id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0911.2381
Ferm\'in Moscoso del Prado Mart\'in
Ferm\'in Moscoso del Prado Mart\'in
Analytical Determination of Fractal Structure in Stochastic Time Series
9 pages, 4 figures
null
null
null
physics.data-an cond-mat.stat-mech cs.LG nlin.CD stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current methods for determining whether a time series exhibits fractal structure (FS) rely on subjective assessments on estimators of the Hurst exponent (H). Here, I introduce the Bayesian Assessment of Scaling, an analytical framework for drawing objective and accurate inferences on the FS of time series. The technique exploits the scaling property of the diffusion associated to a time series. The resulting criterion is simple to compute and represents an accurate characterization of the evidence supporting different hypotheses on the scaling regime of a time series. Additionally, a closed-form Maximum Likelihood estimator of H is derived from the criterion, and this estimator outperforms the best available estimators.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 13:08:20 GMT" } ]
2009-11-13T00:00:00
[ [ "Martín", "Fermín Moscoso del Prado", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0911.2390
EPTCS
Stefan Leijnen, Liane Gabora
How Creative Should Creators Be To Optimize the Evolution of Ideas? A Computational Model
null
EPTCS 9, 2009, pp. 108-119
10.4204/EPTCS.9.12
null
cs.AI cs.NE physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are both benefits and drawbacks to creativity. In a social group it is not necessary for all members to be creative to benefit from creativity; some merely imitate or enjoy the fruits of others' creative efforts. What proportion should be creative? This paper contains a very preliminary investigation of this question carried out using a computer model of cultural evolution referred to as EVOC (for EVOlution of Culture). EVOC is composed of neural network based agents that evolve fitter ideas for actions by (1) inventing new ideas through modification of existing ones, and (2) imitating neighbors' ideas. The ideal proportion with respect to fitness of ideas occurs when thirty to forty percent of the individuals is creative. When creators are inventing 50% of iterations or less, mean fitness of actions in the society is a positive function of the ratio of creators to imitators; otherwise mean fitness of actions starts to drop when the ratio of creators to imitators exceeds approximately 30%. For all levels or creativity, the diversity of ideas in a population is positively correlated with the ratio of creative agents.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 13:44:59 GMT" } ]
2009-11-13T00:00:00
[ [ "Leijnen", "Stefan", "" ], [ "Gabora", "Liane", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.2405
Karim Mahboub
Karim Mahboub, Evelyne Cl\'ement, Cyrille Bertelle, V\'eronique Jay
Emotion: Appraisal-coping model for the "Cascades" problem
6 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modelling emotion has become a challenge nowadays. Therefore, several models have been produced in order to express human emotional activity. However, only a few of them are currently able to express the close relationship existing between emotion and cognition. An appraisal-coping model is presented here, with the aim to simulate the emotional impact caused by the evaluation of a particular situation (appraisal), along with the consequent cognitive reaction intended to face the situation (coping). This model is applied to the "Cascades" problem, a small arithmetical exercise designed for ten-year-old pupils. The goal is to create a model corresponding to a child's behaviour when solving the problem using his own strategies.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 15:03:22 GMT" } ]
2009-11-13T00:00:00
[ [ "Mahboub", "Karim", "" ], [ "Clément", "Evelyne", "" ], [ "Bertelle", "Cyrille", "" ], [ "Jay", "Véronique", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.2423
Matt Purkeypile
Matt Purkeypile
Cove: A Practical Quantum Computer Programming Framework
Doctoral dissertation, 272 pages
null
null
null
cs.PL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While not yet in commercial existence, quantum computers have the ability to solve certain classes of problems that are not efficiently solvable on existing Turing Machine based (classical) computers. For quantum computers to be of use, methods of programming them must exist. Proposals exist for programming quantum computers, but all of the existing ones suffer from flaws that make them impractical in commercial software development environments. Cove is a framework for programming quantum computers that extends existing classical languages to allow for quantum computation, thus providing a quantum computing toolkit for commercial software developers. Since the target users of Cove are commercial developers, it is an object oriented framework that can be used by multiple languages and also places emphasis on complete documentation. The focus of Cove is not so much on the software product, but on the fundamental concepts that make quantum computing practical for common developers.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 05:36:23 GMT" } ]
2009-11-13T00:00:00
[ [ "Purkeypile", "Matt", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0911.2466
Renuka Kandregula
Renuka Kandregula
Towards a Number Theoretic Discrete Hilbert Transform
9 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an approach for the development of a number theoretic discrete Hilbert transform. The forward transformation has been applied by taking the odd reciprocals that occur in the DHT matrix with respect to a power of 2. Specifically, the expression for a 16-point transform is provided and results of a few representative signals are provided. The inverse transform is the inverse of the forward 16-point matrix. But at this time the inverse transform is not identical to the forward transform and, therefore, our proposed number theoretic transform must be taken as a provisional result.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 20:58:44 GMT" } ]
2009-11-13T00:00:00
[ [ "Kandregula", "Renuka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.2484
Pat Morin
Dan Chen, Luc Devroye, Vida Dujmovic, and Pat Morin
Memoryless Routing in Convex Subdivisions: Random Walks are Optimal
11 pages, 6 figures
Computational Geometry: Theory and Applications, Volume 45, Issue 4, May 2012, Pages 178-185
10.1016/j.comgeo.2011.12.005
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A memoryless routing algorithm is one in which the decision about the next edge on the route to a vertex t for a packet currently located at vertex v is made based only on the coordinates of v, t, and the neighbourhood, N(v), of v. The current paper explores the limitations of such algorithms by showing that, for any (randomized) memoryless routing algorithm A, there exists a convex subdivision on which A takes Omega(n^2) expected time to route a message between some pair of vertices. Since this lower bound is matched by a random walk, this result implies that the geometric information available in convex subdivisions is not helpful for this class of routing algorithms. The current paper also shows the existence of triangulations for which the Random-Compass algorithm proposed by Bose etal (2002,2004) requires 2^{\Omega(n)} time to route between some pair of vertices.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 21:53:08 GMT" } ]
2013-03-12T00:00:00
[ [ "Chen", "Dan", "" ], [ "Devroye", "Luc", "" ], [ "Dujmovic", "Vida", "" ], [ "Morin", "Pat", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.2501
Karim Mahboub
Karim Mahboub (LITIS), Cyrille Bertelle (LITIS), V\'eronique Jay (LITIS), Evelyne Cl\'ement
Emotion : mod\`ele d'appraisal-coping pour le probl\`eme des Cascades
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modeling emotion has become a challenge nowadays. Therefore, several models have been produced in order to express human emotional activity. However, only a few of them are currently able to express the close relationship existing between emotion and cognition. An appraisal-coping model is presented here, with the aim to simulate the emotional impact caused by the evaluation of a particular situation (appraisal), along with the consequent cognitive reaction intended to face the situation (coping). This model is applied to the ?Cascades? problem, a small arithmetical exercise designed for ten-year-old pupils. The goal is to create a model corresponding to a child's behavior when solving the problem using his own strategies.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 23:08:43 GMT" } ]
2009-11-16T00:00:00
[ [ "Mahboub", "Karim", "", "LITIS" ], [ "Bertelle", "Cyrille", "", "LITIS" ], [ "Jay", "Véronique", "", "LITIS" ], [ "Clément", "Evelyne", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.2508
Selena Clancy
Russ Harmer (CNRS & Universit\'e Paris Diderot-Paris 7)
Rule-based Modelling and Tunable Resolution
null
EPTCS 9, 2009, pp. 65-72
10.4204/EPTCS.9.8
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the use of an extension of rule-based modelling for cellular signalling to create a structured space of model variants. This enables the incremental development of rule sets that start from simple mechanisms and which, by a gradual increase in agent and rule resolution, evolve into more detailed descriptions.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 23:24:38 GMT" } ]
2009-11-16T00:00:00
[ [ "Harmer", "Russ", "", "CNRS & Université Paris Diderot-Paris 7" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.2538
Francis Bonahon
Edmond Jonckheere (USC), Mingji Lou (USC), Francis Bonahon (USC), Yuliy Baryshnikov (Bell Labs)
Euclidean versus hyperbolic congestion in idealized versus experimental networks
23 pages, 4 figures
null
10.1080/15427951.2010.554320
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a mathematical justification of the phenomenon of extreme congestion at a very limited number of nodes in very large networks. It is argued that this phenomenon occurs as a combination of the negative curvature property of the network together with minimum length routing. More specifically, it is shown that, in a large n-dimensional hyperbolic ball B of radius R viewed as a roughly similar model of a Gromov hyperbolic network, the proportion of traffic paths transiting through a small ball near the center is independent of the radius R whereas, in a Euclidean ball, the same proportion scales as 1/R^{n-1}. This discrepancy persists for the traffic load, which at the center of the hyperbolic ball scales as the square of the volume, whereas the same traffic load scales as the volume to the power (n+1)/n in the Euclidean ball. This provides a theoretical justification of the experimental exponent discrepancy observed by Narayan and Saniee between traffic loads in Gromov-hyperbolic networks from the Rocketfuel data base and synthetic Euclidean lattice networks. It is further conjectured that for networks that do not enjoy the obvious symmetry of hyperbolic and Euclidean balls, the point of maximum traffic is near the center of mass of the network.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 05:17:23 GMT" } ]
2018-08-02T00:00:00
[ [ "Jonckheere", "Edmond", "", "USC" ], [ "Lou", "Mingji", "", "USC" ], [ "Bonahon", "Francis", "", "USC" ], [ "Baryshnikov", "Yuliy", "", "Bell Labs" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2551
Jayakrishnan Unnikrishnan
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli, Sean Meyn
Minimax Robust Quickest Change Detection
Submitted to IEEE Transactions on Information Theory, Nov. 2009. Revised May 2010
null
10.1109/TIT.2011.2104993
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The popular criteria of optimality for quickest change detection procedures are the Lorden criterion, the Shiryaev-Roberts-Pollak criterion, and the Bayesian criterion. In this paper a robust version of these quickest change detection problems is considered when the pre-change and post-change distributions are not known exactly but belong to known uncertainty classes of distributions. For uncertainty classes that satisfy a specific condition, it is shown that one can identify least favorable distributions (LFDs) from the uncertainty classes, such that the detection rule designed for the LFDs is optimal for the robust problem in a minimax sense. The condition is similar to that required for the identification of LFDs for the robust hypothesis testing problem originally studied by Huber. An upper bound on the delay incurred by the robust test is also obtained in the asymptotic setting under the Lorden criterion of optimality. This bound quantifies the delay penalty incurred to guarantee robustness. When the LFDs can be identified, the proposed test is easier to implement than the CUSUM test based on the Generalized Likelihood Ratio (GLR) statistic which is a popular approach for such robust change detection problems. The proposed test is also shown to give better performance than the GLR test in simulations for some parameter values.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 07:07:50 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2010 03:57:48 GMT" } ]
2016-11-15T00:00:00
[ [ "Unnikrishnan", "Jayakrishnan", "" ], [ "Veeravalli", "Venugopal V.", "" ], [ "Meyn", "Sean", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0911.2564
Walid Saad
Walid Saad, Zhu Han, Tamer Basar, Merouane Debbah, and Are Hj{\o}rungnes
Distributed Coalition Formation Games for Secure Wireless Transmission
Invited paper
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. While existing PHY security literature answered the question ``what are the link-level secrecy rate gains from cooperation?'', this paper attempts to answer the question of ``how to achieve those gains in a practical decentralized wireless network and in the presence of a cost for information exchange?''. For this purpose, we model the PHY security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy rate taking into account the security costs during information exchange. We analyze the resulting coalitional structures for both decode-and-forward and amplify-and-forward cooperation and study how the users can adapt the network topology to environmental changes such as mobility. Through simulations, we assess the performance of the proposed algorithm and show that, by coalition formation using decode-and-forward, the average secrecy rate per user is increased of up to 25.3 % and 24.4 % (for a network with 45 users) relative to the non-cooperative and amplify-and-forward cases, respectively.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 08:37:54 GMT" } ]
2009-11-16T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Basar", "Tamer", "" ], [ "Debbah", "Merouane", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2567
Christoph Durr
Marek Chrobak, Christoph Durr, Flavio Guinez, Antoni Lozano, Nguyen Kim Thang
Tile Packing Tomography is NP-hard
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete tomography deals with reconstructing finite spatial objects from lower dimensional projections and has applications for example in timetable design. In this paper we consider the problem of reconstructing a tile packing from its row and column projections. It consists of disjoint copies of a fixed tile, all contained in some rectangular grid. The projections tell how many cells are covered by a tile in each row and column. How difficult is it to construct a tile packing satisfying given projections? It was known to be solvable by a greedy algorithm for bars (tiles of width or height 1), and NP-hardness results were known for some specific tiles. This paper shows that the problem is NP-hard whenever the tile is not a bar.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 08:54:27 GMT" }, { "version": "v2", "created": "Tue, 21 Dec 2010 09:43:49 GMT" } ]
2010-12-22T00:00:00
[ [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Guinez", "Flavio", "" ], [ "Lozano", "Antoni", "" ], [ "Thang", "Nguyen Kim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.2603
Daniel Stern
Daniel Stern
Cybermatter
Seventh International Computer Ethics Conference (CEPE 2007)
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we examine several aspects of the impact of Cyberworld onto our Reality conceptions, and their social implications.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 12:48:42 GMT" } ]
2009-11-16T00:00:00
[ [ "Stern", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.2619
Andrei Sukhov M
A.M. Sukhov, D.I. Sidelnikov, A. Galtsev, A.P. Platonov, M.V. Strizhov
Active Flows in Diagnostic of Troubleshooting on Backbone Links
7 pages, 6 figures, RELARN2009 conference (in Russian)
null
null
RIPN121109
cs.NI
http://creativecommons.org/licenses/by/3.0/
This paper aims to identify the operational region of a link in terms of its utilization and alert operators at the point where the link becomes overloaded and requires a capacity upgrade. The number of active flows is considered the real network state and is proposed to use a proxy for utilization. The Gaussian approximation gives the expression for the confidence interval on an operational region. The easy rule has been formulated to display the network defects by means of measurements of router loading and number of active flows. Mean flow performance is considered as the basic universal index characterized quality of network services provided to single user.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 14:31:58 GMT" } ]
2009-11-16T00:00:00
[ [ "Sukhov", "A. M.", "" ], [ "Sidelnikov", "D. I.", "" ], [ "Galtsev", "A.", "" ], [ "Platonov", "A. P.", "" ], [ "Strizhov", "M. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2620
Al-Sakib Khan Pathan
Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan
Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool
31 pages
null
null
null
cs.SE cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of simulation is often complicated for which many naive users often seek for relatively easier solutions. In many cases, simulations are done without any visual output which makes them non-attractive. In this paper, we present ViSim; a new simulation tool that has a user-friendly graphical interface. ViSim could be useful for researchers, students, teachers in their works, and for the demonstration of various wireless network scenarios on computer screen. It could make the task of simulation more exciting and enhance the interest of the users without going into complex command-only text interface. ViSim is not a simulation engine rather it calls ns-2 simulations in the background and makes the task easy for the users to visualize the simulation in Windows environment. Though ViSim is mainly a simulation demonstration tool, any user with the knowledge of ns-2 and Tcl scripting is also allowed to do necessary modifications and quick configurations for any other MANET routing scenario. Using our simulation tool, we measured the performances of several Mobile Ad-hoc Network (MANET) routing protocols. In this paper, we present the performance analysis of three prominent MANET routing protocols; DSDV, DSR, and AODV using our tool. The details of various features of ViSim, brief descriptions of the selected routing protocols and their comparisons, details about the performed experiments, and the gained results are presented in this work.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 14:38:06 GMT" } ]
2009-11-16T00:00:00
[ [ "Saquib", "Nazmus", "" ], [ "Sakib", "Md. Sabbir Rahman", "" ], [ "Pathan", "Al-Sakib Khan", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2632
Henk Moed
Henk F. Moed
Measuring contextual citation impact of scientific journals
Version 13 November 2009; 23 pages; 1 appendix; 7 tables; 8 figures
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores a new indicator of journal citation impact, denoted as source normalized impact per paper (SNIP). It measures a journal's contextual citation impact, taking into account characteristics of its properly defined subject field, especially the frequency at which authors cite other papers in their reference lists, the rapidity of maturing of citation impact, and the extent to which a database used for the assessment covers the field's literature. It further develops Eugene Garfield's notions of a field's 'citation potential' defined as the average length of references lists in a field and determining the probability of being cited, and the need in fair performance assessments to correct for differences between subject fields. A journal's subject field is defined as the set of papers citing that journal. SNIP is defined as the ratio of the journal's citation count per paper and the citation potential in its subject field. It aims to allow direct comparison of sources in different subject fields. Citation potential is shown to vary not only between journal subject categories - groupings of journals sharing a research field - or disciplines (e.g., journals in mathematics, engineering and social sciences tend to have lower values than titles in life sciences), but also between journals within the same subject category. For instance, basic journals tend to show higher citation potentials than applied or clinical journals, and journals covering emerging topics higher than periodicals in classical subjects or more general journals. SNIP corrects for such differences. Its strengths and limitations are critically discussed, and suggestions are made for further research. All empirical results are derived from Elsevier's Scopus.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 15:10:31 GMT" } ]
2009-11-16T00:00:00
[ [ "Moed", "Henk F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.2731
Loet Leydesdorff
Loet Leydesdorff
Visualization of the Citation Impact Environments of Scientific Journals: An online mapping exercise
null
Visualization of the Citation Impact Environments of Scientific Journals: An online mapping exercise, Journal of the American Society for Information Science and Technology 58(1), 25-38, 2007
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 journals) are made accessible from the perspective of any of these journals. The user is thus able to analyze the citation environment in terms of links and graphs. Furthermore, the local impact of a journal is defined as its share of the total citations in the specific journal's citation environments; the vertical size of the nodes is varied proportionally to this citation impact. The horizontal size of each node can be used to provide the same information after correction for within-journal (self)-citations. In the "citing" environment, the equivalents of this measure can be considered as a citation activity index which maps how the relevant journal environment is perceived by the collective of authors of a given journal. As a policy application, the mechanism of interdisciplinary developments among the sciences is elaborated for the case of nanotechnology journals.
