framework, we design a practical three-rate code
family. We further construct rich sets of near-perfect rateless codes within
our architecture that require either significantly fewer layers or lower
complexity than their perfect counterparts. Variations of the basic
construction are also developed, including one for time-varying channels in
which there is no a priori stochastic model.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 01:32:42 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jun 2011 21:04:26 GMT"
}
] | 2011-06-07T00:00:00 | [
[
"Erez",
"Uri",
""
],
[
"Trott",
"Mitchell D.",
""
],
[
"Wornell",
"Gregory W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2584 | Seiichiro Tani | Seiichiro Tani | Claw Finding Algorithms Using Quantum Walk | 12 pages. Introduction revised. A reference added. Weak lower bound
deleted | Theoretical Computer Science, 410(50): 5285-5297 (2009) | 10.1016/j.tcs.2009.08.030 | null | quant-ph cs.CC | null | The claw finding problem has been studied in terms of query complexity as one
of the problems closely connected to cryptography. For given two functions, f
and g, as an oracle which have domains of size N and M (N<=M), respectively,
and the same range, the goal of the problem is to find x and y such that
f(x)=g(y). This paper describes an optimal algorithm using quantum walk that
solves this problem. Our algorithm can be generalized to find a claw of k
functions for any constant integer k>1, where the domains of the functions may
have different size.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 07:56:12 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 13:23:09 GMT"
}
] | 2011-06-17T00:00:00 | [
[
"Tani",
"Seiichiro",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.2616 | Sourav Dhar | Sourav Dhar and Kabir Chakraborty | An Experimental Investigation of Secure Communication With Chaos Masking | 8 pages, 7 figures | null | null | null | cs.CR | null | The most exciting recent development in nonlinear dynamics is realization
that chaos can be useful. One application involves "Secure Communication". Two
piecewise linear systems with switching nonlinearities have been taken as chaos
generators. In the present work the phenomenon of secure communication with
chaos masking has been investigated experimentally. In this investigation chaos
which is generated from two chaos generators is masked with the massage signal
to be transmitted, thus makes communication is more secure.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 09:39:18 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Dhar",
"Sourav",
""
],
[
"Chakraborty",
"Kabir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.2668 | Daniel Reem | Daniel Reem, Simeon Reich | Zone and double zone diagrams in abstract spaces | 17 pages, 5 figures; slight modifications and additions (including
thanks); Theorem 5.5 was slightly improved. This version is essentially from
the beginning of 2009 and it does not take into account several developments
which have occurred since then | Colloquium Mathematicum 115 (2009), 129-145 | 10.4064/cm115-1-11 | null | math.MG cs.CG math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A zone diagram is a relatively new concept which was first defined and
studied by T. Asano, J. Matousek and T. Tokuyama. It can be interpreted as a
state of equilibrium between several mutually hostile kingdoms. Formally, it is
a fixed point of a certain mapping. These authors considered the Euclidean
plane and proved the existence and uniqueness of zone diagrams there. In the
present paper we generalize this concept in various ways. We consider general
sites in m-spaces (a simple generalization of metric spaces) and prove several
existence and (non)uniqueness results in this setting. In contrast to previous
works, our (rather simple) proofs are based on purely order theoretic
arguments. Many explicit examples are given, and some of them illustrate new
phenomena which occur in the general case. We also re-interpret zone diagrams
as a stable configuration in a certain combinatorial game, and provide an
algorithm for finding this configuration in a particular case.
| [
{
"version": "v1",
"created": "Sun, 19 Aug 2007 15:35:25 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jul 2011 13:30:41 GMT"
}
] | 2017-03-06T00:00:00 | [
[
"Reem",
"Daniel",
""
],
[
"Reich",
"Simeon",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0708.2686 | Darko Roglic | D. Roglic | The universal evolutionary computer based on super-recursive algorithms
of evolvability | 7 pages, 1 table, 1 figure | null | null | null | cs.NE | null | This work exposes which mechanisms and procesess in the Nature of evolution
compute a function not computable by Turing machine. The computer with
intelligence that is not higher than one bacteria population could have, but
with efficency to solve the problems that are non-computable by Turing machine
is represented. This theoretical construction is called Universal Evolutinary
Computer and it is based on the superecursive algorithms of evolvability.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 18:50:22 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Roglic",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0708.2717 | Alejandro Vaisman Prof. | Leticia Gomez, Bart Kuijpers, Alejandro Vaisman | Aggregation Languages for Moving Object and Places of Interest Data | 15 pages, 5 figures | null | null | null | cs.DB | null | We address aggregate queries over GIS data and moving object data, where
non-spatial data are stored in a data warehouse. We propose a formal data model
and query language to express complex aggregate queries. Next, we study the
compression of trajectory data, produced by moving objects, using the notions
of stops and moves. We show that stops and moves are expressible in our query
language and we consider a fragment of this language, consisting of regular
expressions to talk about temporally ordered sequences of stops and moves. This
fragment can be used to efficiently express data mining and pattern matching
tasks over trajectory data.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 20:08:53 GMT"
}
] | 2007-08-22T00:00:00 | [
[
"Gomez",
"Leticia",
""
],
[
"Kuijpers",
"Bart",
""
],
[
"Vaisman",
"Alejandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0708.2732 | Yingbin Liang | Yingbin Liang and H. Vincent Poor | Secrecy Capacity Region of Binary and Gaussian Multiple Access Channels | In Proceedings of the 44th Annual Allerton Conference on
Communication, Control and Computing, University of Illinois, Monticello, IL,
September 27-29, 2006 | null | null | null | cs.IT math.IT | null | A generalized multiple access channel (GMAC) with one confidential message
set is studied, where two users (users 1 and 2) attempt to transmit common
information to a destination, and user 1 also has confidential information
intended for the destination. Moreover, user 1 wishes to keep its confidential
information as secret as possible from user 2. A deterministic GMAC is first
studied, and the capacity-equivocation region and the secrecy capacity region
are obtained. Two main classes of the GMAC are then studied: the binary GMAC
and the Gaussian GMAC. For both channels, the capacity-equivocation region and
the secrecy capacity region are established.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 20:53:10 GMT"
}
] | 2007-08-22T00:00:00 | [
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2733 | Yingbin Liang | Yingbin Liang and H. Vincent Poor | Secure Communications over Fading Channels | In Proceedings of the 44th Annual Allerton Conference on
Communication, Control and Computing, University of Illinois, Monticello, IL,
September 27 - 29, 2006 | null | null | null | cs.IT math.IT | null | The fading wire-tap channel is investigated, where the source-to-destination
channel and the source-to-wire-tapper channel are corrupted by multiplicative
fading gain coefficients in addition to additive Gaussian noise terms. The
channel state information is assumed to be known at both the transmitter and
the receiver. The parallel wire-tap channel with independent subchannels is
first studied, which serves as an information-theoretic model for the fading
wire-tap channel. The secrecy capacity of the parallel wire-tap channel is
established. This result is then specialized to give the secrecy capacity of
the fading wire-tap channel, which is achieved with the source node dynamically
changing the power allocation according to the channel state realization. An
optimal source power allocation is obtained to achieve the secrecy capacity.
| [
{
"version": "v1",
"created": "Mon, 20 Aug 2007 21:16:32 GMT"
}
] | 2007-08-22T00:00:00 | [
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2784 | Ken-ichi Sugiyama | Ken-ichi Sugiyama | On a linear code from a configuration of affine lines | 13 pages | null | null | null | cs.IT cs.DM math.AG math.IT | null | We will show how to obtain a linear code from a configuration of affine lines
in general position and a suitable set of rational points. We will also explain
a new decoding algorithm based on the configuration, which seems to be quite
effective.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 08:57:07 GMT"
}
] | 2007-08-22T00:00:00 | [
[
"Sugiyama",
"Ken-ichi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2788 | Hanene Maghrebi | Han\`ene Maghrebi (LORIA), Amos David (LORIA) | Integrating users' needs into multimedia information retrieval system | null | Dans Third international conference on computer (2007) | null | null | cs.IR | null | The exponential growth of multimedia information and the development of
various communication media generated new problems at various levels including
the rate of flow of information, problems of storage and management. The
difficulty which arises is no longer the existence of information but rather
the access to this information. When designing multimedia information retrieval
system, it is appropriate to bear in mind the potential users and their
information needs. We assumed that multimedia information representation which
takes into account explicitly the users' needs and the cases of use could
contribute to the adaptation potentials of the system for the end-users. We
believe also that responses of multimedia information system would be more
relevant to the users' needs if the types of results to be used from the system
were identified before the design and development of the system. We propose the
integration of the users' information needs. More precisely integrating usage
contexts of resulting information in an information system (during creation and
feedback) should enhance more pertinent users' need. The first section of this
study is dedicated to traditional multimedia information systems and
specifically the approaches of representing multimedia information. Taking into
account the dynamism of users, these approaches do not permit the explicit
integration of the users' information needs. In this paper, we will present our
proposals based on economic intelligence approach. This approach emphasizes the
importance of starting any process of information retrieval witch the user
information need.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 09:04:49 GMT"
}
] | 2007-11-21T00:00:00 | [
[
"Maghrebi",
"Hanène",
"",
"LORIA"
],
[
"David",
"Amos",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0708.2804 | Yi Hong Dr | Ezio Biglieri, Yi Hong, Emanuele Viterbo | On Fast-Decodable Space-Time Block Codes | submitted to IEEE trans IT | null | null | null | cs.IT math.IT | null | We focus on full-rate, fast-decodable space-time block codes (STBCs) for 2x2
and 4x2 multiple-input multiple-output (MIMO) transmission. We first derive
conditions for reduced-complexity maximum-likelihood decoding, and apply them
to a unified analysis of two families of 2x2 STBCs that were recently proposed.
In particular, we describe a reduced-complexity sphere decoding algorithm
suitable for QAM signal constellations. Next, we derive a novel
reduced-complexity 4x2 STBC, and show that it outperforms all previously known
codes with certain constellations.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 10:57:59 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Mar 2008 14:58:25 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Biglieri",
"Ezio",
""
],
[
"Hong",
"Yi",
""
],
[
"Viterbo",
"Emanuele",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2843 | Roger Colbeck | Roger Colbeck | The Impossibility Of Secure Two-Party Classical Computation | 10 pages | Physical Review A 76, 062308 (2007) | 10.1103/PhysRevA.76.062308 | null | quant-ph cs.CR | null | We present attacks that show that unconditionally secure two-party classical
computation is impossible for many classes of function. Our analysis applies to
both quantum and relativistic protocols. We illustrate our results by showing
the impossibility of oblivious transfer.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 13:52:45 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Dec 2007 08:59:41 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Colbeck",
"Roger",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.2854 | Saugata Basu | Saugata Basu | Algorithmic Semi-algebraic Geometry and Topology -- Recent Progress and
Open Problems | Survey article, 74 pages, 15 figures. Final revision. This version
will appear in the AMS Contemporary Math. Series: Proceedings of the Summer
Research Conference on Discrete and Computational Geometry, Snowbird, Utah
(June, 2006). J.E. Goodman, J. Pach, R. Pollack Eds | null | null | null | math.GT cs.CC cs.CG math.AG math.AT | null | We give a survey of algorithms for computing topological invariants of
semi-algebraic sets with special emphasis on the more recent developments in
designing algorithms for computing the Betti numbers of semi-algebraic sets.
Aside from describing these results, we discuss briefly the background as well
as the importance of these problems, and also describe the main tools from
algorithmic semi-algebraic geometry, as well as algebraic topology, which make
these advances possible. We end with a list of open problems.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 14:55:56 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Sep 2007 23:12:20 GMT"
}
] | 2007-09-17T00:00:00 | [
[
"Basu",
"Saugata",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
0708.2893 | Karen Egiazarian | Nikolay Ponomarenko, Vladimir Lukin, Karen Egiazarian, Jaakko Astola,
Boris Y Ryabko | Fast Recursive Coding Based on Grouping of Symbols | 3 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | A novel fast recursive coding technique is proposed. It operates with only
integer values not longer 8 bits and is multiplication free. Recursion the
algorithm is based on indirectly provides rather effective coding of symbols
for very large alphabets. The code length for the proposed technique can be up
to 20-30% less than for arithmetic coding and, in the worst case it is only by
1-3% larger.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 17:41:18 GMT"
}
] | 2007-08-22T00:00:00 | [
[
"Ponomarenko",
"Nikolay",
""
],
[
"Lukin",
"Vladimir",
""
],
[
"Egiazarian",
"Karen",
""
],
[
"Astola",
"Jaakko",
""
],
[
"Ryabko",
"Boris Y",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2911 | Aslan Tchamkerten | Venkat Chandar, Aslan Tchamkerten, Gregory Wornell | Optimal Sequential Frame Synchronization | 6 pages | null | null | null | cs.IT math.IT | null | We consider the `one-shot frame synchronization problem' where a decoder
wants to locate a sync pattern at the output of a channel on the basis of
sequential observations. We assume that the sync pattern of length N starts
being emitted at a random time within some interval of size A, that
characterizes the asynchronism level between the transmitter and the receiver.
