id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0911.2381
|
Ferm\'in Moscoso del Prado Mart\'in
|
Ferm\'in Moscoso del Prado Mart\'in
|
Analytical Determination of Fractal Structure in Stochastic Time Series
|
9 pages, 4 figures
| null | null | null |
physics.data-an cond-mat.stat-mech cs.LG nlin.CD stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current methods for determining whether a time series exhibits fractal
structure (FS) rely on subjective assessments on estimators of the Hurst
exponent (H). Here, I introduce the Bayesian Assessment of Scaling, an
analytical framework for drawing objective and accurate inferences on the FS of
time series. The technique exploits the scaling property of the diffusion
associated to a time series. The resulting criterion is simple to compute and
represents an accurate characterization of the evidence supporting different
hypotheses on the scaling regime of a time series. Additionally, a closed-form
Maximum Likelihood estimator of H is derived from the criterion, and this
estimator outperforms the best available estimators.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 13:08:20 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Martín",
"Fermín Moscoso del Prado",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
] |
0911.2390
|
EPTCS
|
Stefan Leijnen, Liane Gabora
|
How Creative Should Creators Be To Optimize the Evolution of Ideas? A
Computational Model
| null |
EPTCS 9, 2009, pp. 108-119
|
10.4204/EPTCS.9.12
| null |
cs.AI cs.NE physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There are both benefits and drawbacks to creativity. In a social group it is
not necessary for all members to be creative to benefit from creativity; some
merely imitate or enjoy the fruits of others' creative efforts. What proportion
should be creative? This paper contains a very preliminary investigation of
this question carried out using a computer model of cultural evolution referred
to as EVOC (for EVOlution of Culture). EVOC is composed of neural network based
agents that evolve fitter ideas for actions by (1) inventing new ideas through
modification of existing ones, and (2) imitating neighbors' ideas. The ideal
proportion with respect to fitness of ideas occurs when thirty to forty percent
of the individuals is creative. When creators are inventing 50% of iterations
or less, mean fitness of actions in the society is a positive function of the
ratio of creators to imitators; otherwise mean fitness of actions starts to
drop when the ratio of creators to imitators exceeds approximately 30%. For all
levels or creativity, the diversity of ideas in a population is positively
correlated with the ratio of creative agents.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 13:44:59 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Leijnen",
"Stefan",
""
],
[
"Gabora",
"Liane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.2405
|
Karim Mahboub
|
Karim Mahboub, Evelyne Cl\'ement, Cyrille Bertelle, V\'eronique Jay
|
Emotion: Appraisal-coping model for the "Cascades" problem
|
6 pages
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modelling emotion has become a challenge nowadays. Therefore, several models
have been produced in order to express human emotional activity. However, only
a few of them are currently able to express the close relationship existing
between emotion and cognition. An appraisal-coping model is presented here,
with the aim to simulate the emotional impact caused by the evaluation of a
particular situation (appraisal), along with the consequent cognitive reaction
intended to face the situation (coping). This model is applied to the
"Cascades" problem, a small arithmetical exercise designed for ten-year-old
pupils. The goal is to create a model corresponding to a child's behaviour when
solving the problem using his own strategies.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 15:03:22 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Mahboub",
"Karim",
""
],
[
"Clément",
"Evelyne",
""
],
[
"Bertelle",
"Cyrille",
""
],
[
"Jay",
"Véronique",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.2423
|
Matt Purkeypile
|
Matt Purkeypile
|
Cove: A Practical Quantum Computer Programming Framework
|
Doctoral dissertation, 272 pages
| null | null | null |
cs.PL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While not yet in commercial existence, quantum computers have the ability to
solve certain classes of problems that are not efficiently solvable on existing
Turing Machine based (classical) computers. For quantum computers to be of use,
methods of programming them must exist. Proposals exist for programming quantum
computers, but all of the existing ones suffer from flaws that make them
impractical in commercial software development environments. Cove is a
framework for programming quantum computers that extends existing classical
languages to allow for quantum computation, thus providing a quantum computing
toolkit for commercial software developers. Since the target users of Cove are
commercial developers, it is an object oriented framework that can be used by
multiple languages and also places emphasis on complete documentation. The
focus of Cove is not so much on the software product, but on the fundamental
concepts that make quantum computing practical for common developers.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 05:36:23 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Purkeypile",
"Matt",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0911.2466
|
Renuka Kandregula
|
Renuka Kandregula
|
Towards a Number Theoretic Discrete Hilbert Transform
|
9 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an approach for the development of a number theoretic
discrete Hilbert transform. The forward transformation has been applied by
taking the odd reciprocals that occur in the DHT matrix with respect to a power
of 2. Specifically, the expression for a 16-point transform is provided and
results of a few representative signals are provided. The inverse transform is
the inverse of the forward 16-point matrix. But at this time the inverse
transform is not identical to the forward transform and, therefore, our
proposed number theoretic transform must be taken as a provisional result.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 20:58:44 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Kandregula",
"Renuka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.2484
|
Pat Morin
|
Dan Chen, Luc Devroye, Vida Dujmovic, and Pat Morin
|
Memoryless Routing in Convex Subdivisions: Random Walks are Optimal
|
11 pages, 6 figures
|
Computational Geometry: Theory and Applications, Volume 45, Issue
4, May 2012, Pages 178-185
|
10.1016/j.comgeo.2011.12.005
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A memoryless routing algorithm is one in which the decision about the next
edge on the route to a vertex t for a packet currently located at vertex v is
made based only on the coordinates of v, t, and the neighbourhood, N(v), of v.
The current paper explores the limitations of such algorithms by showing that,
for any (randomized) memoryless routing algorithm A, there exists a convex
subdivision on which A takes Omega(n^2) expected time to route a message
between some pair of vertices. Since this lower bound is matched by a random
walk, this result implies that the geometric information available in convex
subdivisions is not helpful for this class of routing algorithms. The current
paper also shows the existence of triangulations for which the Random-Compass
algorithm proposed by Bose etal (2002,2004) requires 2^{\Omega(n)} time to
route between some pair of vertices.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 21:53:08 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Chen",
"Dan",
""
],
[
"Devroye",
"Luc",
""
],
[
"Dujmovic",
"Vida",
""
],
[
"Morin",
"Pat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.2501
|
Karim Mahboub
|
Karim Mahboub (LITIS), Cyrille Bertelle (LITIS), V\'eronique Jay
(LITIS), Evelyne Cl\'ement
|
Emotion : mod\`ele d'appraisal-coping pour le probl\`eme des Cascades
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modeling emotion has become a challenge nowadays. Therefore, several models
have been produced in order to express human emotional activity. However, only
a few of them are currently able to express the close relationship existing
between emotion and cognition. An appraisal-coping model is presented here,
with the aim to simulate the emotional impact caused by the evaluation of a
particular situation (appraisal), along with the consequent cognitive reaction
intended to face the situation (coping). This model is applied to the
?Cascades? problem, a small arithmetical exercise designed for ten-year-old
pupils. The goal is to create a model corresponding to a child's behavior when
solving the problem using his own strategies.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 23:08:43 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Mahboub",
"Karim",
"",
"LITIS"
],
[
"Bertelle",
"Cyrille",
"",
"LITIS"
],
[
"Jay",
"Véronique",
"",
"LITIS"
],
[
"Clément",
"Evelyne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.2508
|
Selena Clancy
|
Russ Harmer (CNRS & Universit\'e Paris Diderot-Paris 7)
|
Rule-based Modelling and Tunable Resolution
| null |
EPTCS 9, 2009, pp. 65-72
|
10.4204/EPTCS.9.8
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the use of an extension of rule-based modelling for cellular
signalling to create a structured space of model variants. This enables the
incremental development of rule sets that start from simple mechanisms and
which, by a gradual increase in agent and rule resolution, evolve into more
detailed descriptions.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 23:24:38 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Harmer",
"Russ",
"",
"CNRS & Université Paris Diderot-Paris 7"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.2538
|
Francis Bonahon
|
Edmond Jonckheere (USC), Mingji Lou (USC), Francis Bonahon (USC),
Yuliy Baryshnikov (Bell Labs)
|
Euclidean versus hyperbolic congestion in idealized versus experimental
networks
|
23 pages, 4 figures
| null |
10.1080/15427951.2010.554320
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a mathematical justification of the phenomenon of extreme
congestion at a very limited number of nodes in very large networks. It is
argued that this phenomenon occurs as a combination of the negative curvature
property of the network together with minimum length routing. More
specifically, it is shown that, in a large n-dimensional hyperbolic ball B of
radius R viewed as a roughly similar model of a Gromov hyperbolic network, the
proportion of traffic paths transiting through a small ball near the center is
independent of the radius R whereas, in a Euclidean ball, the same proportion
scales as 1/R^{n-1}. This discrepancy persists for the traffic load, which at
the center of the hyperbolic ball scales as the square of the volume, whereas
the same traffic load scales as the volume to the power (n+1)/n in the
Euclidean ball. This provides a theoretical justification of the experimental
exponent discrepancy observed by Narayan and Saniee between traffic loads in
Gromov-hyperbolic networks from the Rocketfuel data base and synthetic
Euclidean lattice networks. It is further conjectured that for networks that do
not enjoy the obvious symmetry of hyperbolic and Euclidean balls, the point of
maximum traffic is near the center of mass of the network.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 05:17:23 GMT"
}
] | 2018-08-02T00:00:00 |
[
[
"Jonckheere",
"Edmond",
"",
"USC"
],
[
"Lou",
"Mingji",
"",
"USC"
],
[
"Bonahon",
"Francis",
"",
"USC"
],
[
"Baryshnikov",
"Yuliy",
"",
"Bell Labs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2551
|
Jayakrishnan Unnikrishnan
|
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli, Sean Meyn
|
Minimax Robust Quickest Change Detection
|
Submitted to IEEE Transactions on Information Theory, Nov. 2009.
Revised May 2010
| null |
10.1109/TIT.2011.2104993
| null |
cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The popular criteria of optimality for quickest change detection procedures
are the Lorden criterion, the Shiryaev-Roberts-Pollak criterion, and the
Bayesian criterion. In this paper a robust version of these quickest change
detection problems is considered when the pre-change and post-change
distributions are not known exactly but belong to known uncertainty classes of
distributions. For uncertainty classes that satisfy a specific condition, it is
shown that one can identify least favorable distributions (LFDs) from the
uncertainty classes, such that the detection rule designed for the LFDs is
optimal for the robust problem in a minimax sense. The condition is similar to
that required for the identification of LFDs for the robust hypothesis testing
problem originally studied by Huber. An upper bound on the delay incurred by
the robust test is also obtained in the asymptotic setting under the Lorden
criterion of optimality. This bound quantifies the delay penalty incurred to
guarantee robustness. When the LFDs can be identified, the proposed test is
easier to implement than the CUSUM test based on the Generalized Likelihood
Ratio (GLR) statistic which is a popular approach for such robust change
detection problems. The proposed test is also shown to give better performance
than the GLR test in simulations for some parameter values.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 07:07:50 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 03:57:48 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Unnikrishnan",
"Jayakrishnan",
""
],
[
"Veeravalli",
"Venugopal V.",
""
],
[
"Meyn",
"Sean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0911.2564
|
Walid Saad
|
Walid Saad, Zhu Han, Tamer Basar, Merouane Debbah, and Are
Hj{\o}rungnes
|
Distributed Coalition Formation Games for Secure Wireless Transmission
|
Invited paper
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cooperation among wireless nodes has been recently proposed for improving the
physical layer (PHY) security of wireless transmission in the presence of
multiple eavesdroppers. While existing PHY security literature answered the
question ``what are the link-level secrecy rate gains from cooperation?'', this
paper attempts to answer the question of ``how to achieve those gains in a
practical decentralized wireless network and in the presence of a cost for
information exchange?''. For this purpose, we model the PHY security
cooperation problem as a coalitional game with non-transferable utility and
propose a distributed algorithm for coalition formation. Through the proposed
algorithm, the wireless users can cooperate and self-organize into disjoint
independent coalitions, while maximizing their secrecy rate taking into account
the security costs during information exchange. We analyze the resulting
coalitional structures for both decode-and-forward and amplify-and-forward
cooperation and study how the users can adapt the network topology to
environmental changes such as mobility. Through simulations, we assess the
performance of the proposed algorithm and show that, by coalition formation
using decode-and-forward, the average secrecy rate per user is increased of up
to 25.3 % and 24.4 % (for a network with 45 users) relative to the
non-cooperative and amplify-and-forward cases, respectively.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 08:37:54 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Saad",
"Walid",
""
],
[
"Han",
"Zhu",
""
],
[
"Basar",
"Tamer",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Hjørungnes",
"Are",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2567
|
Christoph Durr
|
Marek Chrobak, Christoph Durr, Flavio Guinez, Antoni Lozano, Nguyen
Kim Thang
|
Tile Packing Tomography is NP-hard
| null | null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discrete tomography deals with reconstructing finite spatial objects from
lower dimensional projections and has applications for example in timetable
design. In this paper we consider the problem of reconstructing a tile packing
from its row and column projections. It consists of disjoint copies of a fixed
tile, all contained in some rectangular grid. The projections tell how many
cells are covered by a tile in each row and column. How difficult is it to
construct a tile packing satisfying given projections? It was known to be
solvable by a greedy algorithm for bars (tiles of width or height 1), and
NP-hardness results were known for some specific tiles. This paper shows that
the problem is NP-hard whenever the tile is not a bar.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 08:54:27 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Dec 2010 09:43:49 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Guinez",
"Flavio",
""
],
[
"Lozano",
"Antoni",
""
],
[
"Thang",
"Nguyen Kim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.2603
|
Daniel Stern
|
Daniel Stern
|
Cybermatter
|
Seventh International Computer Ethics Conference (CEPE 2007)
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we examine several aspects of the impact of Cyberworld onto our
Reality conceptions, and their social implications.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 12:48:42 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Stern",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.2619
|
Andrei Sukhov M
|
A.M. Sukhov, D.I. Sidelnikov, A. Galtsev, A.P. Platonov, M.V. Strizhov
|
Active Flows in Diagnostic of Troubleshooting on Backbone Links
|
7 pages, 6 figures, RELARN2009 conference (in Russian)
| null | null |
RIPN121109
|
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
This paper aims to identify the operational region of a link in terms of its
utilization and alert operators at the point where the link becomes overloaded
and requires a capacity upgrade. The number of active flows is considered the
real network state and is proposed to use a proxy for utilization. The Gaussian
approximation gives the expression for the confidence interval on an
operational region. The easy rule has been formulated to display the network
defects by means of measurements of router loading and number of active flows.