[ { "version": "v1", "created": "Fri, 13 Nov 2009 23:20:36 GMT" } ]
2009-11-17T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.2746
Waheed Bajwa
Waheed U. Bajwa, Robert Calderbank, and Sina Jafarpour
Model Selection: Two Fundamental Measures of Coherence and Their Algorithmic Significance
5 pages; Accepted for Proc. 2010 IEEE International Symposium on Information Theory (ISIT 2010)
Proc. IEEE Int. Symp. Information Theory, Austin, TX, Jun. 13-18, 2010, pp. 1568-1572
10.1109/ISIT.2010.5513474
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of model selection arises in a number of contexts, such as compressed sensing, subset selection in linear regression, estimation of structures in graphical models, and signal denoising. This paper generalizes the notion of \emph{incoherence} in the existing literature on model selection and introduces two fundamental measures of coherence---termed as the worst-case coherence and the average coherence---among the columns of a design matrix. In particular, it utilizes these two measures of coherence to provide an in-depth analysis of a simple one-step thresholding (OST) algorithm for model selection. One of the key insights offered by the ensuing analysis is that OST is feasible for model selection as long as the design matrix obeys an easily verifiable property. In addition, the paper also characterizes the model-selection performance of OST in terms of the worst-case coherence, \mu, and establishes that OST performs near-optimally in the low signal-to-noise ratio regime for N x C design matrices with \mu = O(N^{-1/2}). Finally, in contrast to some of the existing literature on model selection, the analysis in the paper is nonasymptotic in nature, it does not require knowledge of the true model order, it is applicable to generic (random or deterministic) design matrices, and it neither requires submatrices of the design matrix to have full rank, nor does it assume a statistical prior on the values of the nonzero entries of the data vector.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 06:22:30 GMT" }, { "version": "v2", "created": "Fri, 15 Jan 2010 22:50:00 GMT" }, { "version": "v3", "created": "Thu, 29 Apr 2010 22:06:36 GMT" } ]
2018-03-06T00:00:00
[ [ "Bajwa", "Waheed U.", "" ], [ "Calderbank", "Robert", "" ], [ "Jafarpour", "Sina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0911.2760
Katrin Iltgen
Katrin Iltgen, Walter Vogler
Robustness of a bisimulation-type faster-than preorder
Express Workshop
EPTCS 8, 2009, pp. 66-79
10.4204/EPTCS.8.6
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TACS is an extension of CCS where upper time bounds for delays can be specified. Luettgen and Vogler defined three variants of bismulation-type faster-than relations and showed that they all three lead to the same preorder, demonstrating the robustness of their approach. In the present paper, the operational semantics of TACS is extended; it is shown that two of the variants still give the same preorder as before, underlining robustness. An explanation is given why this result fails for the third variant. It is also shown that another variant, which mixes old and new operational semantics, can lead to smaller relations that prove the same preorder.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 09:26:28 GMT" } ]
2009-11-17T00:00:00
[ [ "Iltgen", "Katrin", "" ], [ "Vogler", "Walter", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.2784
Wolfgang Stummer
Wolfgang Stummer and Igor Vajda
On Bregman Distances and Divergences of Probability Measures
12 two-column pages, 2 figures
IEEE Transactions on Information Theory 58(3), 1277-1288 (2012)
10.1109/TIT.2011.2178139
null
cs.IT math.IT math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper introduces scaled Bregman distances of probability distributions which admit non-uniform contributions of observed events. They are introduced in a general form covering not only the distances of discrete and continuous stochastic observations, but also the distances of random processes and signals. It is shown that the scaled Bregman distances extend not only the classical ones studied in the previous literature, but also the information divergence and the related wider class of convex divergences of probability measures. An information processing theorem is established too, but only in the sense of invariance w.r.t. statistically sufficient transformations and not in the sense of universal monotonicity. Pathological situations where coding can increase the classical Bregman distance are illustrated by a concrete example. In addition to the classical areas of application of the Bregman distances and convex divergences such as recognition, classification, learning and evaluation of proximity of various features and signals, the paper mentions a new application in 3D-exploratory data analysis. Explicit expressions for the scaled Bregman distances are obtained in general exponential families, with concrete applications in the binomial, Poisson and Rayleigh families, and in the families of exponential processes such as the Poisson and diffusion processes including the classical examples of the Wiener process and geometric Brownian motion.
[ { "version": "v1", "created": "Sat, 14 Nov 2009 16:23:39 GMT" }, { "version": "v2", "created": "Wed, 5 Oct 2011 22:27:31 GMT" } ]
2021-05-12T00:00:00
[ [ "Stummer", "Wolfgang", "" ], [ "Vajda", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0911.2785
Cristian Molinaro
Sergio Greco, Cristian Molinaro, Irina Trubitsyna, Ester Zumpano
NP Datalog: a Logic Language for Expressing NP Search and Optimization Problems
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a logic language for expressing NP search and optimization problems. Specifically, first a language obtained by extending (positive) Datalog with intuitive and efficient constructs (namely, stratified negation, constraints and exclusive disjunction) is introduced. Next, a further restricted language only using a restricted form of disjunction to define (non-deterministically) subsets (or partitions) of relations is investigated. This language, called NP Datalog, captures the power of Datalog with unstratified negation in expressing search and optimization problems. A system prototype implementing NP Datalog is presented. The system translates NP Datalog queries into OPL programs which are executed by the ILOG OPL Development Studio. Our proposal combines easy formulation of problems, expressed by means of a declarative logic language, with the efficiency of the ILOG System. Several experiments show the effectiveness of this approach.
[ { "version": "v1", "created": "Sat, 14 Nov 2009 17:20:30 GMT" } ]
2009-11-17T00:00:00
[ [ "Greco", "Sergio", "" ], [ "Molinaro", "Cristian", "" ], [ "Trubitsyna", "Irina", "" ], [ "Zumpano", "Ester", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.2801
Olivier Bodini
Olivier Bodini (LIP6), Alice Jacquot (LIP6)
Boltzmann Samplers for Colored Combinatorial Objects
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give a general framework for the Boltzmann generation of colored objects belonging to combinatorial constructible classes. We propose an intuitive notion called profiled objects which allows the sampling of size-colored objects (and also of k-colored objects) although the corresponding class cannot be described by an analytic ordinary generating function.
[ { "version": "v1", "created": "Sat, 14 Nov 2009 20:03:10 GMT" } ]
2009-11-17T00:00:00
[ [ "Bodini", "Olivier", "", "LIP6" ], [ "Jacquot", "Alice", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.2802
Olivier Bodini
Olivier Bodini (LIP6), Alice Jacquot (LIP6)
Boltzmann Samplers for v-balanced Colored Necklaces
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to the random generation of particular colored necklaces for which the number of beads of a given color is constrained (these necklaces are called v-balanced). We propose an efficient sampler (its expected time complexity is linear) which satisfies the Boltzmann model principle introduced by Duchon, Flajolet, Louchard and Schaeffer. Our main motivation is to show that the absence of a decomposable specification can be circumvented by mixing the Boltzmann samplers with other types of samplers.
[ { "version": "v1", "created": "Sat, 14 Nov 2009 20:09:30 GMT" } ]
2009-11-17T00:00:00
[ [ "Bodini", "Olivier", "", "LIP6" ], [ "Jacquot", "Alice", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.2804
Thomas Fernique
Olivier Bodini, Thomas Fernique, Michael Rao, Eric Remila
Distances on Rhombus Tilings
18 pages, 9 figures, submitted to Theoretical Computer Science (special issue of DGCI'09)
Theor. Comput. Sci. 412(36): 4787-4794 (2011)
10.1016/j.tcs.2011.04.015
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rhombus tilings of a simply connected domain of the Euclidean plane are known to form a flip-connected space (a flip is the elementary operation on rhombus tilings which rotates 180{\deg} a hexagon made of three rhombi). Motivated by the study of a quasicrystal growth model, we are here interested in better understanding how "tight" rhombus tiling spaces are flip-connected. We introduce a lower bound (Hamming-distance) on the minimal number of flips to link two tilings (flip-distance), and we investigate whether it is sharp. The answer depends on the number n of different edge directions in the tiling: positive for n=3 (dimer tilings) or n=4 (octogonal tilings), but possibly negative for n=5 (decagonal tilings) or greater values of n. A standard proof is provided for the n=3 and n=4 cases, while the complexity of the n=5 case led to a computer-assisted proof (whose main result can however be easily checked by hand).
[ { "version": "v1", "created": "Sat, 14 Nov 2009 20:29:27 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2011 16:53:33 GMT" } ]
2011-12-07T00:00:00
[ [ "Bodini", "Olivier", "" ], [ "Fernique", "Thomas", "" ], [ "Rao", "Michael", "" ], [ "Remila", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.2805
Olivier Bodini
Olivier Bodini (LIP6), J\'er\'emie Lumbroso (LIP6)
Optimal Partial Tiling of Manhattan Polyominoes
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding an efficient optimal partial tiling algorithm is still an open problem. We have worked on a special case, the tiling of Manhattan polyominoes with dominoes, for which we give an algorithm linear in the number of columns. Some techniques are borrowed from traditional graph optimisation problems.
[ { "version": "v1", "created": "Sat, 14 Nov 2009 20:32:22 GMT" } ]
2009-11-17T00:00:00
[ [ "Bodini", "Olivier", "", "LIP6" ], [ "Lumbroso", "Jérémie", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.2807
Olivier Bodini
Olivier Bodini (LIP6)
On the Minimum Size of a Contraction-Universal Tree
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A tree T_uni is m-universal for the class of trees if for every tree T of size m, T can be obtained from T_uni by successive contractions of edges. We prove that a m-universal tree for the class of trees has at least mln(m) + (gamma-1)m + O(1) edges where is the Euler's constant and we build such a tree with less than mc edges for a fixed constant c = 1.984...
