id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0911.3558
|
Loet Leydesdorff
|
Lutz Bornmann, Loet Leydesdorff, Peter van den Besselaar
|
A Meta-evaluation of Scientific Research Proposals: Different Ways of
Comparing Rejected to Awarded Applications
| null | null | null | null |
cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Combining different data sets with information on grant and fellowship
applications submitted to two renowned funding agencies, we are able to compare
their funding decisions (award and rejection) with scientometric performance
indicators across two fields of science (life sciences and social sciences).
The data sets involve 671 applications in social sciences and 668 applications
in life sciences. In both fields, awarded applicants perform on average better
than all rejected applicants. If only the most preeminent rejected applicants
are considered in both fields, they score better than the awardees on citation
impact. With regard to productivity we find differences between the fields:
While the awardees in life sciences outperform on average the most preeminent
rejected applicants, the situation is reversed in social sciences.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 14:41:41 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Bornmann",
"Lutz",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Besselaar",
"Peter van den",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3581
|
Pasquale De Meo
|
P. De Meo, A. Garro, G. Terracina and D. Ursino
|
X-Learn: An XML-Based, Multi-agent System for Supporting "User-Device"
Adaptive E-learning
|
18 pages, 5 figures
|
Proceedings of the International Conference on Ontologies,
Databases and Applications of SEmantics (ODBASE 2003), pages 739-756,
Taormina, Italy, 2003. Lecture Notes in Computer Science, Springer
| null | null |
cs.CY cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present X-Learn, an XML-based, multi-agent system for
supporting "user-device" adaptive e-learning. X-Learn is characterized by the
following features: (i) it is highly subjective, since it handles quite a rich
and detailed user profile that plays a key role during the learning activities;
(ii) it is dynamic and flexible, i.e., it is capable of reacting to variations
of exigencies and objectives; (iii) it is device-adaptive, since it decides the
learning objects to present to the user on the basis of the device she/he is
currently exploiting; (iv) it is generic, i.e., it is capable of operating in a
large variety of learning contexts; (v) it is XML based, since it exploits many
facilities of XML technology for handling and exchanging information connected
to e-learning activities. The paper reports also various experimental results
as well as a comparison between X-Learn and other related e-learning management
systems already presented in the literature.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 15:59:42 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"De Meo",
"P.",
""
],
[
"Garro",
"A.",
""
],
[
"Terracina",
"G.",
""
],
[
"Ursino",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.3600
|
Pasquale De Meo
|
P. De Meo, G. Quattrone, G. Terracina, D. Ursino
|
"Almost automatic" and semantic integration of XML Schemas at various
"severity" levels
|
18 pages, 3 Figures, 3 Tables
|
Proc. of the International Conference on Cooperative Information
Systems (CoopIS 2003), pages 4 -21, Taormina, Italy, 2003. Lecture Notes in
Computer Science, Springer
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel approach for the integration of a set of XML
Schemas. The proposed approach is specialized for XML, is almost automatic,
semantic and "light". As a further, original, peculiarity, it is parametric
w.r.t. a "severity" level against which the integration task is performed. The
paper describes the approach in all details, illustrates various theoretical
results, presents the experiments we have performed for testing it and,
finally, compares it with various related approaches already proposed in the
literature.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 16:59:38 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"De Meo",
"P.",
""
],
[
"Quattrone",
"G.",
""
],
[
"Terracina",
"G.",
""
],
[
"Ursino",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0911.3633
|
Benjamin Rubinstein
|
Benjamin I. P. Rubinstein and J. Hyam Rubinstein
|
A Geometric Approach to Sample Compression
|
37 pages, 18 figures, submitted to the Journal of Machine Learning
Research
| null | null | null |
cs.LG math.CO math.GT stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Sample Compression Conjecture of Littlestone & Warmuth has remained
unsolved for over two decades. This paper presents a systematic geometric
investigation of the compression of finite maximum concept classes. Simple
arrangements of hyperplanes in Hyperbolic space, and Piecewise-Linear
hyperplane arrangements, are shown to represent maximum classes, generalizing
the corresponding Euclidean result. A main result is that PL arrangements can
be swept by a moving hyperplane to unlabeled d-compress any finite maximum
class, forming a peeling scheme as conjectured by Kuzmin & Warmuth. A corollary
is that some d-maximal classes cannot be embedded into any maximum class of VC
dimension d+k, for any constant k. The construction of the PL sweeping involves
Pachner moves on the one-inclusion graph, corresponding to moves of a
hyperplane across the intersection of d other hyperplanes. This extends the
well known Pachner moves for triangulations to cubical complexes.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 19:22:09 GMT"
}
] | 2014-02-04T00:00:00 |
[
[
"Rubinstein",
"Benjamin I. P.",
""
],
[
"Rubinstein",
"J. Hyam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0911.3641
|
Loet Leydesdorff
|
Rob Goldstone, Loet Leydesdorff
|
The Import and Export of Cognitive Science
| null |
Cognitive Science 30(6) (2006), 983-993
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From its inception, a large part of the motivation for Cognitive Science has
been the need for an interdisciplinary journal for the study of minds and
intelligent systems. One threat to the interdisciplinarity of Cognitive
Science, both the field and journal, is that it may become, or already be, too
dominated by psychologists. In 2005, psychology was a keyword for 51% of
submissions, followed distantly by linguistics (17%), artificial intelligence
(13%), neuroscience (10%), computer science (9%), and philosophy (8%). The
Institute for Scientific Information (ISI) gathers data not only on how
individual articles cite one another, but also on macroscopic citation patterns
among journals. Journals or sets of journals can be considered as proxies for
fields. As fields become established, they often create journals. By studying
the patterns of citations among journals that cite and are cited by Cognitive
Science, we can better: 1) appreciate the scholarly ecology surrounding the
journal and the journals role within this ecology, 2) establish competitor and
alternate journals, and 3) determine the natural clustering of fields related
to cognitive science.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 20:00:02 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Goldstone",
"Rob",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3643
|
Loet Leydesdorff
|
Iina Hellsten, Loet Leydesdorff, Paul Wouters
|
Multiple Presents: How Search Engines Re-write the Past
| null |
New Media & Society, 8(6) (2006), 901-924
| null | null |
cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet search engines function in a present which changes continuously. The
search engines update their indices regularly, overwriting Web pages with newer
ones, adding new pages to the index, and losing older ones. Some search engines
can be used to search for information at the internet for specific periods of
time. However, these 'date stamps' are not determined by the first occurrence
of the pages in the Web, but by the last date at which a page was updated or a
new page was added, and the search engine's crawler updated this change in the
database. This has major implications for the use of search engines in
scholarly research as well as theoretical implications for the conceptions of
time and temporality. We examine the interplay between the different updating
frequencies by using AltaVista and Google for searches at different moments of
time. Both the retrieval of the results and the structure of the retrieved
information erodes over time.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 20:05:51 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Hellsten",
"Iina",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Wouters",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3644
|
Iza Marfisi-Schottman
|
Franck Tarpin Bernard (LIESP), Iza Marfisi-Schottman (LIESP), Halima
Habieb-Mammar (ICTT)
|
AnAmeter: The First Steps to Evaluating Adaptation
| null |
Sixth Workshop on User-Centred Design and Evaluation of Adaptive
Systems, UMAP09 User Modeling, Adaptation, and Personalization, Trento :
Italy (2009)
| null | null |
cs.HC cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the online AnAmeter framework that helps characterize the
different types of adaptations a system features by helping the evaluator fill
in a simple form. The provided information is then processed to obtain a
quantitative evaluation of three parameters called global, semi-global and
local adaptation degrees. By characterizing and quantifying adaptation,
AnAmeter provides the first steps towards the evaluation of the quality of a
system's adaptation. AnAmeter is an open tool available as freeware on the web
and has been applied to a selection of well known systems. To build this
evaluation grid we also collected a number of systems that cover the full range
of adaptation types.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 20:08:34 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Bernard",
"Franck Tarpin",
"",
"LIESP"
],
[
"Marfisi-Schottman",
"Iza",
"",
"LIESP"
],
[
"Habieb-Mammar",
"Halima",
"",
"ICTT"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.3668
|
Mark McDonnell
|
Mark D. McDonnell and Adrian P. Flitney
|
Signal acquisition via polarization modulation in single photon sources
|
7 pages, 2 figures, accepted by Physical Review E. This version adds
a reference
|
Physical Review E 80, 060102(R) (2009)
|
10.1103/PhysRevE.80.060102
| null |
quant-ph cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple model system is introduced for demonstrating how a single photon
source might be used to transduce classical analog information. The theoretical
scheme results in measurements of analog source samples that are (i) quantized
in the sense of analog-to-digital conversion and (ii) corrupted by random noise
that is solely due to the quantum uncertainty in detecting the polarization
state of each photon. This noise is unavoidable if more than one bit per sample
is to be transmitted, and we show how it may be exploited in a manner inspired
by suprathreshold stochastic resonance. The system is analyzed information
theoretically, as it can be modeled as a noisy optical communication channel,
although unlike classical Poisson channels, the detector's photon statistics
are binomial. Previous results on binomial channels are adapted to demonstrate
numerically that the classical information capacity, and thus the accuracy of
the transduction, increases logarithmically with the square root of the number
of photons, N. Although the capacity is shown to be reduced when an additional
detector nonideality is present, the logarithmic increase with N remains.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 22:05:28 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2009 04:01:19 GMT"
}
] | 2016-09-26T00:00:00 |
[
[
"McDonnell",
"Mark D.",
""
],
[
"Flitney",
"Adrian P.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3672
|
Jan Cie\'sli\'nski L.
|
Jan L. Cieslinski
|
On the exact discretization of the classical harmonic oscillator
equation
|
29 pages
|
Journal of Difference Equations and Applications 17(11) (2011)
1673-1694
|
10.1080/10236191003730563
| null |
math-ph cs.NA math.MP nlin.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the exact discretization of the classical harmonic oscillator
equation (including the inhomogeneous case and multidimensional
generalizations) with a special stress on the energy integral. We present and
suggest some numerical applications.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 22:58:51 GMT"
}
] | 2023-03-20T00:00:00 |
[
[
"Cieslinski",
"Jan L.",
""
]
] |
[
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
}
] |
0911.3674
|
Sebastian Maneth
|
Omer Gim\'enez, Guillem Godoy, Sebastian Maneth
|
Deciding Regularity of the Set of Instances of a Set of Terms with
Regular Constraints is EXPTIME-Complete
| null | null | null | null |
cs.SC cs.CC cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finite-state tree automata are a well studied formalism for representing term
languages. This paper studies the problem of determining the regularity of the
set of instances of a finite set of terms with variables, where each variable
is restricted to instantiations of a regular set given by a tree automaton. The
problem was recently proved decidable, but with an unknown complexity. Here,
the exact complexity of the problem is determined by proving
EXPTIME-completeness. The main contribution is a new, exponential time
algorithm that performs various exponential transformations on the involved
terms and tree automata, and decides regularity by analyzing formulas over
inequality and height predicates.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 23:02:12 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Giménez",
"Omer",
""
],
[
"Godoy",
"Guillem",
""
],
[
"Maneth",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.3676
|
Gerhard Kramer
|
Gerhard Kramer
|
Pipelined Encoding for Deterministic and Noisy Relay Networks
|
6 pages, 2 figures, 1 table; Presented at the 2009 Workshop on
Network Coding, Theory, and Applications, EPFL, Lausanne, Switzerland, June
15-16, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent coding strategies for deterministic and noisy relay networks are
related to the pipelining of block Markov encoding. For deterministic networks,
it is shown that pipelined encoding improves encoding delay, as opposed to
end-to-end delay. For noisy networks, it is observed that decode-and-forward
exhibits good rate scaling when the signal-to-noise ratio (SNR) increases.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2009 23:21:06 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Kramer",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3708
|
Toby Walsh
|
Toby Walsh
|
Manipulability of Single Transferable Vote
|
Proceedings of the CARE'09 International Workshop on Collaborative
Agents -- REsearch and Development, Melbourne 2009
| null | null | null |
cs.AI cs.CC cs.GT cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For many voting rules, it is NP-hard to compute a successful manipulation.