Mean flow performance is considered as the basic universal index characterized
quality of network services provided to single user.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 14:31:58 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Sukhov",
"A. M.",
""
],
[
"Sidelnikov",
"D. I.",
""
],
[
"Galtsev",
"A.",
""
],
[
"Platonov",
"A. P.",
""
],
[
"Strizhov",
"M. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2620
|
Al-Sakib Khan Pathan
|
Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan
|
Performance Analysis of MANET Routing Protocols Using An Elegant Visual
Simulation Tool
|
31 pages
| null | null | null |
cs.SE cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The task of simulation is often complicated for which many naive users often
seek for relatively easier solutions. In many cases, simulations are done
without any visual output which makes them non-attractive. In this paper, we
present ViSim; a new simulation tool that has a user-friendly graphical
interface. ViSim could be useful for researchers, students, teachers in their
works, and for the demonstration of various wireless network scenarios on
computer screen. It could make the task of simulation more exciting and enhance
the interest of the users without going into complex command-only text
interface. ViSim is not a simulation engine rather it calls ns-2 simulations in
the background and makes the task easy for the users to visualize the
simulation in Windows environment. Though ViSim is mainly a simulation
demonstration tool, any user with the knowledge of ns-2 and Tcl scripting is
also allowed to do necessary modifications and quick configurations for any
other MANET routing scenario. Using our simulation tool, we measured the
performances of several Mobile Ad-hoc Network (MANET) routing protocols. In
this paper, we present the performance analysis of three prominent MANET
routing protocols; DSDV, DSR, and AODV using our tool. The details of various
features of ViSim, brief descriptions of the selected routing protocols and
their comparisons, details about the performed experiments, and the gained
results are presented in this work.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 14:38:06 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Saquib",
"Nazmus",
""
],
[
"Sakib",
"Md. Sabbir Rahman",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2632
|
Henk Moed
|
Henk F. Moed
|
Measuring contextual citation impact of scientific journals
|
Version 13 November 2009; 23 pages; 1 appendix; 7 tables; 8 figures
| null | null | null |
cs.DL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper explores a new indicator of journal citation impact, denoted as
source normalized impact per paper (SNIP). It measures a journal's contextual
citation impact, taking into account characteristics of its properly defined
subject field, especially the frequency at which authors cite other papers in
their reference lists, the rapidity of maturing of citation impact, and the
extent to which a database used for the assessment covers the field's
literature. It further develops Eugene Garfield's notions of a field's
'citation potential' defined as the average length of references lists in a
field and determining the probability of being cited, and the need in fair
performance assessments to correct for differences between subject fields. A
journal's subject field is defined as the set of papers citing that journal.
SNIP is defined as the ratio of the journal's citation count per paper and the
citation potential in its subject field. It aims to allow direct comparison of
sources in different subject fields. Citation potential is shown to vary not
only between journal subject categories - groupings of journals sharing a
research field - or disciplines (e.g., journals in mathematics, engineering and
social sciences tend to have lower values than titles in life sciences), but
also between journals within the same subject category. For instance, basic
journals tend to show higher citation potentials than applied or clinical
journals, and journals covering emerging topics higher than periodicals in
classical subjects or more general journals. SNIP corrects for such
differences. Its strengths and limitations are critically discussed, and
suggestions are made for further research. All empirical results are derived
from Elsevier's Scopus.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 15:10:31 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Moed",
"Henk F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.2731
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Visualization of the Citation Impact Environments of Scientific
Journals: An online mapping exercise
| null |
Visualization of the Citation Impact Environments of Scientific
Journals: An online mapping exercise, Journal of the American Society for
Information Science and Technology 58(1), 25-38, 2007
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Aggregated journal-journal citation networks based on the Journal Citation
Reports 2004 of the Science Citation Index (5968 journals) and the Social
Science Citation Index (1712 journals) are made accessible from the perspective
of any of these journals. The user is thus able to analyze the citation
environment in terms of links and graphs. Furthermore, the local impact of a
journal is defined as its share of the total citations in the specific
journal's citation environments; the vertical size of the nodes is varied
proportionally to this citation impact. The horizontal size of each node can be
used to provide the same information after correction for within-journal
(self)-citations. In the "citing" environment, the equivalents of this measure
can be considered as a citation activity index which maps how the relevant
journal environment is perceived by the collective of authors of a given
journal. As a policy application, the mechanism of interdisciplinary
developments among the sciences is elaborated for the case of nanotechnology
journals.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 23:20:36 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.2746
|
Waheed Bajwa
|
Waheed U. Bajwa, Robert Calderbank, and Sina Jafarpour
|
Model Selection: Two Fundamental Measures of Coherence and Their
Algorithmic Significance
|
5 pages; Accepted for Proc. 2010 IEEE International Symposium on
Information Theory (ISIT 2010)
|
Proc. IEEE Int. Symp. Information Theory, Austin, TX, Jun. 13-18,
2010, pp. 1568-1572
|
10.1109/ISIT.2010.5513474
| null |
cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of model selection arises in a number of contexts, such as
compressed sensing, subset selection in linear regression, estimation of
structures in graphical models, and signal denoising. This paper generalizes
the notion of \emph{incoherence} in the existing literature on model selection
and introduces two fundamental measures of coherence---termed as the worst-case
coherence and the average coherence---among the columns of a design matrix. In
particular, it utilizes these two measures of coherence to provide an in-depth
analysis of a simple one-step thresholding (OST) algorithm for model selection.
One of the key insights offered by the ensuing analysis is that OST is feasible
for model selection as long as the design matrix obeys an easily verifiable
property. In addition, the paper also characterizes the model-selection
performance of OST in terms of the worst-case coherence, \mu, and establishes
that OST performs near-optimally in the low signal-to-noise ratio regime for N
x C design matrices with \mu = O(N^{-1/2}). Finally, in contrast to some of the
existing literature on model selection, the analysis in the paper is
nonasymptotic in nature, it does not require knowledge of the true model order,
it is applicable to generic (random or deterministic) design matrices, and it
neither requires submatrices of the design matrix to have full rank, nor does
it assume a statistical prior on the values of the nonzero entries of the data
vector.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 06:22:30 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Jan 2010 22:50:00 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Apr 2010 22:06:36 GMT"
}
] | 2018-03-06T00:00:00 |
[
[
"Bajwa",
"Waheed U.",
""
],
[
"Calderbank",
"Robert",
""
],
[
"Jafarpour",
"Sina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0911.2760
|
Katrin Iltgen
|
Katrin Iltgen, Walter Vogler
|
Robustness of a bisimulation-type faster-than preorder
|
Express Workshop
|
EPTCS 8, 2009, pp. 66-79
|
10.4204/EPTCS.8.6
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
TACS is an extension of CCS where upper time bounds for delays can be
specified. Luettgen and Vogler defined three variants of bismulation-type
faster-than relations and showed that they all three lead to the same preorder,
demonstrating the robustness of their approach. In the present paper, the
operational semantics of TACS is extended; it is shown that two of the variants
still give the same preorder as before, underlining robustness. An explanation
is given why this result fails for the third variant. It is also shown that
another variant, which mixes old and new operational semantics, can lead to
smaller relations that prove the same preorder.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 09:26:28 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Iltgen",
"Katrin",
""
],
[
"Vogler",
"Walter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.2784
|
Wolfgang Stummer
|
Wolfgang Stummer and Igor Vajda
|
On Bregman Distances and Divergences of Probability Measures
|
12 two-column pages, 2 figures
|
IEEE Transactions on Information Theory 58(3), 1277-1288 (2012)
|
10.1109/TIT.2011.2178139
| null |
cs.IT math.IT math.PR math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper introduces scaled Bregman distances of probability distributions
which admit non-uniform contributions of observed events. They are introduced
in a general form covering not only the distances of discrete and continuous
stochastic observations, but also the distances of random processes and
signals. It is shown that the scaled Bregman distances extend not only the
classical ones studied in the previous literature, but also the information
divergence and the related wider class of convex divergences of probability
measures. An information processing theorem is established too, but only in the
sense of invariance w.r.t. statistically sufficient transformations and not in
the sense of universal monotonicity. Pathological situations where coding can
increase the classical Bregman distance are illustrated by a concrete example.
In addition to the classical areas of application of the Bregman distances and
convex divergences such as recognition, classification, learning and evaluation
of proximity of various features and signals, the paper mentions a new
application in 3D-exploratory data analysis. Explicit expressions for the
scaled Bregman distances are obtained in general exponential families, with
concrete applications in the binomial, Poisson and Rayleigh families, and in
the families of exponential processes such as the Poisson and diffusion
processes including the classical examples of the Wiener process and geometric
Brownian motion.
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 16:23:39 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Oct 2011 22:27:31 GMT"
}
] | 2021-05-12T00:00:00 |
[
[
"Stummer",
"Wolfgang",
""
],
[
"Vajda",
"Igor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0911.2785
|
Cristian Molinaro
|
Sergio Greco, Cristian Molinaro, Irina Trubitsyna, Ester Zumpano
|
NP Datalog: a Logic Language for Expressing NP Search and Optimization
Problems
|
To appear in Theory and Practice of Logic Programming (TPLP)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a logic language for expressing NP search and
optimization problems. Specifically, first a language obtained by extending
(positive) Datalog with intuitive and efficient constructs (namely, stratified
negation, constraints and exclusive disjunction) is introduced. Next, a further
restricted language only using a restricted form of disjunction to define
(non-deterministically) subsets (or partitions) of relations is investigated.
This language, called NP Datalog, captures the power of Datalog with
unstratified negation in expressing search and optimization problems. A system
prototype implementing NP Datalog is presented. The system translates NP
Datalog queries into OPL programs which are executed by the ILOG OPL
Development Studio. Our proposal combines easy formulation of problems,
expressed by means of a declarative logic language, with the efficiency of the
ILOG System. Several experiments show the effectiveness of this approach.
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 17:20:30 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Greco",
"Sergio",
""
],
[
"Molinaro",
"Cristian",
""
],
[
"Trubitsyna",
"Irina",
""
],
[
"Zumpano",
"Ester",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.2801
|
Olivier Bodini
|
Olivier Bodini (LIP6), Alice Jacquot (LIP6)
|
Boltzmann Samplers for Colored Combinatorial Objects
| null | null | null | null |
cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give a general framework for the Boltzmann generation of
colored objects belonging to combinatorial constructible classes. We propose an
intuitive notion called profiled objects which allows the sampling of
size-colored objects (and also of k-colored objects) although the corresponding
class cannot be described by an analytic ordinary generating function.
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 20:03:10 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bodini",
"Olivier",
"",
"LIP6"
],
[
"Jacquot",
"Alice",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.2802
|
Olivier Bodini
|
Olivier Bodini (LIP6), Alice Jacquot (LIP6)
|
Boltzmann Samplers for v-balanced Colored Necklaces
| null | null | null | null |
cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is devoted to the random generation of particular colored
necklaces for which the number of beads of a given color is constrained (these
necklaces are called v-balanced). We propose an efficient sampler (its expected
time complexity is linear) which satisfies the Boltzmann model principle
introduced by Duchon, Flajolet, Louchard and Schaeffer. Our main motivation is
to show that the absence of a decomposable specification can be circumvented by
mixing the Boltzmann samplers with other types of samplers.
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 20:09:30 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bodini",
"Olivier",
"",
"LIP6"
],
[
"Jacquot",
"Alice",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.2804
|
Thomas Fernique
|
Olivier Bodini, Thomas Fernique, Michael Rao, Eric Remila
|
Distances on Rhombus Tilings
|
18 pages, 9 figures, submitted to Theoretical Computer Science
(special issue of DGCI'09)
|
Theor. Comput. Sci. 412(36): 4787-4794 (2011)
|
10.1016/j.tcs.2011.04.015
| null |
cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rhombus tilings of a simply connected domain of the Euclidean plane are
known to form a flip-connected space (a flip is the elementary operation on
rhombus tilings which rotates 180{\deg} a hexagon made of three rhombi).
Motivated by the study of a quasicrystal growth model, we are here interested
in better understanding how "tight" rhombus tiling spaces are flip-connected.
We introduce a lower bound (Hamming-distance) on the minimal number of flips to
link two tilings (flip-distance), and we investigate whether it is sharp. The
answer depends on the number n of different edge directions in the tiling:
positive for n=3 (dimer tilings) or n=4 (octogonal tilings), but possibly
negative for n=5 (decagonal tilings) or greater values of n. A standard proof
is provided for the n=3 and n=4 cases, while the complexity of the n=5 case led
to a computer-assisted proof (whose main result can however be easily checked
by hand).
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 20:29:27 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Mar 2011 16:53:33 GMT"
}
] | 2011-12-07T00:00:00 |
[
[
"Bodini",
"Olivier",
""
],
[
"Fernique",
"Thomas",
""
],
[
"Rao",
"Michael",
""
],
[
"Remila",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.2805
|
Olivier Bodini
|
Olivier Bodini (LIP6), J\'er\'emie Lumbroso (LIP6)
|
Optimal Partial Tiling of Manhattan Polyominoes
| null | null | null | null |
cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finding an efficient optimal partial tiling algorithm is still an open
problem. We have worked on a special case, the tiling of Manhattan polyominoes
with dominoes, for which we give an algorithm linear in the number of columns.
Some techniques are borrowed from traditional graph optimisation problems.