[ { "version": "v1", "created": "Sat, 14 Nov 2009 21:04:40 GMT" } ]
2009-11-17T00:00:00
[ [ "Bodini", "Olivier", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.2829
EPTCS
S. Barry Cooper, Vincent Danos
Proceedings Fifth Workshop on Developments in Computational Models--Computational Models From Nature
null
EPTCS 9, 2009
10.4204/EPTCS.9
null
cs.CE cs.AI cs.CC cs.FL cs.LO cs.NE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The special theme of DCM 2009, co-located with ICALP 2009, concerned Computational Models From Nature, with a particular emphasis on computational models derived from physics and biology. The intention was to bring together different approaches - in a community with a strong foundational background as proffered by the ICALP attendees - to create inspirational cross-boundary exchanges, and to lead to innovative further research. Specifically DCM 2009 sought contributions in quantum computation and information, probabilistic models, chemical, biological and bio-inspired ones, including spatial models, growth models and models of self-assembly. Contributions putting to the test logical or algorithmic aspects of computing (e.g., continuous computing with dynamical systems, or solid state computing models) were also very much welcomed.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 03:35:32 GMT" } ]
2009-11-17T00:00:00
[ [ "Cooper", "S. Barry", "" ], [ "Danos", "Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.2847
Sergiy Vorobyov
Jie Gao, Sergiy A. Vorobyov, and Hai Jiang
Cooperative Precoding/Resource Allocation Games under Spectral Mask and Total Power Constraints
33 pages, 8 figures, Submitted to the IEEE Trans. Signal Processing in Oct. 2009
J. Gao, S.A. Vorobyov, and H. Jiang, "Cooperative resource allocation games under spectral mask and total power constraints," IEEE Trans. Signal Processing, vol. 58, no. 8, pp. 4379-4395, Aug. 2010
10.1109/TSP.2010.2048320
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of orthogonal signaling schemes such as time-, frequency-, or code-division multiplexing (T-, F-, CDM) in multi-user systems allows for power-efficient simple receivers. It is shown in this paper that by using orthogonal signaling on frequency selective fading channels, the cooperative Nash bargaining (NB)-based precoding games for multi-user systems, which aim at maximizing the information rates of all users, are simplified to the corresponding cooperative resource allocation games. The latter provides additional practically desired simplifications to transmitter design and significantly reduces the overhead during user cooperation. The complexity of the corresponding precoding/resource allocation games, however, depends on the constraints imposed on the users. If only spectral mask constraints are present, the corresponding cooperative NB problem can be formulated as a convex optimization problem and solved efficiently in a distributed manner using dual decomposition based algorithm. However, the NB problem is non-convex if total power constraints are also imposed on the users. In this case, the complexity associate with finding the NB solution is unacceptably high. Therefore, the multi-user systems are categorized into bandwidth- and power-dominant based on a bottleneck resource, and different manners of cooperation are developed for each type of systems for the case of two-users. Such classification guarantees that the solution obtained in each case is Pareto-optimal and actually can be identical to the optimal solution, while the complexity is significantly reduced. Simulation results demonstrate the efficiency of the proposed cooperative precoding/resource allocation strategies and the reduced complexity of the proposed algorithms.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 09:50:50 GMT" } ]
2015-05-14T00:00:00
[ [ "Gao", "Jie", "" ], [ "Vorobyov", "Sergiy A.", "" ], [ "Jiang", "Hai", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2865
Nallusamy R
R. Nallusamy and K. Duraiswamy
Neural Networks for Dynamic Shortest Path Routing Problems - A Survey
This article has been withdrawn by the authors. Misplaced equation 1
CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 1, No. 2, pp. 31-34, May 2009
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reviews the overview of the dynamic shortest path routing problem and the various neural networks to solve it. Different shortest path optimization problems can be solved by using various neural networks algorithms. The routing in packet switched multi-hop networks can be described as a classical combinatorial optimization problem i.e. a shortest path routing problem in graphs. The survey shows that the neural networks are the best candidates for the optimization of dynamic shortest path routing problems due to their fastness in computation comparing to other softcomputing and metaheuristics algorithms
[ { "version": "v1", "created": "Sun, 15 Nov 2009 13:04:26 GMT" }, { "version": "v2", "created": "Sun, 30 May 2010 09:02:08 GMT" } ]
2010-06-01T00:00:00
[ [ "Nallusamy", "R.", "" ], [ "Duraiswamy", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.2873
Pierre-Olivier Amblard
Pierre-Olivier Amblard and Olivier J. J. Michel
Relating Granger causality to directed information theory for networks of stochastic processes
submitted, completely rehaul, new title, added recent references, more emphasis on general case
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of inferring circulation of information between multiple stochastic processes. We discuss two possible frameworks in which the problem can be studied: directed information theory and Granger causality. The main goal of the paper is to study the connection between these two frameworks. In the case of directed information theory, we stress the importance of Kramer's causal conditioning. This type of conditioning is necessary not only in the definition of the directed information but also for handling causal side information. We also show how directed information decomposes into the sum of two measures, the first one related to Schreiber's transfer entropy quantifies the dynamical aspects of causality, whereas the second one, termed instantaneous information exchange, quantifies the instantaneous aspect of causality. After having recalled the definition of Granger causality, we establish its connection with directed information theory. The connection is particularly studied in the Gaussian case, showing that Geweke's measures of Granger causality correspond to the transfer entropy and the instantaneous information exchange. This allows to propose an information theoretic formulation of Granger causality.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 14:47:45 GMT" }, { "version": "v2", "created": "Fri, 27 Nov 2009 17:24:33 GMT" }, { "version": "v3", "created": "Wed, 8 Dec 2010 00:48:56 GMT" }, { "version": "v4", "created": "Tue, 1 Nov 2011 05:00:01 GMT" } ]
2011-11-02T00:00:00
[ [ "Amblard", "Pierre-Olivier", "" ], [ "Michel", "Olivier J. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2889
Vladimir Karlin
V. Karlin
Global communications in multiprocessor simulations of flames
16 pages, 8 figures
null
null
null
cs.DC cs.CE cs.MS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate performance of global communications in a particular parallel code. The code simulates dynamics of expansion of premixed spherical flames using an asymptotic model of Sivashinsky type and a spectral numerical algorithm. As a result, the code heavily relies on global all-to-all interprocessor communications implementing transposition of the distributed data array in which numerical solution to the problem is stored. This global data interdependence makes interprocessor connectivity of the HPC system as important as the floating-point power of the processors of which the system is built. Our experiments show that efficient numerical simulation of this particular model, with global data interdependence, on modern HPC systems is possible. Prospects of performance of more sophisticated models of flame dynamics are analysed as well.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 17:10:31 GMT" } ]
2009-11-17T00:00:00
[ [ "Karlin", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.2899
Roberto Bagnara
Michael A. Covington (Institute for Artificial Intelligence, The University of Georgia, Athens, Georgia, U.S.A.), Roberto Bagnara (Department of Mathematics, University of Parma, and BUGSENG srl, Italy), Richard A. O'Keefe (Department of Computer Science, University of Otago, Dunedin, New Zealand), Jan Wielemaker (Department of Computer Science, VU University Amsterdam, The Netherlands), Simon Price (Intelligent Systems Laboratory, University of Bristol, United Kingdom)
Coding Guidelines for Prolog
39 pages, 4 figures, 2 tables
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coding standards and good practices are fundamental to a disciplined approach to software projects, whatever programming languages they employ. Prolog programming can benefit from such an approach, perhaps more than programming in other languages. Despite this, no widely accepted standards and practices seem to have emerged up to now. The present paper is a first step towards filling this void: it provides immediate guidelines for code layout, naming conventions, documentation, proper use of Prolog features, program development, debugging and testing. Presented with each guideline is its rationale and, where sensible options exist, illustrations of the relative pros and cons for each alternative. A coding standard should always be selected on a per-project basis, based on a host of issues pertinent to any given programming project; for this reason the paper goes beyond the mere provision of normative guidelines by discussing key factors and important criteria that should be taken into account when deciding on a fully-fledged coding standard for the project.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 18:21:41 GMT" }, { "version": "v2", "created": "Fri, 19 Nov 2010 20:25:29 GMT" }, { "version": "v3", "created": "Tue, 17 May 2011 14:30:39 GMT" } ]
2011-05-18T00:00:00
[ [ "Covington", "Michael A.", "", "Institute for Artificial Intelligence, The\n University of Georgia, Athens, Georgia, U.S.A." ], [ "Bagnara", "Roberto", "", "Department\n of Mathematics, University of Parma, and BUGSENG srl, Italy" ], [ "O'Keefe", "Richard A.", "", "Department of Computer Science, University of Otago, Dunedin, New\n Zealand" ], [ "Wielemaker", "Jan", "", "Department of Computer Science, VU University\n Amsterdam, The Netherlands" ], [ "Price", "Simon", "", "Intelligent Systems Laboratory,\n University of Bristol, United Kingdom" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.2900
Tobias Kretz
Tobias Kretz
Computation Speed of the F.A.S.T. Model
Accepted as contribution to "Traffic and Granular Flow 2009" proceedings. This is a slightly extended version
null
null
null
cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The F.A.S.T. model for microscopic simulation of pedestrians was formulated with the idea of parallelizability and small computation times in general in mind, but so far it was never demonstrated, if it can in fact be implemented efficiently for execution on a multi-core or multi-CPU system. In this contribution results are given on computation times for the F.A.S.T. model on an eight-core PC.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 18:09:08 GMT" } ]
2010-01-20T00:00:00
[ [ "Kretz", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.2902
Tobias Kretz
Cornelia Boenisch, Tobias Kretz
Simulation of Pedestrians Crossing a Street
Accepted as contribution to "Traffic and Granular Flow 09" proceedings. This is a slightly extended version
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The simulation of vehicular traffic as well as pedestrian dynamics meanwhile both have a decades long history. The success of this conference series, PED and others show that the interest in these topics is still strongly increasing. This contribution deals with a combination of both systems: pedestrians crossing a street. In a VISSIM simulation for varying demand jam sizes of vehicles as well as pedestrians and the travel times of the pedestrians are measured and compared. The study is considered as a study of VISSIM's con ict area functionality as such, as there is no empirical data available to use for calibration issues. Above a vehicle demand threshold the results show a non-monotonic dependence of pedestrians' travel time on pedestrian demand.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 18:31:21 GMT" } ]
2009-11-17T00:00:00
[ [ "Boenisch", "Cornelia", "" ], [ "Kretz", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.2904
Maxim Raginsky
Maxim Raginsky, Rebecca Willett, Corinne Horn, Jorge Silva, Roummel Marcia
Sequential anomaly detection in the presence of noise and limited feedback
19 pages, 12 pdf figures; final version to be published in IEEE Transactions on Information Theory
null
10.1109/TIT.2012.2201375
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a methodology for detecting anomalies from sequentially observed and potentially noisy data. The proposed approach consists of two main elements: (1) {\em filtering}, or assigning a belief or likelihood to each successive measurement based upon our ability to predict it from previous noisy observations, and (2) {\em hedging}, or flagging potential anomalies by comparing the current belief against a time-varying and data-adaptive threshold. The threshold is adjusted based on the available feedback from an end user. Our algorithms, which combine universal prediction with recent work on online convex programming, do not require computing posterior distributions given all current observations and involve simple primal-dual parameter updates. At the heart of the proposed approach lie exponential-family models which can be used in a wide variety of contexts and applications, and which yield methods that achieve sublinear per-round regret against both static and slowly varying product distributions with marginals drawn from the same exponential family. Moreover, the regret against static distributions coincides with the minimax value of the corresponding online strongly convex game. We also prove bounds on the number of mistakes made during the hedging step relative to the best offline choice of the threshold with access to all estimated beliefs and feedback signals. We validate the theory on synthetic data drawn from a time-varying distribution over binary vectors of high dimensionality, as well as on the Enron email dataset.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 18:43:10 GMT" }, { "version": "v2", "created": "Wed, 14 Jul 2010 17:30:25 GMT" }, { "version": "v3", "created": "Sun, 5 Feb 2012 23:11:54 GMT" }, { "version": "v4", "created": "Tue, 13 Mar 2012 16:11:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Raginsky", "Maxim", "" ], [ "Willett", "Rebecca", "" ], [ "Horn", "Corinne", "" ], [ "Silva", "Jorge", "" ], [ "Marcia", "Roummel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.2907
William Bradley
William F. Bradley
A Recursive Definition of the Holographic Standard Signature
Fixed small typo in Section 3.6
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a recursive description of the signatures realizable on the standard basis by a holographic algorithm. The description allows us to prove tight bounds on the size of planar matchgates and efficiently test for standard signatures. Over finite fields, it allows us to count the number of n-bit standard signatures and calculate their expected sparsity.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 19:30:21 GMT" } ]
2009-11-17T00:00:00
[ [ "Bradley", "William F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.2922
William Bradley
William F. Bradley
Sparse Eigenvectors of the Discrete Fourier Transform
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a basis of sparse eigenvectors for the N-dimensional discrete Fourier transform. The sparsity differs from the optimal by at most a factor of four. When N is a perfect square, the basis is orthogonal.