However, NP-hardness only bounds the worst-case complexity. Recent theoretical
results suggest that manipulation may often be easy in practice. We study
empirically the cost of manipulating the single transferable vote (STV) rule.
This was one of the first rules shown to be NP-hard to manipulate. It also
appears to be one of the harder rules to manipulate since it involves multiple
rounds and since, unlike many other rules, it is NP-hard for a single agent to
manipulate without weights on the votes or uncertainty about how the other
agents have voted. In almost every election in our experiments, it was easy to
compute how a single agent could manipulate the election or to prove that
manipulation by a single agent was impossible. It remains an interesting open
question if manipulation by a coalition of agents is hard to compute in
practice.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 06:23:55 GMT"
}
] | 2012-04-18T00:00:00 |
[
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.3717
|
Vir Dhar
|
V.K.Dhar, A.K.Tickoo, S.K.Kaul, R.Koul, B.P.Dubey
|
Artificial Neural Network-based error compensation procedure for
low-cost encoders
|
16 pages, 4 figures. Accepted for Publication in Measurement Science
and Technology (MST)
| null |
10.1088/0957-0233/21/1/015112
| null |
cs.NE astro-ph.IM physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An Artificial Neural Network-based error compensation method is proposed for
improving the accuracy of resolver-based 16-bit encoders by compensating for
their respective systematic error profiles. The error compensation procedure,
for a particular encoder, involves obtaining its error profile by calibrating
it on a precision rotary table, training the neural network by using a part of
this data and then determining the corrected encoder angle by subtracting the
ANN-predicted error from the measured value of the encoder angle. Since it is
not guaranteed that all the resolvers will have exactly similar error profiles
because of the inherent differences in their construction on a micro scale, the
ANN has been trained on one error profile at a time and the corresponding
weight file is then used only for compensating the systematic error of this
particular encoder. The systematic nature of the error profile for each of the
encoders has also been validated by repeated calibration of the encoders over a
period of time and it was found that the error profiles of a particular encoder
recorded at different epochs show near reproducible behavior. The ANN-based
error compensation procedure has been implemented for 4 encoders by training
the ANN with their respective error profiles and the results indicate that the
accuracy of encoders can be improved by nearly an order of magnitude from
quoted values of ~6 arc-min to ~0.65 arc-min when their corresponding
ANN-generated weight files are used for determining the corrected encoder
angle.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 07:51:03 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Dhar",
"V. K.",
""
],
[
"Tickoo",
"A. K.",
""
],
[
"Kaul",
"S. K.",
""
],
[
"Koul",
"R.",
""
],
[
"Dubey",
"B. P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0911.3723
|
Tobias Kretz
|
Tobias Kretz
|
Applications of the Dynamic Distance Potential Field Method
|
Accepted as contribution to "Traffic and Granular Flow 09"
proceedings. This is a slightly extended version
| null | null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently the dynamic distance potential field (DDPF) was introduced as a
computationally efficient method to make agents in a simulation of pedestrians
move rather on the quickest path than the shortest. It can be considered to be
an estimated-remaining-journey-time-based one-shot dynamic assignment method
for pedestrian route choice on the operational level of dynamics. In this
contribution the method is shortly introduced and the effect of the method on
RiMEA's test case 11 is investigated.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 08:38:30 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Kretz",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.3753
|
Ronald Hochreiter
|
Ronald Hochreiter, David Wozabal
|
Evolutionary estimation of a Coupled Markov Chain credit risk model
| null |
Studies in Computational Intelligence 293: 31-44. 2010
|
10.1007/978-3-642-13950-5_3
| null |
cs.NE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There exists a range of different models for estimating and simulating credit
risk transitions to optimally manage credit risk portfolios and products. In
this chapter we present a Coupled Markov Chain approach to model rating
transitions and thereby default probabilities of companies. As the likelihood
of the model turns out to be a non-convex function of the parameters to be
estimated, we apply heuristics to find the ML estimators. To this extent, we
outline the model and its likelihood function, and present both a Particle
Swarm Optimization algorithm, as well as an Evolutionary Optimization algorithm
to maximize the likelihood function. Numerical results are shown which suggest
a further application of evolutionary optimization techniques for credit risk
management.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 10:43:16 GMT"
}
] | 2014-01-21T00:00:00 |
[
[
"Hochreiter",
"Ronald",
""
],
[
"Wozabal",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0911.3784
|
Lucas Cordeiro Carvalho
|
Lucas Cordeiro, Bernd Fischer, and Joao Marques-Silva
|
Continuous Verification of Large Embedded Software using SMT-Based
Bounded Model Checking
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The complexity of software in embedded systems has increased significantly
over the last years so that software verification now plays an important role
in ensuring the overall product quality. In this context, SAT-based bounded
model checking has been successfully applied to discover subtle errors, but for
larger applications, it often suffers from the state space explosion problem.
This paper describes a new approach called continuous verification to detect
design errors as quickly as possible by looking at the Software Configuration
Management (SCM) system and by combining dynamic and static verification to
reduce the state space to be explored. We also give a set of encodings that
provide accurate support for program verification and use different background
theories in order to improve scalability and precision in a completely
automatic way. A case study from the telecommunications domain shows that the
proposed approach improves the error-detection capability and reduces the
overall verification time by up to 50%.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 12:48:54 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Cordeiro",
"Lucas",
""
],
[
"Fischer",
"Bernd",
""
],
[
"Marques-Silva",
"Joao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.3786
|
Frederic Prost
|
Dominique Duval (LJK), Rachid Echahed (LIG), Fr\'ed\'eric Prost (LIG)
|
Graph rewriting with polarized cloning
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We tackle the problem of graph transformation with a particular focus on node
cloning. We propose a new approach to graph rewriting where nodes can be cloned
zero, one or more times. A node can be cloned together with all its incident
edges, with only its outgoing edges, with only its incoming edges or with none
of its incident edges. We thus subsume previous works such as the
sesqui-pushout, the heterogeneous pushout and the adaptive star grammars
approaches. A rewrite rule is defined as a span where the right-hand and
left-hand sides are graphs while the interface is a polarized graph. A
polarized graph is a graph endowed with some annotations on nodes. The way a
node is cloned is indicated by its polarization annotation. We use these
annotations for designing graph transformation with polarized cloning. We show
how a clone of a node can be built according to the different possible
polarizations and define a rewrite step as a final pullback complement followed
by a pushout. This is called the polarized sesqui-pushout approach. We also
provide an algorithmic presentation of the proposed graph transformation with
polarized cloning.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 12:54:50 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jan 2010 09:36:22 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Apr 2012 07:11:36 GMT"
}
] | 2012-04-25T00:00:00 |
[
[
"Duval",
"Dominique",
"",
"LJK"
],
[
"Echahed",
"Rachid",
"",
"LIG"
],
[
"Prost",
"Frédéric",
"",
"LIG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3799
|
Bastian Laubner
|
Bastian Laubner
|
Capturing Polynomial Time on Interval Graphs
|
17 pages
|
Laubner, B.: Capturing polynomial time on interval graphs. In LICS
2010, pp. 199-208. 2010
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove a characterization of all polynomial-time computable queries on the
class of interval graphs by sentences of fixed-point logic with counting. More
precisely, it is shown that on the class of unordered interval graphs, any
query is polynomial-time computable if and only if it is definable in
fixed-point logic with counting. This result is one of the first establishing
the capturing of polynomial time on a graph class which is defined by forbidden
induced subgraphs. For this, we define a canonical form of interval graphs
using a type of modular decomposition, which is different from the method of
tree decomposition that is used in most known capturing results for other graph
classes, specifically those defined by forbidden minors. The method might also
be of independent interest for its conceptual simplicity. Furthermore, it is
shown that fixed-point logic with counting is not expressive enough to capture
polynomial time on the classes of chordal graphs or incomparability graphs.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 14:29:45 GMT"
},
{
"version": "v2",
"created": "Tue, 4 May 2010 12:17:54 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jan 2011 15:44:34 GMT"
}
] | 2011-01-14T00:00:00 |
[
[
"Laubner",
"Bastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.3823
|
Leonardo Ermann
|
Leonardo Ermann, Dima D.L. Shepelyansky
|
Google matrix and Ulam networks of intermittency maps
|
7 pages, 14 figures, research done at Quantware
http://www.quantware.ups-tlse.fr/
|
PhysRev E. 81, 03622 (2010)
|
10.1103/PhysRevE.81.036221
| null |
cs.IR cond-mat.dis-nn nlin.AO nlin.CD physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the properties of the Google matrix of an Ulam network generated by
intermittency maps. This network is created by the Ulam method which gives a
matrix approximant for the Perron-Frobenius operator of dynamical map. The
spectral properties of eigenvalues and eigenvectors of this matrix are
analyzed. We show that the PageRank of the system is characterized by a power
law decay with the exponent $\beta$ dependent on map parameters and the Google
damping factor $\alpha$. Under certain conditions the PageRank is completely
delocalized so that the Google search in such a situation becomes inefficient.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 15:24:51 GMT"
}
] | 2010-05-12T00:00:00 |
[
[
"Ermann",
"Leonardo",
""
],
[
"Shepelyansky",
"Dima D. L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3836
|
Edwin James Beggs
|
E. J. Beggs, J. F. Costa, J. V. Tucker
|
Limits to measurement in experiments governed by algorithms
|
32 pages approx
| null | null | null |
math.LO cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We pose the following question: If a physical experiment were to be
completely controlled by an algorithm, what effect would the algorithm have on
the physical measurements made possible by the experiment?