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 20:32:22 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bodini",
"Olivier",
"",
"LIP6"
],
[
"Lumbroso",
"Jérémie",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.2807
|
Olivier Bodini
|
Olivier Bodini (LIP6)
|
On the Minimum Size of a Contraction-Universal Tree
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A tree T_uni is m-universal for the class of trees if for every tree T of
size m, T can be obtained from T_uni by successive contractions of edges. We
prove that a m-universal tree for the class of trees has at least mln(m) +
(gamma-1)m + O(1) edges where is the Euler's constant and we build such a tree
with less than mc edges for a fixed constant c = 1.984...
|
[
{
"version": "v1",
"created": "Sat, 14 Nov 2009 21:04:40 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bodini",
"Olivier",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.2829
|
EPTCS
|
S. Barry Cooper, Vincent Danos
|
Proceedings Fifth Workshop on Developments in Computational
Models--Computational Models From Nature
| null |
EPTCS 9, 2009
|
10.4204/EPTCS.9
| null |
cs.CE cs.AI cs.CC cs.FL cs.LO cs.NE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The special theme of DCM 2009, co-located with ICALP 2009, concerned
Computational Models From Nature, with a particular emphasis on computational
models derived from physics and biology. The intention was to bring together
different approaches - in a community with a strong foundational background as
proffered by the ICALP attendees - to create inspirational cross-boundary
exchanges, and to lead to innovative further research. Specifically DCM 2009
sought contributions in quantum computation and information, probabilistic
models, chemical, biological and bio-inspired ones, including spatial models,
growth models and models of self-assembly. Contributions putting to the test
logical or algorithmic aspects of computing (e.g., continuous computing with
dynamical systems, or solid state computing models) were also very much
welcomed.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 03:35:32 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Cooper",
"S. Barry",
""
],
[
"Danos",
"Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.2847
|
Sergiy Vorobyov
|
Jie Gao, Sergiy A. Vorobyov, and Hai Jiang
|
Cooperative Precoding/Resource Allocation Games under Spectral Mask and
Total Power Constraints
|
33 pages, 8 figures, Submitted to the IEEE Trans. Signal Processing
in Oct. 2009
|
J. Gao, S.A. Vorobyov, and H. Jiang, "Cooperative resource
allocation games under spectral mask and total power constraints," IEEE
Trans. Signal Processing, vol. 58, no. 8, pp. 4379-4395, Aug. 2010
|
10.1109/TSP.2010.2048320
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of orthogonal signaling schemes such as time-, frequency-, or
code-division multiplexing (T-, F-, CDM) in multi-user systems allows for
power-efficient simple receivers. It is shown in this paper that by using
orthogonal signaling on frequency selective fading channels, the cooperative
Nash bargaining (NB)-based precoding games for multi-user systems, which aim at
maximizing the information rates of all users, are simplified to the
corresponding cooperative resource allocation games. The latter provides
additional practically desired simplifications to transmitter design and
significantly reduces the overhead during user cooperation. The complexity of
the corresponding precoding/resource allocation games, however, depends on the
constraints imposed on the users. If only spectral mask constraints are
present, the corresponding cooperative NB problem can be formulated as a convex
optimization problem and solved efficiently in a distributed manner using dual
decomposition based algorithm. However, the NB problem is non-convex if total
power constraints are also imposed on the users. In this case, the complexity
associate with finding the NB solution is unacceptably high. Therefore, the
multi-user systems are categorized into bandwidth- and power-dominant based on
a bottleneck resource, and different manners of cooperation are developed for
each type of systems for the case of two-users. Such classification guarantees
that the solution obtained in each case is Pareto-optimal and actually can be
identical to the optimal solution, while the complexity is significantly
reduced. Simulation results demonstrate the efficiency of the proposed
cooperative precoding/resource allocation strategies and the reduced complexity
of the proposed algorithms.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 09:50:50 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Gao",
"Jie",
""
],
[
"Vorobyov",
"Sergiy A.",
""
],
[
"Jiang",
"Hai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2865
|
Nallusamy R
|
R. Nallusamy and K. Duraiswamy
|
Neural Networks for Dynamic Shortest Path Routing Problems - A Survey
|
This article has been withdrawn by the authors. Misplaced equation 1
|
CiiT International Journal of Artificial Intelligent Systems and
Machine Learning, Vol. 1, No. 2, pp. 31-34, May 2009
| null | null |
cs.NE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper reviews the overview of the dynamic shortest path routing problem
and the various neural networks to solve it. Different shortest path
optimization problems can be solved by using various neural networks
algorithms. The routing in packet switched multi-hop networks can be described
as a classical combinatorial optimization problem i.e. a shortest path routing
problem in graphs. The survey shows that the neural networks are the best
candidates for the optimization of dynamic shortest path routing problems due
to their fastness in computation comparing to other softcomputing and
metaheuristics algorithms
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 13:04:26 GMT"
},
{
"version": "v2",
"created": "Sun, 30 May 2010 09:02:08 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Nallusamy",
"R.",
""
],
[
"Duraiswamy",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.2873
|
Pierre-Olivier Amblard
|
Pierre-Olivier Amblard and Olivier J. J. Michel
|
Relating Granger causality to directed information theory for networks
of stochastic processes
|
submitted, completely rehaul, new title, added recent references,
more emphasis on general case
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of inferring circulation of information
between multiple stochastic processes. We discuss two possible frameworks in
which the problem can be studied: directed information theory and Granger
causality. The main goal of the paper is to study the connection between these
two frameworks. In the case of directed information theory, we stress the
importance of Kramer's causal conditioning. This type of conditioning is
necessary not only in the definition of the directed information but also for
handling causal side information. We also show how directed information
decomposes into the sum of two measures, the first one related to Schreiber's
transfer entropy quantifies the dynamical aspects of causality, whereas the
second one, termed instantaneous information exchange, quantifies the
instantaneous aspect of causality. After having recalled the definition of
Granger causality, we establish its connection with directed information
theory. The connection is particularly studied in the Gaussian case, showing
that Geweke's measures of Granger causality correspond to the transfer entropy
and the instantaneous information exchange. This allows to propose an
information theoretic formulation of Granger causality.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 14:47:45 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Nov 2009 17:24:33 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Dec 2010 00:48:56 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Nov 2011 05:00:01 GMT"
}
] | 2011-11-02T00:00:00 |
[
[
"Amblard",
"Pierre-Olivier",
""
],
[
"Michel",
"Olivier J. J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2889
|
Vladimir Karlin
|
V. Karlin
|
Global communications in multiprocessor simulations of flames
|
16 pages, 8 figures
| null | null | null |
cs.DC cs.CE cs.MS cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate performance of global communications in a
particular parallel code. The code simulates dynamics of expansion of premixed
spherical flames using an asymptotic model of Sivashinsky type and a spectral
numerical algorithm. As a result, the code heavily relies on global all-to-all
interprocessor communications implementing transposition of the distributed
data array in which numerical solution to the problem is stored. This global
data interdependence makes interprocessor connectivity of the HPC system as
important as the floating-point power of the processors of which the system is
built. Our experiments show that efficient numerical simulation of this
particular model, with global data interdependence, on modern HPC systems is
possible. Prospects of performance of more sophisticated models of flame
dynamics are analysed as well.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 17:10:31 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Karlin",
"V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.2899
|
Roberto Bagnara
|
Michael A. Covington (Institute for Artificial Intelligence, The
University of Georgia, Athens, Georgia, U.S.A.), Roberto Bagnara (Department
of Mathematics, University of Parma, and BUGSENG srl, Italy), Richard A.
O'Keefe (Department of Computer Science, University of Otago, Dunedin, New
Zealand), Jan Wielemaker (Department of Computer Science, VU University
Amsterdam, The Netherlands), Simon Price (Intelligent Systems Laboratory,
University of Bristol, United Kingdom)
|
Coding Guidelines for Prolog
|
39 pages, 4 figures, 2 tables
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coding standards and good practices are fundamental to a disciplined approach
to software projects, whatever programming languages they employ. Prolog
programming can benefit from such an approach, perhaps more than programming in
other languages. Despite this, no widely accepted standards and practices seem
to have emerged up to now. The present paper is a first step towards filling
this void: it provides immediate guidelines for code layout, naming
conventions, documentation, proper use of Prolog features, program development,
debugging and testing. Presented with each guideline is its rationale and,
where sensible options exist, illustrations of the relative pros and cons for
each alternative. A coding standard should always be selected on a per-project
basis, based on a host of issues pertinent to any given programming project;
for this reason the paper goes beyond the mere provision of normative
guidelines by discussing key factors and important criteria that should be
taken into account when deciding on a fully-fledged coding standard for the
project.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 18:21:41 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Nov 2010 20:25:29 GMT"
},
{
"version": "v3",
"created": "Tue, 17 May 2011 14:30:39 GMT"
}
] | 2011-05-18T00:00:00 |
[
[
"Covington",
"Michael A.",
"",
"Institute for Artificial Intelligence, The\n University of Georgia, Athens, Georgia, U.S.A."
],
[
"Bagnara",
"Roberto",
"",
"Department\n of Mathematics, University of Parma, and BUGSENG srl, Italy"
],
[
"O'Keefe",
"Richard A.",
"",
"Department of Computer Science, University of Otago, Dunedin, New\n Zealand"
],
[
"Wielemaker",
"Jan",
"",
"Department of Computer Science, VU University\n Amsterdam, The Netherlands"
],
[
"Price",
"Simon",
"",
"Intelligent Systems Laboratory,\n University of Bristol, United Kingdom"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.2900
|
Tobias Kretz
|
Tobias Kretz
|
Computation Speed of the F.A.S.T. Model
|
Accepted as contribution to "Traffic and Granular Flow 2009"
proceedings. This is a slightly extended version
| null | null | null |
cs.MA physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The F.A.S.T. model for microscopic simulation of pedestrians was formulated
with the idea of parallelizability and small computation times in general in
mind, but so far it was never demonstrated, if it can in fact be implemented
efficiently for execution on a multi-core or multi-CPU system. In this
contribution results are given on computation times for the F.A.S.T. model on
an eight-core PC.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 18:09:08 GMT"
}
] | 2010-01-20T00:00:00 |
[
[
"Kretz",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.2902
|
Tobias Kretz
|
Cornelia Boenisch, Tobias Kretz
|
Simulation of Pedestrians Crossing a Street
|
Accepted as contribution to "Traffic and Granular Flow 09"
proceedings. This is a slightly extended version
| null | null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The simulation of vehicular traffic as well as pedestrian dynamics meanwhile
both have a decades long history. The success of this conference series, PED
and others show that the interest in these topics is still strongly increasing.
This contribution deals with a combination of both systems: pedestrians
crossing a street. In a VISSIM simulation for varying demand jam sizes of
vehicles as well as pedestrians and the travel times of the pedestrians are
measured and compared. The study is considered as a study of VISSIM's con ict
area functionality as such, as there is no empirical data available to use for
calibration issues. Above a vehicle demand threshold the results show a
non-monotonic dependence of pedestrians' travel time on pedestrian demand.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 18:31:21 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Boenisch",
"Cornelia",
""
],
[
"Kretz",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.2904
|
Maxim Raginsky
|
Maxim Raginsky, Rebecca Willett, Corinne Horn, Jorge Silva, Roummel
Marcia
|
Sequential anomaly detection in the presence of noise and limited
feedback
|
19 pages, 12 pdf figures; final version to be published in IEEE
Transactions on Information Theory
| null |
10.1109/TIT.2012.2201375
| null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a methodology for detecting anomalies from sequentially
observed and potentially noisy data. The proposed approach consists of two main
elements: (1) {\em filtering}, or assigning a belief or likelihood to each
successive measurement based upon our ability to predict it from previous noisy
observations, and (2) {\em hedging}, or flagging potential anomalies by
comparing the current belief against a time-varying and data-adaptive
threshold. The threshold is adjusted based on the available feedback from an
end user. Our algorithms, which combine universal prediction with recent work
on online convex programming, do not require computing posterior distributions
given all current observations and involve simple primal-dual parameter
updates. At the heart of the proposed approach lie exponential-family models
which can be used in a wide variety of contexts and applications, and which
yield methods that achieve sublinear per-round regret against both static and
slowly varying product distributions with marginals drawn from the same
exponential family. Moreover, the regret against static distributions coincides
with the minimax value of the corresponding online strongly convex game. We
also prove bounds on the number of mistakes made during the hedging step
relative to the best offline choice of the threshold with access to all
estimated beliefs and feedback signals. We validate the theory on synthetic
data drawn from a time-varying distribution over binary vectors of high
dimensionality, as well as on the Enron email dataset.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 18:43:10 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 2010 17:30:25 GMT"
},
{
"version": "v3",
"created": "Sun, 5 Feb 2012 23:11:54 GMT"
},
{
"version": "v4",
"created": "Tue, 13 Mar 2012 16:11:21 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Raginsky",
"Maxim",
""
],
[
"Willett",
"Rebecca",
""
],
[
"Horn",
"Corinne",
""
],
[
"Silva",
"Jorge",
""
],
[
"Marcia",
"Roummel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.2907
|
William Bradley
|
William F. Bradley
|
A Recursive Definition of the Holographic Standard Signature
|
Fixed small typo in Section 3.6
| null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide a recursive description of the signatures realizable on the
standard basis by a holographic algorithm. The description allows us to prove
tight bounds on the size of planar matchgates and efficiently test for standard
signatures. Over finite fields, it allows us to count the number of n-bit
standard signatures and calculate their expected sparsity.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 19:30:21 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bradley",
"William F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.2922
|
William Bradley
|
William F. Bradley
|
Sparse Eigenvectors of the Discrete Fourier Transform
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct a basis of sparse eigenvectors for the N-dimensional discrete
Fourier transform. The sparsity differs from the optimal by at most a factor of
four. When N is a perfect square, the basis is orthogonal.