[ { "version": "v1", "created": "Sun, 15 Nov 2009 21:32:22 GMT" } ]
2009-11-17T00:00:00
[ [ "Bradley", "William F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2924
Mika G\"o\"os
Mika G\"o\"os and Pekka Orponen
Synthesizing Minimal Tile Sets for Patterned DNA Self-Assembly
12 pages, 6 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Pattern self-Assembly Tile set Synthesis (PATS) problem is to determine a set of coloured tiles that self-assemble to implement a given rectangular colour pattern. We give an exhaustive branch-and-bound algorithm to find tile sets of minimum cardinality for the PATS problem. Our algorithm makes use of a search tree in the lattice of partitions of the ambient rectangular grid, and an efficient bounding function to prune this search tree. Empirical data on the performance of the algorithm shows that it compares favourably to previously presented heuristic solutions to the problem.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 07:43:41 GMT" }, { "version": "v2", "created": "Sat, 14 Aug 2010 19:25:16 GMT" } ]
2015-03-13T00:00:00
[ [ "Göös", "Mika", "" ], [ "Orponen", "Pekka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.2942
Chris Giannella
Chris Giannella, Kun Liu, Hillol Kargupta
Breaching Euclidean Distance-Preserving Data Perturbation Using Few Known Inputs
This is a major revision accounting for journal peer-review. Changes include: removal of known sample attack, more citations added, an empirical comparison against the algorithm of Kaplan et al. added
Data & Knowledge Engineering 83, pages 93-110, 2013
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine Euclidean distance-preserving data perturbation as a tool for privacy-preserving data mining. Such perturbations allow many important data mining algorithms e.g. hierarchical and k-means clustering), with only minor modification, to be applied to the perturbed data and produce exactly the same results as if applied to the original data. However, the issue of how well the privacy of the original data is preserved needs careful study. We engage in this study by assuming the role of an attacker armed with a small set of known original data tuples (inputs). Little work has been done examining this kind of attack when the number of known original tuples is less than the number of data dimensions. We focus on this important case, develop and rigorously analyze an attack that utilizes any number of known original tuples. The approach allows the attacker to estimate the original data tuple associated with each perturbed tuple and calculate the probability that the estimation results in a privacy breach. On a real 16-dimensional dataset, we show that the attacker, with 4 known original tuples, can estimate an original unknown tuple with less than 7% error with probability exceeding 0.8.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 02:51:37 GMT" }, { "version": "v2", "created": "Wed, 2 Jan 2013 15:49:10 GMT" } ]
2013-01-03T00:00:00
[ [ "Giannella", "Chris", "" ], [ "Liu", "Kun", "" ], [ "Kargupta", "Hillol", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.2948
RadhaKrishna Ganti
Radha Krishna Ganti and Martin Haenggi
Spatial Analysis of Opportunistic Downlink Relaying in a Two-Hop Cellular System
Submitted to IEEE Transactions on Communications
null
null
null
cs.IT cs.NI math.IT stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a two-hop cellular system in which the mobile nodes help the base station by relaying information to the dead spots. While two-hop cellular schemes have been analyzed previously, the distribution of the node locations has not been explicitly taken into account. In this paper, we model the node locations of the base stations and the mobile stations as a point process on the plane and then analyze the performance of two different two-hop schemes in the downlink. In one scheme the node nearest to the destination that has decoded information from the base station in the first hop is used as the relay. In the second scheme the node with the best channel to the relay that received information in the first hop acts as a relay. In both these schemes we obtain the success probability of the two hop scheme, accounting for the interference from all other cells. We use tools from stochastic geometry and point process theory to analyze the two hop schemes. Besides the results obtained a main contribution of the paper is to introduce a mathematical framework that can be used to analyze arbitrary relaying schemes. Some of the main contributions of this paper are the analytical techniques introduced for the inclusion of the spatial locations of the nodes into the mathematical analysis.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 04:09:54 GMT" } ]
2009-11-19T00:00:00
[ [ "Ganti", "Radha Krishna", "" ], [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0911.2952
Kaibin Huang
Kaibin Huang and Rui Zhang
Cooperative Feedback for Multi-Antenna Cognitive Radio Networks
26 pages; to appear in IEEE Trans. Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive beamforming (CB) is a multi-antenna technique for efficient spectrum sharing between primary users (PUs) and secondary users (SUs) in a cognitive radio network. Specifically, a multi-antenna SU transmitter applies CB to suppress the interference to the PU receivers as well as enhance the corresponding SU-link performance. In this paper, for a multiple-input-single-output (MISO) SU channel coexisting with a single-input-single-output (SISO) PU channel, we propose a new and practical paradigm for designing CB based on the finite-rate cooperative feedback from the PU receiver to the SU transmitter. Specifically, the PU receiver communicates to the SU transmitter the quantized SU-to-PU channel direction information (CDI) for computing the SU transmit beamformer, and the interference power control (IPC) signal that regulates the SU transmission power according to the tolerable interference margin at the PU receiver. Two CB algorithms based on cooperative feedback are proposed: one restricts the SU transmit beamformer to be orthogonal to the quantized SU-to-PU channel direction and the other relaxes such a constraint. In addition, cooperative feedforward of the SU CDI from the SU transmitter to the PU receiver is exploited to allow more efficient cooperative feedback. The outage probabilities of the SU link for different CB and cooperative feedback/feedforward algorithms are analyzed, from which the optimal bit-allocation tradeoff between the CDI and IPC feedback is characterized.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 05:09:40 GMT" }, { "version": "v2", "created": "Fri, 15 Oct 2010 09:48:34 GMT" } ]
2010-10-18T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Zhang", "Rui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2974
Zizhuo Wang
Shipra Agrawal, Zizhuo Wang, Yinyu Ye
A Dynamic Near-Optimal Algorithm for Online Linear Programming
null
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A natural optimization model that formulates many online resource allocation and revenue management problems is the online linear program (LP) in which the constraint matrix is revealed column by column along with the corresponding objective coefficient. In such a model, a decision variable has to be set each time a column is revealed without observing the future inputs and the goal is to maximize the overall objective function. In this paper, we provide a near-optimal algorithm for this general class of online problems under the assumption of random order of arrival and some mild conditions on the size of the LP right-hand-side input. Specifically, our learning-based algorithm works by dynamically updating a threshold price vector at geometric time intervals, where the dual prices learned from the revealed columns in the previous period are used to determine the sequential decisions in the current period. Due to the feature of dynamic learning, the competitiveness of our algorithm improves over the past study of the same problem. We also present a worst-case example showing that the performance of our algorithm is near-optimal.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 16:39:33 GMT" }, { "version": "v2", "created": "Sat, 4 May 2013 20:10:14 GMT" }, { "version": "v3", "created": "Wed, 9 Apr 2014 03:44:37 GMT" } ]
2014-04-10T00:00:00
[ [ "Agrawal", "Shipra", "" ], [ "Wang", "Zizhuo", "" ], [ "Ye", "Yinyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.2993
Andrew Gacek
Andrew Gacek, Dale Miller, Gopalan Nadathur
A two-level logic approach to reasoning about computations
To appear in the Journal of Automated Reasoning
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relational descriptions have been used in formalizing diverse computational notions, including, for example, operational semantics, typing, and acceptance by non-deterministic machines. We therefore propose a (restricted) logical theory over relations as a language for specifying such notions. Our specification logic is further characterized by an ability to explicitly treat binding in object languages. Once such a logic is fixed, a natural next question is how we might prove theorems about specifications written in it. We propose to use a second logic, called a reasoning logic, for this purpose. A satisfactory reasoning logic should be able to completely encode the specification logic. Associated with the specification logic are various notions of binding: for quantifiers within formulas, for eigenvariables within sequents, and for abstractions within terms. To provide a natural treatment of these aspects, the reasoning logic must encode binding structures as well as their associated notions of scope, free and bound variables, and capture-avoiding substitution. Further, to support arguments about provability, the reasoning logic should possess strong mechanisms for constructing proofs by induction and co-induction. We provide these capabilities here by using a logic called G which represents relations over lambda-terms via definitions of atomic judgments, contains inference rules for induction and co-induction, and includes a special generic quantifier. We show how provability in the specification logic can be transparently encoded in G. We also describe an interactive theorem prover called Abella that implements G and this two-level logic approach and we present several examples that demonstrate the efficacy of Abella in reasoning about computations.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 09:56:44 GMT" }, { "version": "v2", "created": "Wed, 1 Sep 2010 08:39:26 GMT" } ]
2010-09-02T00:00:00
[ [ "Gacek", "Andrew", "" ], [ "Miller", "Dale", "" ], [ "Nadathur", "Gopalan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.3005
Dominique Duval
Dominique Duval (LJK)
How to combine diagrammatic logics
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a submission to the contest: How to combine logics? at the World Congress and School on Universal Logic III, 2010. We claim that combining "things", whatever these things are, is made easier if these things can be seen as the objects of a category. We define the category of diagrammatic logics, so that categorical constructions can be used for combining diagrammatic logics. As an example, a combination of logics using an opfibration is presented, in order to study computational side-effects due to the evolution of the state during the execution of an imperative program.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 11:03:48 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 12:39:55 GMT" } ]
2009-11-19T00:00:00
[ [ "Duval", "Dominique", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0911.3024
Guyslain Naves
Guyslain Naves (LGS)
The hardness of routing two pairs on one face
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the NP-completeness of the integer multiflow problem in planar graphs, with the following restrictions: there are only two demand edges, both lying on the infinite face of the routing graph. This was one of the open challenges concerning disjoint paths, explicitly asked by M\"uller. It also strengthens Schw\"arzler's recent proof of one of the open problems of Schrijver's book, about the complexity of the edge-disjoint paths problem with terminals on the outer boundary of a planar graph. We also give a directed acyclic reduction. This proves that the arc-disjoint paths problem is NP-complete in directed acyclic graphs, even with only two demand arcs.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 13:22:39 GMT" } ]
2009-11-17T00:00:00
[ [ "Naves", "Guyslain", "", "LGS" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.3086
Loet Leydesdorff
Lutz Bornmann, Loet Leydesdorff, Werner Marx
Citation Environment of Angewandte Chemie
null
Lutz Bornmann, Loet Leydesdorff, and Werner Marx, Citation Environment of Angewandte Chemie, CHIMIA 61(3), 104-109, 2007
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, aggregated journal-journal citation networks were made accessible from the perspective of each journal included in the Science Citation Index see (http://www.leydesdorff.net/). The local matrices can be used to inspect the relevant citation environment of a journal using statistical analysis and visualization techniques from social network analysis. The inspection gives an answer to the question what the local impact of this and other journals in the environment is. In this study the citation environment of Angewandte Chemie was analysed. Angewandte Chemie is one of the prime chemistry journals in the world. Its environment was compared with that of the Journal of the American Chemical Society. The results of the environment analyses give a detailed insight into the field-embeddedness of Angewandte Chemie. The impacts of the German and international editions of this journal are compared.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:19:46 GMT" } ]
2009-11-17T00:00:00
[ [ "Bornmann", "Lutz", "" ], [ "Leydesdorff", "Loet", "" ], [ "Marx", "Werner", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3087
Loet Leydesdorff
Ping Zhou, Loet Leydesdorff
A Comparison between the China Scientific and Technical Papers and Citations Database and the Science Citation Index in terms of journal hierarchies and inter-journal citation relations
null
Journal of the American Society for Information Science and Technology 58(2), 223-236, 2007
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The journal structure in the China Scientific and Technical Papers and Citations Database (CSTPCD) is analysed from three perspectives: the database level, the specialty level and the institutional level (i.e., university journals versus journals issued by the Chinese Academy of Sciences). The results are compared with those for (Chinese) journals included in the Science Citation Index. The frequency of journal-journal citation relations in the CSTPCD is an order of magnitude lower than in the SCI. Chinese journals, especially high-quality journals, prefer to cite international journals rather than domestic ones. However, Chinese journals do not get an equivalent reception from their international counterparts. The international visibility of Chinese journals is low, but varies among fields of science. Journals of the Chinese Academy of Sciences (CAS) have a better reception in the international scientific community than university journals.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:24:56 GMT" } ]
2009-11-17T00:00:00
[ [ "Zhou", "Ping", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3091
Loet Leydesdorff
Ping Zhou and Loet Leydesdorff
The Citation Impacts and Citation Environments of Chinese Journals in Mathematics
null
Zhou, Ping & Loet Leydesdorff, The Citation Impacts and Citation Environments of Chinese Journals in Mathematics, Scientometrics 72(2), 185-200, 2007
null
null
cs.DL math.HO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on the citation data of journals covered by the China Scientific and Technical Papers and Citations Database (CSTPCD), we obtained aggregated journal-journal citation environments by applying routines developed specifically for this purpose. Local citation impact of journals is defined as the share of the total citations in a local citation environment, which is expressed as a ratio and can be visualized by the size of the nodes. The vertical size of the nodes varies proportionally to a journal's total citation share, while the horizontal size of the nodes is used to provide citation information after correction for the within-journal (self-) citations. In this study, we analyze citation impacts of three Chinese journals in mathematics and compare local citation impacts with impact factors. Local citation impacts reflect a journal's status and function better than (global) impact factors. We also found that authors in Chinese journals prefer international instead of domestic ones as sources for their citations.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:33:00 GMT" } ]
2009-11-17T00:00:00
[ [ "Zhou", "Ping", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3092
Emil Vassev Dr.
Emil Vassev, Que Thu Dung Nguyen, Heng Kuang
Fault-Tolerance through Message-logging and Check-pointing: Disaster Recovery for CORBA-based Distributed Bank Servers
42 pages,11 figues
null
null
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report presents results of our endeavor towards developing a failure-recovery variant of a CORBA-based bank server that provides fault tolerance features through message logging and checkpoint logging. In this group of projects, three components were developed to satisfy the requirements: 1) a message-logging protocol for the branch servers of the distributed banking system to log required information; 2) a recovery module that restarts the bank server using the message log to help the restarted bank server process subsequent requests for various operations; 3) a monitor module that periodically checks whether the bank server is down and helps the recovery module restart the bank server if the latter has crashed.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:31:09 GMT" }, { "version": "v2", "created": "Tue, 17 Nov 2009 14:33:48 GMT" } ]
2009-11-17T00:00:00
[ [ "Vassev", "Emil", "" ], [ "Nguyen", "Que Thu Dung", "" ], [ "Kuang", "Heng", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.3093
Loet Leydesdorff
Loet Leydesdorff
Indicators of Structural Change in the Dynamics of Science: Entropy Statistics of the SCI Journal Citation Reports
null
Scientometrics 53(1) (2002) 131-159
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Can change in citation patterns among journals be used as an indicator of structural change in the organization of the sciences? Aggregated journal-journal citations for 1999 are compared with similar data in the Journal Citation Reports 1998 of the Science Citation Index. In addition to indicating local change, probabilistic entropy measures enable us to analyze changes in distributions at different levels of aggregation. The results of various statistics are discussed and compared by elaborating the journal-journal mappings. The relevance of this indicator for science and technology policies is further specified.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:39:35 GMT" } ]
2009-11-17T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3095
Loet Leydesdorff
Loet Leydesdorff
Environment and Planning B as a Journal: The interdisciplinarity of its environment and the citation impact
null
In: T. Braun (ed.), The Impact Factors of Scientific and Scholarly Journals. Its Use and Misuse. Budapest: Akademiai Kiado, 2007, pp. 127-148
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The citation impact of Environment and Planning B can be visualized using its citation relations with journals in its environment as the links of a network. The size of the nodes is varied in correspondence to the relative citation impact in this environment. Additionally, one can correct for the effect of within-journal "self"-citations. The network can be partitioned and clustered using algorithms from social network analysis. After transposing the matrix in terms of rows and columns, the citing patterns can be mapped analogously. Citing patterns reflect the activity of the community of authors who publish in the journal, while being cited indicates reception. Environment and Planning B is cited across the interface between the social sciences and the natural sciences, but its authors cite almost exclusively from the domain of the Social Science Citation Index.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 17:44:32 GMT" } ]
2009-11-17T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3108
Emanuel Gluskin
Emanuel Gluskin
On game psychology: an experiment on the chess board/screen, should you always "do your best", and why the programs with prescribed weaknesses cannot be our good friends?