We show that a sequential decoder can optimally locate the sync pattern, i.e.,
exactly, without delay, and with probability approaching one as N tends to
infinity, if and only if the asynchronism level grows as O(exp(N*k)), with k
below the `synchronization threshold,' a constant that admits a simple
expression depending on the channel. This constant is the same as the one that
characterizes the limit for reliable asynchronous communication, as was
recently reported by the authors. If k exceeds the synchronization threshold,
any decoder, sequential or non-sequential, locates the sync pattern with an
error that tends to one as N tends to infinity. Hence, a sequential decoder can
locate a sync pattern as well as the (non-sequential) maximum likelihood
decoder that operates on the basis of output sequences of maximum length A+N-1,
but with much fewer observations.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 20:00:51 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Chandar",
"Venkat",
""
],
[
"Tchamkerten",
"Aslan",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2936 | David P{\l}aneta S | David S. Planeta | Priority Queue Based on Multilevel Prefix Tree | null | null | null | TR2006-2023 | cs.DS | null | Tree structures are very often used data structures. Among ordered types of
trees there are many variants whose basic operations such as insert, delete,
search, delete-min are characterized by logarithmic time complexity. In the
article I am going to present the structure whose time complexity for each of
the above operations is $O(\frac{M}{K} + K)$, where M is the size of data type
and K is constant properly matching the size of data type. Properly matched K
will make the structure function as a very effective Priority Queue. The
structure size linearly depends on the number and size of elements. PTrie is a
clever combination of the idea of prefix tree -- Trie, structure of logarithmic
time complexity for insert and remove operations, doubly linked list and
queues.
| [
{
"version": "v1",
"created": "Tue, 21 Aug 2007 22:59:49 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Planeta",
"David S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.2974 | Preda Mihailescu | Preda Mihailescu | The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack | null | null | null | null | cs.CV cs.CR | null | The \textit{fuzzy vault} approach is one of the best studied and well
accepted ideas for binding cryptographic security into biometric
authentication. The vault has been implemented in connection with fingerprint
data by Uludag and Jain. We show that this instance of the vault is vulnerable
to brute force attack. An interceptor of the vault data can recover both secret
and template data using only generally affordable computational resources. Some
possible alternatives are then discussed and it is suggested that cryptographic
security may be preferable to the one - way function approach to biometric
security.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 08:28:02 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Mihailescu",
"Preda",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.3014 | Elisa Gorla | Elisa Gorla, Christoph Puttmann, and Jamshid Shokrollahi | Explicit formulas for efficient multiplication in F_{3^{6m}} | 11 pages, to appear in the proceedings of SAC2007 | null | null | null | cs.CR cs.CC | null | Efficient computation of the Tate pairing is an important part of
pairing-based cryptography. Recently with the introduction of the Duursma-Lee
method special attention has been given to the fields of characteristic 3.
Especially multiplication in F_{3^{6m}}, where m is prime, is an important
operation in the above method. In this paper we propose a new method to reduce
the number of F_{3^m} multiplications for multiplication in F_{3^{6m}} from 18
in recent implementations to 15. The method is based on the fast Fourier
tranmsform and explicit formulas are given. The execution times of our software
implementations for F_{3^{6m}} show the efficiency of our results.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 13:52:09 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Gorla",
"Elisa",
""
],
[
"Puttmann",
"Christoph",
""
],
[
"Shokrollahi",
"Jamshid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.3019 | Ananthanarayanan Chockalingam | D. Sreedhar, A. Chockalingam, B. Sundar Rajan | Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent
Cooperative Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Space-time block codes (STBCs) that are single-symbol decodable (SSD) in a
co-located multiple antenna setting need not be SSD in a distributed
cooperative communication setting. A relay network with N relays and a single
source-destination pair is called a partially-coherent relay channel (PCRC) if
the destination has perfect channel state information (CSI) of all the channels
and the relays have only the phase information of the source-to-relay channels.
In this paper, first, a new set of necessary and sufficient conditions for a
STBC to be SSD for co-located multiple antenna communication is obtained. Then,
this is extended to a set of necessary and sufficient conditions for a
distributed STBC (DSTBC) to be SSD for a PCRC, by identifying the additional
conditions. Using this, several SSD DSTBCs for PCRC are identified among the
known classes of STBCs. It is proved that even if a SSD STBC for a co-located
MIMO channel does not satisfy the additional conditions for the code to be SSD
for a PCRC, single-symbol decoding of it in a PCRC gives full-diversity and
only coding gain is lost. It is shown that when a DSTBC is SSD for a PCRC, then
arbitrary coordinate interleaving of the in-phase and quadrature-phase
components of the variables does not disturb its SSD property for PCRC.
Finally, it is shown that the possibility of {\em channel phase compensation}
operation at the relay nodes using partial CSI at the relays increases the
possible rate of SSD DSTBCs from $\frac{2}{N}$ when the relays do not have CSI
to 1/2, which is independent of N.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 13:58:36 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Nov 2008 04:34:11 GMT"
}
] | 2008-11-29T00:00:00 | [
[
"Sreedhar",
"D.",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3022 | Elisa Gorla | Jamshid Shokrollahi, Elisa Gorla, Christoph Puttmann | Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}} | 6 pages, 3 figures, to appear in the proceedings of FPL07 | null | null | null | cs.CR | null | In this work we present a new structure for multiplication in finite fields.
This structure is based on a digit-level LFSR (Linear Feedback Shift Register)
multiplier in which the area of digit-multipliers are reduced using the
Karatsuba method. We compare our results with the other works in the literature
for F_{3^97}. We also propose new formulas for multiplication in F_{3^{6*97}}.
These new formulas reduce the number of F_{3^97}-multiplications from 18 to 15.
The fields F_{3^{97}} and F_{3^{6*97}} are relevant in the context of
pairing-based cryptography.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 14:17:08 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Shokrollahi",
"Jamshid",
""
],
[
"Gorla",
"Elisa",
""
],
[
"Puttmann",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.3048 | Alexandre d'Aspremont | Alexandre d'Aspremont | Identifying Small Mean Reverting Portfolios | null | null | null | null | cs.CE | null | Given multivariate time series, we study the problem of forming portfolios
with maximum mean reversion while constraining the number of assets in these
portfolios. We show that it can be formulated as a sparse canonical correlation
analysis and study various algorithms to solve the corresponding sparse
generalized eigenvalue problems. After discussing penalized parameter
estimation procedures, we study the sparsity versus predictability tradeoff and
the impact of predictability in various markets.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 16:25:17 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Feb 2008 16:29:01 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0708.3057 | Hai Jiang | Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang | Voice Service Support in Mobile Ad Hoc Networks | To appear in the Proceedings of the IEEE Global Communications
Conference (GLOBECOM), Washington, DC, November 26 - 30, 2007 | null | 10.1109/GLOCOM.2007.186 | null | cs.IT cs.NI math.IT | null | Mobile ad hoc networks are expected to support voice traffic. The requirement
for small delay and jitter of voice traffic poses a significant challenge for
medium access control (MAC) in such networks. User mobility makes it more
complex due to the associated dynamic path attenuation. In this paper, a MAC
scheme for mobile ad hoc networks supporting voice traffic is proposed. With
the aid of a low-power probe prior to DATA transmissions, resource reservation
is achieved in a distributed manner, thus leading to small delay and jitter.
The proposed scheme can automatically adapt to dynamic path attenuation in a
mobile environment. Simulation results demonstrate the effectiveness of the
proposed scheme.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 17:12:10 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Jiang",
"Hai",
""
],
[
"Wang",
"Ping",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Zhuang",
"Weihua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3070 | Salah Aly A | Zhenning Kong, Salah A. Aly, Emina Soljanin, Edmund M. Yeh and Andreas
Klappenecker | Network Coding Capacity of Random Wireless Networks under a
Signal-to-Interference-and-Noise Model | null | null | null | null | cs.IT math.IT | null | In this paper, we study network coding capacity for random wireless networks.
Previous work on network coding capacity for wired and wireless networks have
focused on the case where the capacities of links in the network are
independent. In this paper, we consider a more realistic model, where wireless
networks are modeled by random geometric graphs with interference and noise. In
this model, the capacities of links are not independent. We consider two
scenarios, single source multiple destinations and multiple sources multiple
destinations. In the first scenario, employing coupling and martingale methods,
we show that the network coding capacity for random wireless networks still
exhibits a concentration behavior around the mean value of the minimum cut
under some mild conditions. Furthermore, we establish upper and lower bounds on
the network coding capacity for dependent and independent nodes. In the second
one, we also show that the network coding capacity still follows a
concentration behavior. Our simulation results confirm our theoretical
predictions.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2007 18:51:19 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Kong",
"Zhenning",
""
],
[
"Aly",
"Salah A.",
""
],
[
"Soljanin",
"Emina",
""
],
[
"Yeh",
"Edmund M.",
""
],
[
"Klappenecker",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3127 | Yong Wang | Wang Yong | Question on Conditional Entropy | null | null | null | null | cs.IT math.IT | null | The problems of conditional entropy's definition and the formula to compute
conditional entropy are analyzed from various perspectives, and the corrected
computing formula is presented. Examples are given to prove the conclusion that
conditional entropy never be increased is not absolute, thus the representation
that information is to decrease uncertainty in the definition of information is
not absolutely correct.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 05:56:47 GMT"
}
] | 2007-08-24T00:00:00 | [
[
"Yong",
"Wang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3166 | Achmad Benny Mutiara | A. B. Mutiara and T. A. Sabastian | Web Server Benchmark Application WiiBench using Erlang/OTP R11 and
Fedora-Core Linux 5.0 | null | null | null | null | cs.NI | null | As the web grows and the amount of traffics on the web server increase,
problems related to performance begin to appear. Some of the problems, such as
the number of users that can access the server simultaneously, the number of
requests that can be handled by the server per second (requests per second) to
bandwidth consumption and hardware utilization like memories and CPU. To give
better quality of service (\textbf{\textit{QoS}}), web hosting providers and
also the system administrators and network administrators who manage the server
need a benchmark application to measure the capabilities of their servers.
Later, the application intends to work under Linux/Unix -- like platforms and
built using Erlang/OTP R11 as a concurrent oriented language under Fedora Core
Linux 5.0. \textbf{\textit{WiiBench}} is divided into two main parts, the
controller section and the launcher section. Controller is the core of the
application. It has several duties, such as read the benchmark scenario file,
configure the program based on the scenario, initialize the launcher section,
gather the benchmark results from local and remote Erlang node where the
launcher runs and write them in a log file (later the log file will be used to
generate a report page for the sysadmin). Controller also has function as a
timer which act as timing for user inters arrival to the server. Launcher
generates a number of users based on the scenario, initialize them and start
the benchmark by sending requests to the web server. The clients also gather
the benchmark result and send them to the controller.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 12:25:50 GMT"
}
] | 2007-08-24T00:00:00 | [
[
"Mutiara",
"A. B.",
""
],
[
"Sabastian",
"T. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.3220 | Jean-Charles Delvenne | Jean-Charles Delvenne, Ruggero Carli and Sandro Zampieri | Optimal strategies in the average consensus problem | 9 pages; extended preprint with proofs of a CDC 2007 (Conference on
decision and Control) paper | null | null | null | cs.MA cs.NI math.OC | null | We prove that for a set of communicating agents to compute the average of
their initial positions (average consensus problem), the optimal topology of
communication is given by a de Bruijn's graph. Consensus is then reached in a
finitely many steps. A more general family of strategies, constructed by block
Kronecker products, is investigated and compared to Cayley strategies.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 17:53:54 GMT"
}
] | 2013-09-18T00:00:00 | [
[
"Delvenne",
"Jean-Charles",
""
],
[
"Carli",
"Ruggero",
""
],
[
"Zampieri",
"Sandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0708.3224 | Jeffrey Shallit | Jui-Yi Kao, Jeffrey Shallit, Zhi Xu | The Frobenius Problem in a Free Monoid | 19 pages; preliminary announcement | null | null | null | cs.DM math.CO | null | The classical Frobenius problem is to compute the largest number g not
representable as a non-negative integer linear combination of non-negative
integers x_1, x_2, ..., x_k, where gcd(x_1, x_2, ..., x_k) = 1. In this paper
we consider generalizations of the Frobenius problem to the noncommutative
setting of a free monoid. Unlike the commutative case, where the bound on g is
quadratic, we are able to show exponential or subexponential behavior for an
analogue of g, depending on the particular measure chosen.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 18:23:20 GMT"
}
] | 2007-08-24T00:00:00 | [
[
"Kao",
"Jui-Yi",
""
],
[
"Shallit",
"Jeffrey",
""
],
[
"Xu",
"Zhi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0708.3226 | Rustem Takhanov | Rustem Takhanov | A Dichotomy Theorem for General Minimum Cost Homomorphism Problem | 23 pages | null | null | null | cs.LG cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the constraint satisfaction problem ($CSP$), the aim is to find an
assignment of values to a set of variables subject to specified constraints. In
the minimum cost homomorphism problem ($MinHom$), one is additionally given
weights $c_{va}$ for every variable $v$ and value $a$, and the aim is to find
an assignment $f$ to the variables that minimizes $\sum_{v} c_{vf(v)}$. Let
$MinHom(\Gamma)$ denote the $MinHom$ problem parameterized by the set of
predicates allowed for constraints. $MinHom(\Gamma)$ is related to many
well-studied combinatorial optimization problems, and concrete applications can
be found in, for instance, defence logistics and machine learning. We show that
$MinHom(\Gamma)$ can be studied by using algebraic methods similar to those
used for CSPs. With the aid of algebraic techniques, we classify the
computational complexity of $MinHom(\Gamma)$ for all choices of $\Gamma$. Our
result settles a general dichotomy conjecture previously resolved only for
certain classes of directed graphs, [Gutin, Hell, Rafiey, Yeo, European J. of
Combinatorics, 2008].