In a programme to study the nature of computation possible by physical
systems, and by algorithms coupled with physical systems, we have begun to
analyse (i) the algorithmic nature of experimental procedures, and (ii) the
idea of using a physical experiment as an oracle to Turing Machines. To answer
the question, we will extend our theory of experimental oracles in order to use
Turing machines to model the experimental procedures that govern the conduct of
physical experiments. First, we specify an experiment that measures mass via
collisions in Newtonian Dynamics; we examine its properties in preparation for
its use as an oracle. We start to classify the computational power of
polynomial time Turing machines with this experimental oracle using non-uniform
complexity classes. Second, we show that modelling an experimenter and
experimental procedure algorithmically imposes a limit on what can be measured
with equipment. Indeed, the theorems suggest a new form of uncertainty
principle for our knowledge of physical quantities measured in simple physical
experiments. We argue that the results established here are representative of a
huge class of experiments.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 16:24:11 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Beggs",
"E. J.",
""
],
[
"Costa",
"J. F.",
""
],
[
"Tucker",
"J. V.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.3842
|
Luciano da Fontoura Costa
|
Debora C. Correa, Jose H. Saito and Luciano da F. Costa
|
Musical Genres: Beating to the Rhythms of Different Drums
|
35 pages, 13 figures, 13 tables
| null |
10.1088/1367-2630/12/5/053030
| null |
physics.data-an cs.IR cs.SD physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online music databases have increased signicantly as a consequence of the
rapid growth of the Internet and digital audio, requiring the development of
faster and more efficient tools for music content analysis. Musical genres are
widely used to organize music collections. In this paper, the problem of
automatic music genre classification is addressed by exploring rhythm-based
features obtained from a respective complex network representation. A Markov
model is build in order to analyse the temporal sequence of rhythmic notation
events. Feature analysis is performed by using two multivariate statistical
approaches: principal component analysis(unsupervised) and linear discriminant
analysis (supervised). Similarly, two classifiers are applied in order to
identify the category of rhythms: parametric Bayesian classifier under gaussian
hypothesis (supervised), and agglomerative hierarchical clustering
(unsupervised). Qualitative results obtained by Kappa coefficient and the
obtained clusters corroborated the effectiveness of the proposed method.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 20:29:04 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Correa",
"Debora C.",
""
],
[
"Saito",
"Jose H.",
""
],
[
"Costa",
"Luciano da F.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.3856
|
Jorg Liebeherr
|
Jorg Liebeherr, Almut Burchard, Florin Ciucu
|
Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic
|
29 pages
|
IEEE Transactions on Information Theory 58 (2), 1010-1024, 2012
|
10.1109/TIT.2011.2173713
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide upper bounds on the end-to-end backlog and delay in a network with
heavy-tailed and self-similar traffic. The analysis follows a network calculus
approach where traffic is characterized by envelope functions and service is
described by service curves. A key contribution of this paper is the derivation
of a probabilistic sample path bound for heavy-tailed self-similar arrival
processes, which is enabled by a suitable envelope characterization, referred
to as `htss envelope'. We derive a heavy-tailed service curve for an entire
network path when the service at each node on the path is characterized by
heavy-tailed service curves. We obtain backlog and delay bounds for traffic
that is characterized by an htss envelope and receives service given by a
heavy-tailed service curve. The derived performance bounds are non-asymptotic
in that they do not assume a steady-state, large buffer, or many sources
regime. We also explore the scale of growth of delays as a function of the
length of the path. The appendix contains an analysis for self-similar traffic
with a Gaussian tail distribution.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 19:27:50 GMT"
}
] | 2013-12-30T00:00:00 |
[
[
"Liebeherr",
"Jorg",
""
],
[
"Burchard",
"Almut",
""
],
[
"Ciucu",
"Florin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.3872
|
Mukul Agarwal
|
Mukul Agarwal, Anant Sahai, Sanjoy Mitter
|
Equivalence perspectives in communication, source-channel connections
and universal source-channel separation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An operational perspective is used to understand the relationship between
source and channel coding. This is based on a direct reduction of one problem
to another that uses random coding (and hence common randomness) but unlike all
prior work, does not involve any functional computations, in particular, no
mutual-information computations. This result is then used to prove a universal
source-channel separation theorem in the rate-distortion context where
universality is in the sense of a compound ``general channel.''
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 19:08:41 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Agarwal",
"Mukul",
""
],
[
"Sahai",
"Anant",
""
],
[
"Mitter",
"Sanjoy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3921
|
Sergey Loyka
|
Sergey Loyka, Victoria Kostina, Francois Gagnon
|
Error Rates of the Maximum-Likelihood Detector for Arbitrary
Constellations: Convex/Concave Behavior and Applications
|
accepted by IEEE IT Transactions
|
IEEE Transactions on Information Theory, v. 56, N. 4, pp.
1948-1960, Apr. 2010
|
10.1109/TIT.2010.2040965
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by a recent surge of interest in convex optimization techniques,
convexity/concavity properties of error rates of the maximum likelihood
detector operating in the AWGN channel are studied and extended to
frequency-flat slow-fading channels. Generic conditions are identified under
which the symbol error rate (SER) is convex/concave for arbitrary
multi-dimensional constellations. In particular, the SER is convex in SNR for
any one- and two-dimensional constellation, and also in higher dimensions at
high SNR. Pairwise error probability and bit error rate are shown to be convex
at high SNR, for arbitrary constellations and bit mapping. Universal bounds for
the SER 1st and 2nd derivatives are obtained, which hold for arbitrary
constellations and are tight for some of them. Applications of the results are
discussed, which include optimum power allocation in spatial multiplexing
systems, optimum power/time sharing to decrease or increase (jamming problem)
error rate, an implication for fading channels ("fading is never good in low
dimensions") and optimization of a unitary-precoded OFDM system. For example,
the error rate bounds of a unitary-precoded OFDM system with QPSK modulation,
which reveal the best and worst precoding, are extended to arbitrary
constellations, which may also include coding. The reported results also apply
to the interference channel under Gaussian approximation, to the bit error rate
when it can be expressed or approximated as a non-negative linear combination
of individual symbol error rates, and to coded systems.
|
[
{
"version": "v1",
"created": "Thu, 19 Nov 2009 22:13:51 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Loyka",
"Sergey",
""
],
[
"Kostina",
"Victoria",
""
],
[
"Gagnon",
"Francois",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.3944
|
Patrick J. Wolfe
|
Christopher M. White, Sanjeev P. Khudanpur, and Patrick J. Wolfe
|
Likelihood-based semi-supervised model selection with applications to
speech processing
|
11 pages, 2 figures; submitted for publication
|
IEEE Journal of Selected Topics in Signal Processing, vol. 4, pp.
1016-1026, 2010
|
10.1109/JSTSP.2010.2076050
| null |
stat.ML cs.CL cs.LG stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In conventional supervised pattern recognition tasks, model selection is
typically accomplished by minimizing the classification error rate on a set of
so-called development data, subject to ground-truth labeling by human experts
or some other means. In the context of speech processing systems and other
large-scale practical applications, however, such labeled development data are
typically costly and difficult to obtain. This article proposes an alternative
semi-supervised framework for likelihood-based model selection that leverages
unlabeled data by using trained classifiers representing each model to
automatically generate putative labels. The errors that result from this
automatic labeling are shown to be amenable to results from robust statistics,
which in turn provide for minimax-optimal censored likelihood ratio tests that
recover the nonparametric sign test as a limiting case. This approach is then
validated experimentally using a state-of-the-art automatic speech recognition
system to select between candidate word pronunciations using unlabeled speech
data that only potentially contain instances of the words under test. Results
provide supporting evidence for the utility of this approach, and suggest that
it may also find use in other applications of machine learning.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 01:30:36 GMT"
}
] | 2011-08-25T00:00:00 |
[
[
"White",
"Christopher M.",
""
],
[
"Khudanpur",
"Sanjeev P.",
""
],
[
"Wolfe",
"Patrick J.",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0911.3945
|
Xiaoming Zhang
|
Xiao Ming Zhang
|
A Semantic Grid Oriented to E-Tourism
|
12 PAGES, 7 Figures
|
Xiao Ming Zhang, A Semantic Grid Oriented to E-Tourism, In:
CloudCom 2009, LNCS 5931, pp. 485-496, 2009, M.G. Jaatun, G. Zhao, and C.
Rong (Eds.), Springer-Verlag Berlin Heidelberg 2009
|
10.1007/978-3-642-10665-1_44
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With increasing complexity of tourism business models and tasks, there is a
clear need of the next generation e-Tourism infrastructure to support flexible
automation, integration, computation, storage, and collaboration. Currently
several enabling technologies such as semantic Web, Web service, agent and grid
computing have been applied in the different e-Tourism applications, however
there is no a unified framework to be able to integrate all of them. So this
paper presents a promising e-Tourism framework based on emerging semantic grid,
in which a number of key design issues are discussed including architecture,
ontologies structure, semantic reconciliation, service and resource discovery,
role based authorization and intelligent agent. The paper finally provides the
implementation of the framework.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 01:51:30 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Zhang",
"Xiao Ming",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.3950
|
Hariharan Narayanan
|
Hariharan Narayanan
|
Randomized Interior Point methods for Sampling and Optimization
| null | null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a Markov chain (Dikin walk) for sampling from a convex body
equipped with a self-concordant barrier, whose mixing time from a "central
point" is strongly polynomial in the description of the convex set. The mixing
time of this chain is invariant under affine transformations of the convex set,
thus eliminating the need for first placing the body in an isotropic position.
This recovers and extends previous results of from polytopes to more general
convex sets. On every convex set of dimension $n$, there exists a
self-concordant barrier whose "complexity" is polynomially bounded.
Consequently, a rapidly mixing Markov chain of the kind we describe can be
defined on any convex set. We use these results to design an algorithm
consisting of a single random walk for optimizing a linear function on a convex
set. We show that this random walk reaches an approximately optimal point in
polynomial time with high probability and that the corresponding objective
values converge with probability 1 to the optimal objective value as the number
of steps tends to infinity. One technical contribution is a family of lower
bounds for the isoperimetric constants of (weighted) Riemannian manifolds on
which, interior point methods perform a kind of steepest descent. Using results
of Barthe \cite{barthe} and Bobkov and Houdr\'e, on the isoperimetry of
products of (weighted) Riemannian manifolds, we obtain sharper upper bounds on
the mixing time of Dikin walk on products of convex sets than the bounds
obtained from a direct application of the Localization Lemma, on which, since
(Lov\'asz and Simonovits), the analyses of all random walks on convex sets have
relied.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 02:46:03 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Apr 2010 22:56:34 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Aug 2015 13:26:54 GMT"
},
{
"version": "v4",
"created": "Sun, 15 Nov 2015 21:48:56 GMT"
}
] | 2015-11-17T00:00:00 |
[
[
"Narayanan",
"Hariharan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.3961
|
Yohan Payan
|
Olivier Chenu (TIMC), Nicolas Vuillerme (TIMC), Jacques Demongeot
(TIMC), Yohan Payan (TIMC)
|
A wireless lingual feedback device to reduce overpressures in seated
posture: a feasibility study
| null |
PLoS ONE 4, 10 (2009) e7550
|
10.1371/journal.pone.0007550
| null |
physics.med-ph cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BACKGROUND: Pressure sores are localized injuries to the skin and underlying
tissues and are mainly resulting from overpressure. Paraplegic peoples are
particularly subjects to pressure sores because of long-time seated postures
and sensory deprivation at the lower limbs. METHODOLOGY/PRINCIPAL FINDINGS:
Here we report outcomes of a feasibility trial involving a biofeedback system
aimed at reducing buttock overpressure whilst an individual is seated. The
system consists of (1) pressure sensors, (2) a laptop coupling sensors and
actuator (3) a wireless Tongue Display Unit (TDU) consisting of a circuit
embedded in a dental retainer with electrodes put in contact with the tongue.