|
[
{
"version": "v1",
"created": "Sun, 15 Nov 2009 21:32:22 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bradley",
"William F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2924
|
Mika G\"o\"os
|
Mika G\"o\"os and Pekka Orponen
|
Synthesizing Minimal Tile Sets for Patterned DNA Self-Assembly
|
12 pages, 6 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Pattern self-Assembly Tile set Synthesis (PATS) problem is to determine a
set of coloured tiles that self-assemble to implement a given rectangular
colour pattern. We give an exhaustive branch-and-bound algorithm to find tile
sets of minimum cardinality for the PATS problem. Our algorithm makes use of a
search tree in the lattice of partitions of the ambient rectangular grid, and
an efficient bounding function to prune this search tree. Empirical data on the
performance of the algorithm shows that it compares favourably to previously
presented heuristic solutions to the problem.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 07:43:41 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Aug 2010 19:25:16 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Göös",
"Mika",
""
],
[
"Orponen",
"Pekka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.2942
|
Chris Giannella
|
Chris Giannella, Kun Liu, Hillol Kargupta
|
Breaching Euclidean Distance-Preserving Data Perturbation Using Few
Known Inputs
|
This is a major revision accounting for journal peer-review. Changes
include: removal of known sample attack, more citations added, an empirical
comparison against the algorithm of Kaplan et al. added
|
Data & Knowledge Engineering 83, pages 93-110, 2013
| null | null |
cs.DB cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We examine Euclidean distance-preserving data perturbation as a tool for
privacy-preserving data mining. Such perturbations allow many important data
mining algorithms e.g. hierarchical and k-means clustering), with only minor
modification, to be applied to the perturbed data and produce exactly the same
results as if applied to the original data. However, the issue of how well the
privacy of the original data is preserved needs careful study. We engage in
this study by assuming the role of an attacker armed with a small set of known
original data tuples (inputs). Little work has been done examining this kind of
attack when the number of known original tuples is less than the number of data
dimensions. We focus on this important case, develop and rigorously analyze an
attack that utilizes any number of known original tuples. The approach allows
the attacker to estimate the original data tuple associated with each perturbed
tuple and calculate the probability that the estimation results in a privacy
breach. On a real 16-dimensional dataset, we show that the attacker, with 4
known original tuples, can estimate an original unknown tuple with less than 7%
error with probability exceeding 0.8.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 02:51:37 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jan 2013 15:49:10 GMT"
}
] | 2013-01-03T00:00:00 |
[
[
"Giannella",
"Chris",
""
],
[
"Liu",
"Kun",
""
],
[
"Kargupta",
"Hillol",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.2948
|
RadhaKrishna Ganti
|
Radha Krishna Ganti and Martin Haenggi
|
Spatial Analysis of Opportunistic Downlink Relaying in a Two-Hop
Cellular System
|
Submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT cs.NI math.IT stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a two-hop cellular system in which the mobile nodes help the base
station by relaying information to the dead spots. While two-hop cellular
schemes have been analyzed previously, the distribution of the node locations
has not been explicitly taken into account. In this paper, we model the node
locations of the base stations and the mobile stations as a point process on
the plane and then analyze the performance of two different two-hop schemes in
the downlink. In one scheme the node nearest to the destination that has
decoded information from the base station in the first hop is used as the
relay. In the second scheme the node with the best channel to the relay that
received information in the first hop acts as a relay. In both these schemes we
obtain the success probability of the two hop scheme, accounting for the
interference from all other cells. We use tools from stochastic geometry and
point process theory to analyze the two hop schemes. Besides the results
obtained a main contribution of the paper is to introduce a mathematical
framework that can be used to analyze arbitrary relaying schemes. Some of the
main contributions of this paper are the analytical techniques introduced for
the inclusion of the spatial locations of the nodes into the mathematical
analysis.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 04:09:54 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Ganti",
"Radha Krishna",
""
],
[
"Haenggi",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
] |
0911.2952
|
Kaibin Huang
|
Kaibin Huang and Rui Zhang
|
Cooperative Feedback for Multi-Antenna Cognitive Radio Networks
|
26 pages; to appear in IEEE Trans. Signal Processing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cognitive beamforming (CB) is a multi-antenna technique for efficient
spectrum sharing between primary users (PUs) and secondary users (SUs) in a
cognitive radio network. Specifically, a multi-antenna SU transmitter applies
CB to suppress the interference to the PU receivers as well as enhance the
corresponding SU-link performance. In this paper, for a
multiple-input-single-output (MISO) SU channel coexisting with a
single-input-single-output (SISO) PU channel, we propose a new and practical
paradigm for designing CB based on the finite-rate cooperative feedback from
the PU receiver to the SU transmitter. Specifically, the PU receiver
communicates to the SU transmitter the quantized SU-to-PU channel direction
information (CDI) for computing the SU transmit beamformer, and the
interference power control (IPC) signal that regulates the SU transmission
power according to the tolerable interference margin at the PU receiver. Two CB
algorithms based on cooperative feedback are proposed: one restricts the SU
transmit beamformer to be orthogonal to the quantized SU-to-PU channel
direction and the other relaxes such a constraint. In addition, cooperative
feedforward of the SU CDI from the SU transmitter to the PU receiver is
exploited to allow more efficient cooperative feedback. The outage
probabilities of the SU link for different CB and cooperative
feedback/feedforward algorithms are analyzed, from which the optimal
bit-allocation tradeoff between the CDI and IPC feedback is characterized.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 05:09:40 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Oct 2010 09:48:34 GMT"
}
] | 2010-10-18T00:00:00 |
[
[
"Huang",
"Kaibin",
""
],
[
"Zhang",
"Rui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2974
|
Zizhuo Wang
|
Shipra Agrawal, Zizhuo Wang, Yinyu Ye
|
A Dynamic Near-Optimal Algorithm for Online Linear Programming
| null | null | null | null |
cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A natural optimization model that formulates many online resource allocation
and revenue management problems is the online linear program (LP) in which the
constraint matrix is revealed column by column along with the corresponding
objective coefficient. In such a model, a decision variable has to be set each
time a column is revealed without observing the future inputs and the goal is
to maximize the overall objective function. In this paper, we provide a
near-optimal algorithm for this general class of online problems under the
assumption of random order of arrival and some mild conditions on the size of
the LP right-hand-side input. Specifically, our learning-based algorithm works
by dynamically updating a threshold price vector at geometric time intervals,
where the dual prices learned from the revealed columns in the previous period
are used to determine the sequential decisions in the current period. Due to
the feature of dynamic learning, the competitiveness of our algorithm improves
over the past study of the same problem. We also present a worst-case example
showing that the performance of our algorithm is near-optimal.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 16:39:33 GMT"
},
{
"version": "v2",
"created": "Sat, 4 May 2013 20:10:14 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Apr 2014 03:44:37 GMT"
}
] | 2014-04-10T00:00:00 |
[
[
"Agrawal",
"Shipra",
""
],
[
"Wang",
"Zizhuo",
""
],
[
"Ye",
"Yinyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.2993
|
Andrew Gacek
|
Andrew Gacek, Dale Miller, Gopalan Nadathur
|
A two-level logic approach to reasoning about computations
|
To appear in the Journal of Automated Reasoning
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Relational descriptions have been used in formalizing diverse computational
notions, including, for example, operational semantics, typing, and acceptance
by non-deterministic machines. We therefore propose a (restricted) logical
theory over relations as a language for specifying such notions. Our
specification logic is further characterized by an ability to explicitly treat
binding in object languages. Once such a logic is fixed, a natural next
question is how we might prove theorems about specifications written in it. We
propose to use a second logic, called a reasoning logic, for this purpose. A
satisfactory reasoning logic should be able to completely encode the
specification logic. Associated with the specification logic are various
notions of binding: for quantifiers within formulas, for eigenvariables within
sequents, and for abstractions within terms. To provide a natural treatment of
these aspects, the reasoning logic must encode binding structures as well as
their associated notions of scope, free and bound variables, and
capture-avoiding substitution. Further, to support arguments about provability,
the reasoning logic should possess strong mechanisms for constructing proofs by
induction and co-induction. We provide these capabilities here by using a logic
called G which represents relations over lambda-terms via definitions of atomic
judgments, contains inference rules for induction and co-induction, and
includes a special generic quantifier. We show how provability in the
specification logic can be transparently encoded in G. We also describe an
interactive theorem prover called Abella that implements G and this two-level
logic approach and we present several examples that demonstrate the efficacy of
Abella in reasoning about computations.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 09:56:44 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Sep 2010 08:39:26 GMT"
}
] | 2010-09-02T00:00:00 |
[
[
"Gacek",
"Andrew",
""
],
[
"Miller",
"Dale",
""
],
[
"Nadathur",
"Gopalan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.3005
|
Dominique Duval
|
Dominique Duval (LJK)
|
How to combine diagrammatic logics
| null | null | null | null |
cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is a submission to the contest: How to combine logics? at the
World Congress and School on Universal Logic III, 2010. We claim that combining
"things", whatever these things are, is made easier if these things can be seen
as the objects of a category. We define the category of diagrammatic logics, so
that categorical constructions can be used for combining diagrammatic logics.
As an example, a combination of logics using an opfibration is presented, in
order to study computational side-effects due to the evolution of the state
during the execution of an imperative program.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 11:03:48 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 12:39:55 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Duval",
"Dominique",
"",
"LJK"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0911.3024
|
Guyslain Naves
|
Guyslain Naves (LGS)
|
The hardness of routing two pairs on one face
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove the NP-completeness of the integer multiflow problem in planar
graphs, with the following restrictions: there are only two demand edges, both
lying on the infinite face of the routing graph. This was one of the open
challenges concerning disjoint paths, explicitly asked by M\"uller. It also
strengthens Schw\"arzler's recent proof of one of the open problems of
Schrijver's book, about the complexity of the edge-disjoint paths problem with
terminals on the outer boundary of a planar graph. We also give a directed
acyclic reduction. This proves that the arc-disjoint paths problem is
NP-complete in directed acyclic graphs, even with only two demand arcs.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 13:22:39 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Naves",
"Guyslain",
"",
"LGS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.3086
|
Loet Leydesdorff
|
Lutz Bornmann, Loet Leydesdorff, Werner Marx
|
Citation Environment of Angewandte Chemie
| null |
Lutz Bornmann, Loet Leydesdorff, and Werner Marx, Citation
Environment of Angewandte Chemie, CHIMIA 61(3), 104-109, 2007
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, aggregated journal-journal citation networks were made accessible
from the perspective of each journal included in the Science Citation Index see
(http://www.leydesdorff.net/). The local matrices can be used to inspect the
relevant citation environment of a journal using statistical analysis and
visualization techniques from social network analysis. The inspection gives an
answer to the question what the local impact of this and other journals in the
environment is. In this study the citation environment of Angewandte Chemie was
analysed. Angewandte Chemie is one of the prime chemistry journals in the
world. Its environment was compared with that of the Journal of the American
Chemical Society. The results of the environment analyses give a detailed
insight into the field-embeddedness of Angewandte Chemie. The impacts of the
German and international editions of this journal are compared.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:19:46 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Bornmann",
"Lutz",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Marx",
"Werner",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3087
|
Loet Leydesdorff
|
Ping Zhou, Loet Leydesdorff
|
A Comparison between the China Scientific and Technical Papers and
Citations Database and the Science Citation Index in terms of journal
hierarchies and inter-journal citation relations
| null |
Journal of the American Society for Information Science and
Technology 58(2), 223-236, 2007
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The journal structure in the China Scientific and Technical Papers and
Citations Database (CSTPCD) is analysed from three perspectives: the database
level, the specialty level and the institutional level (i.e., university
journals versus journals issued by the Chinese Academy of Sciences). The
results are compared with those for (Chinese) journals included in the Science
Citation Index. The frequency of journal-journal citation relations in the
CSTPCD is an order of magnitude lower than in the SCI. Chinese journals,
especially high-quality journals, prefer to cite international journals rather
than domestic ones. However, Chinese journals do not get an equivalent
reception from their international counterparts. The international visibility
of Chinese journals is low, but varies among fields of science. Journals of the
Chinese Academy of Sciences (CAS) have a better reception in the international
scientific community than university journals.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:24:56 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Zhou",
"Ping",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3091
|
Loet Leydesdorff
|
Ping Zhou and Loet Leydesdorff
|
The Citation Impacts and Citation Environments of Chinese Journals in
Mathematics
| null |
Zhou, Ping & Loet Leydesdorff, The Citation Impacts and Citation
Environments of Chinese Journals in Mathematics, Scientometrics 72(2),
185-200, 2007
| null | null |
cs.DL math.HO physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Based on the citation data of journals covered by the China Scientific and
Technical Papers and Citations Database (CSTPCD), we obtained aggregated
journal-journal citation environments by applying routines developed
specifically for this purpose. Local citation impact of journals is defined as
the share of the total citations in a local citation environment, which is
expressed as a ratio and can be visualized by the size of the nodes. The
vertical size of the nodes varies proportionally to a journal's total citation
share, while the horizontal size of the nodes is used to provide citation
information after correction for the within-journal (self-) citations. In this
study, we analyze citation impacts of three Chinese journals in mathematics and
compare local citation impacts with impact factors. Local citation impacts
reflect a journal's status and function better than (global) impact factors. We
also found that authors in Chinese journals prefer international instead of
domestic ones as sources for their citations.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:33:00 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Zhou",
"Ping",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3092
|
Emil Vassev Dr.
|
Emil Vassev, Que Thu Dung Nguyen, Heng Kuang
|
Fault-Tolerance through Message-logging and Check-pointing: Disaster
Recovery for CORBA-based Distributed Bank Servers
|
42 pages,11 figues
| null | null | null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents results of our endeavor towards developing a
failure-recovery variant of a CORBA-based bank server that provides fault
tolerance features through message logging and checkpoint logging. In this
group of projects, three components were developed to satisfy the requirements:
1) a message-logging protocol for the branch servers of the distributed banking
system to log required information; 2) a recovery module that restarts the bank
server using the message log to help the restarted bank server process
subsequent requests for various operations; 3) a monitor module that
periodically checks whether the bank server is down and helps the recovery
module restart the bank server if the latter has crashed.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:31:09 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Nov 2009 14:33:48 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Vassev",
"Emil",
""
],
[
"Nguyen",
"Que Thu Dung",
""
],
[
"Kuang",
"Heng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.3093
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Indicators of Structural Change in the Dynamics of Science: Entropy
Statistics of the SCI Journal Citation Reports
| null |
Scientometrics 53(1) (2002) 131-159
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Can change in citation patterns among journals be used as an indicator of
structural change in the organization of the sciences? Aggregated
journal-journal citations for 1999 are compared with similar data in the
Journal Citation Reports 1998 of the Science Citation Index. In addition to
indicating local change, probabilistic entropy measures enable us to analyze
changes in distributions at different levels of aggregation. The results of
various statistics are discussed and compared by elaborating the
journal-journal mappings. The relevance of this indicator for science and
technology policies is further specified.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:39:35 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3095
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Environment and Planning B as a Journal: The interdisciplinarity of its
environment and the citation impact
| null |
In: T. Braun (ed.), The Impact Factors of Scientific and Scholarly
Journals. Its Use and Misuse. Budapest: Akademiai Kiado, 2007, pp. 127-148
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The citation impact of Environment and Planning B can be visualized using its
citation relations with journals in its environment as the links of a network.
The size of the nodes is varied in correspondence to the relative citation
impact in this environment. Additionally, one can correct for the effect of
within-journal "self"-citations. The network can be partitioned and clustered
using algorithms from social network analysis. After transposing the matrix in
terms of rows and columns, the citing patterns can be mapped analogously.