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 18:26:21 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Aug 2008 21:54:49 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jan 2009 13:53:56 GMT"
},
{
"version": "v4",
"created": "Fri, 23 Jan 2009 16:13:44 GMT"
},
{
"version": "v5",
"created": "Mon, 20 Apr 2009 15:18:35 GMT"
},
{
"version": "v6",
"created": "Thu, 16 Jul 2009 16:43:08 GMT"
},
{
"version": "v7",
"created": "Sun, 4 Apr 2010 20:39:03 GMT"
}
] | 2010-04-06T00:00:00 | [
[
"Takhanov",
"Rustem",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.3230 | Kamil Kulesza | Kamil Kulesza | Can Alice and Bob be random: a study on human playing zero knowledge
protocols | An extended abstract of the paper submitted for publication, 3 pages
total | null | null | null | cs.CR cs.CY | null | The research described in this abstract was initiated by discussions between
the author and Giovanni Di Crescenzo in Barcelona in early 2004. It was during
Advanced Course on Contemporary Cryptology that Di Crescenzo gave a course on
zero knowledge protocols (ZKP), see [1]. After that course we started to play
with unorthodox ideas for breaking ZKP, especially one based on graph
3-coloring. It was chosen for investigation because it is being considered as a
"benchmark" ZKP, see [2], [3]. At this point we briefly recall such a
protocol's description.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 18:39:56 GMT"
}
] | 2007-08-24T00:00:00 | [
[
"Kulesza",
"Kamil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.3259 | Rasmus Pagh | Philip Bille, Anna Pagh, Rasmus Pagh | Fast evaluation of union-intersection expressions | null | null | null | null | cs.DS cs.DB cs.IR | null | We show how to represent sets in a linear space data structure such that
expressions involving unions and intersections of sets can be computed in a
worst-case efficient way. This problem has applications in e.g. information
retrieval and database systems. We mainly consider the RAM model of
computation, and sets of machine words, but also state our results in the I/O
model. On a RAM with word size $w$, a special case of our result is that the
intersection of $m$ (preprocessed) sets, containing $n$ elements in total, can
be computed in expected time $O(n (\log w)^2 / w + km)$, where $k$ is the
number of elements in the intersection. If the first of the two terms
dominates, this is a factor $w^{1-o(1)}$ faster than the standard solution of
merging sorted lists. We show a cell probe lower bound of time $\Omega(n/(w m
\log m)+ (1-\tfrac{\log k}{w}) k)$, meaning that our upper bound is nearly
optimal for small $m$. Our algorithm uses a novel combination of approximate
set representations and word-level parallelism.
| [
{
"version": "v1",
"created": "Thu, 23 Aug 2007 22:23:04 GMT"
}
] | 2007-08-27T00:00:00 | [
[
"Bille",
"Philip",
""
],
[
"Pagh",
"Anna",
""
],
[
"Pagh",
"Rasmus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0708.3341 | Noelle Carbonell | Olivier Christmann (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Browsing through 3D representations of unstructured picture collections:
an empirical study | 4 pages | Dans Proceedings of ACM Working Conference on Advanced Visual
Interfaces (AVI 2006), Venezia, Italy, May 23-26, 2006 - ACM Working
Conference on Advanced Visual Interfaces (AVI 2006), Venezia : Italie (2006) | null | null | cs.HC | null | The paper presents a 3D interactive representation of fairly large picture
collections which facilitates browsing through unstructured sets of icons or
pictures. Implementation of this representation implies choosing between two
visualization strategies: users may either manipulate the view (OV) or be
immersed in it (IV). The paper first presents this representation, then
describes an empirical study (17 participants) aimed at assessing the utility
and usability of each view. Subjective judgements in questionnaires and
debriefings were varied: 7 participants preferred the IV view, 4 the OV one,
and 6 could not choose between the two. Visual acuity and visual exploration
strategies seem to have exerted a greater influence on participants'
preferences than task performance or feeling of immersion.
| [
{
"version": "v1",
"created": "Fri, 24 Aug 2007 13:33:38 GMT"
}
] | 2007-08-27T00:00:00 | [
[
"Christmann",
"Olivier",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3381 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Architecture Optimization of a 3-DOF Translational Parallel Mechanism
for Machining Applications, the Orthoglide | null | IEEE Transactions on Robotics and Automation 19, 3 (2003) 403-410 | null | null | cs.RO | null | This paper addresses the architecture optimization of a 3-DOF translational
parallel mechanism designed for machining applications. The design optimization
is conducted on the basis of a prescribed Cartesian workspace with prescribed
kinetostatic performances. The resulting machine, the Orthoglide, features
three fixed parallel linear joints which are mounted orthogonally and a mobile
platform which moves in the Cartesian x-y-z space with fixed orientation. The
interesting features of the Orthoglide are a regular Cartesian workspace shape,
uniform performances in all directions and good compactness. A small-scale
prototype of the Orthoglide under development is presented at the end of this
paper.
| [
{
"version": "v1",
"created": "Fri, 24 Aug 2007 18:25:36 GMT"
}
] | 2007-08-27T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3387 | Zhihang Yi | Zhihang Yi and Il-Min Kim | The Impact of Noise Correlation and Channel Phase Information on the
Data-Rate of the Single-Symbol ML Decodable Distributed STBCs | null | null | null | null | cs.IT math.IT | null | Very recently, we proposed the row-monomial distributed orthogonal space-time
block codes (DOSTBCs) and showed that the row-monomial DOSTBCs achieved
approximately twice higher bandwidth efficiency than the repetitionbased
cooperative strategy [1]. However, we imposed two limitations on the
row-monomial DOSTBCs. The first one was that the associated matrices of the
codes must be row-monomial. The other was the assumption that the relays did
not have any channel state information (CSI) of the channels from the source to
the relays, although this CSI could be readily obtained at the relays without
any additional pilot signals or any feedback overhead. In this paper, we first
remove the row-monomial limitation; but keep the CSI limitation. In this case,
we derive an upper bound of the data-rate of the DOSTBC and it is larger than
that of the row-monomial DOSTBCs in [1]. Secondly, we abandon the CSI
limitation; but keep the row-monomial limitation. Specifically, we propose the
row-monomial DOSTBCs with channel phase information (DOSTBCs-CPI) and derive an
upper bound of the data-rate of those codes. The rowmonomial DOSTBCs-CPI have
higher data-rate than the DOSTBCs and the row-monomial DOSTBCs. Furthermore, we
find the actual row-monomial DOSTBCs-CPI which achieve the upper bound of the
data-rate.
| [
{
"version": "v1",
"created": "Fri, 24 Aug 2007 19:17:29 GMT"
}
] | 2007-08-27T00:00:00 | [
[
"Yi",
"Zhihang",
""
],
[
"Kim",
"Il-Min",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3408 | David P{\l}aneta S | David S. Planeta | Linear Time Algorithms Based on Multilevel Prefix Tree for Finding
Shortest Path with Positive Weights and Minimum Spanning Tree in a Networks | null | null | null | Cornell University TR2006-2043 | cs.DS | null | In this paper I present general outlook on questions relevant to the basic
graph algorithms; Finding the Shortest Path with Positive Weights and Minimum
Spanning Tree. I will show so far known solution set of basic graph problems
and present my own. My solutions to graph problems are characterized by their
linear worst-case time complexity. It should be noticed that the algorithms
which compute the Shortest Path and Minimum Spanning Tree problems not only
analyze the weight of arcs (which is the main and often the only criterion of
solution hitherto known algorithms) but also in case of identical path weights
they select this path which walks through as few vertices as possible. I have
presented algorithms which use priority queue based on multilevel prefix tree
-- PTrie. PTrie is a clever combination of the idea of prefix tree -- Trie, the
structure of logarithmic time complexity for insert and remove operations,
doubly linked list and queues. In C++ I will implement linear worst-case time
algorithm computing the Single-Destination Shortest-Paths problem and I will
explain its usage.
| [
{
"version": "v1",
"created": "Fri, 24 Aug 2007 21:58:29 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Planeta",
"David S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.3446 | L.T. Handoko | Z. Akbar and L.T. Handoko | Multi and Independent Block Approach in Public Cluster | 3 pages, Proceeding of the 3rd Information and Communication
Technology Seminar 2007 | null | null | FISIKALIPI-07012 | cs.DC | null | We present extended multi block approach in the LIPI Public Cluster. The
multi block approach enables a cluster to be divided into several independent
blocks which run jobs owned by different users simultaneously. Previously, we
have maintained the blocks using single master node for all blocks due to
efficiency and resource limitations. Following recent advancements and
expansion of node\'s number, we have modified the multi block approach with
multiple master nodes, each of them is responsible for a single block. We argue
that this approach improves the overall performance significantly, for
especially data intensive computational works.
| [
{
"version": "v1",
"created": "Sat, 25 Aug 2007 19:46:52 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Sep 2007 21:22:23 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.3463 | Sabatino Costanzo | Sabatino Costanzo, Loren Trigo, Luis Jimenez, Juan Gonzalez | A Neural Networks Model of the Venezuelan Economy | null | null | null | null | cs.CE cs.NE | null | Besides an indicator of the GDP, the Central Bank of Venezuela generates the
so called Monthly Economic Activity General Indicator. The a priori knowledge
of this indicator, which represents and sometimes even anticipates the
economy's fluctuations, could be helpful in developing public policies and in
investment decision making. The purpose of this study is forecasting the IGAEM
through non parametric methods, an approach that has proven effective in a wide
variety of problems in economics and finance.
| [
{
"version": "v1",
"created": "Sun, 26 Aug 2007 05:10:29 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Costanzo",
"Sabatino",
""
],
[
"Trigo",
"Loren",
""
],
[
"Jimenez",
"Luis",
""
],
[
"Gonzalez",
"Juan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0708.3464 | Sabatino Costanzo | Sabatino Costanzo, Loren Trigo, Ramses Dominguez, William Moreno | A Non Parametric Study of the Volatility of the Economy as a Country
Risk Predictor | null | null | null | null | cs.CE cs.NE | null | This paper intends to explain Venezuela's country spread behavior through the
Neural Networks analysis of a monthly economic activity general index of
economic indicators constructed by the Central Bank of Venezuela, a measure of
the shocks affecting country risk of emerging markets and the U.S. short term
interest rate. The use of non parametric methods allowed the finding of non
linear relationship between these inputs and the country risk. The networks
performance was evaluated using the method of excess predictability.
| [
{
"version": "v1",
"created": "Sun, 26 Aug 2007 05:30:18 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Costanzo",
"Sabatino",
""
],
[
"Trigo",
"Loren",
""
],
[
"Dominguez",
"Ramses",
""
],
[
"Moreno",
"William",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0708.3465 | Sabatino Costanzo | Loren Trigo, Sabatino Costanzo, Felix Gonzalez, Jose Llamozas | An Early Warning System for Bankruptcy Prediction: lessons from the
Venezuelan Bank Crisis | null | null | null | null | cs.CE | null | During 1993-94 Venezuela experienced a severe banking crisis which ended up
with 18 commercial banks intervened by the government. Here we develop an early
warning system for detecting credit related bankruptcy through discriminant
functions developed on financial and macroeconomic data predating the crisis. A
robustness test performed on these functions shows high precision in error
estimation. The model calibrated on pre-crisis data could detect abnormal
financial tension in the late Banco Capital many months before it was
intervened and liquidated.
| [
{
"version": "v1",
"created": "Sun, 26 Aug 2007 05:33:41 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Trigo",
"Loren",
""
],
[
"Costanzo",
"Sabatino",
""
],
[
"Gonzalez",
"Felix",
""
],
[
"Llamozas",
"Jose",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0708.3477 | Alexander Rabinovich | Alexander Rabinovich | The Church Synthesis Problem with Parameters | null | Logical Methods in Computer Science, Volume 3, Issue 4 (November
14, 2007) lmcs:1233 | 10.2168/LMCS-3(4:9)2007 | null | cs.LO | null | For a two-variable formula ψ(X,Y) of Monadic Logic of Order (MLO) the
Church Synthesis Problem concerns the existence and construction of an operator
Y=F(X) such that ψ(X,F(X)) is universally valid over Nat.