The principle consists in (1) detecting overpressures in people who are seated
over long periods of time, (2) estimating a postural change that could reduce
these overpressures and (3) communicating this change through directional
information transmitted by the TDU. Twenty-four healthy subjects voluntarily
participated in this study. CONCLUSIONS/SIGNIFICANCE: The findings suggest
that, in this trial, subjects were able to use a tongue tactile feedback system
to reduce buttock overpressure while seated. Further evaluation of this system
on paraplegic subjects remains to be done.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 04:33:07 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Chenu",
"Olivier",
"",
"TIMC"
],
[
"Vuillerme",
"Nicolas",
"",
"TIMC"
],
[
"Demongeot",
"Jacques",
"",
"TIMC"
],
[
"Payan",
"Yohan",
"",
"TIMC"
]
] |
[
{
"class": "Physics",
"code": "physics.med-ph",
"description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.",
"span": "(Medical Physics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.3979
|
Daniel Gayo Avello
|
Daniel Gayo-Avello, David J. Brenes
|
Making the road by searching - A search engine based on Swarm
Information Foraging
| null | null | null | null |
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Search engines are nowadays one of the most important entry points for
Internet users and a central tool to solve most of their information needs.
Still, there exist a substantial amount of users' searches which obtain
unsatisfactory results. Needless to say, several lines of research aim to
increase the relevancy of the results users retrieve. In this paper the authors
frame this problem within the much broader (and older) one of information
overload. They argue that users' dissatisfaction with search engines is a
currently common manifestation of such a problem, and propose a different angle
from which to tackle with it. As it will be discussed, their approach shares
goals with a current hot research topic (namely, learning to rank for
information retrieval) but, unlike the techniques commonly applied in that
field, their technique cannot be exactly considered machine learning and,
additionally, it can be used to change the search engine's response in
real-time, driven by the users behavior. Their proposal adapts concepts from
Swarm Intelligence (in particular, Ant Algorithms) from an Information Foraging
point of view. It will be shown that the technique is not only feasible, but
also an elegant solution to the stated problem; what's more, it achieves
promising results, both increasing the performance of a major search engine for
informational queries, and substantially reducing the time users require to
answer complex information needs.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 20:57:33 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Gayo-Avello",
"Daniel",
""
],
[
"Brenes",
"David J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.3992
|
Eitan Yaakobi
|
Anxiao (Andrew) Jiang, Robert Mateescu, Eitan Yaakobi, Jehoshua Bruck,
Paul H. Siegel, Alexander Vardy, Jack K. Wolf
|
Storage Coding for Wear Leveling in Flash Memories
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Flash memory is a non-volatile computer memory comprised of blocks of cells,
wherein each cell is implemented as either NAND or NOR floating gate. NAND
flash is currently the most widely used type of flash memory. In a NAND flash
memory, every block of cells consists of numerous pages; rewriting even a
single page requires the whole block to be erased and reprogrammed. Block
erasures determine both the longevity and the efficiency of a flash memory.
Therefore, when data in a NAND flash memory are reorganized, minimizing the
total number of block erasures required to achieve the desired data movement is
an important goal. This leads to the flash data movement problem studied in
this paper. We show that coding can significantly reduce the number of block
erasures required for data movement, and present several optimal or nearly
optimal data-movement algorithms based upon ideas from coding theory and
combinatorics. In particular, we show that the sorting-based (non-coding)
schemes require at least O(nlogn) erasures to move data among n blocks, whereas
coding-based schemes require only O(n) erasures. Furthermore, coding-based
schemes use only one auxiliary block, which is the best possible, and achieve a
good balance between the number of erasures in each of the n+1 blocks.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 09:01:26 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Anxiao",
"",
"",
"Andrew"
],
[
"Jiang",
"",
""
],
[
"Mateescu",
"Robert",
""
],
[
"Yaakobi",
"Eitan",
""
],
[
"Bruck",
"Jehoshua",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Vardy",
"Alexander",
""
],
[
"Wolf",
"Jack K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4033
|
Anas Abou El Kalam
|
Mahmoud Mostafa (IRIT), Anas Abou El Kalam (IRIT), Christian Fraboul
(IRIT)
|
Extending Firewall Session Table to Accelerate NAT, QoS Classification
and Routing
| null |
19th International Conference on Computer Theory and Applications
(ICCTA 2009), Alexandria : Egypt (2009)
| null | null |
cs.CR cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
security and QoS are the two most precious objectives for network systems to
be attained. Unfortunately, they are in conflict, while QoS tries to minimize
processing delay, strong security protection requires more processing time and
cause packet delay. This article is a step towards resolving this conflict by
extending the firewall session table to accelerate NAT, QoS classification, and
routing processing time while providing the same level of security protection.
Index Terms ? stateful packet filtering; firewall; session/state table; QoS;
NAT; Routing.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 12:56:49 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Mostafa",
"Mahmoud",
"",
"IRIT"
],
[
"Kalam",
"Anas Abou El",
"",
"IRIT"
],
[
"Fraboul",
"Christian",
"",
"IRIT"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.4034
|
Anas Abou El Kalam
|
Mahmoud Mostafa (IRIT), Anas Abou El Kalam (IRIT), Christian Fraboul
(IRIT)
|
Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework
| null |
Third IEEE / IFIP International Conference on New Technologies,
Mobility and Security, Cairo : Egypt (2009)
| null | null |
cs.CR cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IPSec is a protocol that allows to make secure connections between branch
offices and allows secure VPN accesses. However, the efforts to improve IPSec
are still under way; one aspect of this improvement is to take Quality of
Service (QoS) requirements into account. QoS is the ability of the network to
provide a service at an assured service level while optimizing the global usage
of network resources. The QoS level that a flow receives depends on a six-bit
identifier in the IP header; the so-called Differentiated Services code point
(DSCP). Basically, Multi-Field classifiers classify a packet by inspecting
IP/TCP headers, to decide how the packet should be processed. The current IPSec
standard does hardly offer any guidance to do this, because the existing IPSec
ESP security protocol hides much of this information in its encrypted payloads,
preventing network control devices such as routers and switches from utilizing
this information in performing classification appropriately. To solve this
problem, we propose a QoS-friendly Encapsulated Security Payload (Q-ESP) as a
new IPSec security protocol that provides both security and QoS supports. We
also present our NetBSD kernel-based implementation as well as our evaluation
results of Q-ESP.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 12:59:13 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2009 09:41:56 GMT"
}
] | 2009-12-09T00:00:00 |
[
[
"Mostafa",
"Mahmoud",
"",
"IRIT"
],
[
"Kalam",
"Anas Abou El",
"",
"IRIT"
],
[
"Fraboul",
"Christian",
"",
"IRIT"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.4040
|
Maurice Margenstern
|
Margenstern Maurice
|
About a new splitting for the algorithmic study of the tilings $\{p,q\}$
of the hyperbolic plane when $q$ is odd
|
20 pages, 19 figures This version significantly improves version 1 of
the paper, by answering questions remained open in the previous version and
by bringing in a new solution to a case raised by the new study
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we remind previous results about the tilings $\{p,q\}$ of the
hyperbolic plane. We introduce two new ways to split the hyperbolic plane in
order to algorithmically construct the tilings $\{p,q\}$ when $q$ is odd.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 14:58:51 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Dec 2009 10:31:10 GMT"
}
] | 2009-12-19T00:00:00 |
[
[
"Maurice",
"Margenstern",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.4046
|
Ryota Tomioka
|
Ryota Tomioka, Taiji Suzuki, Masashi Sugiyama
|
Super-Linear Convergence of Dual Augmented-Lagrangian Algorithm for
Sparsity Regularized Estimation
|
51 pages, 9 figures
|
Journal of Machine Learning Research, 12(May):1537-1586, 2011
| null | null |
stat.ML cs.LG stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the convergence behaviour of a recently proposed algorithm for
regularized estimation called Dual Augmented Lagrangian (DAL). Our analysis is
based on a new interpretation of DAL as a proximal minimization algorithm. We
theoretically show under some conditions that DAL converges super-linearly in a
non-asymptotic and global sense. Due to a special modelling of sparse
estimation problems in the context of machine learning, the assumptions we make
are milder and more natural than those made in conventional analysis of
augmented Lagrangian algorithms. In addition, the new interpretation enables us
to generalize DAL to wide varieties of sparse estimation problems. We
experimentally confirm our analysis in a large scale $\ell_1$-regularized
logistic regression problem and extensively compare the efficiency of DAL
algorithm to previously proposed algorithms on both synthetic and benchmark
datasets.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 13:44:28 GMT"
},
{
"version": "v2",
"created": "Wed, 12 May 2010 12:33:07 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Jan 2011 07:04:21 GMT"
}
] | 2011-06-07T00:00:00 |
[
[
"Tomioka",
"Ryota",
""
],
[
"Suzuki",
"Taiji",
""
],
[
"Sugiyama",
"Masashi",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
] |
0911.4047
|
Elvira Albert
|
G. Puebla and E. Albert and M. Hermenegildo
|
Efficient Local Unfolding with Ancestor Stacks
|
Number of pages: 32 Number of figures: 7 Number of Tables: 3
| null | null | null |
cs.PL cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The most successful unfolding rules used nowadays in the partial evaluation
of logic programs are based on well quasi orders (wqo) applied over (covering)
ancestors, i.e., a subsequence of the atoms selected during a derivation.
Ancestor (sub)sequences are used to increase the specialization power of
unfolding while still guaranteeing termination and also to reduce the number of
atoms for which the wqo has to be checked. Unfortunately, maintaining the
structure of the ancestor relation during unfolding introduces significant
overhead. We propose an efficient, practical local unfolding rule based on the
notion of covering ancestors which can be used in combination with a wqo and
allows a stack-based implementation without losing any opportunities for
specialization. Using our technique, certain non-leftmost unfoldings are
allowed as long as local unfolding is performed, i.e., we cover depth-first
strategies.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 13:44:59 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Puebla",
"G.",
""
],
[
"Albert",
"E.",
""
],
[
"Hermenegildo",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.4051
|
Pablo Arrighi
|
Pablo Arrighi, Gilles Dowek
|
A computational definition of the notion of vectorial space
|
14 pages, latex
|
Proc. of 5th International Workshop on Rewriting Logic and its
Applications 2004 (WRLA) and ENTCS 117, 249-261, (2005).
| null | null |
cs.LO cs.PL cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We usually define an algebraic structure by a set, some operations defined on
this set and some propositions that the algebraic structure must validate. In
some cases, we can replace these propositions by an algorithm on terms
constructed upon these operations that the algebraic structure must validate.