This is a somewhat contracted (compared to v1,2)version of my original manuscript motivated by observation of a very unusual weakness of a chess program that plays, generally, much stronger than I do, and by the wish to consider chess not just as competition, also as a model for human weaknesses. Some details of the experiment suggest a new version of the game. 5 figures
null
null
null
cs.AI cs.GT math.HO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is noted that some unusual moves against a strong chess program greatly weaken its ability to see the serious targets of the game, and its whole level of play... It is suggested to create programs with different weaknesses in order to analyze similar human behavior. Finally, a new version of chess, "Chess Corrida" is suggested.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 22:15:07 GMT" }, { "version": "v2", "created": "Thu, 15 Apr 2010 14:17:24 GMT" }, { "version": "v3", "created": "Fri, 28 Jan 2011 12:11:26 GMT" } ]
2011-01-31T00:00:00
[ [ "Gluskin", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" } ]
0911.3110
David Harvey
David Harvey
Faster exponentials of power series
3 pages, requires algorithm2e package
null
null
null
cs.SC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new algorithm for computing exp(f) where f is a power series in C[[x]]. If M(n) denotes the cost of multiplying polynomials of degree n, the new algorithm costs (2.1666... + o(1)) M(n) to compute exp(f) to order n. This improves on the previous best result, namely (2.333... + o(1)) M(n).
[ { "version": "v1", "created": "Mon, 16 Nov 2009 18:22:48 GMT" } ]
2009-11-17T00:00:00
[ [ "Harvey", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.3125
Tengiz Zorikov
T. Zorikov
A computational model of the bottlenose dolphin sonar: Feature-extracting method
11 pages, 5 figures
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The data describing a process of echo-image formation in bottlenose dolphin sonar perception were accumulated in our experimental explorations. These data were formalized mathematically and used in the computational model, comparative testing of which in echo-discrimination tasks revealed no less capabilities then those of bottlenose dolphins.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 19:24:59 GMT" }, { "version": "v2", "created": "Sun, 22 Nov 2009 08:20:17 GMT" } ]
2009-11-22T00:00:00
[ [ "Zorikov", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0911.3162
Lance Fortnow
Lance Fortnow and Rahul Santhanam
Bounding Rationality by Discounting Time
To appear in Proceedings of The First Symposium on Innovations in Computer Science
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a game where Alice generates an integer and Bob wins if he can factor that integer. Traditional game theory tells us that Bob will always win this game even though in practice Alice will win given our usual assumptions about the hardness of factoring. We define a new notion of bounded rationality, where the payoffs of players are discounted by the computation time they take to produce their actions. We use this notion to give a direct correspondence between the existence of equilibria where Alice has a winning strategy and the hardness of factoring. Namely, under a natural assumption on the discount rates, there is an equilibriumwhere Alice has a winning strategy iff there is a linear-time samplable distribution with respect to which Factoring is hard on average. We also give general results for discounted games over countable action spaces, including showing that any game with bounded and computable payoffs has an equilibrium in our model, even if each player is allowed a countable number of actions. It follows, for example, that the Largest Integer game has an equilibrium in our model though it has no Nash equilibria or epsilon-Nash equilibria.
[ { "version": "v1", "created": "Mon, 16 Nov 2009 21:10:26 GMT" } ]
2009-11-18T00:00:00
[ [ "Fortnow", "Lance", "" ], [ "Santhanam", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3189
EPTCS
Sibylle Fr\"oschle, Daniele Gorla
Proceedings 16th International Workshop on Expressiveness in Concurrency
null
EPTCS 8, 2009
10.4204/EPTCS.8
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the 16th International Workshop on Expressiveness in Concurrency (EXPRESS'09), which took place on 5th September 2009 in Bologna, co-located with CONCUR'09. The EXPRESS workshop series aim at bringing together researchers who are interested in the expressiveness and comparison of formal models that broadly relate to concurrency. In particular, this also includes emergent fields such as logic and interaction, game-theoretic models, and service-oriented computing.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 00:35:52 GMT" } ]
2009-11-18T00:00:00
[ [ "Fröschle", "Sibylle", "" ], [ "Gorla", "Daniele", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3195
Danupon Nanongkai
Atish Das Sarma, Danupon Nanongkai, Gopal Pandurangan, Prasad Tetali
Efficient Distributed Random Walks with Applications
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on the problem of performing random walks efficiently in a distributed network. Given bandwidth constraints, the goal is to minimize the number of rounds required to obtain a random walk sample. We first present a fast sublinear time distributed algorithm for performing random walks whose time complexity is sublinear in the length of the walk. Our algorithm performs a random walk of length $\ell$ in $\tilde{O}(\sqrt{\ell D})$ rounds (with high probability) on an undirected network, where $D$ is the diameter of the network. This improves over the previous best algorithm that ran in $\tilde{O}(\ell^{2/3}D^{1/3})$ rounds (Das Sarma et al., PODC 2009). We further extend our algorithms to efficiently perform $k$ independent random walks in $\tilde{O}(\sqrt{k\ell D} + k)$ rounds. We then show that there is a fundamental difficulty in improving the dependence on $\ell$ any further by proving a lower bound of $\Omega(\sqrt{\frac{\ell}{\log \ell}} + D)$ under a general model of distributed random walk algorithms. Our random walk algorithms are useful in speeding up distributed algorithms for a variety of applications that use random walks as a subroutine. We present two main applications. First, we give a fast distributed algorithm for computing a random spanning tree (RST) in an arbitrary (undirected) network which runs in $\tilde{O}(\sqrt{m}D)$ rounds (with high probability; here $m$ is the number of edges). Our second application is a fast decentralized algorithm for estimating mixing time and related parameters of the underlying network. Our algorithm is fully decentralized and can serve as a building block in the design of topologically-aware networks.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 00:57:01 GMT" }, { "version": "v2", "created": "Wed, 3 Mar 2010 13:34:11 GMT" } ]
2010-03-03T00:00:00
[ [ "Sarma", "Atish Das", "" ], [ "Nanongkai", "Danupon", "" ], [ "Pandurangan", "Gopal", "" ], [ "Tetali", "Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.3209
Chao-Yang Pang
Chao-Yang Pang, Hui Liu, Xia Li, Yun-Fei Wang, Ben-Qiong Hu
Apply Ant Colony Algorithm to Search All Extreme Points of Function
23 pages, 7 figures
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To find all extreme points of multimodal functions is called extremum problem, which is a well known difficult issue in optimization fields. Applying ant colony optimization (ACO) to solve this problem is rarely reported. The method of applying ACO to solve extremum problem is explored in this paper. Experiment shows that the solution error of the method presented in this paper is less than 10^-8. keywords: Extremum Problem; Ant Colony Optimization (ACO)
[ { "version": "v1", "created": "Tue, 17 Nov 2009 03:34:19 GMT" } ]
2009-11-18T00:00:00
[ [ "Pang", "Chao-Yang", "" ], [ "Liu", "Hui", "" ], [ "Li", "Xia", "" ], [ "Wang", "Yun-Fei", "" ], [ "Hu", "Ben-Qiong", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.3213
Neri Merhav
Neri Merhav
Optimum estimation via gradients of partition functions and information measures: a statistical-mechanical perspective
21 pages; submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2132590
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In continuation to a recent work on the statistical--mechanical analysis of minimum mean square error (MMSE) estimation in Gaussian noise via its relation to the mutual information (the I-MMSE relation), here we propose a simple and more direct relationship between optimum estimation and certain information measures (e.g., the information density and the Fisher information), which can be viewed as partition functions and hence are amenable to analysis using statistical--mechanical techniques. The proposed approach has several advantages, most notably, its applicability to general sources and channels, as opposed to the I-MMSE relation and its variants which hold only for certain classes of channels (e.g., additive white Gaussian noise channels). We then demonstrate the derivation of the conditional mean estimator and the MMSE in a few examples. Two of these examples turn out to be generalizable to a fairly wide class of sources and channels. For this class, the proposed approach is shown to yield an approximate conditional mean estimator and an MMSE formula that has the flavor of a single-letter expression. We also show how our approach can easily be generalized to situations of mismatched estimation.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 06:24:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3214
Guo-Qiang Zhang
Manfred Droste, Guo-Qiang Zhang
Bifinite Chu Spaces
null
Logical Methods in Computer Science, Volume 6, Issue 1 (January 14, 2010) lmcs:1183
10.2168/LMCS-6(1:3)2010
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies colimits of sequences of finite Chu spaces and their ramifications. Besides generic Chu spaces, we consider extensional and biextensional variants. In the corresponding categories we first characterize the monics and then the existence (or the lack thereof) of the desired colimits. In each case, we provide a characterization of the finite objects in terms of monomorphisms/injections. Bifinite Chu spaces are then expressed with respect to the monics of generic Chu spaces, and universal, homogeneous Chu spaces are shown to exist in this category. Unanticipated results driving this development include the fact that while for generic Chu spaces monics consist of an injective first and a surjective second component, in the extensional and biextensional cases the surjectivity requirement can be dropped. Furthermore, the desired colimits are only guaranteed to exist in the extensional case. Finally, not all finite Chu spaces (considered set-theoretically) are finite objects in their categories. This study opens up opportunities for further investigations into recursively defined Chu spaces, as well as constructive models of linear logic.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 06:27:14 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 23:45:22 GMT" } ]
2015-07-01T00:00:00
[ [ "Droste", "Manfred", "" ], [ "Zhang", "Guo-Qiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.3241
Francesco De Pellegrini Dr.