B\"{u}chi and Landweber proved that the Church synthesis problem is
decidable; moreover, they showed that if there is an operator F that solves the
Church Synthesis Problem, then it can also be solved by an operator defined by
a finite state automaton or equivalently by an MLO formula. We investigate a
parameterized version of the Church synthesis problem. In this version ψ
might contain as a parameter a unary predicate P. We show that the Church
synthesis problem for P is computable if and only if the monadic theory of
<Nat,<,P> is decidable. We prove that the B\"{u}chi-Landweber theorem can be
extended only to ultimately periodic parameters. However, the MLO-definability
part of the B\"{u}chi-Landweber theorem holds for the parameterized version of
the Church synthesis problem.
| [
{
"version": "v1",
"created": "Sun, 26 Aug 2007 12:08:30 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Nov 2007 12:01:15 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Rabinovich",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.3499 | Francesc Rossell\'o | Gabriel Cardona, Francesc Rossello, Gabriel Valiente | Comparison of Tree-Child Phylogenetic Networks | 37 pages | null | null | null | q-bio.PE cs.CE cs.DM | null | Phylogenetic networks are a generalization of phylogenetic trees that allow
for the representation of non-treelike evolutionary events, like recombination,
hybridization, or lateral gene transfer. In this paper, we present and study a
new class of phylogenetic networks, called tree-child phylogenetic networks,
where every non-extant species has some descendant through mutation. We provide
an injective representation of these networks as multisets of vectors of
natural numbers, their path multiplicity vectors, and we use this
representation to define a distance on this class and to give an alignment
method for pairs of these networks. To the best of our knowledge, they are
respectively the first true distance and the first alignment method defined on
a meaningful class of phylogenetic networks strictly extending the class of
phylogenetic trees. Simple, polynomial algorithms for reconstructing a
tree-child phylogenetic network from its path multiplicity vectors, for
computing the distance between two tree-child phylogenetic networks, and for
aligning a pair of tree-child phylogenetic networks, are provided, and they
have been implemented as a Perl package and a Java applet, and they are
available at http://bioinfo.uib.es/~recerca/phylonetworks/mudistance
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 09:37:55 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Cardona",
"Gabriel",
""
],
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.3505 | Noelle Carbonell | Daniel Gepner (INRIA Rocquencourt / INRIA Lorraine - LORIA),
J\'er\^ome Simonin (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle
Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Gaze as a Supplementary Modality for Interacting with Ambient
Intelligence Environments | 10 pages | Dans Universal Access to Ambient Interaction, Springer-Verlag,
LNCS-LNAI Series, number 4555 - 12th International Conference on
Human-Computer Interaction (HCI Internatinal 2007), Beijing : China (2007) | null | null | cs.HC | null | We present our current research on the implementation of gaze as an efficient
and usable pointing modality supplementary to speech, for interacting with
augmented objects in our daily environment or large displays, especially
immersive virtual reality environments, such as reality centres and caves. We
are also addressing issues relating to the use of gaze as the main interaction
input modality. We have designed and developed two operational user interfaces:
one for providing motor-disabled users with easy gaze-based access to map
applications and graphical software; the other for iteratively testing and
improving the usability of gaze-contingent displays.
| [
{
"version": "v1",
"created": "Sun, 26 Aug 2007 18:53:41 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Gepner",
"Daniel",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Simonin",
"Jérôme",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3522 | Saugata Basu | Saugata Basu, Dmitrii V. Pasechnik, Marie-Francoise Roy | Bounding the Betti numbers and computing the Euler-Poincar\'e
characteristic of semi-algebraic sets defined by partly quadratic systems of
polynomials | 23 pages, 1 figure. Shortened revised version to appear in the J.
Eur. Math. Soc | J. European Math. Soc. 12(2010), 529-553 | 10.1137/070711141 | null | math.AG cs.SC math.AT math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\R$ be a real closed field, $ {\mathcal Q} \subset
\R[Y_1,...,Y_\ell,X_1,...,X_k], $ with $ \deg_{Y}(Q) \leq 2, \deg_{X}(Q) \leq
d, Q \in {\mathcal Q}, #({\mathcal Q})=m,$ and $ {\mathcal P} \subset
\R[X_1,...,X_k] $ with $\deg_{X}(P) \leq d, P \in {\mathcal P}, #({\mathcal
P})=s$, and $S \subset \R^{\ell+k}$ a semi-algebraic set defined by a Boolean
formula without negations, with atoms $P=0, P \geq 0, P \leq 0, P \in {\mathcal
P} \cup {\mathcal Q}$. We prove that the sum of the Betti numbers of $S$ is
bounded by \[ \ell^2 (O(s+\ell+m)\ell d)^{k+2m}. \] This is a common
generalization of previous results on bounding the Betti numbers of closed
semi-algebraic sets defined by polynomials of degree $d$ and 2, respectively.
We also describe an algorithm for computing the Euler-Poincar\'e
characteristic of such sets, generalizing similar algorithms known before. The
complexity of the algorithm is bounded by $(\ell s m d)^{O(m(m+k))}$.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 01:31:17 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jun 2008 14:04:51 GMT"
}
] | 2010-10-21T00:00:00 | [
[
"Basu",
"Saugata",
""
],
[
"Pasechnik",
"Dmitrii V.",
""
],
[
"Roy",
"Marie-Francoise",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
0708.3531 | Xiaolin Wu | Xiaolin Wu, Xiaohan Wang and Zhe Wang | Networked Multiple Description Estimation and Compression with Resource
Scalability | null | null | null | null | cs.IT math.IT | null | We present a joint source-channel multiple description (JSC-MD) framework for
resource-constrained network communications (e.g., sensor networks), in which
one or many deprived encoders communicate a Markov source against bit errors
and erasure errors to many heterogeneous decoders, some powerful and some
deprived. To keep the encoder complexity at minimum, the source is coded into K
descriptions by a simple multiple description quantizer (MDQ) with neither
entropy nor channel coding. The code diversity of MDQ and the path diversity of
the network are exploited by decoders to correct transmission errors and
improve coding efficiency. A key design objective is resource scalability:
powerful nodes in the network can perform JSC-MD distributed
estimation/decoding under the criteria of maximum a posteriori probability
(MAP) or minimum mean-square error (MMSE), while primitive nodes resort to
simpler MD decoding, all working with the same MDQ code. The application of
JSC-MD to distributed estimation of hidden Markov models in a sensor network is
demonstrated. The proposed JSC-MD MAP estimator is an algorithm of the longest
path in a weighted directed acyclic graph, while the JSC-MD MMSE decoder is an
extension of the well-known forward-backward algorithm to multiple
descriptions. Both algorithms simultaneously exploit the source memory, the
redundancy of the fixed-rate MDQ, and the inter-description correlations. They
outperform the existing hard-decision MDQ decoders by large margins (up to
8dB). For Gaussian Markov sources, the complexity of JSC-MD distributed MAP
sequence estimation can be made as low as that of typical single description
Viterbi-type algorithms.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 03:11:22 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Wu",
"Xiaolin",
""
],
[
"Wang",
"Xiaohan",
""
],
[
"Wang",
"Zhe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3564 | Eugen Zalinescu | Hubert Comon-Lundh and V\'eronique Cortier and Eugen Zalinescu | Deciding security properties for cryptographic protocols. Application to
key cycles | revised version (corrected small mistakes, improved presentation); to
be published in ACM Transactions on Computational Logic; 39 pages | null | null | null | cs.LO cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a large amount of work dedicated to the formal verification of
security protocols. In this paper, we revisit and extend the NP-complete
decision procedure for a bounded number of sessions. We use a, now standard,
deducibility constraints formalism for modeling security protocols. Our first
contribution is to give a simple set of constraint simplification rules, that
allows to reduce any deducibility constraint system to a set of solved forms,
representing all solutions (within the bound on sessions).
As a consequence, we prove that deciding the existence of key cycles is
NP-complete for a bounded number of sessions. The problem of key-cycles has
been put forward by recent works relating computational and symbolic models.
The so-called soundness of the symbolic model requires indeed that no key cycle
(e.g., enc(k,k)) ever occurs in the execution of the protocol. Otherwise,
stronger security assumptions (such as KDM-security) are required.
We show that our decision procedure can also be applied to prove again the
decidability of authentication-like properties and the decidability of a
significant fragment of protocols with timestamps.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 11:20:33 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Mar 2009 16:43:04 GMT"
}
] | 2009-03-20T00:00:00 | [
[
"Comon-Lundh",
"Hubert",
""
],
[
"Cortier",
"Véronique",
""
],
[
"Zalinescu",
"Eugen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.3567 | Joerg Wagner | Joerg Wagner and Armin Wittneben | On the Distortion of the Eigenvalue Spectrum in MIMO Amplify-and-Forward
Multi-Hop Channels | submitted to Eurasip Journal on Wireless Communications and
Networking | null | null | null | cs.IT math.IT | null | Consider a wireless MIMO multi-hop channel with n_s non-cooperating source
antennas and n_d fully cooperating destination antennas, as well as L clusters
containing k non-cooperating relay antennas each. The source signal traverses
all L clusters of relay antennas, before it reaches the destination. When relay
antennas within the same cluster scale their received signals by the same
constant before the retransmission, the equivalent channel matrix H relating
the input signals at the source antennas to the output signals at the
destination antennas is proportional to the product of channel matrices H_l,
l=1,...,L+1, corresponding to the individual hops. We perform an asymptotic
capacity analysis for this channel as follows: In a first instance we take the
limits n_s->infty, n_d->infty and k->infty, but keep both n_s/n_d and k/n_d
fixed. Then, we take the limits L->infty and k/n_d->infty. Requiring that the
H_l's satisfy the conditions needed for the Marcenko-Pastur law, we prove that
the capacity scales linearly in min{n_s,n_d}, as long as the ratio k/n_d scales
at least linearly in L. Moreover, we show that up to a noise penalty and a
pre-log factor the capacity of a point-to-point MIMO channel is approached,
when this scaling is slightly faster than linear. Conversely, almost all
spatial degrees of freedom vanish for less than linear scaling.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 10:23:34 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Wagner",
"Joerg",
""
],
[
"Wittneben",
"Armin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3568 | Vadim Tarin | Vadim Tarin | A Polynomial-time Algorithm for Computing the Permanent in GF(3^q) | null | null | null | null | cs.CC | null | A polynomial-time algorithm for computing the permanent in any field of
characteristic 3 is presented in this article. The principal objects utilized
for that purpose are the Cauchy and Vandermonde matrices, the discriminant
function and their generalizations of various types. Classical theorems on the
permanent such as the Binet-Minc identity and Borchadt's formula are widely
applied, while a special new technique involving the notion of limit re-defined
for fields of finite characteristics and corresponding computational methods
was developed in order to deal with a number of polynomial-time reductions. All
the constructions preserve a strictly algebraic nature ignoring the structure
of the basic field, while applying its infinite extensions for calculating
limits.
A natural corollary of the polynomial-time computability of the permanent in
a field of a characteristic different from 2 is the non-uniform equality
between the complexity classes P and NP what is equivalent to RP=NP (Ref. [1]).