We show in this note that this is the case for the notions of vectorial space
and bilinear operation. KEYWORDS: Rewrite system, vector space, bilinear
operation, tensorial product, semantics, quantum programming languages,
probabilistic programming languages.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2009 13:56:14 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Arrighi",
"Pablo",
""
],
[
"Dowek",
"Gilles",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0911.4146
|
Adrian Dumitrescu
|
Adrian Dumitrescu and Evan Hilscher
|
On convexification of polygons by pops
|
6 pages, 2 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a polygon $P$ in the plane, a {\em pop} operation is the reflection of
a vertex with respect to the line through its adjacent vertices. We define a
family of alternating polygons, and show that any polygon from this family
cannot be convexified by pop operations. This family contains simple, as well
as non-simple (i.e., self-intersecting) polygons, as desired. We thereby answer
in the negative an open problem posed by Demaine and O'Rourke \cite[Open
Problem 5.3]{DO07}.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 00:08:31 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Dumitrescu",
"Adrian",
""
],
[
"Hilscher",
"Evan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.4150
|
Rajgopal Kannan
|
Rajgopal Kannan and Costas Busch
|
The Impact of Exponential Utility Costs in Bottleneck Routing Games
|
AMS Latex 10 pages 2 Figures
| null | null |
Louisiana State University Tech report LSU-CSC-09-01
|
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study bottleneck routing games where the social cost is determined by the
worst congestion on any edge in the network. Bottleneck games have been studied
in the literature by having the player's utility costs to be determined by the
worst congested edge in their paths. However, the Nash equilibria of such games
are inefficient since the price of anarchy can be very high with respect to the
parameters of the game. In order to obtain smaller price of anarchy we explore
{\em exponential bottleneck games} where the utility costs of the players are
exponential functions on the congestion of the edges in their paths. We find
that exponential bottleneck games are very efficient giving a poly-log bound on
the price of anarchy: O(log L log |E|), where L is the largest path length in
the players strategy sets and E is the set of edges in the graph.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 01:10:39 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Kannan",
"Rajgopal",
""
],
[
"Busch",
"Costas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.4167
|
Ertem Tuncel
|
Jayanth Nayak, Ertem Tuncel, and Deniz Gunduz
|
Wyner-Ziv Coding over Broadcast Channels: Digital Schemes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses lossy transmission of a common source over a broadcast
channel when there is correlated side information at the receivers, with
emphasis on the quadratic Gaussian and binary Hamming cases. A digital scheme
that combines ideas from the lossless version of the problem, i.e.,
Slepian-Wolf coding over broadcast channels, and dirty paper coding, is
presented and analyzed. This scheme uses layered coding where the common layer
information is intended for both receivers and the refinement information is
destined only for one receiver. For the quadratic Gaussian case, a quantity
characterizing the overall quality of each receiver is identified in terms of
channel and side information parameters. It is shown that it is more
advantageous to send the refinement information to the receiver with "better"
overall quality. In the case where all receivers have the same overall quality,
the presented scheme becomes optimal. Unlike its lossless counterpart, however,
the problem eludes a complete characterization.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 08:20:59 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Nayak",
"Jayanth",
""
],
[
"Tuncel",
"Ertem",
""
],
[
"Gunduz",
"Deniz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4178
|
Morgan Harvey
|
Morgan Harvey, Mark Baillie, Ian Ruthven, David Elsweiler
|
Folksonomic Tag Clouds as an Aid to Content Indexing
|
SIGIR 2009 Workshop on Search in Social Media (SSM 2009)
| null | null | null |
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social tagging systems have recently developed as a popular method of data
organisation on the Internet. These systems allow users to organise their
content in a way that makes sense to them, rather than forcing them to use a
pre-determined and rigid set of categorisations. These folksonomies provide
well populated sources of unstructured tags describing web resources which
could potentially be used as semantic index terms for these resources. However
getting people to agree on what tags best describe a resource is a difficult
problem, therefore any feature which increases the consistency and stability of
terms chosen would be extremely beneficial. We investigate how the provision of
a tag cloud, a weighted list of terms commonly used to assist in browsing a
folksonomy, during the tagging process itself influences the tags produced and
how difficult the user perceived the task to be. We show that illustrating the
most popular tags to users assists in the tagging process and encourages a
stable and consistent folksonomy to form.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 12:55:54 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Harvey",
"Morgan",
""
],
[
"Baillie",
"Mark",
""
],
[
"Ruthven",
"Ian",
""
],
[
"Elsweiler",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.4191
|
Shmuel Onn
|
Shmuel Onn
|
Theory and Applications of N-Fold Integer Programming
|
IMA Volume on Mixed Integer Nonlinear Programming, Frontier Series,
Springer, to appear
| null | null | null |
math.OC cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We overview our recently introduced theory of n-fold integer programming
which enables the polynomial time solution of fundamental linear and nonlinear
integer programming problems in variable dimension. We demonstrate its power by
obtaining the first polynomial time algorithms in several application areas
including multicommodity flows and privacy in statistical databases.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 16:32:32 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2009 19:05:49 GMT"
}
] | 2010-06-07T00:00:00 |
[
[
"Onn",
"Shmuel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.4199
|
Ali Dehghan
|
Arash Ahadi, Ali Dehghan
|
Upper bounds for the 2-hued chromatic number of graphs in terms of the
independence number
|
Dynamic chromatic number; conditional (k, 2)-coloring; 2-hued
chromatic number; 2-hued coloring; Independence number; Probabilistic method
|
Discrete Applied Mathematics 160(2012)2142--2146
|
10.1016/j.dam.2012.05.003
| null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A 2-hued coloring of a graph $G$ (also known as conditional $(k, 2)$-coloring
and dynamic coloring) is a coloring such that for every vertex $v\in V(G)$ of
degree at least $2$, the neighbors of $v$ receive at least $2$ colors. The
smallest integer $k$ such that $G$ has a 2-hued coloring with $ k $ colors, is
called the {\it 2-hued chromatic number} of $G$ and denoted by $\chi_2(G)$. In
this paper, we will show that if $G$ is a regular graph, then $ \chi_{2}(G)-
\chi(G) \leq 2 \log _{2}(\alpha(G)) +\mathcal{O}(1) $ and if $G$ is a graph and
$\delta(G)\geq 2$, then $ \chi_{2}(G)- \chi(G) \leq 1+\lceil \sqrt[\delta
-1]{4\Delta^{2}} \rceil ( 1+ \log _{\frac{2\Delta(G)}{2\Delta(G)-\delta(G)}}
(\alpha(G)) ) $ and in general case if $G$ is a graph, then $ \chi_{2}(G)-
\chi(G) \leq 2+ \min \lbrace
\alpha^{\prime}(G),\frac{\alpha(G)+\omega(G)}{2}\rbrace $.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 20:09:24 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2010 07:14:39 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Apr 2010 16:09:17 GMT"
},
{
"version": "v4",
"created": "Fri, 2 Dec 2011 16:04:32 GMT"
},
{
"version": "v5",
"created": "Mon, 26 Jan 2015 11:51:11 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Ahadi",
"Arash",
""
],
[
"Dehghan",
"Ali",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4202
|
Maxim Kolosovskiy
|
Maxim A. Kolosovskiy, Elena N. Kryuchkova (Altai State Technical
University, Russia)
|
Network congestion control using NetFlow
|
10 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of congestion control is to avoid congestion in network elements. A
network element is congested if it is being offered more traffic than it can
process. To detect such situations and to neutralize them we should monitor
traffic in the network. In this paper, we propose using Cisco's NetFlow
technology, which allows collecting statistics about traffic in the network by
generating special NetFlow packets. Cisco's routers can send NetFlow packets to
a special node, so we can collect these packets, analyze its content and detect
network congestion. We use Cisco's feature as example, some other vendors
(Juniper, 3COM, Alcatel, etc.) provide similar features for their routers. We
also consider a simple system, which collects statistical information about
network elements, determines overloaded elements and identifies flows, which
congest them.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 20:59:27 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Kolosovskiy",
"Maxim A.",
"",
"Altai State Technical\n University, Russia"
],
[
"Kryuchkova",
"Elena N.",
"",
"Altai State Technical\n University, Russia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4203
|
Mathieu Boespflug
|
Mathieu Boespflug (LIX)
|
From Self-Interpreters to Normalization by Evaluation
| null |
2009 Workshop on Normalization by Evaluation, Los Angeles :
\'Etats-Unis d'Am\'erique (2009)
| null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We characterize normalization by evaluation as the composition of a
self-interpreter with a self-reducer using a special representation scheme, in
the sense of Mogensen (1992). We do so by deriving in a systematic way an
untyped normalization by evaluation algorithm from a standard interpreter for
the ?-calculus. The derived algorithm is not novel and indeed other published
algorithms may be obtained in the same manner through appropriate adaptations
to the representation scheme.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 21:19:33 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Boespflug",
"Mathieu",
"",
"LIX"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.4207
|
Rafael S. Calsaverini
|
Rafael S. Calsaverini, Renato Vicente
|
An information theoretic approach to statistical dependence: copula
information
|
to appear in Europhysics Letters
|
Europ. Phys. Lett. 88 68003 (2009)
|
10.1209/0295-5075/88/68003
| null |
q-fin.ST cs.IT math.IT physics.data-an stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the connection between information and copula theories by showing
that a copula can be employed to decompose the information content of a
multivariate distribution into marginal and dependence components, with the
latter quantified by the mutual information. We define the information excess
as a measure of deviation from a maximum entropy distribution. The idea of
marginal invariant dependence measures is also discussed and used to show that
empirical linear correlation underestimates the amplitude of the actual
correlation in the case of non-Gaussian marginals. The mutual information is
shown to provide an upper bound for the asymptotic empirical log-likelihood of
a copula. An analytical expression for the information excess of T-copulas is
provided, allowing for simple model identification within this family. We
illustrate the framework in a financial data set.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2009 22:41:35 GMT"
}
] | 2011-10-26T00:00:00 |
[
[
"Calsaverini",
"Rafael S.",
""
],
[
"Vicente",
"Renato",
""
]
] |
[
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0911.4219
|
Andrea Montanari
|
David L. Donoho and Arian Maleki and Andrea Montanari
|
Message Passing Algorithms for Compressed Sensing: I. Motivation and
Construction
|
5 pages, IEEE Information Theory Workshop, Cairo 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a recent paper, the authors proposed a new class of low-complexity
iterative thresholding algorithms for reconstructing sparse signals from a
small set of linear measurements \cite{DMM}. The new algorithms are broadly
referred to as AMP, for approximate message passing. This is the first of two
conference papers describing the derivation of these algorithms, connection
with the related literature, extensions of the original framework, and new
empirical evidence.
In particular, the present paper outlines the derivation of AMP from standard
sum-product belief propagation, and its extension in several directions. We
also discuss relations with formal calculations based on statistical mechanics
methods.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 03:00:43 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Donoho",
"David L.",
""
],
[
"Maleki",
"Arian",
""
],
[
"Montanari",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4222
|
Andrea Montanari
|
David L. Donoho and Arian Maleki and Andrea Montanari
|
Message Passing Algorithms for Compressed Sensing: II. Analysis and
Validation
|
5 pages, 3 pdf figures, IEEE Information Theory Workshop, Cairo 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a recent paper, the authors proposed a new class of low-complexity
iterative thresholding algorithms for reconstructing sparse signals from a
small set of linear measurements \cite{DMM}. The new algorithms are broadly
referred to as AMP, for approximate message passing. This is the second of two
conference papers describing the derivation of these algorithms, connection
with related literature, extensions of original framework, and new empirical
evidence.