Citing patterns reflect the activity of the community of authors who publish in
the journal, while being cited indicates reception. Environment and Planning B
is cited across the interface between the social sciences and the natural
sciences, but its authors cite almost exclusively from the domain of the Social
Science Citation Index.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 17:44:32 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3108
|
Emanuel Gluskin
|
Emanuel Gluskin
|
On game psychology: an experiment on the chess board/screen, should you
always "do your best", and why the programs with prescribed weaknesses cannot
be our good friends?
|
This is a somewhat contracted (compared to v1,2)version of my
original manuscript motivated by observation of a very unusual weakness of a
chess program that plays, generally, much stronger than I do, and by the wish
to consider chess not just as competition, also as a model for human
weaknesses. Some details of the experiment suggest a new version of the game.
5 figures
| null | null | null |
cs.AI cs.GT math.HO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is noted that some unusual moves against a strong chess program greatly
weaken its ability to see the serious targets of the game, and its whole level
of play... It is suggested to create programs with different weaknesses in
order to analyze similar human behavior. Finally, a new version of chess,
"Chess Corrida" is suggested.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 22:15:07 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Apr 2010 14:17:24 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Jan 2011 12:11:26 GMT"
}
] | 2011-01-31T00:00:00 |
[
[
"Gluskin",
"Emanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
] |
0911.3110
|
David Harvey
|
David Harvey
|
Faster exponentials of power series
|
3 pages, requires algorithm2e package
| null | null | null |
cs.SC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a new algorithm for computing exp(f) where f is a power series in
C[[x]]. If M(n) denotes the cost of multiplying polynomials of degree n, the
new algorithm costs (2.1666... + o(1)) M(n) to compute exp(f) to order n. This
improves on the previous best result, namely (2.333... + o(1)) M(n).
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 18:22:48 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Harvey",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.3125
|
Tengiz Zorikov
|
T. Zorikov
|
A computational model of the bottlenose dolphin sonar:
Feature-extracting method
|
11 pages, 5 figures
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The data describing a process of echo-image formation in bottlenose dolphin
sonar perception were accumulated in our experimental explorations. These data
were formalized mathematically and used in the computational model, comparative
testing of which in echo-discrimination tasks revealed no less capabilities
then those of bottlenose dolphins.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 19:24:59 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Nov 2009 08:20:17 GMT"
}
] | 2009-11-22T00:00:00 |
[
[
"Zorikov",
"T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0911.3162
|
Lance Fortnow
|
Lance Fortnow and Rahul Santhanam
|
Bounding Rationality by Discounting Time
|
To appear in Proceedings of The First Symposium on Innovations in
Computer Science
| null | null | null |
cs.GT cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider a game where Alice generates an integer and Bob wins if he can
factor that integer. Traditional game theory tells us that Bob will always win
this game even though in practice Alice will win given our usual assumptions
about the hardness of factoring.
We define a new notion of bounded rationality, where the payoffs of players
are discounted by the computation time they take to produce their actions. We
use this notion to give a direct correspondence between the existence of
equilibria where Alice has a winning strategy and the hardness of factoring.
Namely, under a natural assumption on the discount rates, there is an
equilibriumwhere Alice has a winning strategy iff there is a linear-time
samplable distribution with respect to which Factoring is hard on average.
We also give general results for discounted games over countable action
spaces, including showing that any game with bounded and computable payoffs has
an equilibrium in our model, even if each player is allowed a countable number
of actions. It follows, for example, that the Largest Integer game has an
equilibrium in our model though it has no Nash equilibria or epsilon-Nash
equilibria.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2009 21:10:26 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Fortnow",
"Lance",
""
],
[
"Santhanam",
"Rahul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3189
|
EPTCS
|
Sibylle Fr\"oschle, Daniele Gorla
|
Proceedings 16th International Workshop on Expressiveness in Concurrency
| null |
EPTCS 8, 2009
|
10.4204/EPTCS.8
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the 16th International Workshop on
Expressiveness in Concurrency (EXPRESS'09), which took place on 5th September
2009 in Bologna, co-located with CONCUR'09. The EXPRESS workshop series aim at
bringing together researchers who are interested in the expressiveness and
comparison of formal models that broadly relate to concurrency. In particular,
this also includes emergent fields such as logic and interaction,
game-theoretic models, and service-oriented computing.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 00:35:52 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Fröschle",
"Sibylle",
""
],
[
"Gorla",
"Daniele",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3195
|
Danupon Nanongkai
|
Atish Das Sarma, Danupon Nanongkai, Gopal Pandurangan, Prasad Tetali
|
Efficient Distributed Random Walks with Applications
| null | null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We focus on the problem of performing random walks efficiently in a
distributed network. Given bandwidth constraints, the goal is to minimize the
number of rounds required to obtain a random walk sample. We first present a
fast sublinear time distributed algorithm for performing random walks whose
time complexity is sublinear in the length of the walk. Our algorithm performs
a random walk of length $\ell$ in $\tilde{O}(\sqrt{\ell D})$ rounds (with high
probability) on an undirected network, where $D$ is the diameter of the
network. This improves over the previous best algorithm that ran in
$\tilde{O}(\ell^{2/3}D^{1/3})$ rounds (Das Sarma et al., PODC 2009). We further
extend our algorithms to efficiently perform $k$ independent random walks in
$\tilde{O}(\sqrt{k\ell D} + k)$ rounds. We then show that there is a
fundamental difficulty in improving the dependence on $\ell$ any further by
proving a lower bound of $\Omega(\sqrt{\frac{\ell}{\log \ell}} + D)$ under a
general model of distributed random walk algorithms. Our random walk algorithms
are useful in speeding up distributed algorithms for a variety of applications
that use random walks as a subroutine. We present two main applications. First,
we give a fast distributed algorithm for computing a random spanning tree (RST)
in an arbitrary (undirected) network which runs in $\tilde{O}(\sqrt{m}D)$
rounds (with high probability; here $m$ is the number of edges). Our second
application is a fast decentralized algorithm for estimating mixing time and
related parameters of the underlying network. Our algorithm is fully
decentralized and can serve as a building block in the design of
topologically-aware networks.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 00:57:01 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 13:34:11 GMT"
}
] | 2010-03-03T00:00:00 |
[
[
"Sarma",
"Atish Das",
""
],
[
"Nanongkai",
"Danupon",
""
],
[
"Pandurangan",
"Gopal",
""
],
[
"Tetali",
"Prasad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.3209
|
Chao-Yang Pang
|
Chao-Yang Pang, Hui Liu, Xia Li, Yun-Fei Wang, Ben-Qiong Hu
|
Apply Ant Colony Algorithm to Search All Extreme Points of Function
|
23 pages, 7 figures
| null | null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To find all extreme points of multimodal functions is called extremum
problem, which is a well known difficult issue in optimization fields. Applying
ant colony optimization (ACO) to solve this problem is rarely reported. The
method of applying ACO to solve extremum problem is explored in this paper.
Experiment shows that the solution error of the method presented in this paper
is less than 10^-8. keywords: Extremum Problem; Ant Colony Optimization (ACO)
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 03:34:19 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Pang",
"Chao-Yang",
""
],
[
"Liu",
"Hui",
""
],
[
"Li",
"Xia",
""
],
[
"Wang",
"Yun-Fei",
""
],
[
"Hu",
"Ben-Qiong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.3213
|
Neri Merhav
|
Neri Merhav
|
Optimum estimation via gradients of partition functions and information
measures: a statistical-mechanical perspective
|
21 pages; submitted to the IEEE Transactions on Information Theory
| null |
10.1109/TIT.2011.2132590
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In continuation to a recent work on the statistical--mechanical analysis of
minimum mean square error (MMSE) estimation in Gaussian noise via its relation
to the mutual information (the I-MMSE relation), here we propose a simple and
more direct relationship between optimum estimation and certain information
measures (e.g., the information density and the Fisher information), which can
be viewed as partition functions and hence are amenable to analysis using
statistical--mechanical techniques. The proposed approach has several
advantages, most notably, its applicability to general sources and channels, as
opposed to the I-MMSE relation and its variants which hold only for certain
classes of channels (e.g., additive white Gaussian noise channels). We then
demonstrate the derivation of the conditional mean estimator and the MMSE in a
few examples. Two of these examples turn out to be generalizable to a fairly
wide class of sources and channels. For this class, the proposed approach is
shown to yield an approximate conditional mean estimator and an MMSE formula
that has the flavor of a single-letter expression. We also show how our
approach can easily be generalized to situations of mismatched estimation.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 06:24:52 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3214
|
Guo-Qiang Zhang
|
Manfred Droste, Guo-Qiang Zhang
|
Bifinite Chu Spaces
| null |
Logical Methods in Computer Science, Volume 6, Issue 1 (January
14, 2010) lmcs:1183
|
10.2168/LMCS-6(1:3)2010
| null |
cs.LO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies colimits of sequences of finite Chu spaces and their
ramifications. Besides generic Chu spaces, we consider extensional and
biextensional variants. In the corresponding categories we first characterize
the monics and then the existence (or the lack thereof) of the desired
colimits. In each case, we provide a characterization of the finite objects in
terms of monomorphisms/injections. Bifinite Chu spaces are then expressed with
respect to the monics of generic Chu spaces, and universal, homogeneous Chu
spaces are shown to exist in this category. Unanticipated results driving this
development include the fact that while for generic Chu spaces monics consist
of an injective first and a surjective second component, in the extensional and
biextensional cases the surjectivity requirement can be dropped. Furthermore,
the desired colimits are only guaranteed to exist in the extensional case.
Finally, not all finite Chu spaces (considered set-theoretically) are finite
objects in their categories. This study opens up opportunities for further
investigations into recursively defined Chu spaces, as well as constructive
models of linear logic.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 06:27:14 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jan 2010 23:45:22 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Droste",
"Manfred",
""
],
[
"Zhang",
"Guo-Qiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.3241
|
Francesco De Pellegrini Dr.
|
Eitan Altman, Tamer Basar and Francesco De Pellegrini
|
Optimal Control in Two-Hop Relay Routing
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the optimal control of propagation of packets in delay tolerant
mobile ad-hoc networks. We consider a two-hop forwarding policy under which the
expected number of nodes carrying copies of the packets obeys a linear
dynamics. We exploit this property to formulate the problem in the framework of
linear quadratic optimal control which allows us to obtain closed-form
expressions for the optimal control and to study numerically the tradeoffs by
varying various parameters that define the cost.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 09:29:50 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Altman",
"Eitan",
""
],
[
"Basar",
"Tamer",
""
],
[
"De Pellegrini",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3256
|
Natalia Silberstein
|
Natalia Silberstein and Tuvi Etzion
|
Enumerative Coding for Grassmannian Space
|
to appear in IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Grassmannian space $\Gr$ is the set of all $k-$dimensional subspaces of
the vector space~\smash{$\F_q^n$}. Recently, codes in the Grassmannian have
found an application in network coding. The main goal of this paper is to
present efficient enumerative encoding and decoding techniques for the
Grassmannian. These coding techniques are based on two different orders for the
Grassmannian induced by different representations of $k$-dimensional subspaces
of $\F_q^n$. One enumerative coding method is based on a Ferrers diagram
representation and on an order for $\Gr$ based on this representation. The
complexity of this enumerative coding is $O(k^{5/2} (n-k)^{5/2})$ digit
operations. Another order of the Grassmannian is based on a combination of an
identifying vector and a reduced row echelon form representation of subspaces.
The complexity of the enumerative coding, based on this order, is
$O(nk(n-k)\log n\log\log n)$ digits operations. A combination of the two
methods reduces the complexity on average by a constant factor.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 10:28:21 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Aug 2010 12:09:17 GMT"
}
] | 2010-08-31T00:00:00 |
[
[
"Silberstein",
"Natalia",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3262
|
Samuel Ouzan
|
Samuel Ouzan, Yair Be'ery
|
Moderate-Density Parity-Check Codes
|
Submitted to the IEEE Transactions on Communications, September 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new type of short to moderate block-length, linear
error-correcting codes, called moderate-density parity-check (MDPC) codes. The
number of ones of the parity-check matrix of the codes presented is typically
higher than the number of ones of the parity-check matrix of low-density
parity-check (LDPC) codes. But, still lower than those of the parity-check
matrix of classical block codes. The proposed MDPC codes are cyclic and are
designed by constructing idempotents using cyclotomic cosets. The construction
is simple and allows finding short block-length, high-rate codes with good
minimum distance. Inspired by some recent iterative soft-input soft-output
(SISO) decoders used in a context of classical block codes, we propose a low
complexity, efficient, iterative decoder called Auto-Diversity (AD) decoder. AD
decoder is based on belief propagation (BP) decoder and takes advantage of the
fundamental property of automorphism group of the constructed cyclic code.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 10:59:29 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Ouzan",
"Samuel",
""
],
[
"Be'ery",
"Yair",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3275
|
EPTCS
|
Nguyen Van Tang (AIST)
|
A Tighter Bound for the Determinization of Visibly Pushdown Automata
| null |
EPTCS 10, 2009, pp. 62-76
|
10.4204/EPTCS.10.5
| null |
cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visibly pushdown automata (VPA), introduced by Alur and Madhusuan in 2004, is
a subclass of pushdown automata whose stack behavior is completely determined
by the input symbol according to a fixed partition of the input alphabet. Since
its introduce, VPAs have been shown to be useful in various context, e.g., as
specification formalism for verification and as automaton model for processing
XML streams. Due to high complexity, however, implementation of formal
verification based on VPA framework is a challenge. In this paper we consider
the problem of implementing VPA-based model checking algorithms. For doing so,
we first present an improvement on upper bound for determinization of VPA.