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 15:47:49 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Tarin",
"Vadim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.3573 | Pablo Piantanida | Pablo Piantanida, Sajad Sadough and Pierre Duhamel | On the Outage Capacity of a Practical Decoder Accounting for Channel
Estimation Inaccuracies | Submitted to IEEE Transactions on Communications, July 2007 | null | 10.1109/TCOMM.2009.070353 | null | cs.IT math.IT | null | The optimal decoder achieving the outage capacity under imperfect channel
estimation is investigated. First, by searching into the family of nearest
neighbor decoders, which can be easily implemented on most practical coded
modulation systems, we derive a decoding metric that minimizes the average of
the transmission error probability over all channel estimation errors. Next, we
specialize our general expression to obtain the corresponding decoding metric
for fading MIMO channels. According to the notion of estimation-induced outage
(EIO) capacity introduced in our previous work and assuming no channel state
information (CSI) at the transmitter, we characterize maximal achievable
information rates, using Gaussian codebooks, associated to the proposed
decoder. In the case of uncorrelated Rayleigh fading, these achievable rates
are compared to the rates achieved by the classical mismatched
maximum-likelihood (ML) decoder and the ultimate limits given by the EIO
capacity. Numerical results show that the derived metric provides significant
gains for the considered scenario, in terms of achievable information rates and
bit error rate (BER), in a bit interleaved coded modulation (BICM) framework,
without introducing any additional decoding complexity.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 11:47:46 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Piantanida",
"Pablo",
""
],
[
"Sadough",
"Sajad",
""
],
[
"Duhamel",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3575 | Noelle Carbonell | Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | How really effective are Multimodal Hints in enhancing Visual Target
Spotting? Some evidence from a usability study | 9 pages | Journal on Multimodal Interaction (JMUI), 1 (2007) 1-9 | null | null | cs.HC | null | The main aim of the work presented here is to contribute to computer science
advances in the multimodal usability area, in-as-much as it addresses one of
the major issues relating to the generation of effective oral system messages:
how to design messages which effectively help users to locate specific
graphical objects in information visualisations? An experimental study was
carried out to determine whether oral messages including coarse information on
the locations of graphical objects on the current display may facilitate target
detection tasks sufficiently for making it worth while to integrate such
messages in GUIs. The display spatial layout varied in order to test the
influence of visual presentation structure on the contribution of these
messages to facilitating visual search on crowded displays. Finally, three
levels of task difficulty were defined, based mainly on the target visual
complexity and the number of distractors in the scene. The findings suggest
that spatial information messages improve participants' visual search
performances significantly; they are more appropriate to radial structures than
to matrix, random and elleptic structures; and, they are particularly useful
for performing difficult visual search tasks.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 11:53:35 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Kieffer",
"Suzanne",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3580 | Noelle Carbonell | No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Ambient Multimodality: an Asset for Developing Universal Access to the
Information Society | null | 3rd International Conference on Universal Access in Human-Computer
Interaction, Las Vegas : \'Etats-Unis d'Am\'erique (2005) | null | null | cs.HC | null | The paper tries to point out the benefits that can be derived from research
advances in the implementation of concepts such as ambient intelligence (AmI)
and ubiquitous or pervasive computing for promoting Universal Access (UA) to
the Information Society, that is, for contributing to enable everybody,
especially Physically Disabled (PD) people, to have easy access to all
computing resources and information services that the coming worldwide
Information Society will soon make available to the general public. Following
definitions of basic concepts relating to multimodal interaction, the
significant contribution of multimodality to developing UA is briefly argued.
Then, a short state of the art in AmI research is presented. In the last
section we bring out the potential contribution of advances in AmI research and
technology to the improvement of computer access for PD people. This claim is
supported by the following observations: (i) most projects aiming at
implementing AmI focus on the design of new interaction modalities and flexible
multimodal user interfaces which may facilitate PD users' computer access ;
(ii) targeted applications will support users in a wide range of daily
activities which will be performed simultaneously with supporting computing
tasks; therefore, users will be placed in contexts where they will be
confronted with similar difficulties to those encountered by PD users; (iii)
AmI applications being intended for the general public, a wide range of new
interaction devices and flexible processing software will be available, making
it possible to provide PD users with human-computer facilities tailored to
their specific needs at reasonable expense..
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 12:11:56 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3582 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud
(LIX), Albert Rubio | HORPO with Computability Closure : A Reconstruction | null | Dans 14th International Conference on Logic for Programming
Artificial Intelligence and Reasoning LNCS (2007) | null | null | cs.LO | null | This paper provides a new, decidable definition of the higher- order
recursive path ordering in which type comparisons are made only when needed,
therefore eliminating the need for the computability clo- sure, and bound
variables are handled explicitly, making it possible to handle recursors for
arbitrary strictly positive inductive types.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 12:23:16 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"LIX"
],
[
"Rubio",
"Albert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.3607 | Damien Chablat | F\'elix Majou (IRCCyN), Cl\'ement Gosselin (Robotics Laboratory),
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Parametric stiffness analysis of the Orthoglide | null | Journal of Mechanism and Machine Theory 42, 3 (2007) 296-311 | null | null | cs.RO | null | This paper presents a parametric stiffness analysis of the Orthoglide. A
compliant modeling and a symbolic expression of the stiffness matrix are
conducted. This allows a simple systematic analysis of the influence of the
geometric design parameters and to quickly identify the critical link
parameters. Our symbolic model is used to display the stiffest areas of the
workspace for a specific machining task. Our approach can be applied to any
parallel manipulator for which stiffness is a critical issue.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 13:59:35 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Majou",
"Félix",
"",
"IRCCyN"
],
[
"Gosselin",
"Clément",
"",
"Robotics Laboratory"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3613 | Damien Chablat | Anatoly Pashkevich (Robotic Laboratory), Damien Chablat (IRCCyN),
Philippe Wenger (IRCCyN) | Kinematics and Workspace Analysis of a Three-Axis Parallel Manipulator:
the Orthoglide | null | Robotica 24, 1 (2006) 39-49 | null | null | cs.RO | null | The paper addresses kinematic and geometrical aspects of the Orthoglide, a
three-DOF parallel mechanism. This machine consists of three fixed linear
joints, which are mounted orthogonally, three identical legs and a mobile
platform, which moves in the Cartesian x-y-z space with fixed orientation. New
solutions to solve inverse/direct kinematics are proposed and we perform a
detailed workspace and singularity analysis, taking into account specific joint
limit constraints.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 14:05:34 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"Robotic Laboratory"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3628 | Xiaohan Wang | Xiaohan Wang and Xiaolin Wu | Recursive Structure and Bandwidth of Hales-Numbered Hypercube | 10 pages | null | null | null | cs.DM | null | The Hales numbered $n$-dimensional hypercube and the corresponding adjacency
matrix exhibit interesting recursive structures in $n$. These structures lead
to a very simple proof of the well-known bandwidth formula for hypercube, whose
proof was thought to be surprisingly difficult. A related problem called
hypercube antibandwidth, for which Harper proposed an algorithm, is also
reexamined in the light of the above recursive structures, and a close form
solution is found.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 15:24:39 GMT"
}
] | 2007-08-28T00:00:00 | [
[
"Wang",
"Xiaohan",
""
],
[
"Wu",
"Xiaolin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.3696 | Michael Mahoney | Petros Drineas, Michael W. Mahoney and S. Muthukrishnan | Relative-Error CUR Matrix Decompositions | 40 pages, 10 figures | null | null | null | cs.DS | null | Many data analysis applications deal with large matrices and involve
approximating the matrix using a small number of ``components.'' Typically,
these components are linear combinations of the rows and columns of the matrix,
and are thus difficult to interpret in terms of the original features of the
input data. In this paper, we propose and study matrix approximations that are
explicitly expressed in terms of a small number of columns and/or rows of the
data matrix, and thereby more amenable to interpretation in terms of the
original data. Our main algorithmic results are two randomized algorithms which
take as input an $m \times n$ matrix $A$ and a rank parameter $k$. In our first
algorithm, $C$ is chosen, and we let $A'=CC^+A$, where $C^+$ is the
Moore-Penrose generalized inverse of $C$. In our second algorithm $C$, $U$, $R$
are chosen, and we let $A'=CUR$. ($C$ and $R$ are matrices that consist of
actual columns and rows, respectively, of $A$, and $U$ is a generalized inverse
of their intersection.) For each algorithm, we show that with probability at
least $1-\delta$: $$ ||A-A'||_F \leq (1+\epsilon) ||A-A_k||_F, $$ where $A_k$
is the ``best'' rank-$k$ approximation provided by truncating the singular
value decomposition (SVD) of $A$. The number of columns of $C$ and rows of $R$
is a low-degree polynomial in $k$, $1/\epsilon$, and $\log(1/\delta)$. Our two
algorithms are the first polynomial time algorithms for such low-rank matrix
approximations that come with relative-error guarantees; previously, in some
cases, it was not even known whether such matrix decompositions exist. Both of
our algorithms are simple, they take time of the order needed to approximately
compute the top $k$ singular vectors of $A$, and they use a novel, intuitive
sampling method called ``subspace sampling.''
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2007 23:34:50 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Drineas",
"Petros",
""
],
[
"Mahoney",
"Michael W.",
""
],
[
"Muthukrishnan",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.3699 | Mark Wilde | Mark M. Wilde, Hari Krovi and Todd A. Brun | Convolutional Entanglement Distillation | 17 pages, 7 figures, 1 table - minor corrections to text and figures | Proceedings of the 2010 IEEE International Symposium on
Information Theory, pp. 2657-2661, Austin, Texas, USA | 10.1109/ISIT.2010.5513666 | CSI-07-08-02 | quant-ph cs.IT math.IT | null | We develop a theory of entanglement distillation that exploits a
convolutional coding structure. We provide a method for converting an arbitrary
classical binary or quaternary convolutional code into a convolutional
entanglement distillation protocol. The imported classical convolutional code
does not have to be dual-containing or self-orthogonal. The yield and
error-correcting properties of such a protocol depend respectively on the rate
and error-correcting properties of the imported classical convolutional code. A
convolutional entanglement distillation protocol has several other benefits.
Two parties sharing noisy ebits can distill noiseless ebits ``online'' as they
acquire more noisy ebits. Distillation yield is high and decoding complexity is
simple for a convolutional entanglement distillation protocol. Our theory of
convolutional entanglement distillation reduces the problem of finding a good
convolutional entanglement distillation protocol to the well-established
problem of finding a good classical convolutional code.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 00:11:09 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Sep 2007 06:15:55 GMT"
}
] | 2010-08-12T00:00:00 | [
[
"Wilde",
"Mark M.",
""
],
[
"Krovi",
"Hari",
""
],
[
"Brun",
"Todd A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3721 | Marc Daumas | Marc Daumas (LIRMM, Eliaus), David Lester (UNIVERSITY of Manchester),
C\'esar Mu\~noz (NIA) | Verified Real Number Calculations: A Library for Interval Arithmetic | null | null | null | null | cs.MS cs.LO | null | Real number calculations on elementary functions are remarkably difficult to
handle in mechanical proofs. In this paper, we show how these calculations can
be performed within a theorem prover or proof assistant in a convenient and
highly automated as well as interactive way. First, we formally establish upper
and lower bounds for elementary functions. Then, based on these bounds, we
develop a rational interval arithmetic where real number calculations take
place in an algebraic setting. In order to reduce the dependency effect of
interval arithmetic, we integrate two techniques: interval splitting and taylor
series expansions. This pragmatic approach has been developed, and formally
verified, in a theorem prover. The formal development also includes a set of
customizable strategies to automate proofs involving explicit calculations over
real numbers. Our ultimate goal is to provide guaranteed proofs of numerical
properties with minimal human theorem-prover interaction.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 07:14:29 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LIRMM, Eliaus"
],
[
"Lester",
"David",
"",
"UNIVERSITY of Manchester"
],
[
"Muñoz",
"César",
"",
"NIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.3722 | Marc Daumas | Sylvie Boldo (INRIA Futurs), Marc Daumas (LIRMM, Eliaus), Ren Cang Li | Formally Verified Argument Reduction with a Fused-Multiply-Add | null | null | null | null | cs.MS cs.PF | null | Cody & Waite argument reduction technique works perfectly for reasonably
large arguments but as the input grows there are no bit left to approximate the
constant with enough accuracy. Under mild assumptions, we show that the result
computed with a fused-multiply-add provides a fully accurate result for many
possible values of the input with a constant almost accurate to the full
working precision. We also present an algorithm for a fully accurate second
reduction step to reach double full accuracy (all the significand bits of two
numbers are significant) even in the worst cases of argument reduction. Our
work recalls the common algorithms and presents proofs of correctness. All the
proofs are formally verified using the Coq automatic proof checker.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 07:15:08 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Boldo",
"Sylvie",
"",
"INRIA Futurs"
],
[
"Daumas",
"Marc",
"",
"LIRMM, Eliaus"
],
[
"Li",
"Ren Cang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0708.3723 | Damien Chablat | F\'elix Majou (IRCCyN, Robotics Laboratory), Cl\'ement Gosselin
(ROBOTICS Laboratory), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Parametric Stiffness Analysis of the Orthoglide | null | Dans International Symposium on Robotics - International Symposium
on Robotics, Paris : France (2004) | null | null | cs.RO | null | This paper presents a parametric stiffness analysis of the Orthoglide, a
3-DOF translational Parallel Kinematic Machine. First, a compliant modeling of
the Orthoglide is conducted based on an existing method. Then stiffness matrix
is symbolically computed. This allows one to easily study the influence of the
geometric design parameters on the matrix elements. Critical links are
displayed. Cutting forces are then modeled so that static displacements of the
Orthoglide tool during slot milling are symbolically computed. Influence of the
geometric design parameters on the static displacements is checked as well.