This paper describes the state evolution formalism for analyzing these
algorithms, and some of the conclusions that can be drawn from this formalism.
We carried out extensive numerical simulations to confirm these predictions. We
present here a few representative results.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 02:54:51 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Donoho",
"David L.",
""
],
[
"Maleki",
"Arian",
""
],
[
"Montanari",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4223
|
Alberto Pepe
|
Alberto Pepe, Marko A. Rodriguez
|
Collaboration in sensor network research: an in-depth longitudinal
analysis of assortative mixing patterns
|
Scientometrics (In press)
|
Scientometrics. Volume 84, Number 3. 2010
|
10.1007/s11192-009-0147-2
| null |
physics.data-an cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many investigations of scientific collaboration are based on statistical
analyses of large networks constructed from bibliographic repositories. These
investigations often rely on a wealth of bibliographic data, but very little or
no other information about the individuals in the network, and thus, fail to
illustrate the broader social and academic landscape in which collaboration
takes place. In this article, we perform an in-depth longitudinal analysis of a
relatively small network of scientific collaboration (N = 291) constructed from
the bibliographic record of a research center involved in the development and
application of sensor network and wireless technologies. We perform a
preliminary analysis of selected structural properties of the network,
computing its range, configuration and topology. We then support our
preliminary statistical analysis with an in-depth temporal investigation of the
assortative mixing of selected node characteristics, unveiling the researchers'
propensity to collaborate preferentially with others with a similar academic
profile. Our qualitative analysis of mixing patterns offers clues as to the
nature of the scientific community being modeled in relation to its
organizational, disciplinary, institutional, and international arrangements of
collaboration.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 03:04:36 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Dec 2009 20:18:26 GMT"
}
] | 2010-12-24T00:00:00 |
[
[
"Pepe",
"Alberto",
""
],
[
"Rodriguez",
"Marko A.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.4230
|
M Sabu THAMPI
|
Sabu M. Thampi
|
Introduction to Bioinformatics
| null | null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bioinformatics is a new discipline that addresses the need to manage and
interpret the data that in the past decade was massively generated by genomic
research. This discipline represents the convergence of genomics, biotechnology
and information technology, and encompasses analysis and interpretation of
data, modeling of biological phenomena, and development of algorithms and
statistics. This article presents an introduction to bioinformatics
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 04:07:08 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Thampi",
"Sabu M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0911.4238
|
Chia-Mu Yu
|
Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo
|
Secure Multidimensional Queries in Tiered Sensor Networks
| null | null | null | null |
cs.NI cs.CR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, aiming at securing range query, top-k query, and skyline query
in tiered sensor networks, we propose the Secure Range Query (SRQ), Secure
Top-$k$ Query (STQ), and Secure Skyline Query (SSQ) schemes, respectively. In
particular, SRQ, by using our proposed \emph{prime aggregation} technique, has
the lowest communication overhead among prior works, while STQ and SSQ, to our
knowledge, are the first proposals in tiered sensor networks for securing
top-$k$ and skyline queries, respectively. Moreover, the relatively unexplored
issue of the security impact of sensor node compromises on multidimensional
queries is studied; two attacks incurred from the sensor node compromises,
\emph{collusion attack} and \emph{false-incrimination attack}, are investigated
in this paper. After developing a novel technique called \emph{subtree
sampling}, we also explore methods of efficiently mitigating the threat of
sensor node compromises. Performance analyses regarding the probability for
detecting incomplete query-results and communication cost of the proposed
schemes are also studied.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 08:36:13 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Dec 2009 15:46:53 GMT"
}
] | 2009-12-16T00:00:00 |
[
[
"Yu",
"Chia-Mu",
""
],
[
"Lu",
"Chun-Shien",
""
],
[
"Kuo",
"Sy-Yen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4239
|
Chia-Mu Yu
|
Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo
|
Constrained Function Based En-Route Filtering for Sensor Networks
|
26 pages, single column, extension from a preliminary version
appeared in IEEE WCNC 2009
| null | null | null |
cs.NI cs.CR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sensor networks are vulnerable to \emph{false data injection attack} and
\emph{path-based DoS} (PDoS) attack. While conventional authentication schemes
are insufficient for solving these security conflicts, an \emph{en-route
filtering} scheme acts as a defense against these two attacks. To construct an
efficient en-route filtering scheme, this paper first presents a Constrained
Function based message Authentication (CFA) scheme, which can be thought of as
a hash function directly supporting the en-route filtering functionality.
Together with the \emph{redundancy property} of sensor networks, which means
that an event can be simultaneously observed by multiple sensor nodes, the
devised CFA scheme is used to construct a CFA-based en-route filtering (CFAEF)
scheme. In contrast to most of the existing methods, which rely on complicated
security associations among sensor nodes, our design, which directly exploits
an en-route filtering hash function, appears to be novel. We examine the CFA
and CFAEF schemes from both the theoretical and numerical aspects to
demonstrate their efficiency and effectiveness.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 08:56:07 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Yu",
"Chia-Mu",
""
],
[
"Lu",
"Chun-Shien",
""
],
[
"Kuo",
"Sy-Yen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4262
|
Iza Marfisi-Schottman
|
Iza Marfisi-Schottman (LIESP), Aymen Sghaier (LIESP), S\'ebastien
George (LIESP), Franck Tarpin-Bernard (LIESP), Patrick Pr\'ev\^ot (LIESP)
|
Towards Industrialized Conception and Production of Serious Games
| null |
ICTE INTERNATIONAL CONFERENCE ON TECHNOLOGY AND EDUCATION, Paris :
France (2009)
| null | null |
cs.LG cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Serious Games (SGs) have experienced a tremendous outburst these last years.
Video game companies have been producing fun, user-friendly SGs, but their
educational value has yet to be proven. Meanwhile, cognition research scientist
have been developing SGs in such a way as to guarantee an educational gain, but
the fun and attractive characteristics featured often would not meet the
public's expectations. The ideal SG must combine these two aspects while still
being economically viable. In this article, we propose a production chain model
to efficiently conceive and produce SGs that are certified for their
educational gain and fun qualities. Each step of this chain will be described
along with the human actors, the tools and the documents that intervene.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 16:01:09 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Marfisi-Schottman",
"Iza",
"",
"LIESP"
],
[
"Sghaier",
"Aymen",
"",
"LIESP"
],
[
"George",
"Sébastien",
"",
"LIESP"
],
[
"Tarpin-Bernard",
"Franck",
"",
"LIESP"
],
[
"Prévôt",
"Patrick",
"",
"LIESP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.4288
|
Kyoung-Dae Kim
|
Kyoung-Dae Kim and P. R. Kumar
|
The Importance, Design and Implementation of a Middleware for Networked
Control Systems
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the advancement of computing and communication technology, networked
control systems may soon become prevalent in many control applications. While
the capability of employing the communication network in the control loop
certainly provides many benefits, it also raises several challenges which need
to be overcome to utilize the benefits.
In this chapter, we focus on one major challenge: a middleware framework that
enables a networked control system to be implemented. Indeed our thesis is that
a middleware for networked control sys important for the future of networked
control systems.
We discuss the fundamental issues which need to be considered in the design
and development of an appropriate middleware for networked control systems. We
describe \emph{Etherware}, a middleware for networked control system which has
been developed at the University of Illinois, as an example of such a
middleware framework, to illustrate how these issues can be addressed in the
design of a middleware. Using a networked inverted pendulum control system as
an example, we demonstrate the powerful capabilities provided by Etherware for
a networked control system.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 21:11:56 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Kim",
"Kyoung-Dae",
""
],
[
"Kumar",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4292
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Similarity Measures, Author Cocitation Analysis, and Information Theory
| null |
Journal of the American Society for Information Science &
Technology, 56(7), 2005, 769-772
| null | null |
cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of Pearson's correlation coefficient in Author Cocitation Analysis
was compared with Salton's cosine measure in a number of recent contributions.
Unlike the Pearson correlation, the cosine is insensitive to the number of
zeros. However, one has the option of applying a logarithmic transformation in
correlation analysis. Information calculus is based on both the logarithmic
transformation and provides a non-parametric statistics. Using this methodology
one can cluster a document set in a precise way and express the differences in
terms of bits of information. The algorithm is explained and used on the data
set which was made the subject of this discussion.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 21:35:51 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.4302
|
Loet Leydesdorff
|
Diana Lucio-Arias, Loet Leydesdorff
|
An Indicator of Research Front Activity: Measuring Intellectual
Organization as Uncertainty Reduction in Document Sets
| null |
Journal of the American Society for Information Science &
Technology 60(12) (2009) 2488-2498
| null | null |
cs.DL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When using scientific literature to model scholarly discourse, a research
specialty can be operationalized as an evolving set of related documents. Each
publication can be expected to contribute to the further development of the
specialty at the research front. The specific combinations of title words and
cited references in a paper can then be considered as a signature of the
knowledge claim in the paper: new words and combinations of words can be
expected to represent variation, while each paper is at the same time
selectively positioned into the intellectual organization of a field using
context-relevant references. Can the mutual information among these three
dimensions--title words, cited references, and sequence numbers--be used as an
indicator of the extent to which intellectual organization structures the
uncertainty prevailing at a research front? The effect of the discovery of
nanotubes (1991) on the previously existing field of fullerenes is used as a
test case. Thereafter, this method is applied to science studies with a focus
on scientometrics using various sample delineations. An emerging research front
about citation analysis can be indicated.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2009 22:12:55 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Lucio-Arias",
"Diana",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.4313
|
Joaquin Garcia-Alfaro
|
Joaquin Garcia-Alfaro, Michel Barbeau, Evangelos Kranakis
|
Evaluation of Anonymized ONS Queries
|
14 pages
|
Proc. 2008 Security of Autonomous and Spontaneous Networks,
Editions Publibook Universite, pages 47-60, Loctudy, Brittany, France,
October, 2008
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for
the automatic identification of objects on supply chain applications (e.g.,
pharmaceutical or military applications). This infrastructure relies on the use
of the (1) Radio Frequency Identification (RFID) technology to tag objects in
motion and (2) distributed services providing information about objects via the
Internet. A lookup service, called the Object Name Service (ONS) and based on
the use of the Domain Name System (DNS), can be publicly accessed by EPC
applications looking for information associated with tagged objects. Privacy
issues may affect corporate infrastructures based on EPC technologies if their
lookup service is not properly protected. A possible solution to mitigate these
issues is the use of online anonymity. We present an evaluation experiment that
compares the of use of Tor (The second generation Onion Router) on a global
ONS/DNS setup, with respect to benefits, limitations, and latency.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 00:40:26 GMT"
}
] | 2009-11-27T00:00:00 |
[
[
"Garcia-Alfaro",
"Joaquin",
""
],
[
"Barbeau",
"Michel",
""
],
[
"Kranakis",
"Evangelos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4322
|
Alexander Gutfraind
|
Alexander Gutfraind, Kiyan Ahmadizadeh
|
Markovian Network Interdiction and the Four Color Theorem
|
7 pages, 2 figures
| null | null |
LA-UR-09-07611
|
cs.DM cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Unreactive Markovian Evader Interdiction Problem (UME) asks to optimally
place sensors on a network to detect Markovian motion by one or more "evaders".