Next, we propose simple on-the-fly algorithms to check universality and
inclusion problems of this automata class. Then, we implement the proposed
algorithms in a prototype tool. Finally, we conduct experiments on randomly
generated VPAs. The experimental results show that the proposed algorithms are
considerably faster than the standard ones.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:48:55 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Van Tang",
"Nguyen",
"",
"AIST"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3276
|
EPTCS
|
Laurent Fribourg (LSV Cachan), Etienne Andr\'e (LSV Cachan)
|
An Inverse Method for Policy-Iteration Based Algorithms
| null |
EPTCS 10, 2009, pp. 44-61
|
10.4204/EPTCS.10.4
| null |
cs.DM cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an extension of two policy-iteration based algorithms on weighted
graphs (viz., Markov Decision Problems and Max-Plus Algebras). This extension
allows us to solve the following inverse problem: considering the weights of
the graph to be unknown constants or parameters, we suppose that a reference
instantiation of those weights is given, and we aim at computing a constraint
on the parameters under which an optimal policy for the reference instantiation
is still optimal. The original algorithm is thus guaranteed to behave well
around the reference instantiation, which provides us with some criteria of
robustness. We present an application of both methods to simple examples. A
prototype implementation has been done.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:46:19 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Fribourg",
"Laurent",
"",
"LSV Cachan"
],
[
"André",
"Etienne",
"",
"LSV Cachan"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3277
|
EPTCS
|
Bahareh Badban (Konstanz university), Stefan Leue (Konstanz
university), Jan-Georg Smaus (Freiburg University)
|
Automated Predicate Abstraction for Real-Time Models
| null |
EPTCS 10, 2009, pp. 36-43
|
10.4204/EPTCS.10.3
| null |
cs.LO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a technique designed to automatically compute predicate
abstractions for dense real-timed models represented as networks of timed
automata.
We use the CIPM algorithm in our previous work which computes new invariants
for timed automata control locations and prunes the model, to compute a
predicate abstraction of the model. We do so by taking information regarding
control locations and their newly computed invariants into account.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:12:54 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Badban",
"Bahareh",
"",
"Konstanz university"
],
[
"Leue",
"Stefan",
"",
"Konstanz\n university"
],
[
"Smaus",
"Jan-Georg",
"",
"Freiburg University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0911.3280
|
Maurizio Serva
|
Maurizio Serva
|
Automated languages phylogeny from Levenshtein distance
|
Ideas and results in this paper were presented at the International
Conference: Visitas Internationais, Instituto de Estudos Avancados
Transdisciplinares, (Belo Horizonte, 2009)
| null | null | null |
cs.CL q-bio.PE q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Languages evolve over time in a process in which reproduction, mutation and
extinction are all possible, similar to what happens to living organisms. Using
this similarity it is possible, in principle, to build family trees which show
the degree of relatedness between languages.
The method used by modern glottochronology, developed by Swadesh in the
1950s, measures distances from the percentage of words with a common historical
origin. The weak point of this method is that subjective judgment plays a
relevant role.
Recently we proposed an automated method that avoids the subjectivity, whose
results can be replicated by studies that use the same database and that
doesn't require a specific linguistic knowledge. Moreover, the method allows a
quick comparison of a large number of languages.
We applied our method to the Indo-European and Austronesian families,
considering in both cases, fifty different languages. The resulting trees are
similar to those of previous studies, but with some important differences in
the position of few languages and subgroups. We believe that these differences
carry new information on the structure of the tree and on the phylogenetic
relationships within families.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:17:22 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2011 22:14:52 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Apr 2011 18:48:20 GMT"
},
{
"version": "v4",
"created": "Fri, 29 Apr 2011 20:24:40 GMT"
},
{
"version": "v5",
"created": "Tue, 3 May 2011 21:19:29 GMT"
},
{
"version": "v6",
"created": "Fri, 6 May 2011 20:41:08 GMT"
},
{
"version": "v7",
"created": "Mon, 2 Jul 2012 09:54:50 GMT"
}
] | 2012-07-03T00:00:00 |
[
[
"Serva",
"Maurizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.3283
|
EPTCS
|
Christophe Morvan (Universit\'e Paris-Est)
|
On external presentations of infinite graphs
| null |
EPTCS 10, 2009, pp. 23-35
|
10.4204/EPTCS.10.2
| null |
cs.FL cs.DM cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The vertices of a finite state system are usually a subset of the natural
numbers. Most algorithms relative to these systems only use this fact to select
vertices.
For infinite state systems, however, the situation is different: in
particular, for such systems having a finite description, each state of the
system is a configuration of some machine. Then most algorithmic approaches
rely on the structure of these configurations. Such characterisations are said
internal. In order to apply algorithms detecting a structural property (like
identifying connected components) one may have first to transform the system in
order to fit the description needed for the algorithm. The problem of internal
characterisation is that it hides structural properties, and each solution
becomes ad hoc relatively to the form of the configurations.
On the contrary, external characterisations avoid explicit naming of the
vertices. Such characterisation are mostly defined via graph transformations.
In this paper we present two kind of external characterisations:
deterministic graph rewriting, which in turn characterise regular graphs,
deterministic context-free languages, and rational graphs. Inverse substitution
from a generator (like the complete binary tree) provides characterisation for
prefix-recognizable graphs, the Caucal Hierarchy and rational graphs. We
illustrate how these characterisation provide an efficient tool for the
representation of infinite state systems.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:07:16 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Morvan",
"Christophe",
"",
"Université Paris-Est"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3291
|
Frederic Magniez
|
F. Magniez, C. Mathieu, A. Nayak
|
Recognizing well-parenthesized expressions in the streaming model
|
20 pages, 5 figures
| null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by a concrete problem and with the goal of understanding the sense
in which the complexity of streaming algorithms is related to the complexity of
formal languages, we investigate the problem Dyck(s) of checking matching
parentheses, with $s$ different types of parenthesis.
We present a one-pass randomized streaming algorithm for Dyck(2) with space
$\Order(\sqrt{n}\log n)$, time per letter $\polylog (n)$, and one-sided error.
We prove that this one-pass algorithm is optimal, up to a $\polylog n$ factor,
even when two-sided error is allowed. For the lower bound, we prove a direct
sum result on hard instances by following the "information cost" approach, but
with a few twists. Indeed, we play a subtle game between public and private
coins. This mixture between public and private coins results from a balancing
act between the direct sum result and a combinatorial lower bound for the base
case.
Surprisingly, the space requirement shrinks drastically if we have access to
the input stream in reverse. We present a two-pass randomized streaming
algorithm for Dyck(2) with space $\Order((\log n)^2)$, time $\polylog (n)$ and
one-sided error, where the second pass is in the reverse direction. Both
algorithms can be extended to Dyck(s) since this problem is reducible to
Dyck(2) for a suitable notion of reduction in the streaming model.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:42:11 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Magniez",
"F.",
""
],
[
"Mathieu",
"C.",
""
],
[
"Nayak",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3292
|
Maurizio Serva
|
Filippo Petroni and Maurizio Serva
|
Automated words stability and languages phylogeny
|
XI International Conference "Cognitive Modeling in Linguistics-2009"
Constanca, Romania, September, 7-14, 2009
| null | null | null |
cs.CL physics.soc-ph q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The idea of measuring distance between languages seems to have its roots in
the work of the French explorer Dumont D'Urville (D'Urville 1832). He collected
comparative words lists of various languages during his voyages aboard the
Astrolabe from 1826 to1829 and, in his work about the geographical division of
the Pacific, he proposed a method to measure the degree of relation among
languages. The method used by modern glottochronology, developed by Morris
Swadesh in the 1950s (Swadesh 1952), measures distances from the percentage of
shared cognates, which are words with a common historical origin. Recently, we
proposed a new automated method which uses normalized Levenshtein distance
among words with the same meaning and averages on the words contained in a
list. Another classical problem in glottochronology is the study of the
stability of words corresponding to different meanings. Words, in fact, evolve
because of lexical changes, borrowings and replacement at a rate which is not
the same for all of them. The speed of lexical evolution is different for
different meanings and it is probably related to the frequency of use of the
associated words (Pagel et al. 2007). This problem is tackled here by an
automated methodology only based on normalized Levenshtein distance.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 12:47:44 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Dec 2009 17:08:06 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Petroni",
"Filippo",
""
],
[
"Serva",
"Maurizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
0911.3298
|
Alejandro Chinea Manrique De Lara
|
Alejandro Chinea
|
Understanding the Principles of Recursive Neural networks: A Generative
Approach to Tackle Model Complexity
|
11 pages, 4 figures, Recurrent Networks session ICANN 2009
|
Alippi, C., Polycarpou, M. Panayiotou, C., Ellinas, G. (Eds.)
ICANN 2009, LNCS, vol. 5768 pp. 952-963, Springer, Heidelberg (2009)
| null | null |
cs.NE cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive Neural Networks are non-linear adaptive models that are able to
learn deep structured information. However, these models have not yet been
broadly accepted. This fact is mainly due to its inherent complexity. In
particular, not only for being extremely complex information processing models,
but also because of a computational expensive learning phase. The most popular
training method for these models is back-propagation through the structure.
This algorithm has been revealed not to be the most appropriate for structured
processing due to problems of convergence, while more sophisticated training
methods enhance the speed of convergence at the expense of increasing
significantly the computational cost. In this paper, we firstly perform an
analysis of the underlying principles behind these models aimed at
understanding their computational power. Secondly, we propose an approximate
second order stochastic learning algorithm. The proposed algorithm dynamically
adapts the learning rate throughout the training phase of the network without
incurring excessively expensive computational effort. The algorithm operates in
both on-line and batch modes. Furthermore, the resulting learning scheme is
robust against the vanishing gradients problem. The advantages of the proposed
algorithm are demonstrated with a real-world application example.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:17:05 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Chinea",
"Alejandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.3299
|
Axel Legay
|
Axel Legay and Marco Faella
|
Some Models and Tools for Open Systems
|
This is our invited paper to FIT 2005
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In computer science, there is a distinction between closed systems, whose
behavior is totally determined in advance, and open systems, that are systems
maintaining a constant interaction with an unspecified environment. Closed
systems are naturally modeled by transitions systems. Open systems have been
modeled in various ways, including process algebras, I/O automata, ``modules'',
and interfaces. Games provide a uniform setting in which all these models can
be cast and compared. In this paper, we discuss the features and costs related
to the game-based approach to open systems, referring to some of the existing
models. Finally, we describe a new model of interface, called sociable
interface, which is geared towards easier specification, improved reusability
of models, and efficient symbolic implementation.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:21:31 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Legay",
"Axel",
""
],
[
"Faella",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3301
|
Sahbi Sidhom
|
Patrick Nourrissier (INRIA Lorraine - LORIA), Sahbi Sidhom (LORIA)
|
Le travail coop\'eratif comme vecteur d'\'evolution de nos syst\`emes
d'information
| null |
Conf\'erence internationale sur les "Syst\`emes d'Information et
Intelligence Economique", Hammamet : Tunisie (2009)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article focuses on presenting the cooperative tool DIMS, it is a
platform that can manage the participants's daily life, by providing
flexibility and speed in the organization's tasks. The main interest lies in
the possibility of organizing information system in a logical network, across
multiple physical sites, incorporating a specific protocol to making possible
the inter-server communication. This protocol, based on the Jabber standard,
that meets the needs of working everyday matters, allowing the distribution of
research and access to resources of the WAN. The technological objective
concerns the evolution of an information system architectures, where the
application may be a comprehensive set of tools and services on a distributed
network of remote sites. The challenge for users is the perception of a
collective role to each individual who cooperates in compliance with safety
rules and unlimited access to technical information.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:30:56 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Nourrissier",
"Patrick",
"",
"INRIA Lorraine - LORIA"
],
[
"Sidhom",
"Sahbi",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.3304
|
Romain Giot
|
Romain Giot (GREYC), Mohamad El-Abed (GREYC), Christophe Rosenberger
(GREYC)
|
Keystroke Dynamics Authentication For Collaborative Systems
| null |
The IEEE International Symposium on Collaborative Technologies and
Systems (CTS), Baltimore : United States (2009)
|
10.1109/CTS.2009.5067478
| null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper a study on the ability and the benefits of using a
keystroke dynamics authentication method for collaborative systems.
Authentication is a challenging issue in order to guarantee the security of use
of collaborative systems during the access control step. Many solutions exist
in the state of the art such as the use of one time passwords or smart-cards.
We focus in this paper on biometric based solutions that do not necessitate any
additional sensor. Keystroke dynamics is an interesting solution as it uses
only the keyboard and is invisible for users. Many methods have been published
in this field. We make a comparative study of many of them considering the
operational constraints of use for collaborative systems.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:35:40 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Giot",
"Romain",
"",
"GREYC"
],
[
"El-Abed",
"Mohamad",
"",
"GREYC"
],
[
"Rosenberger",
"Christophe",
"",
"GREYC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.3306
|
Pascal Urso
|
Nacer Boudjlida (INRIA Lorraine - LORIA), Jean-Pierre Jacquot (LORIA),
Pascal Urso (INRIA Lorraine - LORIA)
|
Software Engineering Education by Example
| null |
5th China - Europe International Symposium on Software Industry
Oriented Education (CEISIE 2009), Bordeaux : France (2009)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Based on the old but famous distinction between "in the small" and "in the
large" software development, at Nancy Universit\'e, UHP Nancy 1, we experience
for a while software engineering education thanks to actual project
engineering. This education method has the merit to enable students to discover
and to overcome actual problems when faced to a large project which may be
conducted by a large development team. The mode of education is a simulation of
an actual software engineering project as encountered in "real life\'e"
activities.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:36:59 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Boudjlida",
"Nacer",
"",
"INRIA Lorraine - LORIA"
],
[
"Jacquot",
"Jean-Pierre",
"",
"LORIA"
],
[
"Urso",
"Pascal",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.3307
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
On Some Sets of Dictionaries Whose omega-Powers Have a Given Complexity
|
To appear in Mathematical Logic Quarterly
|
Mathematical Logic Quarterly 56, 5 (2010) 452?460
|
10.1002/malq.200810154
| null |
math.LO cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A dictionary is a set of finite words over some finite alphabet X. The
omega-power of a dictionary V is the set of infinite words obtained by infinite
concatenation of words in V. Lecomte studied in [Omega-powers and descriptive
set theory, JSL 2005] the complexity of the set of dictionaries whose
associated omega-powers have a given complexity. In particular, he considered
the sets $W({\bf\Si}^0_{k})$ (respectively, $W({\bf\Pi}^0_{k})$,
$W({\bf\Delta}_1^1)$) of dictionaries $V \subseteq 2^\star$ whose omega-powers
are ${\bf\Si}^0_{k}$-sets (respectively, ${\bf\Pi}^0_{k}$-sets, Borel sets). In
this paper we first establish a new relation between the sets
$W({\bf\Sigma}^0_{2})$ and $W({\bf\Delta}_1^1)$, showing that the set
$W({\bf\Delta}_1^1)$ is "more complex" than the set $W({\bf\Sigma}^0_{2})$. As
an application we improve the lower bound on the complexity of
$W({\bf\Delta}_1^1)$ given by Lecomte. Then we prove that, for every integer
$k\geq 2$, (respectively, $k\geq 3$) the set of dictionaries
$W({\bf\Pi}^0_{k+1})$ (respectively, $W({\bf\Si}^0_{k+1})$) is "more complex"
than the set of dictionaries $W({\bf\Pi}^0_{k})$ (respectively,
$W({\bf\Si}^0_{k})$) .