Other machining operations can be modeled. This parametric stiffness analysis
can be applied to any parallel manipulator for which stiffness is a critical
issue.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 07:17:46 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Majou",
"Félix",
"",
"IRCCyN, Robotics Laboratory"
],
[
"Gosselin",
"Clément",
"",
"ROBOTICS Laboratory"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3734 | Rossano Venturini | Igor Nitto and Rossano Venturini | Searching for a dangerous host: randomized vs. deterministic | null | null | null | null | cs.DC | null | A Black Hole is an harmful host in a network that destroys incoming agents
without leaving any trace of such event. The problem of locating the black hole
in a network through a team of agent coordinated by a common protocol is
usually referred in literature as the Black Hole Search problem (or BHS for
brevity) and it is a consolidated research topic in the area of distributed
algorithms. The aim of this paper is to extend the results for BHS by
considering more general (and hence harder) classes of dangerous host. In
particular we introduce rB-hole as a probabilistic generalization of the Black
Hole, in which the destruction of an incoming agent is a purely random event
happening with some fixed probability (like flipping a biased coin). The main
result we present is that if we tolerate an arbitrarily small error probability
in the result then the rB-hole Search problem, or RBS, is not harder than the
usual BHS. We establish this result in two different communication model,
specifically both in presence or absence of whiteboards non-located at the
homebase. The core of our methods is a general reduction tool for transforming
algorithms for the black hole into algorithms for the rB-hole.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 09:24:13 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Nitto",
"Igor",
""
],
[
"Venturini",
"Rossano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.3740 | Noelle Carbonell | J\'er\^ome Simonin (INRIA Rocquencourt / INRIA Lorraine - LORIA),
Marius Hategan (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle
Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Plate-forme Magicien d'Oz pour l'\'etude de l'apport des ACAs \`a
l'interaction | null | Dans Actes du Second Workshop sur les Agents Conversationnels
anim\'es - Second Workshop sur les Agents Conversationnels anim\'es, Toulouse
: France (2007) | null | null | cs.HC | null | In order to evaluate the contribution of Embodied (Animated) Conversational
Agents (ECAs) to the effectiveness and usability of human-computer interaction,
we developed a software platform meant to collect usage data. This platform,
which implements the wizard of Oz paradigm, makes it possible to simulate user
interfaces integrating ACAs for any Windows software application. It can also
save and "replay" a rich interaction trace including user and system events,
screen captures, users' speech and eye fixations. This platform has been used
to assess users' subjective judgements and reactions to a multimodal online
help system meant to facilitate the use of software for the general public
(Flash). The online help system is embodied using a 3D talking head (developed
by FT R&D) which "says" oral help messages illustrated with Flash screen
copies.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 09:56:05 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Simonin",
"Jérôme",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Hategan",
"Marius",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3742 | Noelle Carbonell | J\'er\^ome Simonin (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Interfaces adaptatives Adaptation dynamique \`a l'utilisateur courant | null | Interfaces num\'eriques, Herm\`es Science (Ed.) (2007) 18 pages | null | null | cs.HC | null | We present a survey of recent research studies of the implementation of
adaptive user models in human-computer interaction. A classification of
research directions on adaptive user interfaces is first proposed; it takes
account of the user characteristics that are modelled, the distribution of
initiative and control of the system evolution between user and system, and the
role of dynamic adaptation. Then, a few representative research studies are
briefly presented to illustrate this classification. In the conclusion, some
major issues regarding the utility and usability of adaptive user interfaces
and the design of an appropriate methodology for assessing the ergonomic
quality of this new form of interaction are mentioned.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 09:57:43 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Simonin",
"Jérôme",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.3761 | Ricardo Lopez-Ruiz | Ricardo Lopez-Ruiz, Jaime Sanudo and Xavier Calbet | Multi-agent systems, Equiprobability, Gamma distributions and other
Geometrical questions | 15 pages, 3 figures | null | null | null | nlin.CD cond-mat.stat-mech cs.MA physics.soc-ph | null | A set of many identical interacting agents obeying a global additive
constraint is considered. Under the hypothesis of equiprobability in the
high-dimensional volume delimited in phase space by the constraint, the
statistical behavior of a generic agent over the ensemble is worked out. The
asymptotic distribution of that statistical behavior is derived from
geometrical arguments. This distribution is related with the Gamma
distributions found in several multi-agent economy models. The parallelism with
all these systems is established. Also, as a collateral result, a formula for
the volume of high-dimensional symmetrical bodies is proposed.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 11:38:30 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Sep 2007 08:08:01 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Lopez-Ruiz",
"Ricardo",
""
],
[
"Sanudo",
"Jaime",
""
],
[
"Calbet",
"Xavier",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0708.3764 | Mylene Pischella Ms | Mylene Pischella, Jean-Claude Belfiore | A Radio Resource Management strategy for downlink cooperation in
distributed networks | null | null | null | null | cs.IT math.IT | null | This paper has been withdrawn by the author
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 11:56:16 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Sep 2007 10:41:08 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Pischella",
"Mylene",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3809 | Damien Chablat | Anatoly Pashkevich (Robotic Laboratory), Philippe Wenger (IRCCyN),
Damien Chablat (IRCCyN) | Design Strategies for the Geometric Synthesis of Orthoglide-type
Mechanisms | null | Journal of Mechanism and Machine Theory 40, 8 (2005) 907-930 | null | null | cs.RO | null | The paper addresses the geometric synthesis of Orthoglide-type mechanism, a
family of 3-DOF parallel manipulators for rapid machining applications, which
combine advantages of both serial mechanisms and parallel kinematic
architectures. These manipulators possess quasi-isotropic kinematic
performances and are made up of three actuated fixed prismatic joints, which
are mutually orthogonal and connected to a mobile platform via three
parallelogram chains. The platform moves in the Cartesian space with fixed
orientation, similar to conventional XYZ-machine. Three strategies have been
proposed to define the Orthoglide geometric parameters (manipulator link
lengths and actuated joint limits) as functions of a cubic workspace size and
dextrous properties expressed by bounds on the velocity transmission factors,
manipulability or the Jacobian condition number. Low inertia and intrinsic
stiffness have been set as additional design goals expressed by the minimal
link length requirement. For each design strategy, analytical expressions for
computing the Orthoglide parameters are proposed. It is showed that the
proposed strategies yield Pareto-optimal solutions, which differ by the
kinematic performances outside the prescribed Cartesian cube (but within the
workspace bounded by the actuated joint limits). The proposed technique is
illustrated with numerical examples for the Orthoglide prototype design.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 15:40:39 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"Robotic Laboratory"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3811 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | An Exhaustive Study of the Workspaces Tolopogies of all 3R Orthogonal
Manipulators with Geometric Simplifications | null | Journal of Mechanism and Machine Theory 41, 8 (2006) 971-986 | 10.1016/j.mechmachtheory.2006.03.013 | null | cs.RO | null | This paper proposes a classification of three-revolute orthogonal
manipulators that have at least one of their DH parameters equal to zero. This
classification is based on the topology of their workspace. The workspace is
characterized in a half-cross section by the singular curves. The workspace
topology is defined by the number of cusps and nodes that appear on these
singular curves. The manipulators are classified into different types with
similar kinematic properties. Each type is evaluated according to interesting
kinematic properties such as, whether the workspace is fully reachable with
four inverse kinematic solutions or not, the existence of voids, and the
feasibility of continuous trajectories in the workspace. It is found that
several orthogonal manipulators have a "well-connected" workspace, that is,
their workspace is fully accessible with four inverse kinematic solutions and
any continuous trajectory is feasible. This result is of interest for the
design of alternative manipulator geometries.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 15:51:50 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3829 | Sabatino Costanzo | Sabatino Costanzo, Loren Trigo, Wafaa Dehne, Hender Prato | A Non Parametric Model for the Forecasting of the Venezuelan Oil Prices | 17 pages, in Spanish | null | null | null | cs.CE cs.NE | null | A neural net model for forecasting the prices of Venezuelan crude oil is
proposed. The inputs of the neural net are selected by reference to a dynamic
system model of oil prices by Mashayekhi (1995, 2001) and its performance is
evaluated using two criteria: the Excess Profitability test by Anatoliev and
Gerko (2005) and the characteristics of the equity curve generated by a trading
strategy based on the neural net predictions.
-----
Se introduce aqui un modelo no parametrico para pronosticar los precios del
petroleo Venezolano cuyos insumos son seleccionados en base a un sistema
dinamico que explica los precios en terminos de dichos insumos. Se describe el
proceso de recoleccion y pre-procesamiento de datos y la corrida de la red y se
evaluan sus pronosticos a traves de un test estadistico de predictibilidad y de
las caracteristicas del Equity Curve inducido por la estrategia de compraventa
bursatil generada por dichos pronosticos.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 18:29:55 GMT"
}
] | 2007-08-29T00:00:00 | [
[
"Costanzo",
"Sabatino",
""
],
[
"Trigo",
"Loren",
""
],
[
"Dehne",
"Wafaa",
""
],
[
"Prato",
"Hender",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0708.3879 | Dmitri Krioukov | Xenofontas Dimitropoulos, Dmitri Krioukov, Amin Vahdat, George Riley | Graph Annotations in Modeling Complex Network Topologies | null | ACM Transactions on Modeling and Computer Simulation (TOMACS),
v.19, n.4, p.17, 2009 | 10.1145/1596519.1596522 | null | cs.NI cond-mat.dis-nn physics.data-an physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The coarsest approximation of the structure of a complex network, such as the
Internet, is a simple undirected unweighted graph. This approximation, however,
loses too much detail. In reality, objects represented by vertices and edges in
such a graph possess some non-trivial internal structure that varies across and
differentiates among distinct types of links or nodes. In this work, we
abstract such additional information as network annotations. We introduce a
network topology modeling framework that treats annotations as an extended
correlation profile of a network. Assuming we have this profile measured for a
given network, we present an algorithm to rescale it in order to construct
networks of varying size that still reproduce the original measured annotation
profile.
Using this methodology, we accurately capture the network properties
essential for realistic simulations of network applications and protocols, or
any other simulations involving complex network topologies, including modeling
and simulation of network evolution. We apply our approach to the Autonomous
System (AS) topology of the Internet annotated with business relationships
between ASs. This topology captures the large-scale structure of the Internet.
In depth understanding of this structure and tools to model it are cornerstones
of research on future Internet architectures and designs. We find that our
techniques are able to accurately capture the structure of annotation
correlations within this topology, thus reproducing a number of its important
properties in synthetically-generated random graphs.
| [
{
"version": "v1",
"created": "Wed, 29 Aug 2007 03:23:56 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Aug 2007 22:09:32 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Sep 2008 02:44:12 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Nov 2009 20:00:00 GMT"
}
] | 2009-11-02T00:00:00 | [
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Vahdat",
"Amin",
""
],
[
"Riley",
"George",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0708.3896 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), St\'ephane Caro
(IRCCyN), Jorge Angeles (CIM) | The Isoconditioning Loci of Planar Three-DOF Parallel Manipulators | ASME 29th Design Automation Conference | Dans 29th Design Automation Conference - ASME 29th Design
Automation Conference, France (2002) | null | null | cs.RO | null | The subject of this paper is a special class of three-degree-of-freedom
parallel manipulators. The singular configurations of the two Jacobian matrices
are first studied. The isotropic configurations are then found based on the
characteristic length of this manipulator. The isoconditioning loci for the
Jacobian matrices are plotted to define a global performance index allowing the
comparison of the different working modes. The index thus resulting is compared
with the Cartesian workspace surface and the average of the condition number.
| [
{
"version": "v1",
"created": "Wed, 29 Aug 2007 07:08:21 GMT"
}
] | 2007-08-30T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3900 | Yoshiyuki Kabashima | Yoshiyuki Kabashima | Inference from correlated patterns: a unified theory for perceptron
learning and linear vector channels | Conference paper for the International Workshop on Statistical
Mechanical Informatics 2007, September 16-19, 2007, Kyoto, Japan | Journal of Physics Conference Series 95, 012001, 2008;
http://www.iop.org/EJ/toc/1742-6596/95/1 | 10.1088/1742-6596/95/1/012001 | null | cs.IT cond-mat.dis-nn math.IT | null | A framework to analyze inference performance in densely connected
single-layer feed-forward networks is developed for situations where a given
data set is composed of correlated patterns. The framework is based on the
assumption that the left and right singular value bases of the given pattern
matrix are generated independently and uniformly from Haar measures. This
assumption makes it possible to characterize the objective system by a single
function of two variables which is determined by the eigenvalue spectrum of the
cross-correlation matrix of the pattern matrix. Links to existing methods for
analysis of perceptron learning and Gaussian linear vector channels and an
application to a simple but nontrivial problem are also shown.
| [
{
"version": "v1",
"created": "Wed, 29 Aug 2007 07:55:01 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Sep 2007 07:26:01 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Feb 2008 04:08:38 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Kabashima",
"Yoshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.3920 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Ilian Bonev (GPA) | Kinematic analysis of the 3-RPR parallel manipulator | null | Dans Advances in Robot Kinematics - 10th International Symposium
on Advances in Robot Kinematics, Ljubljana : Slov\'enie (2006) | null | null | cs.RO | null | The aim of this paper is the kinematic study of a 3-RPR planar parallel
manipulator where the three fixed revolute joints are actuated. The direct and
inverse kinematic problem as well as the singular configuration is
characterized. On parallel singular configurations, the motion produce by the
mobile platform can be compared to the Reuleaux straight-line mechanism.