It was previously proved that finding the optimal sensor placement is NP-hard
if the number of evaders is unbounded. Here we show that the problem is NP-hard
with just 2 evaders using a connection to coloring of planar graphs. The
results suggest that approximation algorithms are needed even in applications
where the number of evaders is small. It remains an open problem to determine
the complexity of the 1-evader case or to devise efficient algorithms.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 03:57:04 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Gutfraind",
"Alexander",
""
],
[
"Ahmadizadeh",
"Kiyan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.4329
|
Ki-Hoon Lee
|
Ki-Hoon Lee, Kyu-Young Whang, Wook-Shin Han, and Min-Soo Kim
|
Structural Consistency: Enabling XML Keyword Search to Eliminate
Spurious Results Consistently
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
XML keyword search is a user-friendly way to query XML data using only
keywords. In XML keyword search, to achieve high precision without sacrificing
recall, it is important to remove spurious results not intended by the user.
Efforts to eliminate spurious results have enjoyed some success by using the
concepts of LCA or its variants, SLCA and MLCA. However, existing methods still
could find many spurious results. The fundamental cause for the occurrence of
spurious results is that the existing methods try to eliminate spurious results
locally without global examination of all the query results and, accordingly,
some spurious results are not consistently eliminated. In this paper, we
propose a novel keyword search method that removes spurious results
consistently by exploiting the new concept of structural consistency.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 06:45:37 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2009 01:00:10 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Lee",
"Ki-Hoon",
""
],
[
"Whang",
"Kyu-Young",
""
],
[
"Han",
"Wook-Shin",
""
],
[
"Kim",
"Min-Soo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0911.4332
|
Swaminathan Sankararaman
|
Swaminathan Sankararaman, Alon Efrat, Srinivasan Ramasubramanian,
Javad Taheri
|
Scheduling Sensors for Guaranteed Sparse Coverage
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sensor networks are particularly applicable to the tracking of objects in
motion. For such applications, it may not necessary that the whole region be
covered by sensors as long as the uncovered region is not too large. This
notion has been formalized by Balasubramanian et.al. as the problem of
$\kappa$-weak coverage. This model of coverage provides guarantees about the
regions in which the objects may move undetected. In this paper, we analyse the
theoretical aspects of the problem and provide guarantees about the lifetime
achievable. We introduce a number of practical algorithms and analyse their
significance. The main contribution is a novel linear programming based
algorithm which provides near-optimal lifetime. Through extensive
experimentation, we analyse the performance of these algorithms based on
several parameters defined.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 07:11:49 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 19:41:27 GMT"
}
] | 2010-02-26T00:00:00 |
[
[
"Sankararaman",
"Swaminathan",
""
],
[
"Efrat",
"Alon",
""
],
[
"Ramasubramanian",
"Srinivasan",
""
],
[
"Taheri",
"Javad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4337
|
Srikanth Srinivasan
|
Vikraman Arvind, Srikanth Srinivasan
|
Circuit Lower Bounds, Help Functions, and the Remote Point Problem
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the power of Algebraic Branching Programs (ABPs) augmented
with help polynomials, and constant-depth Boolean circuits augmented with help
functions. We relate the problem of proving explicit lower bounds in both these
models to the Remote Point Problem (introduced by Alon, Panigrahy, and Yekhanin
(RANDOM '09)). More precisely, proving lower bounds for ABPs with help
polynomials is related to the Remote Point Problem w.r.t. the rank metric, and
for constant-depth circuits with help functions it is related to the Remote
Point Problem w.r.t. the Hamming metric. For algebraic branching programs with
help polynomials with some degree restrictions we show exponential size lower
bounds for explicit polynomials.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 08:25:40 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Arvind",
"Vikraman",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.4351
|
Sonny Ben-Shimon
|
Sonny Ben-Shimon, Michael Krivelevich, Benny Sudakov
|
Local resilience and Hamiltonicity Maker-Breaker games in random-regular
graphs
|
34 pages. 1 figure
|
Combinatorics, Probability, and Computing, 20(2):173--211, 2011
|
10.1017/S0963548310000453
| null |
math.CO cs.DM math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For an increasing monotone graph property $\mP$ the \emph{local resilience}
of a graph $G$ with respect to $\mP$ is the minimal $r$ for which there exists
of a subgraph $H\subseteq G$ with all degrees at most $r$ such that the removal
of the edges of $H$ from $G$ creates a graph that does not possesses $\mP$.
This notion, which was implicitly studied for some ad-hoc properties, was
recently treated in a more systematic way in a paper by Sudakov and Vu. Most
research conducted with respect to this distance notion focused on the Binomial
random graph model $\GNP$ and some families of pseudo-random graphs with
respect to several graph properties such as containing a perfect matching and
being Hamiltonian, to name a few. In this paper we continue to explore the
local resilience notion, but turn our attention to random and pseudo-random
\emph{regular} graphs of constant degree. We investigate the local resilience
of the typical random $d$-regular graph with respect to edge and vertex
connectivity, containing a perfect matching, and being Hamiltonian. In
particular we prove that for every positive $\epsilon$ and large enough values
of $d$ with high probability the local resilience of the random $d$-regular
graph, $\GND$, with respect to being Hamiltonian is at least $(1-\epsilon)d/6$.
We also prove that for the Binomial random graph model $\GNP$, for every
positive $\epsilon>0$ and large enough values of $K$, if $p>\frac{K\ln n}{n}$
then with high probability the local resilience of $\GNP$ with respect to being
Hamiltonian is at least $(1-\epsilon)np/6$. Finally, we apply similar
techniques to Positional Games and prove that if $d$ is large enough then with
high probability a typical random $d$-regular graph $G$ is such that in the
unbiased Maker-Breaker game played on the edges of $G$, Maker has a winning
strategy to create a Hamilton cycle.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 10:16:58 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Mar 2010 23:31:35 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jun 2010 16:18:51 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Jun 2010 23:49:55 GMT"
}
] | 2011-02-01T00:00:00 |
[
[
"Ben-Shimon",
"Sonny",
""
],
[
"Krivelevich",
"Michael",
""
],
[
"Sudakov",
"Benny",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0911.4357
|
Virag Shah
|
Virag Shah, Neelesh B. Mehta, Raymond Yim
|
Splitting Algorithms for Fast Relay Selection: Generalizations,
Analysis, and a Unified View
|
20 pages, 7 figures, 1 table, Accepted for publication in IEEE
Transactions on Wireless Communications
| null |
10.1109/TWC.2010.04.091364
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Relay selection for cooperative communications promises significant
performance improvements, and is, therefore, attracting considerable attention.
While several criteria have been proposed for selecting one or more relays,
distributed mechanisms that perform the selection have received relatively less
attention. In this paper, we develop a novel, yet simple, asymptotic analysis
of a splitting-based multiple access selection algorithm to find the single
best relay. The analysis leads to simpler and alternate expressions for the
average number of slots required to find the best user. By introducing a new
`contention load' parameter, the analysis shows that the parameter settings
used in the existing literature can be improved upon. New and simple bounds are
also derived. Furthermore, we propose a new algorithm that addresses the
general problem of selecting the best $Q \ge 1$ relays, and analyze and
optimize it. Even for a large number of relays, the algorithm selects the best
two relays within 4.406 slots and the best three within 6.491 slots, on
average. We also propose a new and simple scheme for the practically relevant
case of discrete metrics. Altogether, our results develop a unifying
perspective about the general problem of distributed selection in cooperative
systems and several other multi-node systems.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 11:20:27 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Shah",
"Virag",
""
],
[
"Mehta",
"Neelesh B.",
""
],
[
"Yim",
"Raymond",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4366
|
Gwena\"el Joret
|
Samuel Fiorini, Gwena\"el Joret, Ugo Pietropaoli
|
Hitting Diamonds and Growing Cacti
|
v2: several minor changes.
| null |
10.1007/978-3-642-13036-6_15
| null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the following NP-hard problem: in a weighted graph, find a
minimum cost set of vertices whose removal leaves a graph in which no two
cycles share an edge. We obtain a constant-factor approximation algorithm,
based on the primal-dual method. Moreover, we show that the integrality gap of
the natural LP relaxation of the problem is \Theta(\log n), where n denotes the
number of vertices in the graph.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 11:14:06 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Mar 2010 21:03:38 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
],
[
"Pietropaoli",
"Ugo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4375
|
De Comite Francesco
|
Francesco De Comite, Jean-Paul Delahaye
|
Automated Proofs in Geometry : Computing Upper Bounds for the Heilbronn
Problem for Triangles
| null | null | null | null |
cs.CG cs.DM cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a method for computing upper bounds for the Heilbronn problem for
triangles.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 11:43:21 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Dec 2009 12:18:59 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Mar 2010 09:52:12 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"De Comite",
"Francesco",
""
],
[
"Delahaye",
"Jean-Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0911.4384
|
Magnus Lie Hetland
|
Magnus Lie Hetland
|
Ptolemaic Indexing
| null |
Journ. of Comp. Geom., JoCG, vol 6, no 1 (2015) 165-184
| null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses a new family of bounds for use in similarity search,
related to those used in metric indexing, but based on Ptolemy's inequality,
rather than the metric axioms. Ptolemy's inequality holds for the well-known
Euclidean distance, but is also shown here to hold for quadratic form metrics
in general, with Mahalanobis distance as an important special case. The
inequality is examined empirically on both synthetic and real-world data sets
and is also found to hold approximately, with a very low degree of error, for
important distances such as the angular pseudometric and several Lp norms.