Eitan Altman, Tamer Basar and Francesco De Pellegrini
Optimal Control in Two-Hop Relay Routing
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the optimal control of propagation of packets in delay tolerant mobile ad-hoc networks. We consider a two-hop forwarding policy under which the expected number of nodes carrying copies of the packets obeys a linear dynamics. We exploit this property to formulate the problem in the framework of linear quadratic optimal control which allows us to obtain closed-form expressions for the optimal control and to study numerically the tradeoffs by varying various parameters that define the cost.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 09:29:50 GMT" } ]
2009-11-18T00:00:00
[ [ "Altman", "Eitan", "" ], [ "Basar", "Tamer", "" ], [ "De Pellegrini", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3256
Natalia Silberstein
Natalia Silberstein and Tuvi Etzion
Enumerative Coding for Grassmannian Space
to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Grassmannian space $\Gr$ is the set of all $k-$dimensional subspaces of the vector space~\smash{$\F_q^n$}. Recently, codes in the Grassmannian have found an application in network coding. The main goal of this paper is to present efficient enumerative encoding and decoding techniques for the Grassmannian. These coding techniques are based on two different orders for the Grassmannian induced by different representations of $k$-dimensional subspaces of $\F_q^n$. One enumerative coding method is based on a Ferrers diagram representation and on an order for $\Gr$ based on this representation. The complexity of this enumerative coding is $O(k^{5/2} (n-k)^{5/2})$ digit operations. Another order of the Grassmannian is based on a combination of an identifying vector and a reduced row echelon form representation of subspaces. The complexity of the enumerative coding, based on this order, is $O(nk(n-k)\log n\log\log n)$ digits operations. A combination of the two methods reduces the complexity on average by a constant factor.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 10:28:21 GMT" }, { "version": "v2", "created": "Sat, 28 Aug 2010 12:09:17 GMT" } ]
2010-08-31T00:00:00
[ [ "Silberstein", "Natalia", "" ], [ "Etzion", "Tuvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3262
Samuel Ouzan
Samuel Ouzan, Yair Be'ery
Moderate-Density Parity-Check Codes
Submitted to the IEEE Transactions on Communications, September 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new type of short to moderate block-length, linear error-correcting codes, called moderate-density parity-check (MDPC) codes. The number of ones of the parity-check matrix of the codes presented is typically higher than the number of ones of the parity-check matrix of low-density parity-check (LDPC) codes. But, still lower than those of the parity-check matrix of classical block codes. The proposed MDPC codes are cyclic and are designed by constructing idempotents using cyclotomic cosets. The construction is simple and allows finding short block-length, high-rate codes with good minimum distance. Inspired by some recent iterative soft-input soft-output (SISO) decoders used in a context of classical block codes, we propose a low complexity, efficient, iterative decoder called Auto-Diversity (AD) decoder. AD decoder is based on belief propagation (BP) decoder and takes advantage of the fundamental property of automorphism group of the constructed cyclic code.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 10:59:29 GMT" } ]
2009-11-18T00:00:00
[ [ "Ouzan", "Samuel", "" ], [ "Be'ery", "Yair", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3275
EPTCS
Nguyen Van Tang (AIST)
A Tighter Bound for the Determinization of Visibly Pushdown Automata
null
EPTCS 10, 2009, pp. 62-76
10.4204/EPTCS.10.5
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visibly pushdown automata (VPA), introduced by Alur and Madhusuan in 2004, is a subclass of pushdown automata whose stack behavior is completely determined by the input symbol according to a fixed partition of the input alphabet. Since its introduce, VPAs have been shown to be useful in various context, e.g., as specification formalism for verification and as automaton model for processing XML streams. Due to high complexity, however, implementation of formal verification based on VPA framework is a challenge. In this paper we consider the problem of implementing VPA-based model checking algorithms. For doing so, we first present an improvement on upper bound for determinization of VPA. Next, we propose simple on-the-fly algorithms to check universality and inclusion problems of this automata class. Then, we implement the proposed algorithms in a prototype tool. Finally, we conduct experiments on randomly generated VPAs. The experimental results show that the proposed algorithms are considerably faster than the standard ones.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:48:55 GMT" } ]
2009-11-18T00:00:00
[ [ "Van Tang", "Nguyen", "", "AIST" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3276
EPTCS
Laurent Fribourg (LSV Cachan), Etienne Andr\'e (LSV Cachan)
An Inverse Method for Policy-Iteration Based Algorithms
null
EPTCS 10, 2009, pp. 44-61
10.4204/EPTCS.10.4
null
cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an extension of two policy-iteration based algorithms on weighted graphs (viz., Markov Decision Problems and Max-Plus Algebras). This extension allows us to solve the following inverse problem: considering the weights of the graph to be unknown constants or parameters, we suppose that a reference instantiation of those weights is given, and we aim at computing a constraint on the parameters under which an optimal policy for the reference instantiation is still optimal. The original algorithm is thus guaranteed to behave well around the reference instantiation, which provides us with some criteria of robustness. We present an application of both methods to simple examples. A prototype implementation has been done.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:46:19 GMT" } ]
2009-11-18T00:00:00
[ [ "Fribourg", "Laurent", "", "LSV Cachan" ], [ "André", "Etienne", "", "LSV Cachan" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3277
EPTCS
Bahareh Badban (Konstanz university), Stefan Leue (Konstanz university), Jan-Georg Smaus (Freiburg University)
Automated Predicate Abstraction for Real-Time Models
null
EPTCS 10, 2009, pp. 36-43
10.4204/EPTCS.10.3
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a technique designed to automatically compute predicate abstractions for dense real-timed models represented as networks of timed automata. We use the CIPM algorithm in our previous work which computes new invariants for timed automata control locations and prunes the model, to compute a predicate abstraction of the model. We do so by taking information regarding control locations and their newly computed invariants into account.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:12:54 GMT" } ]
2009-11-18T00:00:00
[ [ "Badban", "Bahareh", "", "Konstanz university" ], [ "Leue", "Stefan", "", "Konstanz\n university" ], [ "Smaus", "Jan-Georg", "", "Freiburg University" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0911.3280
Maurizio Serva
Maurizio Serva
Automated languages phylogeny from Levenshtein distance
Ideas and results in this paper were presented at the International Conference: Visitas Internationais, Instituto de Estudos Avancados Transdisciplinares, (Belo Horizonte, 2009)
null
null
null
cs.CL q-bio.PE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Languages evolve over time in a process in which reproduction, mutation and extinction are all possible, similar to what happens to living organisms. Using this similarity it is possible, in principle, to build family trees which show the degree of relatedness between languages. The method used by modern glottochronology, developed by Swadesh in the 1950s, measures distances from the percentage of words with a common historical origin. The weak point of this method is that subjective judgment plays a relevant role. Recently we proposed an automated method that avoids the subjectivity, whose results can be replicated by studies that use the same database and that doesn't require a specific linguistic knowledge. Moreover, the method allows a quick comparison of a large number of languages. We applied our method to the Indo-European and Austronesian families, considering in both cases, fifty different languages. The resulting trees are similar to those of previous studies, but with some important differences in the position of few languages and subgroups. We believe that these differences carry new information on the structure of the tree and on the phylogenetic relationships within families.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:17:22 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2011 22:14:52 GMT" }, { "version": "v3", "created": "Thu, 28 Apr 2011 18:48:20 GMT" }, { "version": "v4", "created": "Fri, 29 Apr 2011 20:24:40 GMT" }, { "version": "v5", "created": "Tue, 3 May 2011 21:19:29 GMT" }, { "version": "v6", "created": "Fri, 6 May 2011 20:41:08 GMT" }, { "version": "v7", "created": "Mon, 2 Jul 2012 09:54:50 GMT" } ]
2012-07-03T00:00:00
[ [ "Serva", "Maurizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.3283
EPTCS
Christophe Morvan (Universit\'e Paris-Est)
On external presentations of infinite graphs
null
EPTCS 10, 2009, pp. 23-35
10.4204/EPTCS.10.2
null
cs.FL cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vertices of a finite state system are usually a subset of the natural numbers. Most algorithms relative to these systems only use this fact to select vertices. For infinite state systems, however, the situation is different: in particular, for such systems having a finite description, each state of the system is a configuration of some machine. Then most algorithmic approaches rely on the structure of these configurations. Such characterisations are said internal. In order to apply algorithms detecting a structural property (like identifying connected components) one may have first to transform the system in order to fit the description needed for the algorithm. The problem of internal characterisation is that it hides structural properties, and each solution becomes ad hoc relatively to the form of the configurations. On the contrary, external characterisations avoid explicit naming of the vertices. Such characterisation are mostly defined via graph transformations. In this paper we present two kind of external characterisations: deterministic graph rewriting, which in turn characterise regular graphs, deterministic context-free languages, and rational graphs. Inverse substitution from a generator (like the complete binary tree) provides characterisation for prefix-recognizable graphs, the Caucal Hierarchy and rational graphs. We illustrate how these characterisation provide an efficient tool for the representation of infinite state systems.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:07:16 GMT" } ]
2009-11-18T00:00:00
[ [ "Morvan", "Christophe", "", "Université Paris-Est" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3291
Frederic Magniez
F. Magniez, C. Mathieu, A. Nayak
Recognizing well-parenthesized expressions in the streaming model
20 pages, 5 figures
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by a concrete problem and with the goal of understanding the sense in which the complexity of streaming algorithms is related to the complexity of formal languages, we investigate the problem Dyck(s) of checking matching parentheses, with $s$ different types of parenthesis. We present a one-pass randomized streaming algorithm for Dyck(2) with space $\Order(\sqrt{n}\log n)$, time per letter $\polylog (n)$, and one-sided error. We prove that this one-pass algorithm is optimal, up to a $\polylog n$ factor, even when two-sided error is allowed. For the lower bound, we prove a direct sum result on hard instances by following the "information cost" approach, but with a few twists. Indeed, we play a subtle game between public and private coins. This mixture between public and private coins results from a balancing act between the direct sum result and a combinatorial lower bound for the base case. Surprisingly, the space requirement shrinks drastically if we have access to the input stream in reverse. We present a two-pass randomized streaming algorithm for Dyck(2) with space $\Order((\log n)^2)$, time $\polylog (n)$ and one-sided error, where the second pass is in the reverse direction. Both algorithms can be extended to Dyck(s) since this problem is reducible to Dyck(2) for a suitable notion of reduction in the streaming model.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:42:11 GMT" } ]
2009-11-18T00:00:00
[ [ "Magniez", "F.", "" ], [ "Mathieu", "C.", "" ], [ "Nayak", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3292
Maurizio Serva
Filippo Petroni and Maurizio Serva
Automated words stability and languages phylogeny
XI International Conference "Cognitive Modeling in Linguistics-2009" Constanca, Romania, September, 7-14, 2009
null
null
null
cs.CL physics.soc-ph q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea of measuring distance between languages seems to have its roots in the work of the French explorer Dumont D'Urville (D'Urville 1832). He collected comparative words lists of various languages during his voyages aboard the Astrolabe from 1826 to1829 and, in his work about the geographical division of the Pacific, he proposed a method to measure the degree of relation among languages. The method used by modern glottochronology, developed by Morris Swadesh in the 1950s (Swadesh 1952), measures distances from the percentage of shared cognates, which are words with a common historical origin. Recently, we proposed a new automated method which uses normalized Levenshtein distance among words with the same meaning and averages on the words contained in a list. Another classical problem in glottochronology is the study of the stability of words corresponding to different meanings. Words, in fact, evolve because of lexical changes, borrowings and replacement at a rate which is not the same for all of them. The speed of lexical evolution is different for different meanings and it is probably related to the frequency of use of the associated words (Pagel et al. 2007). This problem is tackled here by an automated methodology only based on normalized Levenshtein distance.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 12:47:44 GMT" }, { "version": "v2", "created": "Sat, 5 Dec 2009 17:08:06 GMT" } ]
2009-12-07T00:00:00
[ [ "Petroni", "Filippo", "" ], [ "Serva", "Maurizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0911.3298
Alejandro Chinea Manrique De Lara
Alejandro Chinea
Understanding the Principles of Recursive Neural networks: A Generative Approach to Tackle Model Complexity
11 pages, 4 figures, Recurrent Networks session ICANN 2009
Alippi, C., Polycarpou, M. Panayiotou, C., Ellinas, G. (Eds.) ICANN 2009, LNCS, vol. 5768 pp. 952-963, Springer, Heidelberg (2009)
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recursive Neural Networks are non-linear adaptive models that are able to learn deep structured information. However, these models have not yet been broadly accepted. This fact is mainly due to its inherent complexity. In particular, not only for being extremely complex information processing models, but also because of a computational expensive learning phase. The most popular training method for these models is back-propagation through the structure. This algorithm has been revealed not to be the most appropriate for structured processing due to problems of convergence, while more sophisticated training methods enhance the speed of convergence at the expense of increasing significantly the computational cost. In this paper, we firstly perform an analysis of the underlying principles behind these models aimed at understanding their computational power. Secondly, we propose an approximate second order stochastic learning algorithm. The proposed algorithm dynamically adapts the learning rate throughout the training phase of the network without incurring excessively expensive computational effort. The algorithm operates in both on-line and batch modes. Furthermore, the resulting learning scheme is robust against the vanishing gradients problem. The advantages of the proposed algorithm are demonstrated with a real-world application example.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:17:05 GMT" } ]
2009-11-18T00:00:00
[ [ "Chinea", "Alejandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.3299
Axel Legay
Axel Legay and Marco Faella
Some Models and Tools for Open Systems
This is our invited paper to FIT 2005
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In computer science, there is a distinction between closed systems, whose behavior is totally determined in advance, and open systems, that are systems maintaining a constant interaction with an unspecified environment. Closed systems are naturally modeled by transitions systems. Open systems have been modeled in various ways, including process algebras, I/O automata, ``modules'', and interfaces. Games provide a uniform setting in which all these models can be cast and compared. In this paper, we discuss the features and costs related to the game-based approach to open systems, referring to some of the existing models. Finally, we describe a new model of interface, called sociable interface, which is geared towards easier specification, improved reusability of models, and efficient symbolic implementation.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:21:31 GMT" } ]
2009-11-18T00:00:00
[ [ "Legay", "Axel", "" ], [ "Faella", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3301
Sahbi Sidhom
Patrick Nourrissier (INRIA Lorraine - LORIA), Sahbi Sidhom (LORIA)
Le travail coop\'eratif comme vecteur d'\'evolution de nos syst\`emes d'information
null
Conf\'erence internationale sur les "Syst\`emes d'Information et Intelligence Economique", Hammamet : Tunisie (2009)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article focuses on presenting the cooperative tool DIMS, it is a platform that can manage the participants's daily life, by providing flexibility and speed in the organization's tasks. The main interest lies in the possibility of organizing information system in a logical network, across multiple physical sites, incorporating a specific protocol to making possible the inter-server communication. This protocol, based on the Jabber standard, that meets the needs of working everyday matters, allowing the distribution of research and access to resources of the WAN. The technological objective concerns the evolution of an information system architectures, where the application may be a comprehensive set of tools and services on a distributed network of remote sites. The challenge for users is the perception of a collective role to each individual who cooperates in compliance with safety rules and unlimited access to technical information.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:30:56 GMT" } ]
2009-11-18T00:00:00
[ [ "Nourrissier", "Patrick", "", "INRIA Lorraine - LORIA" ], [ "Sidhom", "Sahbi", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.3304
Romain Giot
Romain Giot (GREYC), Mohamad El-Abed (GREYC), Christophe Rosenberger (GREYC)
Keystroke Dynamics Authentication For Collaborative Systems
null
The IEEE International Symposium on Collaborative Technologies and Systems (CTS), Baltimore : United States (2009)
10.1109/CTS.2009.5067478
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional sensor. Keystroke dynamics is an interesting solution as it uses only the keyboard and is invisible for users. Many methods have been published in this field. We make a comparative study of many of them considering the operational constraints of use for collaborative systems.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:35:40 GMT" } ]
2009-11-18T00:00:00
[ [ "Giot", "Romain", "", "GREYC" ], [ "El-Abed", "Mohamad", "", "GREYC" ], [ "Rosenberger", "Christophe", "", "GREYC" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.3306
Pascal Urso
Nacer Boudjlida (INRIA Lorraine - LORIA), Jean-Pierre Jacquot (LORIA), Pascal Urso (INRIA Lorraine - LORIA)
Software Engineering Education by Example
null
5th China - Europe International Symposium on Software Industry Oriented Education (CEISIE 2009), Bordeaux : France (2009)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on the old but famous distinction between "in the small" and "in the large" software development, at Nancy Universit\'e, UHP Nancy 1, we experience for a while software engineering education thanks to actual project engineering. This education method has the merit to enable students to discover and to overcome actual problems when faced to a large project which may be conducted by a large development team. The mode of education is a simulation of an actual software engineering project as encountered in "real life\'e" activities.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:36:59 GMT" } ]
2009-11-18T00:00:00
[ [ "Boudjlida", "Nacer", "", "INRIA Lorraine - LORIA" ], [ "Jacquot", "Jean-Pierre", "", "LORIA" ], [ "Urso", "Pascal", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.3307
Olivier Finkel
Olivier Finkel (ELM)
On Some Sets of Dictionaries Whose omega-Powers Have a Given Complexity
To appear in Mathematical Logic Quarterly
Mathematical Logic Quarterly 56, 5 (2010) 452?460
10.1002/malq.200810154
null
math.LO cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A dictionary is a set of finite words over some finite alphabet X. The omega-power of a dictionary V is the set of infinite words obtained by infinite concatenation of words in V. Lecomte studied in [Omega-powers and descriptive set theory, JSL 2005] the complexity of the set of dictionaries whose associated omega-powers have a given complexity. In particular, he considered the sets $W({\bf\Si}^0_{k})$ (respectively, $W({\bf\Pi}^0_{k})$, $W({\bf\Delta}_1^1)$) of dictionaries $V \subseteq 2^\star$ whose omega-powers are ${\bf\Si}^0_{k}$-sets (respectively, ${\bf\Pi}^0_{k}$-sets, Borel sets). In this paper we first establish a new relation between the sets $W({\bf\Sigma}^0_{2})$ and $W({\bf\Delta}_1^1)$, showing that the set $W({\bf\Delta}_1^1)$ is "more complex" than the set $W({\bf\Sigma}^0_{2})$. As an application we improve the lower bound on the complexity of $W({\bf\Delta}_1^1)$ given by Lecomte. Then we prove that, for every integer $k\geq 2$, (respectively, $k\geq 3$) the set of dictionaries $W({\bf\Pi}^0_{k+1})$ (respectively, $W({\bf\Si}^0_{k+1})$) is "more complex" than the set of dictionaries $W({\bf\Pi}^0_{k})$ (respectively, $W({\bf\Si}^0_{k})$) .