| [
{
"version": "v1",
"created": "Wed, 29 Aug 2007 09:28:52 GMT"
}
] | 2007-08-30T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Bonev",
"Ilian",
"",
"GPA"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3936 | Damien Chablat | Ilian Bonev (GPA), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | Working and Assembly Modes of the Agile Eye | null | Dans International Conference On Robotics And Automation - IEEE
International Conference On Robotics And Automation, Orlando : \'Etats-Unis
d'Am\'erique (2006) | null | null | cs.RO | null | This paper deals with the in-depth kinematic analysis of a special spherical
parallel wrist, called the Agile Eye. The Agile Eye is a three-legged spherical
parallel robot with revolute joints in which all pairs of adjacent joint axes
are orthogonal. Its most peculiar feature, demonstrated in this paper for the
first time, is that its (orientation) workspace is unlimited and flawed only by
six singularity curves (rather than surfaces). Furthermore, these curves
correspond to self-motions of the mobile platform. This paper also demonstrates
that, unlike for any other such complex spatial robots, the four solutions to
the direct kinematics of the Agile Eye (assembly modes) have a simple geometric
relationship with the eight solutions to the inverse kinematics (working
modes).
| [
{
"version": "v1",
"created": "Wed, 29 Aug 2007 11:24:41 GMT"
}
] | 2007-08-30T00:00:00 | [
[
"Bonev",
"Ilian",
"",
"GPA"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.3962 | Vahan Mkrtchyan | V. V. Mkrtchyan | A course on Combinatorial Algorithms | Comments: 165 pages, in Armenian | null | null | null | cs.DM | null | The paper presents a course on Combinatorial Algorithms that is based on the
drafts of the author that he used while teaching the course in the Department
of Informatics and Applied Mathematics of Yerevan State University, Armenia
from February 2007 to June 2007.
| [
{
"version": "v1",
"created": "Tue, 28 Aug 2007 15:46:18 GMT"
}
] | 2007-08-30T00:00:00 | [
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.4075 | Matthew Delacorte | Matthew Delacorte | Graph Isomorphism is PSPACE-complete | null | null | null | null | cs.CC | null | Combining the the results of A.R. Meyer and L.J. Stockmeyer "The Equivalence
Problem for Regular Expressions with Squaring Requires Exponential Space", and
K.S. Booth "Isomorphism testing for graphs, semigroups, and finite automata are
polynomiamlly equivalent problems" shows that graph isomorphism is
PSPACE-complete.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 05:06:39 GMT"
}
] | 2007-08-31T00:00:00 | [
[
"Delacorte",
"Matthew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.4082 | Noelle Carbonell | Antonio Capobianco (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Aides en ligne \`a l'utilisation de logiciels grand public : probl\`emes
sp\'ecifiques de conception et solutions potentielles | null | Intellectica 2006/2, 44 (2006) 87-120 | null | null | cs.HC | null | The observation that novice users seldom consult online help was made over
twenty years ago. This observation still holds nowadays, although online help
to the use of software for the general public has greatly improved in usability
during this period. The paper first demonstrates the necessity of online help
to the use of new software whatever the transparency of the user interface, as
whether online help systems are meant to compensate for interface design
weaknesses or actually do provide necessary assistance to the discovery of a
new software package functionalities is still an unsolved issue. The discussion
relies on results of empirical and experimental studies and theoretical
arguments. In the second part, we analyse the specific difficulties raised by
the design of effective online help systems for current software intended for
the general public so as to try and understand the reluctance of novice users
to use online help. In the last part, we present and discuss the possible
contributions of various approaches to solving this issue. Recent interaction
paradigms and techniques are considered, such as, static and dynamic
personalisation, contextual online help and new forms of multimodality.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 06:39:15 GMT"
}
] | 2007-08-31T00:00:00 | [
[
"Capobianco",
"Antonio",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.4149 | Stephen Vavasis | Stephen A. Vavasis | On the complexity of nonnegative matrix factorization | Version 2 corrects small typos; adds ref to Cohen & Rothblum; adds
ref to Gillis; clarifies reduction of NMF to int. simplex | null | null | null | cs.NA cs.IR | null | Nonnegative matrix factorization (NMF) has become a prominent technique for
the analysis of image databases, text databases and other information retrieval
and clustering applications. In this report, we define an exact version of NMF.
Then we establish several results about exact NMF: (1) that it is equivalent to
a problem in polyhedral combinatorics; (2) that it is NP-hard; and (3) that a
polynomial-time local search heuristic exists.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 13:01:33 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Sep 2007 17:04:40 GMT"
}
] | 2007-09-27T00:00:00 | [
[
"Vavasis",
"Stephen A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0708.4155 | Frank Schweitzer | Thomas Fent, Patrick Groeber, Frank Schweitzer | Coexistence of Social Norms based on In- and Out-group Interactions | null | ACS - Advances in Complex Systems, vol. 10, no. 2 (2007), pp.
271-286 | null | null | nlin.AO cs.MA physics.soc-ph | null | The question how social norms can emerge from microscopic interactions
between individuals is a key problem in social sciences to explain collective
behavior. In this paper we propose an agent-based model to show that randomly
distributed social behavior by way of local interaction converges to a state
with a multimodal distribution of behavior. This can be interpreted as a
coexistence of different social norms, a result that goes beyond previous
investigations. The model is discrete in time and space, behavior is
characterized in a continuous state space. The adaptation of social behavior by
each agent is based on attractive and repulsive forces caused by friendly and
adversary relations among agents. The model is analyzed both analytically and
by means of spatio-temporal computer simulations. It provides conditions under
which we find convergence towards a single norm, coexistence of two opposing
norms, and coexistence of a multitude of norms. For the latter case, we also
show the evolution of the spatio-temporal distribution of behavior.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 13:27:52 GMT"
}
] | 2008-09-07T00:00:00 | [
[
"Fent",
"Thomas",
""
],
[
"Groeber",
"Patrick",
""
],
[
"Schweitzer",
"Frank",
""
]
] | [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0708.4164 | Gilles Z\'emor | Philippe Gaborit and Gilles Zemor | Asymptotic improvement of the Gilbert-Varshamov bound for linear codes | Submitted to IEEE Transactions on Information Theory | IEEE Transactions on Information Theory, IT-54, No. 9 (2008) pp.
3865--3872. | 10.1109/TIT.2008.928288 | null | cs.IT math.IT | null | The Gilbert-Varshamov bound states that the maximum size A_2(n,d) of a binary
code of length n and minimum distance d satisfies A_2(n,d) >= 2^n/V(n,d-1)
where V(n,d) stands for the volume of a Hamming ball of radius d. Recently
Jiang and Vardy showed that for binary non-linear codes this bound can be
improved to A_2(n,d) >= cn2^n/V(n,d-1) for c a constant and d/n <= 0.499. In
this paper we show that certain asymptotic families of linear binary [n,n/2]
random double circulant codes satisfy the same improved Gilbert-Varshamov
bound.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 14:05:17 GMT"
}
] | 2008-09-26T00:00:00 | [
[
"Gaborit",
"Philippe",
""
],
[
"Zemor",
"Gilles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.4170 | Paolo Liberatore | Paolo Liberatore | Raising a Hardness Result | null | null | null | null | cs.AI cs.CC cs.LO | null | This article presents a technique for proving problems hard for classes of
the polynomial hierarchy or for PSPACE. The rationale of this technique is that
some problem restrictions are able to simulate existential or universal
quantifiers. If this is the case, reductions from Quantified Boolean Formulae
(QBF) to these restrictions can be transformed into reductions from QBFs having
one more quantifier in the front. This means that a proof of hardness of a
problem at level n in the polynomial hierarchy can be split into n separate
proofs, which may be simpler than a proof directly showing a reduction from a
class of QBFs to the considered problem.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 14:42:50 GMT"
}
] | 2007-08-31T00:00:00 | [
[
"Liberatore",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.4176 | Olivier Finkel | Olivier Finkel (LIP, ELM), Dominique Lecomte (UMR 7586) | Classical and Effective Descriptive Complexities of omega-Powers | Final Version, published in A.P.A.L. This paper is an extended
version of a conference paper which appeared in the Proceedings of the 16th
EACSL Annual Conference on Computer Science and Logic, CSL 07. Part of the
results in this paper have been also presented at the International
Conference Computability in Europe, CiE 07, Siena, Italy, June 2007 | Annals of Pure and Applied Logic 2, 160 (2009) 163-191 | null | LIP Research Report RR 2007-38 | math.LO cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that, for each non null countable ordinal alpha, there exist some
Sigma^0_alpha-complete omega-powers, and some Pi^0_alpha-complete omega-powers,
extending previous works on the topological complexity of omega-powers. We
prove effective versions of these results. In particular, for each non null
recursive ordinal alpha, there exists a recursive finitary language A such that
A^omega is Sigma^0_alpha-complete (respectively, Pi^0_alpha-complete). To do
this, we prove effective versions of a result by Kuratowski, describing a Borel
set as the range of a closed subset of the Baire space by a continuous
bijection. This leads us to prove closure properties for the classes
Effective-Pi^0_alpha and Effective-Sigma^0_alpha of the hyperarithmetical
hierarchy in arbitrary recursively presented Polish spaces. We apply our
existence results to get better computations of the topological complexity of
some sets of dictionaries considered by the second author in [Omega-Powers and
Descriptive Set Theory, Journal of Symbolic Logic, Volume 70 (4), 2005, p.
1210-1232].
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 14:56:24 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 17:02:41 GMT"
}
] | 2009-08-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"LIP, ELM"
],
[
"Lecomte",
"Dominique",
"",
"UMR 7586"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.4214 | B.Sundar Rajan | J. Harshan and B. Sundar Rajan | High Rate Single-Symbol Decodable Precoded DSTBCs for Cooperative
Networks | A technical report of DRDO-IISc Programme on Advanced Research in
Mathematical Engineering | null | null | TR-PME-2007-08 | cs.IT math.IT | null | Distributed Orthogonal Space-Time Block Codes (DOSTBCs) achieving full
diversity order and single-symbol ML decodability have been introduced recently
for cooperative networks and an upper-bound on the maximal rate of such codes
along with code constructions has been presented. In this report, we introduce
a new class of Distributed STBCs called Semi-orthogonal Precoded Distributed
Single-Symbol Decodable STBCs (S-PDSSDC) wherein, the source performs
co-ordinate interleaving of information symbols appropriately before
transmitting it to all the relays. It is shown that DOSTBCs are a special case
of S-PDSSDCs. A special class of S-PDSSDCs having diagonal covariance matrix at
the destination is studied and an upper bound on the maximal rate of such codes
is derived. The bounds obtained are approximately twice larger than that of the
DOSTBCs. A systematic construction of S-PDSSDCs is presented when the number of
relays $K \geq 4$. The constructed codes are shown to achieve the upper-bound
on the rate when $K$ is of the form 0 modulo 4 or 3 modulo 4. For the rest of
the values of $K$, the constructed codes are shown to have rates higher than
that of DOSTBCs. It is also shown that S-PDSSDCs cannot be constructed with any
form of linear processing at the relays when the source doesn't perform
co-ordinate interleaving of the information symbols.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 18:15:57 GMT"
}
] | 2007-08-31T00:00:00 | [
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.4219 | Ashish Khisti | Ashish Khisti, Gregory Wornell | Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel | null | null | null | null | cs.IT math.IT | null | The role of multiple antennas for secure communication is investigated within
the framework of Wyner's wiretap channel. We characterize the secrecy capacity
in terms of generalized eigenvalues when the sender and eavesdropper have
multiple antennas, the intended receiver has a single antenna, and the channel
matrices are fixed and known to all the terminals, and show that a beamforming
strategy is capacity-achieving. In addition, we show that in the high
signal-to-noise (SNR) ratio regime the penalty for not knowing eavesdropper's
channel is small--a simple ``secure space-time code'' that can be thought of as
masked beamforming and radiates power isotropically attains near-optimal
performance. In the limit of large number of antennas, we obtain a
realization-independent characterization of the secrecy capacity as a function
of the number $\beta$: the number of eavesdropper antennas per sender antenna.