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 13:40:29 GMT"
}
] | 2010-09-28T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3318
|
Francisco Claude
|
Francisco Claude, Antonio Farina and Gonzalo Navarro
|
Re-Pair Compression of Inverted Lists
| null | null | null | null |
cs.IR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compression of inverted lists with methods that support fast intersection
operations is an active research topic. Most compression schemes rely on
encoding differences between consecutive positions with techniques that favor
small numbers. In this paper we explore a completely different alternative: We
use Re-Pair compression of those differences. While Re-Pair by itself offers
fast decompression at arbitrary positions in main and secondary memory, we
introduce variants that in addition speed up the operations required for
inverted list intersection. We compare the resulting data structures with
several recent proposals under various list intersection algorithms, to
conclude that our Re-Pair variants offer an interesting time/space tradeoff for
this problem, yet further improvements are required for it to improve upon the
state of the art.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 14:39:36 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Claude",
"Francisco",
""
],
[
"Farina",
"Antonio",
""
],
[
"Navarro",
"Gonzalo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.3343
|
Nicolai Kuntze
|
Nicolai Kuntze, Juergen Repp, Hervais Simo Fhom, Andreas Fuchs,
Ine-Saf Benaissa
|
Final Architecture Specification of security, privacy, and incentive
mechanisms
|
Delieverable of the EU FP7 project Nanodatacenters
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this document, we define the NADA security architecture based on refined
use case scenarios, a derived high level model and security analysis. For the
architecure design and verification we are applying the well known STRIDE
model.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 15:58:10 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Kuntze",
"Nicolai",
""
],
[
"Repp",
"Juergen",
""
],
[
"Fhom",
"Hervais Simo",
""
],
[
"Fuchs",
"Andreas",
""
],
[
"Benaissa",
"Ine-Saf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.3347
|
Hemant Kowshik
|
Hemant Kowshik and P. R. Kumar
|
Optimal strategies for computing symmetric Boolean functions in
collocated networks
|
5 pages, To appear in Proceedings of the IEEE Information Theory
Workshop, Cairo, January 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address the problem of finding optimal strategies for computing Boolean
symmetric functions. We consider a collocated network, where each node's
transmissions can be heard by every other node. Each node has a Boolean
measurement and we wish to compute a given Boolean function of these
measurements with zero error. We allow for block computation to enhance data
fusion efficiency, and determine the minimum worst-case total bits to be
communicated to perform the desired computation. We restrict attention to the
class of symmetric Boolean functions, which only depend on the number of 1s
among the n measurements.
We define three classes of functions, namely threshold functions, delta
functions and interval functions. We provide exactly optimal strategies for the
first two classes, and an order-optimal strategy with optimal preconstant for
interval functions. Using these results, we can characterize the complexity of
computing percentile type functions, which is of great interest. In our
analysis, we use lower bounds from communication complexity theory, and provide
an achievable scheme using information theoretic tools.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 16:56:15 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Kowshik",
"Hemant",
""
],
[
"Kumar",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3349
|
Alyssa A. Goodman
|
Alyssa Goodman
|
Seeing Science
|
4 pages, including 3 figures. To appear in Proceedings of the
International Festival of Scientific Visualization, held in Tokyo, Japan,
March 2009. Publisher will be Universal Academy Press
| null | null | null |
astro-ph.IM cs.CV cs.GR stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to represent scientific data and concepts visually is becoming
increasingly important due to the unprecedented exponential growth of
computational power during the present digital age. The data sets and
simulations scientists in all fields can now create are literally thousands of
times as large as those created just 20 years ago. Historically successful
methods for data visualization can, and should, be applied to today's huge data
sets, but new approaches, also enabled by technology, are needed as well.
Increasingly, "modular craftsmanship" will be applied, as relevant
functionality from the graphically and technically best tools for a job are
combined as-needed, without low-level programming.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 17:01:33 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Goodman",
"Alyssa",
""
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0911.3352
|
Adam Sheffer
|
Micha Sharir, Adam Sheffer
|
Counting Triangulations of Planar Point Sets
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the maximal number of triangulations that a planar set of $n$ points
can have, and show that it is at most $30^n$. This new bound is achieved by a
careful optimization of the charging scheme of Sharir and Welzl (2006), which
has led to the previous best upper bound of $43^n$ for the problem.
Moreover, this new bound is useful for bounding the number of other types of
planar (i.e., crossing-free) straight-line graphs on a given point set.
Specifically, we derive new upper bounds for the number of planar graphs
($o(239.4^n)$), spanning cycles ($O(70.21^n)$), and spanning trees ($160^n$).
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 17:29:19 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Jan 2010 15:16:30 GMT"
}
] | 2010-01-03T00:00:00 |
[
[
"Sharir",
"Micha",
""
],
[
"Sheffer",
"Adam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.3355
|
Zhi Xu
|
Zhi Xu
|
A Minimal Periods Algorithm with Applications
|
14 pages
| null |
10.1007/978-3-642-13509-5_6
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Kosaraju in ``Computation of squares in a string'' briefly described a
linear-time algorithm for computing the minimal squares starting at each
position in a word. Using the same construction of suffix trees, we generalize
his result and describe in detail how to compute in O(k|w|)-time the minimal
k-th power, with period of length larger than s, starting at each position in a
word w for arbitrary exponent $k\geq2$ and integer $s\geq0$. We provide the
complete proof of correctness of the algorithm, which is somehow not completely
clear in Kosaraju's original paper. The algorithm can be used as a sub-routine
to detect certain types of pseudo-patterns in words, which is our original
intention to study the generalization.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 17:34:23 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Xu",
"Zhi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.3357
|
Hemant Kowshik
|
Nikolaos M. Freris, Hemant Kowshik and P. R. Kumar
|
Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks
and Computation
|
10 pages, 3 figures, Submitted to the Proceedings of the IEEE
| null |
10.1109/JPROC.2010.2065790
| null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sensor networks potentially feature large numbers of nodes that can sense
their environment over time, communicate with each other over a wireless
network, and process information. They differ from data networks in that the
network as a whole may be designed for a specific application. We study the
theoretical foundations of such large scale sensor networks, addressing four
fundamental issues- connectivity, capacity, clocks and function computation.
To begin with, a sensor network must be connected so that information can
indeed be exchanged between nodes. The connectivity graph of an ad-hoc network
is modeled as a random graph and the critical range for asymptotic connectivity
is determined, as well as the critical number of neighbors that a node needs to
connect to. Next, given connectivity, we address the issue of how much data can
be transported over the sensor network. We present fundamental bounds on
capacity under several models, as well as architectural implications for how
wireless communication should be organized.
Temporal information is important both for the applications of sensor
networks as well as their operation.We present fundamental bounds on the
synchronizability of clocks in networks, and also present and analyze
algorithms for clock synchronization. Finally we turn to the issue of gathering
relevant information, that sensor networks are designed to do. One needs to
study optimal strategies for in-network aggregation of data, in order to
reliably compute a composite function of sensor measurements, as well as the
complexity of doing so. We address the issue of how such computation can be
performed efficiently in a sensor network and the algorithms for doing so, for
some classes of functions.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 17:50:12 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Freris",
"Nikolaos M.",
""
],
[
"Kowshik",
"Hemant",
""
],
[
"Kumar",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3389
|
Jelani Nelson
|
Ilias Diakonikolas, Daniel M. Kane, Jelani Nelson
|
Bounded Independence Fools Degree-2 Threshold Functions
|
Using v1 numbering: removed Lemma G.5 from the Appendix (it was
wrong). Net effect is that Theorem G.6 reduces the m^6 dependence of Theorem
8.1 to m^4, not m^2
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let x be a random vector coming from any k-wise independent distribution over
{-1,1}^n. For an n-variate degree-2 polynomial p, we prove that E[sgn(p(x))] is
determined up to an additive epsilon for k = poly(1/epsilon). This answers an
open question of Diakonikolas et al. (FOCS 2009). Using standard constructions
of k-wise independent distributions, we obtain a broad class of explicit
generators that epsilon-fool the class of degree-2 threshold functions with
seed length log(n)*poly(1/epsilon).
Our approach is quite robust: it easily extends to yield that the
intersection of any constant number of degree-2 threshold functions is
epsilon-fooled by poly(1/epsilon)-wise independence. Our results also hold if
the entries of x are k-wise independent standard normals, implying for example
that bounded independence derandomizes the Goemans-Williamson hyperplane
rounding scheme.
To achieve our results, we introduce a technique we dub multivariate
FT-mollification, a generalization of the univariate form introduced by Kane et
al. (SODA 2010) in the context of streaming algorithms. Along the way we prove
a generalized hypercontractive inequality for quadratic forms which takes the
operator norm of the associated matrix into account. These techniques may be of
independent interest.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 20:24:27 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2010 17:15:56 GMT"
}
] | 2010-02-18T00:00:00 |
[
[
"Diakonikolas",
"Ilias",
""
],
[
"Kane",
"Daniel M.",
""
],
[
"Nelson",
"Jelani",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3405
|
Axel Legay
|
Florent Bouchy and Alain Finkel and Pierluigi San Pietro
|
Dense-choice Counter Machines revisited
| null |
EPTCS 10, 2009, pp. 3-22
|
10.4204/EPTCS.10.1
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper clarifies the picture about Dense-choice Counter Machines, which
have been less studied than (discrete) Counter Machines. We revisit the
definition of "Dense Counter Machines" so that it now extends (discrete)
Counter Machines, and we provide new undecidability and decidability results.
Using the first-order additive mixed theory of reals and integers, we give a
logical characterization of the sets of configurations reachable by
reversal-bounded Dense-choice Counter Machines.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 23:40:50 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Bouchy",
"Florent",
""
],
[
"Finkel",
"Alain",
""
],
[
"Pietro",
"Pierluigi San",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3411
|
Loet Leydesdorff
|
Loet Leydesdorff and Iina Hellsten
|
Measuring the Meaning of Words in Contexts: An automated analysis of
controversies about Monarch butterflies, Frankenfoods, and stem cells
| null |
Scientometrics 67(2), 2006, 231-258
| null | null |
cs.CL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Co-words have been considered as carriers of meaning across different domains
in studies of science, technology, and society. Words and co-words, however,
obtain meaning in sentences, and sentences obtain meaning in their contexts of
use. At the science/society interface, words can be expected to have different
meanings: the codes of communication that provide meaning to words differ on
the varying sides of the interface. Furthermore, meanings and interfaces may
change over time. Given this structuring of meaning across interfaces and over
time, we distinguish between metaphors and diaphors as reflexive mechanisms
that facilitate the translation between contexts. Our empirical focus is on
three recent scientific controversies: Monarch butterflies, Frankenfoods, and
stem-cell therapies. This study explores new avenues that relate the study of
co-word analysis in context with the sociological quest for the analysis and
processing of meaning.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 22:03:56 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
],
[
"Hellsten",
"Iina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3415
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Can Scientific Journals be Classified in terms of Aggregated
Journal-Journal Citation Relations using the Journal Citation Reports?