[ { "version": "v1", "created": "Tue, 17 Nov 2009 13:40:29 GMT" } ]
2010-09-28T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3318
Francisco Claude
Francisco Claude, Antonio Farina and Gonzalo Navarro
Re-Pair Compression of Inverted Lists
null
null
null
null
cs.IR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compression of inverted lists with methods that support fast intersection operations is an active research topic. Most compression schemes rely on encoding differences between consecutive positions with techniques that favor small numbers. In this paper we explore a completely different alternative: We use Re-Pair compression of those differences. While Re-Pair by itself offers fast decompression at arbitrary positions in main and secondary memory, we introduce variants that in addition speed up the operations required for inverted list intersection. We compare the resulting data structures with several recent proposals under various list intersection algorithms, to conclude that our Re-Pair variants offer an interesting time/space tradeoff for this problem, yet further improvements are required for it to improve upon the state of the art.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 14:39:36 GMT" } ]
2009-11-18T00:00:00
[ [ "Claude", "Francisco", "" ], [ "Farina", "Antonio", "" ], [ "Navarro", "Gonzalo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.3343
Nicolai Kuntze
Nicolai Kuntze, Juergen Repp, Hervais Simo Fhom, Andreas Fuchs, Ine-Saf Benaissa
Final Architecture Specification of security, privacy, and incentive mechanisms
Delieverable of the EU FP7 project Nanodatacenters
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this document, we define the NADA security architecture based on refined use case scenarios, a derived high level model and security analysis. For the architecure design and verification we are applying the well known STRIDE model.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 15:58:10 GMT" } ]
2009-11-18T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Repp", "Juergen", "" ], [ "Fhom", "Hervais Simo", "" ], [ "Fuchs", "Andreas", "" ], [ "Benaissa", "Ine-Saf", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.3347
Hemant Kowshik
Hemant Kowshik and P. R. Kumar
Optimal strategies for computing symmetric Boolean functions in collocated networks
5 pages, To appear in Proceedings of the IEEE Information Theory Workshop, Cairo, January 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of finding optimal strategies for computing Boolean symmetric functions. We consider a collocated network, where each node's transmissions can be heard by every other node. Each node has a Boolean measurement and we wish to compute a given Boolean function of these measurements with zero error. We allow for block computation to enhance data fusion efficiency, and determine the minimum worst-case total bits to be communicated to perform the desired computation. We restrict attention to the class of symmetric Boolean functions, which only depend on the number of 1s among the n measurements. We define three classes of functions, namely threshold functions, delta functions and interval functions. We provide exactly optimal strategies for the first two classes, and an order-optimal strategy with optimal preconstant for interval functions. Using these results, we can characterize the complexity of computing percentile type functions, which is of great interest. In our analysis, we use lower bounds from communication complexity theory, and provide an achievable scheme using information theoretic tools.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 16:56:15 GMT" } ]
2009-11-18T00:00:00
[ [ "Kowshik", "Hemant", "" ], [ "Kumar", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3349
Alyssa A. Goodman
Alyssa Goodman
Seeing Science
4 pages, including 3 figures. To appear in Proceedings of the International Festival of Scientific Visualization, held in Tokyo, Japan, March 2009. Publisher will be Universal Academy Press
null
null
null
astro-ph.IM cs.CV cs.GR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to represent scientific data and concepts visually is becoming increasingly important due to the unprecedented exponential growth of computational power during the present digital age. The data sets and simulations scientists in all fields can now create are literally thousands of times as large as those created just 20 years ago. Historically successful methods for data visualization can, and should, be applied to today's huge data sets, but new approaches, also enabled by technology, are needed as well. Increasingly, "modular craftsmanship" will be applied, as relevant functionality from the graphically and technically best tools for a job are combined as-needed, without low-level programming.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 17:01:33 GMT" } ]
2009-11-18T00:00:00
[ [ "Goodman", "Alyssa", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0911.3352
Adam Sheffer
Micha Sharir, Adam Sheffer
Counting Triangulations of Planar Point Sets
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the maximal number of triangulations that a planar set of $n$ points can have, and show that it is at most $30^n$. This new bound is achieved by a careful optimization of the charging scheme of Sharir and Welzl (2006), which has led to the previous best upper bound of $43^n$ for the problem. Moreover, this new bound is useful for bounding the number of other types of planar (i.e., crossing-free) straight-line graphs on a given point set. Specifically, we derive new upper bounds for the number of planar graphs ($o(239.4^n)$), spanning cycles ($O(70.21^n)$), and spanning trees ($160^n$).
[ { "version": "v1", "created": "Tue, 17 Nov 2009 17:29:19 GMT" }, { "version": "v2", "created": "Sun, 3 Jan 2010 15:16:30 GMT" } ]
2010-01-03T00:00:00
[ [ "Sharir", "Micha", "" ], [ "Sheffer", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.3355
Zhi Xu
Zhi Xu
A Minimal Periods Algorithm with Applications
14 pages
null
10.1007/978-3-642-13509-5_6
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kosaraju in ``Computation of squares in a string'' briefly described a linear-time algorithm for computing the minimal squares starting at each position in a word. Using the same construction of suffix trees, we generalize his result and describe in detail how to compute in O(k|w|)-time the minimal k-th power, with period of length larger than s, starting at each position in a word w for arbitrary exponent $k\geq2$ and integer $s\geq0$. We provide the complete proof of correctness of the algorithm, which is somehow not completely clear in Kosaraju's original paper. The algorithm can be used as a sub-routine to detect certain types of pseudo-patterns in words, which is our original intention to study the generalization.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 17:34:23 GMT" } ]
2015-05-14T00:00:00
[ [ "Xu", "Zhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.3357
Hemant Kowshik
Nikolaos M. Freris, Hemant Kowshik and P. R. Kumar
Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks and Computation
10 pages, 3 figures, Submitted to the Proceedings of the IEEE
null
10.1109/JPROC.2010.2065790
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor networks potentially feature large numbers of nodes that can sense their environment over time, communicate with each other over a wireless network, and process information. They differ from data networks in that the network as a whole may be designed for a specific application. We study the theoretical foundations of such large scale sensor networks, addressing four fundamental issues- connectivity, capacity, clocks and function computation. To begin with, a sensor network must be connected so that information can indeed be exchanged between nodes. The connectivity graph of an ad-hoc network is modeled as a random graph and the critical range for asymptotic connectivity is determined, as well as the critical number of neighbors that a node needs to connect to. Next, given connectivity, we address the issue of how much data can be transported over the sensor network. We present fundamental bounds on capacity under several models, as well as architectural implications for how wireless communication should be organized. Temporal information is important both for the applications of sensor networks as well as their operation.We present fundamental bounds on the synchronizability of clocks in networks, and also present and analyze algorithms for clock synchronization. Finally we turn to the issue of gathering relevant information, that sensor networks are designed to do. One needs to study optimal strategies for in-network aggregation of data, in order to reliably compute a composite function of sensor measurements, as well as the complexity of doing so. We address the issue of how such computation can be performed efficiently in a sensor network and the algorithms for doing so, for some classes of functions.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 17:50:12 GMT" } ]
2016-11-17T00:00:00
[ [ "Freris", "Nikolaos M.", "" ], [ "Kowshik", "Hemant", "" ], [ "Kumar", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3389
Jelani Nelson
Ilias Diakonikolas, Daniel M. Kane, Jelani Nelson
Bounded Independence Fools Degree-2 Threshold Functions
Using v1 numbering: removed Lemma G.5 from the Appendix (it was wrong). Net effect is that Theorem G.6 reduces the m^6 dependence of Theorem 8.1 to m^4, not m^2
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let x be a random vector coming from any k-wise independent distribution over {-1,1}^n. For an n-variate degree-2 polynomial p, we prove that E[sgn(p(x))] is determined up to an additive epsilon for k = poly(1/epsilon). This answers an open question of Diakonikolas et al. (FOCS 2009). Using standard constructions of k-wise independent distributions, we obtain a broad class of explicit generators that epsilon-fool the class of degree-2 threshold functions with seed length log(n)*poly(1/epsilon). Our approach is quite robust: it easily extends to yield that the intersection of any constant number of degree-2 threshold functions is epsilon-fooled by poly(1/epsilon)-wise independence. Our results also hold if the entries of x are k-wise independent standard normals, implying for example that bounded independence derandomizes the Goemans-Williamson hyperplane rounding scheme. To achieve our results, we introduce a technique we dub multivariate FT-mollification, a generalization of the univariate form introduced by Kane et al. (SODA 2010) in the context of streaming algorithms. Along the way we prove a generalized hypercontractive inequality for quadratic forms which takes the operator norm of the associated matrix into account. These techniques may be of independent interest.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 20:24:27 GMT" }, { "version": "v2", "created": "Thu, 18 Feb 2010 17:15:56 GMT" } ]
2010-02-18T00:00:00
[ [ "Diakonikolas", "Ilias", "" ], [ "Kane", "Daniel M.", "" ], [ "Nelson", "Jelani", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3405
Axel Legay
Florent Bouchy and Alain Finkel and Pierluigi San Pietro
Dense-choice Counter Machines revisited
null
EPTCS 10, 2009, pp. 3-22
10.4204/EPTCS.10.1
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper clarifies the picture about Dense-choice Counter Machines, which have been less studied than (discrete) Counter Machines. We revisit the definition of "Dense Counter Machines" so that it now extends (discrete) Counter Machines, and we provide new undecidability and decidability results. Using the first-order additive mixed theory of reals and integers, we give a logical characterization of the sets of configurations reachable by reversal-bounded Dense-choice Counter Machines.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 23:40:50 GMT" } ]
2009-11-19T00:00:00
[ [ "Bouchy", "Florent", "" ], [ "Finkel", "Alain", "" ], [ "Pietro", "Pierluigi San", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3411
Loet Leydesdorff
Loet Leydesdorff and Iina Hellsten
Measuring the Meaning of Words in Contexts: An automated analysis of controversies about Monarch butterflies, Frankenfoods, and stem cells
null
Scientometrics 67(2), 2006, 231-258
null
null
cs.CL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Co-words have been considered as carriers of meaning across different domains in studies of science, technology, and society. Words and co-words, however, obtain meaning in sentences, and sentences obtain meaning in their contexts of use. At the science/society interface, words can be expected to have different meanings: the codes of communication that provide meaning to words differ on the varying sides of the interface. Furthermore, meanings and interfaces may change over time. Given this structuring of meaning across interfaces and over time, we distinguish between metaphors and diaphors as reflexive mechanisms that facilitate the translation between contexts. Our empirical focus is on three recent scientific controversies: Monarch butterflies, Frankenfoods, and stem-cell therapies. This study explores new avenues that relate the study of co-word analysis in context with the sociological quest for the analysis and processing of meaning.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 22:03:56 GMT" } ]
2009-11-19T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Hellsten", "Iina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3415
Loet Leydesdorff
Loet Leydesdorff
Can Scientific Journals be Classified in terms of Aggregated Journal-Journal Citation Relations using the Journal Citation Reports?