We show that the eavesdropper is comparatively ineffective when $\beta<1$, but
that for $\beta\ge2$ the eavesdropper can drive the secrecy capacity to zero,
thereby blocking secure communication to the intended receiver. Extensions to
ergodic fading channels are also provided.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 19:38:22 GMT"
}
] | 2007-08-31T00:00:00 | [
[
"Khisti",
"Ashish",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.4230 | Laurent Buse | Laurent Bus\'e (INRIA Sophia Antipolis), Marc Dohm (JAD) | Implicitization of Bihomogeneous Parametrizations of Algebraic Surfaces
via Linear Syzygies | null | Dans International Conference on Symbolic and Algebraic
Computation (2007) 69 - 76 | 10.1145/1277548.1277559 | null | math.AG cs.SC math.AC | null | We show that the implicit equation of a surface in 3-dimensional projective
space parametrized by bi-homogeneous polynomials of bi-degree (d,d), for a
given positive integer d, can be represented and computed from the linear
syzygies of its parametrization if the base points are isolated and form
locally a complete intersection.
| [
{
"version": "v1",
"created": "Thu, 30 Aug 2007 20:31:00 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Busé",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Dohm",
"Marc",
"",
"JAD"
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0708.4284 | Mariano Zelke | Mariano Zelke | Optimal Per-Edge Processing Times in the Semi-Streaming Model | 8 pages, 1 table | Information Processing Letters, Volume 104, Issue 3, 2007, Pages
106-112 | null | null | cs.DM cs.DS | null | We present semi-streaming algorithms for basic graph problems that have
optimal per-edge processing times and therefore surpass all previous
semi-streaming algorithms for these tasks. The semi-streaming model, which is
appropriate when dealing with massive graphs, forbids random access to the
input and restricts the memory to O(n*polylog n) bits.
Particularly, the formerly best per-edge processing times for finding the
connected components and a bipartition are O(alpha(n)), for determining
k-vertex and k-edge connectivity O(k^2n) and O(n*log n) respectively for any
constant k and for computing a minimum spanning forest O(log n). All these time
bounds we reduce to O(1).
Every presented algorithm determines a solution asymptotically as fast as the
best corresponding algorithm up to date in the classical RAM model, which
therefore cannot convert the advantage of unlimited memory and random access
into superior computing times for these problems.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 07:19:27 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Zelke",
"Mariano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.4288 | Philip Bille | Philip Bille | Pattern Matching in Trees and Strings | PhD dissertation, 140 pages | null | null | null | cs.DS | null | We study the design of efficient algorithms for combinatorial pattern
matching. More concretely, we study algorithms for tree matching, string
matching, and string matching in compressed texts.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 08:07:32 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Bille",
"Philip",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.4311 | Juergen Schmidhuber | Juergen Schmidhuber | 2006: Celebrating 75 years of AI - History and Outlook: the Next 25
Years | 14 pages; preprint of invited contribution to the Proceedings of the
``50th Anniversary Summit of Artificial Intelligence'' at Monte Verita,
Ascona, Switzerland, 9-14 July 2006 | null | null | null | cs.AI | null | When Kurt Goedel layed the foundations of theoretical computer science in
1931, he also introduced essential concepts of the theory of Artificial
Intelligence (AI). Although much of subsequent AI research has focused on
heuristics, which still play a major role in many practical AI applications, in
the new millennium AI theory has finally become a full-fledged formal science,
with important optimality results for embodied agents living in unknown
environments, obtained through a combination of theory a la Goedel and
probability theory. Here we look back at important milestones of AI history,
mention essential recent results, and speculate about what we may expect from
the next 25 years, emphasizing the significance of the ongoing dramatic
hardware speedups, and discussing Goedel-inspired, self-referential,
self-improving universal problem solvers.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 11:12:26 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0708.4324 | Stephane Caro | St\'ephane Caro (IRCCyN), Philippe Wenger (IRCCyN), Fouad Bennis
(IRCCyN), Damien Chablat (IRCCyN) | Sensitivity Analysis of the Orthoglide, a 3-DOF Translational Parallel
Kinematic Machine | null | Journal of Mechanical Design 128 (2006) 392-402 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a sensitivity analysis of the Orthoglide, a 3-DOF
translational Parallel Kinematic Machine. Two complementary methods are
developed to analyze its sensitivity to its dimensional and angular variations.
First, a linkage kinematic analysis method is used to have a rough idea of the
influence of the dimensional variations on the location of the end-effector.
Besides, this method shows that variations in the design parameters of the same
type from one leg to the other have the same influence on the end-effector.
However, this method does not take into account the variations in the
parallelograms. Thus, a differential vector method is used to study the
influence of the dimensional and angular variations in the parts of the
manipulator on the position and orientation of the end-effector, and
particularly the influence of the variations in the parallelograms. It turns
out that the kinematic isotropic configuration of the manipulator is the least
sensitive one to its dimensional and angular variations. On the contrary, the
closest configurations to its kinematic singular configurations are the most
sensitive ones to geometrical variations.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 11:53:35 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Dec 2013 08:49:13 GMT"
}
] | 2013-12-05T00:00:00 | [
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.4328 | Terence H. Chan | Terence Chan and Alex Grant | Dualities Between Entropy Functions and Network Codes | null | null | null | null | cs.IT math.IT | null | This paper provides a new duality between entropy functions and network
codes. Given a function $g\geq 0$ defined on all proper subsets of $N$ random
variables, we provide a construction for a network multicast problem which is
solvable if and only if $g$ is entropic. The underlying network topology is
fixed and the multicast problem depends on $g$ only through edge capacities and
source rates. Relaxing the requirement that the domain of $g$ be subsets of
random variables, we obtain a similar duality between polymatroids and the
linear programming bound. These duality results provide an alternative proof of
the insufficiency of linear (and abelian) network codes, and demonstrate the
utility of non-Shannon inequalities to tighten outer bounds on network coding
capacity regions.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 12:02:41 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.4379 | Adrian Riskin | Marisa Debowsky and Adrian Riskin | A system for the simulation of simultaneous moves between two
noncolocational players | 3 pages | null | null | null | cs.GT | null | We describe a new system for the simulation of simultaneous moves between
noncolocational players. This has applications in the burgeoning
Rock-Paper-Scissors by mail movement.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 16:03:21 GMT"
}
] | 2007-09-03T00:00:00 | [
[
"Debowsky",
"Marisa",
""
],
[
"Riskin",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0708.4387 | Amy Glen | Amy Glen | Conjugates of characteristic Sturmian words generated by morphisms | 11 pages | European Journal of Combinatorics 25 (2004) 1025-1037 | 10.1016/j.ejc.2003.12.012 | null | math.CO cs.DM | null | This article is concerned with characteristic Sturmian words of slope
$\alpha$ and $1-\alpha$ (denoted by $c_\alpha$ and $c_{1-\alpha}$
respectively), where $\alpha \in (0,1)$ is an irrational number such that
$\alpha = [0;1+d_1,\bar{d_2,...,d_n}]$ with $d_n \geq d_1 \geq 1$. It is known
that both $c_\alpha$ and $c_{1-\alpha}$ are fixed points of non-trivial
(standard) morphisms $\sigma$ and $\hat{\sigma}$, respectively, if and only if
$\alpha$ has a continued fraction expansion as above. Accordingly, such words
$c_\alpha$ and $c_{1-\alpha}$ are generated by the respective morphisms
$\sigma$ and $\hat{\sigma}$. For the particular case when $\alpha =
[0;2,\bar{r}]$ ($r\geq1$), we give a decomposition of each conjugate of
$c_\alpha$ (and hence $c_{1-\alpha}$) into generalized adjoining singular
words, by considering conjugates of powers of the standard morphism $\sigma$ by
which it is generated. This extends a recent result of Lev\'{e} and S\ee bold
on conjugates of the infinite Fibonacci word.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 16:26:57 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.4389 | Amy Glen | Amy Glen | Occurrences of palindromes in characteristic Sturmian words | 17 pages | Theoretical Computer Science 352 (2006) 31-46 | 10.1016/j.tcs.2005.09.075 | null | math.CO cs.DM | null | This paper is concerned with palindromes occurring in characteristic Sturmian
words $c_\alpha$ of slope $\alpha$, where $\alpha \in (0,1)$ is an irrational.
As $c_\alpha$ is a uniformly recurrent infinite word, any (palindromic) factor
of $c_\alpha$ occurs infinitely many times in $c_\alpha$ with bounded gaps. Our
aim is to completely describe where palindromes occur in $c_\alpha$. In
particular, given any palindromic factor $u$ of $c_\alpha$, we shall establish
a decomposition of $c_\alpha$ with respect to the occurrences of $u$. Such a
decomposition shows precisely where $u$ occurs in $c_\alpha$, and this is
directly related to the continued fraction expansion of $\alpha$.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 16:49:21 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.4399 | Steven G. Johnson | Xuancheng Shao and Steven G. Johnson | Type-IV DCT, DST, and MDCT algorithms with reduced numbers of arithmetic
operations | 11 pages | Signal Processing vol. 88, issue 6, p. 1313-1326 (2008) | 10.1016/j.sigpro.2007.11.024 | null | cs.DS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present algorithms for the type-IV discrete cosine transform (DCT-IV) and
discrete sine transform (DST-IV), as well as for the modified discrete cosine
transform (MDCT) and its inverse, that achieve a lower count of real
multiplications and additions than previously published algorithms, without
sacrificing numerical accuracy. Asymptotically, the operation count is reduced
from ~2NlogN to ~(17/9)NlogN for a power-of-two transform size N, and the exact
count is strictly lowered for all N > 4. These results are derived by
considering the DCT to be a special case of a DFT of length 8N, with certain
symmetries, and then pruning redundant operations from a recent improved fast
Fourier transform algorithm (based on a recursive rescaling of the
conjugate-pair split radix algorithm). The improved algorithms for DST-IV and
MDCT follow immediately from the improved count for the DCT-IV.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:00:33 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 19:18:21 GMT"
}
] | 2009-01-29T00:00:00 | [
[
"Shao",
"Xuancheng",
""
],
[
"Johnson",
"Steven G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0708.4400 | Amy Glen | Amy Glen | Powers in a class of A-strict standard episturmian words | 26 pages; extended version of a paper presented at the 5th
International Conference on Words, Montreal, Canada, September 13-17, 2005 | Theoretical Computer Science 380 (2007) 330-354 | 10.1016/j.tcs.2007.03.023 | null | math.CO cs.DM | null | This paper concerns a specific class of strict standard episturmian words
whose directive words resemble those of characteristic Sturmian words. In
particular, we explicitly determine all integer powers occurring in such
infinite words, extending recent results of Damanik and Lenz (2003), who
studied powers in Sturmian words. The key tools in our analysis are canonical
decompositions and a generalization of singular words, which were originally
defined for the ubiquitous Fibonacci word. Our main results are demonstrated
via some examples, including the $k$-bonacci word: a generalization of the
Fibonacci word to a $k$-letter alphabet ($k\geq2$).
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:03:03 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.4406 | Amy Glen | Amy Glen | A characterization of fine words over a finite alphabet | 16 pages; presented at the conference on "Combinatorics, Automata and
Number Theory", Liege, Belgium, May 8-19, 2006 (to appear in a special issue
of Theoretical Computer Science) | Theoretical Computer Science 391 (2008) 51-60 | 10.1016/j.tcs.2007.10.029 | null | math.CO cs.DM | null | To any infinite word w over a finite alphabet A we can associate two infinite
words min(w) and max(w) such that any prefix of min(w) (resp. max(w)) is the
lexicographically smallest (resp. greatest) amongst the factors of w of the
same length. We say that an infinite word w over A is "fine" if there exists an
infinite word u such that, for any lexicographic order, min(w) = au where a =
min(A). In this paper, we characterize fine words; specifically, we prove that
an infinite word w is fine if and only if w is either a "strict episturmian
word" or a strict "skew episturmian word''. This characterization generalizes a
recent result of G. Pirillo, who proved that a fine word over a 2-letter
alphabet is either an (aperiodic) Sturmian word, or an ultimately periodic (but
not periodic) infinite word, all of whose factors are (finite) Sturmian.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:34:41 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.4407 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Algebraic Distributed Differential Space-Time Codes with Low Decoding
Complexity | To appear in IEEE Transactions on Wireless Communications. 10 pages,
5 figures | null | null | null | cs.IT cs.DM math.IT math.RA | null | The differential encoding/decoding setup introduced by Kiran et al,
Oggier-Hassibi and Jing-Jafarkhani for wireless relay networks that use
codebooks consisting of unitary matrices is extended to allow codebooks
consisting of scaled unitary matrices. For such codebooks to be usable in the
Jing-Hassibi protocol for cooperative diversity, the conditions involving the
relay matrices and the codebook that need to be satisfied are identified. Using
the algebraic framework of extended Clifford algebras, a new class of
Distributed Differential Space-Time Codes satisfying these conditions for power
of two number of relays and also achieving full cooperative diversity with a
low complexity sub-optimal receiver is proposed. Simulation results indicate
that the proposed codes outperform both the cyclic codes as well as the
circulant codes. Furthermore, these codes can also be applied as Differential
Space-Time codes for non-coherent communication in classical point to point
multiple antenna systems.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:49:54 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Nov 2007 21:49:58 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
Subsets and Splits