| null |
Journal of the American Society for Information Science and
Technology, 57(5) (2006) 601-613
| null | null |
cs.DL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aggregated citation relations among journals included in the Science
Citation Index provide us with a huge matrix which can be analyzed in various
ways. Using principal component analysis or factor analysis, the factor scores
can be used as indicators of the position of the cited journals in the citing
dimensions of the database. Unrotated factor scores are exact, and the
extraction of principal components can be made stepwise since the principal
components are independent. Rotation may be needed for the designation, but in
the rotated solution a model is assumed. This assumption can be legitimated on
pragmatic or theoretical grounds. Since the resulting outcomes remain sensitive
to the assumptions in the model, an unambiguous classification is no longer
possible in this case. However, the factor-analytic solutions allow us to test
classifications against the structures contained in the database. This will be
demonstrated for the delineation of a set of biochemistry journals.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 22:20:18 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3416
|
Loet Leydesdorff
|
Loet Leydesdorff, Stephen Bensman
|
Classification and Powerlaws: The Logarithmic Transformation
| null |
Journal of the American Society for Information Science and
Technology 57(11) (2006) 1470-1486
| null | null |
cs.IR cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Logarithmic transformation of the data has been recommended by the literature
in the case of highly skewed distributions such as those commonly found in
information science. The purpose of the transformation is to make the data
conform to the lognormal law of error for inferential purposes. How does this
transformation affect the analysis? We factor analyze and visualize the
citation environment of the Journal of the American Chemical Society (JACS)
before and after a logarithmic transformation. The transformation strongly
reduces the variance necessary for classificatory purposes and therefore is
counterproductive to the purposes of the descriptive statistics. We recommend
against the logarithmic transformation when sets cannot be defined
unambiguously. The intellectual organization of the sciences is reflected in
the curvilinear parts of the citation distributions, while negative powerlaws
fit excellently to the tails of the distributions.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 22:24:31 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
],
[
"Bensman",
"Stephen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3418
|
Shashank Shekhar
|
Shashank Shekhar, Mohit Soni, NVSN Kalyan Chakravarthy
|
Flare: Architecture for rapid and easy development of Internet-based
Applications
|
4 pages, 5 figures
| null |
10.5120/549-716
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an architecture, Flare, that is a structured and easy way to
develop applications rapidly, in a multitude of languages, which make use of
online storage of data and management of users. The architecture eliminates the
need for server-side programming in most cases, creation and management of
online database storage servers, re-creation of user management schemes and
writing a lot of unnecessary code for accessing different web-based services
using their APIs. A Web API provides a common API for various web-based
services like Blogger [2], Wordpress, MSN Live, Facebook [3] etc. Access
Libraries provided for major programming languages and platforms make it easy
to develop applications using the Flare Web Service. We demonstrate a simple
micro-blogging service developed using these APIs in two modes: a graphical
browser-based mode, and a command-line mode in C++, which provide two different
interfaces to the same account and data.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 22:25:49 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Shekhar",
"Shashank",
""
],
[
"Soni",
"Mohit",
""
],
[
"Chakravarthy",
"NVSN Kalyan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.3422
|
Loet Leydesdorff
|
Loet Leydesdorff and Liwen Vaughan
|
Co-occurrence Matrices and their Applications in Information Science:
Extending ACA to the Web Environment
| null |
Journal of the American Society for Information Science &
Technology 57(12) (2006) 1616-1628
| null | null |
cs.IR cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Co-occurrence matrices, such as co-citation, co-word, and co-link matrices,
have been used widely in the information sciences. However, confusion and
controversy have hindered the proper statistical analysis of this data. The
underlying problem, in our opinion, involved understanding the nature of
various types of matrices. This paper discusses the difference between a
symmetrical co-citation matrix and an asymmetrical citation matrix as well as
the appropriate statistical techniques that can be applied to each of these
matrices, respectively. Similarity measures (like the Pearson correlation
coefficient or the cosine) should not be applied to the symmetrical co-citation
matrix, but can be applied to the asymmetrical citation matrix to derive the
proximity matrix. The argument is illustrated with examples. The study then
extends the application of co-occurrence matrices to the Web environment where
the nature of the available data and thus data collection methods are different
from those of traditional databases such as the Science Citation Index. A set
of data collected with the Google Scholar search engine is analyzed using both
the traditional methods of multivariate analysis and the new visualization
software Pajek that is based on social network analysis and graph theory.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 22:33:53 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
],
[
"Vaughan",
"Liwen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3438
|
Francesco Zamponi
|
T.Jorg, F.Krzakala, G.Semerjian, F.Zamponi
|
First-order transitions and the performance of quantum algorithms in
random optimization problems
|
4 pages, 4 figures; final version accepted on Phys.Rev.Lett
|
Phys. Rev. Lett. 104, 207206 (2010)
|
10.1103/PhysRevLett.104.207206
| null |
cond-mat.dis-nn cond-mat.stat-mech cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a study of the phase diagram of a random optimization problem in
presence of quantum fluctuations. Our main result is the characterization of
the nature of the phase transition, which we find to be a first-order quantum
phase transition. We provide evidence that the gap vanishes exponentially with
the system size at the transition. This indicates that the Quantum Adiabatic
Algorithm requires a time growing exponentially with system size to find the
ground state of this problem.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 23:36:16 GMT"
},
{
"version": "v2",
"created": "Thu, 20 May 2010 21:22:38 GMT"
}
] | 2010-05-24T00:00:00 |
[
[
"Jorg",
"T.",
""
],
[
"Krzakala",
"F.",
""
],
[
"Semerjian",
"G.",
""
],
[
"Zamponi",
"F.",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0911.3440
|
EPTCS
|
Axel Legay (INRIA/Irisa Rennes)
|
Proceedings International Workshop on Verification of Infinite-State
Systems
| null |
EPTCS 10, 2009
|
10.4204/EPTCS.10
| null |
cs.LO cs.DM cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the 11th International Workshop on
Verification of Infinite-State Systems (INFINITY 2009). The workshop was held
in Bologna, Italy on August 31, 2009, as a satellite event to the 20th
International Conference on Concurrency Theory (CONCUR 2009). The aim of the
INFINITY workshop is to provide a forum for researchers interested in the
development of formal methods and algorithmic techniques for the analysis of
systems with infinitely many states, and their application in automated
verification of complex software and hardware systems.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2009 23:46:08 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Legay",
"Axel",
"",
"INRIA/Irisa Rennes"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0911.3456
|
Andreas Kl\"ockner
|
Andreas Kl\"ockner, Nicolas Pinto, Yunsup Lee, Bryan Catanzaro, Paul
Ivanov and Ahmed Fasih
|
PyCUDA and PyOpenCL: A Scripting-Based Approach to GPU Run-Time Code
Generation
|
Submitted to Parallel Computing, Elsevier
| null |
10.1016/j.parco.2011.09.001
| null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High-performance computing has recently seen a surge of interest in
heterogeneous systems, with an emphasis on modern Graphics Processing Units
(GPUs). These devices offer tremendous potential for performance and efficiency
in important large-scale applications of computational science. However,
exploiting this potential can be challenging, as one must adapt to the
specialized and rapidly evolving computing environment currently exhibited by
GPUs. One way of addressing this challenge is to embrace better techniques and
develop tools tailored to their needs. This article presents one simple
technique, GPU run-time code generation (RTCG), along with PyCUDA and PyOpenCL,
two open-source toolkits that support this technique.
In introducing PyCUDA and PyOpenCL, this article proposes the combination of
a dynamic, high-level scripting language with the massive performance of a GPU
as a compelling two-tiered computing platform, potentially offering significant
performance and productivity advantages over conventional single-tier, static
systems. The concept of RTCG is simple and easily implemented using existing,
robust infrastructure. Nonetheless it is powerful enough to support (and
encourage) the creation of custom application-specific tools by its users. The
premise of the paper is illustrated by a wide range of examples where the
technique has been applied with considerable success.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 02:51:14 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Mar 2011 15:36:41 GMT"
}
] | 2012-07-17T00:00:00 |
[
[
"Klöckner",
"Andreas",
""
],
[
"Pinto",
"Nicolas",
""
],
[
"Lee",
"Yunsup",
""
],
[
"Catanzaro",
"Bryan",
""
],
[
"Ivanov",
"Paul",
""
],
[
"Fasih",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.3473
|
Shachar Lovett
|
Ido Ben-Eliezer, Shachar Lovett, Ariel Yadin
|
Polynomial Threshold Functions: Structure, Approximation and
Pseudorandomness
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the computational power of polynomial threshold functions, that is,
threshold functions of real polynomials over the boolean cube. We provide two
new results bounding the computational power of this model.
Our first result shows that low-degree polynomial threshold functions cannot
approximate any function with many influential variables. We provide a couple
of examples where this technique yields tight approximation bounds.
Our second result relates to constructing pseudorandom generators fooling
low-degree polynomial threshold functions. This problem has received attention
recently, where Diakonikolas et al proved that $k$-wise independence suffices
to fool linear threshold functions. We prove that any low-degree polynomial
threshold function, which can be represented as a function of a small number of
linear threshold functions, can also be fooled by $k$-wise independence. We
view this as an important step towards fooling general polynomial threshold
functions, and we discuss a plausible approach achieving this goal based on our
techniques.
Our results combine tools from real approximation theory, hyper-contractive
inequalities and probabilistic methods. In particular, we develop several new
tools in approximation theory which may be of independent interest.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 07:28:08 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Nov 2009 22:31:41 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Nov 2009 20:37:14 GMT"
}
] | 2009-11-29T00:00:00 |
[
[
"Ben-Eliezer",
"Ido",
""
],
[
"Lovett",
"Shachar",
""
],
[
"Yadin",
"Ariel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3482
|
Russell K. Standish
|
Russell K. Standish
|
Complexity of Networks (reprise)
|
Accepted in Complexity
|
Complexity, v 17, 50-61, (2012)
|
10.1002/cplx.20393
| null |
cs.IT math.IT nlin.AO q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network or graph structures are ubiquitous in the study of complex systems.
Often, we are interested in complexity trends of these system as it evolves
under some dynamic. An example might be looking at the complexity of a food web
as species enter an ecosystem via migration or speciation, and leave via
extinction.
In a previous paper, a complexity measure of networks was proposed based on
the {\em complexity is information content} paradigm. To apply this paradigm to
any object, one must fix two things: a representation language, in which
strings of symbols from some alphabet describe, or stand for the objects being
considered; and a means of determining when two such descriptions refer to the
same object. With these two things set, the information content of an object
can be computed in principle from the number of equivalent descriptions
describing a particular object.
The previously proposed representation language had the deficiency that the
fully connected and empty networks were the most complex for a given number of
nodes. A variation of this measure, called zcomplexity, applied a compression
algorithm to the resulting bitstring representation, to solve this problem.
Unfortunately, zcomplexity proved too computationally expensive to be
practical.
In this paper, I propose a new representation language that encodes the
number of links along with the number of nodes and a representation of the
linklist. This, like zcomplexity, exhibits minimal complexity for fully
connected and empty networks, but is as tractable as the original measure.
...
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 09:03:59 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 11:22:40 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Aug 2010 11:29:39 GMT"
},
{
"version": "v4",
"created": "Wed, 19 Jan 2011 03:49:20 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Jul 2011 23:55:09 GMT"
}
] | 2012-01-23T00:00:00 |
[
[
"Standish",
"Russell K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
0911.3492
|
Britta Dorn
|
Nadja Betzler, Britta Dorn
|
Towards a Dichotomy for the Possible Winner Problem in Elections Based
on Scoring Rules
|
minor changes and updates; accepted for publication in JCSS, online
version available.
| null |
10.1016/j.jcss.2010.04.002
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To make a joint decision, agents (or voters) are often required to provide
their preferences as linear orders. To determine a winner, the given linear
orders can be aggregated according to a voting protocol. However, in realistic
settings, the voters may often only provide partial orders. This directly leads
to the Possible Winner problem that asks, given a set of partial votes, whether
a distinguished candidate can still become a winner. In this work, we consider
the computational complexity of Possible Winner for the broad class of voting
protocols defined by scoring rules. A scoring rule provides a score value for
every position which a candidate can have in a linear order. Prominent examples
include plurality, k-approval, and Borda. Generalizing previous NP-hardness
results for some special cases, we settle the computational complexity for all
but one scoring rule. More precisely, for an unbounded number of candidates and
unweighted voters, we show that Possible Winner is NP-complete for all pure
scoring rules except plurality, veto, and the scoring rule defined by the
scoring vector (2,1,...,1,0), while it is solvable in polynomial time for
plurality and veto.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 10:02:39 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Apr 2010 11:36:55 GMT"
}
] | 2010-05-03T00:00:00 |
[
[
"Betzler",
"Nadja",
""
],
[
"Dorn",
"Britta",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3503
|
Bernard Mourrain
|
Mariemi Alonso (UCM), J\'erome Brachat (INRIA Sophia Antipolis),
Bernard Mourrain (INRIA Sophia Antipolis)
|
The Hilbert scheme of points and its link with border basis
| null | null | null | null |
cs.SC math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give new explicit representations of the Hilbert scheme of
$\mu$ points in $\PP^{r}$ as a projective subvariety of a Grassmanniann
variety. This new explicit description of the Hilbert scheme is simpler than
the previous ones and global. It involves equations of degree $2$. We show how
these equations are deduced from the commutation relations characterizing
border bases. Next, we consider infinitesimal perturbations of an input system
of equations on this Hilbert scheme and describe its tangent space. We propose
an effective criterion to test if it is a flat deformation, that is if the
perturbed system remains on the Hilbert scheme of the initial equations. This
criterion involves in particular formal reduction with respect to border bases.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 10:50:19 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Aug 2010 06:32:30 GMT"
}
] | 2010-08-04T00:00:00 |
[
[
"Alonso",
"Mariemi",
"",
"UCM"
],
[
"Brachat",
"Jérome",
"",
"INRIA Sophia Antipolis"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0911.3514
|
Thomas Blumensath
|
Thomas Blumensath
|
Sampling and reconstructing signals from a union of linear subspaces
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note we study the problem of sampling and reconstructing signals
which are assumed to lie on or close to one of several subspaces of a Hilbert
space. Importantly, we here consider a very general setting in which we allow
infinitely many subspaces in infinite dimensional Hilbert spaces. This general
approach allows us to unify many results derived recently in areas such as
compressed sensing, affine rank minimisation and analog compressed sensing.
Our main contribution is to show that a conceptually simple iterative
projection algorithms is able to recover signals from a union of subspaces
whenever the sampling operator satisfies a bi-Lipschitz embedding condition.
Importantly, this result holds for all Hilbert spaces and unions of subspaces,
as long as the sampling procedure satisfies the condition for the set of
subspaces considered. In addition to recent results for finite unions of finite
dimensional subspaces and infinite unions of subspaces in finite dimensional
spaces, we also show that this bi-Lipschitz property can hold in an analog
compressed sensing setting in which we have an infinite union of infinite
dimensional subspaces living in infinite dimensional space.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 11:53:50 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2009 16:45:02 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Blumensath",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3528
|
Bikash Kumar Dey
|
Bikash Kumar Dey and D. Manjunath and Supriyo Chakraborty
|
Estimating Network Link Characteristics using Packet-Pair Dispersion: A
Discrete Time Queueing Theoretic View
|
32 pages, 12 figures, 1 table
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Packet-dispersion based measurement tools insert pairs of probe packets with
a known separation into the network for transmission over a unicast path or a
multicast tree. Samples of the separation between the probe pairs at the
destination(s) are observed. Heuristic techniques are then used by these tools
to estimate the path characteristics from the observations. In this paper we
present a queueing theoretic setting for packet-dispersion based probing.
Analogous to network tomography, we develop techniques to estimate the
parameters of the arrival process to the individual links from the samples of
the output separations, i.e., from the end-to-end measurements. The links are
modeled as independent discrete time queues with i.i.d. arrivals. We first
obtain an algorithm to obtain the (joint) distribution of the separation
between the probes at the destination(s) for a given distribution of the
spacing at the input. The parameter estimates of the arrival process are
obtained as the minimizer of a cost function between the empirical and
calculated distributions. We also carry out extensive simulations and numerical
experiments to study the performance of the estimation algorithm under the
fairly `harsh' conditions of non stationarity of the arrival process. We find
that the estimations work fairly well for two queues in series and for
multicast.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 13:01:54 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Dey",
"Bikash Kumar",
""
],
[
"Manjunath",
"D.",
""
],
[
"Chakraborty",
"Supriyo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.3538
|
Amin Daneshmand Malayeri
|
Amin Daneshmand Malayeri
|
Noise Speech wavelet analyzing in special time ranges
| null | null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Speech analyzing in special periods of time has been presented in this paper.
One of the most important periods in signal processing is near to Zero. By this
paper, we analyze noise speech signals when these signals are near to Zero. Our
strategy is defining some subfunctions and compress histograms when a noise
speech signal is in a special period. It can be so useful for wavelet signal
processing and spoken systems analyzing.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 13:36:20 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Malayeri",
"Amin Daneshmand",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.