null
Journal of the American Society for Information Science and Technology, 57(5) (2006) 601-613
null
null
cs.DL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aggregated citation relations among journals included in the Science Citation Index provide us with a huge matrix which can be analyzed in various ways. Using principal component analysis or factor analysis, the factor scores can be used as indicators of the position of the cited journals in the citing dimensions of the database. Unrotated factor scores are exact, and the extraction of principal components can be made stepwise since the principal components are independent. Rotation may be needed for the designation, but in the rotated solution a model is assumed. This assumption can be legitimated on pragmatic or theoretical grounds. Since the resulting outcomes remain sensitive to the assumptions in the model, an unambiguous classification is no longer possible in this case. However, the factor-analytic solutions allow us to test classifications against the structures contained in the database. This will be demonstrated for the delineation of a set of biochemistry journals.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 22:20:18 GMT" } ]
2009-11-19T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3416
Loet Leydesdorff
Loet Leydesdorff, Stephen Bensman
Classification and Powerlaws: The Logarithmic Transformation
null
Journal of the American Society for Information Science and Technology 57(11) (2006) 1470-1486
null
null
cs.IR cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logarithmic transformation of the data has been recommended by the literature in the case of highly skewed distributions such as those commonly found in information science. The purpose of the transformation is to make the data conform to the lognormal law of error for inferential purposes. How does this transformation affect the analysis? We factor analyze and visualize the citation environment of the Journal of the American Chemical Society (JACS) before and after a logarithmic transformation. The transformation strongly reduces the variance necessary for classificatory purposes and therefore is counterproductive to the purposes of the descriptive statistics. We recommend against the logarithmic transformation when sets cannot be defined unambiguously. The intellectual organization of the sciences is reflected in the curvilinear parts of the citation distributions, while negative powerlaws fit excellently to the tails of the distributions.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 22:24:31 GMT" } ]
2009-11-19T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Bensman", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3418
Shashank Shekhar
Shashank Shekhar, Mohit Soni, NVSN Kalyan Chakravarthy
Flare: Architecture for rapid and easy development of Internet-based Applications
4 pages, 5 figures
null
10.5120/549-716
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an architecture, Flare, that is a structured and easy way to develop applications rapidly, in a multitude of languages, which make use of online storage of data and management of users. The architecture eliminates the need for server-side programming in most cases, creation and management of online database storage servers, re-creation of user management schemes and writing a lot of unnecessary code for accessing different web-based services using their APIs. A Web API provides a common API for various web-based services like Blogger [2], Wordpress, MSN Live, Facebook [3] etc. Access Libraries provided for major programming languages and platforms make it easy to develop applications using the Flare Web Service. We demonstrate a simple micro-blogging service developed using these APIs in two modes: a graphical browser-based mode, and a command-line mode in C++, which provide two different interfaces to the same account and data.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 22:25:49 GMT" } ]
2015-05-14T00:00:00
[ [ "Shekhar", "Shashank", "" ], [ "Soni", "Mohit", "" ], [ "Chakravarthy", "NVSN Kalyan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.3422
Loet Leydesdorff
Loet Leydesdorff and Liwen Vaughan
Co-occurrence Matrices and their Applications in Information Science: Extending ACA to the Web Environment
null
Journal of the American Society for Information Science & Technology 57(12) (2006) 1616-1628
null
null
cs.IR cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Co-occurrence matrices, such as co-citation, co-word, and co-link matrices, have been used widely in the information sciences. However, confusion and controversy have hindered the proper statistical analysis of this data. The underlying problem, in our opinion, involved understanding the nature of various types of matrices. This paper discusses the difference between a symmetrical co-citation matrix and an asymmetrical citation matrix as well as the appropriate statistical techniques that can be applied to each of these matrices, respectively. Similarity measures (like the Pearson correlation coefficient or the cosine) should not be applied to the symmetrical co-citation matrix, but can be applied to the asymmetrical citation matrix to derive the proximity matrix. The argument is illustrated with examples. The study then extends the application of co-occurrence matrices to the Web environment where the nature of the available data and thus data collection methods are different from those of traditional databases such as the Science Citation Index. A set of data collected with the Google Scholar search engine is analyzed using both the traditional methods of multivariate analysis and the new visualization software Pajek that is based on social network analysis and graph theory.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 22:33:53 GMT" } ]
2009-11-19T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Vaughan", "Liwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3438
Francesco Zamponi
T.Jorg, F.Krzakala, G.Semerjian, F.Zamponi
First-order transitions and the performance of quantum algorithms in random optimization problems
4 pages, 4 figures; final version accepted on Phys.Rev.Lett
Phys. Rev. Lett. 104, 207206 (2010)
10.1103/PhysRevLett.104.207206
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a study of the phase diagram of a random optimization problem in presence of quantum fluctuations. Our main result is the characterization of the nature of the phase transition, which we find to be a first-order quantum phase transition. We provide evidence that the gap vanishes exponentially with the system size at the transition. This indicates that the Quantum Adiabatic Algorithm requires a time growing exponentially with system size to find the ground state of this problem.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 23:36:16 GMT" }, { "version": "v2", "created": "Thu, 20 May 2010 21:22:38 GMT" } ]
2010-05-24T00:00:00
[ [ "Jorg", "T.", "" ], [ "Krzakala", "F.", "" ], [ "Semerjian", "G.", "" ], [ "Zamponi", "F.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0911.3440
EPTCS
Axel Legay (INRIA/Irisa Rennes)
Proceedings International Workshop on Verification of Infinite-State Systems
null
EPTCS 10, 2009
10.4204/EPTCS.10
null
cs.LO cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the 11th International Workshop on Verification of Infinite-State Systems (INFINITY 2009). The workshop was held in Bologna, Italy on August 31, 2009, as a satellite event to the 20th International Conference on Concurrency Theory (CONCUR 2009). The aim of the INFINITY workshop is to provide a forum for researchers interested in the development of formal methods and algorithmic techniques for the analysis of systems with infinitely many states, and their application in automated verification of complex software and hardware systems.
[ { "version": "v1", "created": "Tue, 17 Nov 2009 23:46:08 GMT" } ]
2009-11-19T00:00:00
[ [ "Legay", "Axel", "", "INRIA/Irisa Rennes" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0911.3456
Andreas Kl\"ockner
Andreas Kl\"ockner, Nicolas Pinto, Yunsup Lee, Bryan Catanzaro, Paul Ivanov and Ahmed Fasih
PyCUDA and PyOpenCL: A Scripting-Based Approach to GPU Run-Time Code Generation
Submitted to Parallel Computing, Elsevier
null
10.1016/j.parco.2011.09.001
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-performance computing has recently seen a surge of interest in heterogeneous systems, with an emphasis on modern Graphics Processing Units (GPUs). These devices offer tremendous potential for performance and efficiency in important large-scale applications of computational science. However, exploiting this potential can be challenging, as one must adapt to the specialized and rapidly evolving computing environment currently exhibited by GPUs. One way of addressing this challenge is to embrace better techniques and develop tools tailored to their needs. This article presents one simple technique, GPU run-time code generation (RTCG), along with PyCUDA and PyOpenCL, two open-source toolkits that support this technique. In introducing PyCUDA and PyOpenCL, this article proposes the combination of a dynamic, high-level scripting language with the massive performance of a GPU as a compelling two-tiered computing platform, potentially offering significant performance and productivity advantages over conventional single-tier, static systems. The concept of RTCG is simple and easily implemented using existing, robust infrastructure. Nonetheless it is powerful enough to support (and encourage) the creation of custom application-specific tools by its users. The premise of the paper is illustrated by a wide range of examples where the technique has been applied with considerable success.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 02:51:14 GMT" }, { "version": "v2", "created": "Tue, 29 Mar 2011 15:36:41 GMT" } ]
2012-07-17T00:00:00
[ [ "Klöckner", "Andreas", "" ], [ "Pinto", "Nicolas", "" ], [ "Lee", "Yunsup", "" ], [ "Catanzaro", "Bryan", "" ], [ "Ivanov", "Paul", "" ], [ "Fasih", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.3473
Shachar Lovett
Ido Ben-Eliezer, Shachar Lovett, Ariel Yadin
Polynomial Threshold Functions: Structure, Approximation and Pseudorandomness
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the computational power of polynomial threshold functions, that is, threshold functions of real polynomials over the boolean cube. We provide two new results bounding the computational power of this model. Our first result shows that low-degree polynomial threshold functions cannot approximate any function with many influential variables. We provide a couple of examples where this technique yields tight approximation bounds. Our second result relates to constructing pseudorandom generators fooling low-degree polynomial threshold functions. This problem has received attention recently, where Diakonikolas et al proved that $k$-wise independence suffices to fool linear threshold functions. We prove that any low-degree polynomial threshold function, which can be represented as a function of a small number of linear threshold functions, can also be fooled by $k$-wise independence. We view this as an important step towards fooling general polynomial threshold functions, and we discuss a plausible approach achieving this goal based on our techniques. Our results combine tools from real approximation theory, hyper-contractive inequalities and probabilistic methods. In particular, we develop several new tools in approximation theory which may be of independent interest.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 07:28:08 GMT" }, { "version": "v2", "created": "Wed, 18 Nov 2009 22:31:41 GMT" }, { "version": "v3", "created": "Sun, 29 Nov 2009 20:37:14 GMT" } ]
2009-11-29T00:00:00
[ [ "Ben-Eliezer", "Ido", "" ], [ "Lovett", "Shachar", "" ], [ "Yadin", "Ariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3482
Russell K. Standish
Russell K. Standish
Complexity of Networks (reprise)
Accepted in Complexity
Complexity, v 17, 50-61, (2012)
10.1002/cplx.20393
null
cs.IT math.IT nlin.AO q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network or graph structures are ubiquitous in the study of complex systems. Often, we are interested in complexity trends of these system as it evolves under some dynamic. An example might be looking at the complexity of a food web as species enter an ecosystem via migration or speciation, and leave via extinction. In a previous paper, a complexity measure of networks was proposed based on the {\em complexity is information content} paradigm. To apply this paradigm to any object, one must fix two things: a representation language, in which strings of symbols from some alphabet describe, or stand for the objects being considered; and a means of determining when two such descriptions refer to the same object. With these two things set, the information content of an object can be computed in principle from the number of equivalent descriptions describing a particular object. The previously proposed representation language had the deficiency that the fully connected and empty networks were the most complex for a given number of nodes. A variation of this measure, called zcomplexity, applied a compression algorithm to the resulting bitstring representation, to solve this problem. Unfortunately, zcomplexity proved too computationally expensive to be practical. In this paper, I propose a new representation language that encodes the number of links along with the number of nodes and a representation of the linklist. This, like zcomplexity, exhibits minimal complexity for fully connected and empty networks, but is as tractable as the original measure. ...
[ { "version": "v1", "created": "Wed, 18 Nov 2009 09:03:59 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 11:22:40 GMT" }, { "version": "v3", "created": "Mon, 23 Aug 2010 11:29:39 GMT" }, { "version": "v4", "created": "Wed, 19 Jan 2011 03:49:20 GMT" }, { "version": "v5", "created": "Wed, 27 Jul 2011 23:55:09 GMT" } ]
2012-01-23T00:00:00
[ [ "Standish", "Russell K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0911.3492
Britta Dorn
Nadja Betzler, Britta Dorn
Towards a Dichotomy for the Possible Winner Problem in Elections Based on Scoring Rules
minor changes and updates; accepted for publication in JCSS, online version available.
null
10.1016/j.jcss.2010.04.002
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To make a joint decision, agents (or voters) are often required to provide their preferences as linear orders. To determine a winner, the given linear orders can be aggregated according to a voting protocol. However, in realistic settings, the voters may often only provide partial orders. This directly leads to the Possible Winner problem that asks, given a set of partial votes, whether a distinguished candidate can still become a winner. In this work, we consider the computational complexity of Possible Winner for the broad class of voting protocols defined by scoring rules. A scoring rule provides a score value for every position which a candidate can have in a linear order. Prominent examples include plurality, k-approval, and Borda. Generalizing previous NP-hardness results for some special cases, we settle the computational complexity for all but one scoring rule. More precisely, for an unbounded number of candidates and unweighted voters, we show that Possible Winner is NP-complete for all pure scoring rules except plurality, veto, and the scoring rule defined by the scoring vector (2,1,...,1,0), while it is solvable in polynomial time for plurality and veto.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 10:02:39 GMT" }, { "version": "v2", "created": "Fri, 30 Apr 2010 11:36:55 GMT" } ]
2010-05-03T00:00:00
[ [ "Betzler", "Nadja", "" ], [ "Dorn", "Britta", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3503
Bernard Mourrain
Mariemi Alonso (UCM), J\'erome Brachat (INRIA Sophia Antipolis), Bernard Mourrain (INRIA Sophia Antipolis)
The Hilbert scheme of points and its link with border basis
null
null
null
null
cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give new explicit representations of the Hilbert scheme of $\mu$ points in $\PP^{r}$ as a projective subvariety of a Grassmanniann variety. This new explicit description of the Hilbert scheme is simpler than the previous ones and global. It involves equations of degree $2$. We show how these equations are deduced from the commutation relations characterizing border bases. Next, we consider infinitesimal perturbations of an input system of equations on this Hilbert scheme and describe its tangent space. We propose an effective criterion to test if it is a flat deformation, that is if the perturbed system remains on the Hilbert scheme of the initial equations. This criterion involves in particular formal reduction with respect to border bases.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 10:50:19 GMT" }, { "version": "v2", "created": "Mon, 2 Aug 2010 06:32:30 GMT" } ]
2010-08-04T00:00:00
[ [ "Alonso", "Mariemi", "", "UCM" ], [ "Brachat", "Jérome", "", "INRIA Sophia Antipolis" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0911.3514
Thomas Blumensath
Thomas Blumensath
Sampling and reconstructing signals from a union of linear subspaces
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we study the problem of sampling and reconstructing signals which are assumed to lie on or close to one of several subspaces of a Hilbert space. Importantly, we here consider a very general setting in which we allow infinitely many subspaces in infinite dimensional Hilbert spaces. This general approach allows us to unify many results derived recently in areas such as compressed sensing, affine rank minimisation and analog compressed sensing. Our main contribution is to show that a conceptually simple iterative projection algorithms is able to recover signals from a union of subspaces whenever the sampling operator satisfies a bi-Lipschitz embedding condition. Importantly, this result holds for all Hilbert spaces and unions of subspaces, as long as the sampling procedure satisfies the condition for the set of subspaces considered. In addition to recent results for finite unions of finite dimensional subspaces and infinite unions of subspaces in finite dimensional spaces, we also show that this bi-Lipschitz property can hold in an analog compressed sensing setting in which we have an infinite union of infinite dimensional subspaces living in infinite dimensional space.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 11:53:50 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 2009 16:45:02 GMT" } ]
2009-12-02T00:00:00
[ [ "Blumensath", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3528
Bikash Kumar Dey
Bikash Kumar Dey and D. Manjunath and Supriyo Chakraborty
Estimating Network Link Characteristics using Packet-Pair Dispersion: A Discrete Time Queueing Theoretic View
32 pages, 12 figures, 1 table
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Packet-dispersion based measurement tools insert pairs of probe packets with a known separation into the network for transmission over a unicast path or a multicast tree. Samples of the separation between the probe pairs at the destination(s) are observed. Heuristic techniques are then used by these tools to estimate the path characteristics from the observations. In this paper we present a queueing theoretic setting for packet-dispersion based probing. Analogous to network tomography, we develop techniques to estimate the parameters of the arrival process to the individual links from the samples of the output separations, i.e., from the end-to-end measurements. The links are modeled as independent discrete time queues with i.i.d. arrivals. We first obtain an algorithm to obtain the (joint) distribution of the separation between the probes at the destination(s) for a given distribution of the spacing at the input. The parameter estimates of the arrival process are obtained as the minimizer of a cost function between the empirical and calculated distributions. We also carry out extensive simulations and numerical experiments to study the performance of the estimation algorithm under the fairly `harsh' conditions of non stationarity of the arrival process. We find that the estimations work fairly well for two queues in series and for multicast.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 13:01:54 GMT" } ]
2009-11-19T00:00:00
[ [ "Dey", "Bikash Kumar", "" ], [ "Manjunath", "D.", "" ], [ "Chakraborty", "Supriyo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.3538
Amin Daneshmand Malayeri
Amin Daneshmand Malayeri
Noise Speech wavelet analyzing in special time ranges
null
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Speech analyzing in special periods of time has been presented in this paper. One of the most important periods in signal processing is near to Zero. By this paper, we analyze noise speech signals when these signals are near to Zero. Our strategy is defining some subfunctions and compress histograms when a noise speech signal is in a special period. It can be so useful for wavelet signal processing and spoken systems analyzing.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 13:36:20 GMT" } ]
2009-11-19T00:00:00
[ [ "Malayeri", "Amin Daneshmand", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]