Indexing experiments demonstrate a highly increased filtering power compared to
existing, triangular methods. It is also shown that combining the Ptolemaic and
triangular filtering can lead to better results than using either approach on
its own.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 12:16:15 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 21:57:13 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jul 2015 11:57:30 GMT"
}
] | 2015-07-08T00:00:00 |
[
[
"Hetland",
"Magnus Lie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4385
|
Mauricio Cerda
|
Mauricio Cerda (INRIA Lorraine - LORIA), Lucas Terissi, Bernard Girau
(INRIA Lorraine - LORIA)
|
Bio-inspired speed detection and discrimination
| null |
4th International Conference on Bio-Inspired Models of Network,
Information, and Computing Systems, Avignon : France (2009)
| null | null |
cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the field of computer vision, a crucial task is the detection of motion
(also called optical flow extraction). This operation allows analysis such as
3D reconstruction, feature tracking, time-to-collision and novelty detection
among others. Most of the optical flow extraction techniques work within a
finite range of speeds. Usually, the range of detection is extended towards
higher speeds by combining some multiscale information in a serial
architecture. This serial multi-scale approach suffers from the problem of
error propagation related to the number of scales used in the algorithm. On the
other hand, biological experiments show that human motion perception seems to
follow a parallel multiscale scheme. In this work we present a bio-inspired
parallel architecture to perform detection of motion, providing a wide range of
operation and avoiding error propagation associated with the serial
architecture. To test our algorithm, we perform relative error comparisons
between both classical and proposed techniques, showing that the parallel
architecture is able to achieve motion detection with results similar to the
serial approach.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 12:23:39 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Cerda",
"Mauricio",
"",
"INRIA Lorraine - LORIA"
],
[
"Terissi",
"Lucas",
"",
"INRIA Lorraine - LORIA"
],
[
"Girau",
"Bernard",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.4395
|
M Sabu THAMPI
|
Sabu M. Thampi
|
Introduction to Distributed Systems
| null | null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computing has passed through many transformations since the birth of the
first computing machines. Developments in technology have resulted in the
availability of fast and inexpensive processors, and progresses in
communication technology have resulted in the availability of lucrative and
highly proficient computer networks. Among these, the centralized networks have
one component that is shared by users all the time. All resources are
accessible, but there is a single point of control as well as a single point of
failure. The integration of computer and networking technologies gave birth to
new paradigm of computing called distributed computing in the late 1970s.
Distributed computing has changed the face of computing and offered quick and
precise solutions for a variety of complex problems for different fields.
Nowadays, we are fully engrossed by the information age, and expending more
time communicating and gathering information through the Internet. The Internet
keeps on progressing along more than a few magnitudes, abiding end systems
increasingly to communicate in more and more different ways. Over the years,
several methods have evolved to enable these developments, ranging from
simplistic data sharing to advanced systems supporting a multitude of services.
This article provides an overview of distributed computing systems. The
definition, architecture, characteristics of distributed systems and the
various distributed computing fallacies are discussed in the beginning.
Finally, discusses client/server computing, World Wide Web and types of
distributed systems.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 13:14:35 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"Thampi",
"Sabu M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.4414
|
Arijit Laha Ph.D.
|
Nikhil R. Pal, Arijit Laha and J. Das
|
Designing fuzzy rule based classifier using self-organizing feature map
for analysis of multispectral satellite images
|
23 pages, 7 figures
|
International Journal of Remote Sensing, Volume 26, No 10, Pages
2219-2240, May 2005
|
10.1080/01431160500033419
| null |
cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel scheme for designing fuzzy rule based classifier. An SOFM
based method is used for generating a set of prototypes which is used to
generate a set of fuzzy rules. Each rule represents a region in the feature
space that we call the context of the rule. The rules are tuned with respect to
their context. We justified that the reasoning scheme may be different in
different context leading to context sensitive inferencing. To realize context
sensitive inferencing we used a softmin operator with a tunable parameter. The
proposed scheme is tested on several multispectral satellite image data sets
and the performance is found to be much better than the results reported in the
literature.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 14:26:00 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Pal",
"Nikhil R.",
""
],
[
"Laha",
"Arijit",
""
],
[
"Das",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.4416
|
Arijit Laha Ph.D.
|
Arijit Laha, Nikhil R. Pal, and J. Das
|
Land cover classification using fuzzy rules and aggregation of
contextual information through evidence theory
|
14 pages, 2 figures
|
IEEE Transactions on Geoscience and Remote Sensing, Vol. 44, No.
6, pp. 1633-1642, June 2006
|
10.1109/TGRS.2006.864391
| null |
cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Land cover classification using multispectral satellite image is a very
challenging task with numerous practical applications. We propose a multi-stage
classifier that involves fuzzy rule extraction from the training data and then
generation of a possibilistic label vector for each pixel using the fuzzy rule
base. To exploit the spatial correlation of land cover types we propose four
different information aggregation methods which use the possibilistic class
label of a pixel and those of its eight spatial neighbors for making the final
classification decision. Three of the aggregation methods use Dempster-Shafer
theory of evidence while the remaining one is modeled after the fuzzy k-NN
rule. The proposed methods are tested with two benchmark seven channel
satellite images and the results are found to be quite satisfactory. They are
also compared with a Markov random field (MRF) model-based contextual
classification method and found to perform consistently better.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 14:33:27 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Laha",
"Arijit",
""
],
[
"Pal",
"Nikhil R.",
""
],
[
"Das",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.4432
|
Aylin Yener
|
Xiang He, Aylin Yener
|
The Role of Feedback in Two-way Secure Communications
|
51 pages. Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most practical communication links are bi-directional. In these models, since
the source node also receives signals, its encoder has the option of computing
its output based on the signals it received in the past. On the other hand,
from a practical point of view, it would also be desirable to identify the
cases where such an encoder design may not improve communication rates. This
question is particularly interesting for the case where the transmitted
messages and the feedback signals are subject to eavesdropping. In this work,
we investigate the question of how much impact the feedback has on the secrecy
capacity by studying two fundamental models. First, we consider the Gaussian
two-way wiretap channel and derive an outer bound for its secrecy capacity
region. We show that the secrecy rate loss can be unbounded when feedback
signals are not utilized except for a special case we identify, and thus
conclude that utilizing feedback can be highly beneficial in general. Second,
we consider a half-duplex Gaussian two-way relay channel where the relay node
is also an eavesdropper, and find that the impact of feedback is less
pronounced compared to the previous scenario. Specifically, the loss in secrecy
rate, when ignoring the feedback, is quantified to be less than 0.5 bit per
channel use when the relay power goes to infinity. This achievable rate region
is obtained with simple time sharing along with cooperative jamming, which,
with its simplicity and near optimum performance, is a viable alternative to an
encoder that utilizes feedback signals.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 15:54:53 GMT"
}
] | 2009-11-24T00:00:00 |
[
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4459
|
Petros Petrosyan
|
Petros A. Petrosyan
|
Interval edge colorings of some products of graphs
|
14 pages, 5 figures, minor changes
| null | null | null |
cs.DM
|
http://creativecommons.org/licenses/by/3.0/
|
An edge coloring of a graph $G$ with colors $1,2,\ldots ,t$ is called an
interval $t$-coloring if for each $i\in \{1,2,\ldots,t\}$ there is at least one
edge of $G$ colored by $i$, and the colors of edges incident to any vertex of
$G$ are distinct and form an interval of integers. A graph $G$ is interval
colorable, if there is an integer $t\geq 1$ for which $G$ has an interval
$t$-coloring. Let $\mathfrak{N}$ be the set of all interval colorable graphs.
In 2004 Kubale and Giaro showed that if $G,H\in \mathfrak{N}$, then the
Cartesian product of these graphs belongs to $\mathfrak{N}$. Also, they
formulated a similar problem for the lexicographic product as an open problem.
In this paper we first show that if $G\in \mathfrak{N}$, then $G[nK_{1}]\in
\mathfrak{N}$ for any $n\in \mathbf{N}$. Furthermore, we show that if $G,H\in
\mathfrak{N}$ and $H$ is a regular graph, then strong and lexicographic
products of graphs $G,H$ belong to $\mathfrak{N}$. We also prove that tensor
and strong tensor products of graphs $G,H$ belong to $\mathfrak{N}$ if $G\in
\mathfrak{N}$ and $H$ is a regular graph.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 18:26:31 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Aug 2010 07:15:58 GMT"
}
] | 2010-08-13T00:00:00 |
[
[
"Petrosyan",
"Petros A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4498
|
Anton Korobeynikov
|
Anton Korobeynikov
|
Computation- and Space-Efficient Implementation of SSA
|
27 pages, 8 figures
|
Statistics and Its Interface, 3 (3), 2010, pp 357-368
| null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The computational complexity of different steps of the basic SSA is
discussed. It is shown that the use of the general-purpose "blackbox" routines
(e.g. found in packages like LAPACK) leads to huge waste of time resources
since the special Hankel structure of the trajectory matrix is not taken into
account. We outline several state-of-the-art algorithms (for example,
Lanczos-based truncated SVD) which can be modified to exploit the structure of
the trajectory matrix. The key components here are hankel matrix-vector
multiplication and hankelization operator. We show that both can be computed
efficiently by the means of Fast Fourier Transform. The use of these methods
yields the reduction of the worst-case computational complexity from O(N^3) to
O(k N log(N)), where N is series length and k is the number of eigentriples
desired.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 21:41:17 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Apr 2010 18:42:16 GMT"
}
] | 2012-07-02T00:00:00 |
[
[
"Korobeynikov",
"Anton",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0911.4507
|
Cenk M. Yetis
|
Cenk M. Yetis, Tiangao Gou, Syed A. Jafar and Ahmet H. Kayran
|
On Feasibility of Interference Alignment in MIMO Interference Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the feasibility of interference alignment in signal vector space
-- based only on beamforming -- for K-user MIMO interference channels. Our main
contribution is to relate the feasibility issue to the problem of determining
the solvability of a multivariate polynomial system, considered extensively in
algebraic geometry. It is well known, e.g. from Bezout's theorem, that generic
polynomial systems are solvable if and only if the number of equations does not
exceed the number of variables. Following this intuition, we classify signal
space interference alignment problems as either proper or improper based on the
number of equations and variables. Rigorous connections between feasible and
proper systems are made through Bernshtein's theorem for the case where each
transmitter uses only one beamforming vector. The multi-beam case introduces
dependencies among the coefficients of a polynomial system so that the system
is no longer generic in the sense required by both theorems. In this case, we
show that the connection between feasible and proper systems can be further
strengthened (since the equivalency between feasible and proper systems does
not always hold) by including standard information theoretic outer bounds in
the feasibility analysis.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 22:36:15 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Yetis",
"Cenk M.",
""
],
[
"Gou",
"Tiangao",
""
],
[
"Jafar",
"Syed A.",
""
],
[
"Kayran",
"Ahmet H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4510
|
EPTCS
|
Giorgio Bacci (DiMI, University of Udine), Davide Grohmann (DiMI,
University of Udine), Marino Miculan (DiMI, University of Udine)
|
Bigraphical models for protein and membrane interactions
| null |
EPTCS 11, 2009, pp. 3-18
|
10.4204/EPTCS.11.1
| null |
cs.CE cs.LO q-bio.MN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a bigraphical framework suited for modeling biological systems
both at protein level and at membrane level. We characterize formally bigraphs
corresponding to biologically meaningful systems, and bigraphic rewriting rules
representing biologically admissible interactions. At the protein level, these
bigraphic reactive systems correspond exactly to systems of kappa-calculus.
Membrane-level interactions are represented by just two general rules, whose
application can be triggered by protein-level interactions in a well-de\"ined
and precise way. This framework can be used to compare and merge models at
different abstraction levels; in particular, higher-level (e.g. mobility)
activities can be given a formal biological justification in terms of low-level
(i.e., protein) interactions. As examples, we formalize in our framework the
vesiculation and the phagocytosis processes.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 22:57:45 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Bacci",
"Giorgio",
"",
"DiMI, University of Udine"
],
[
"Grohmann",
"Davide",
"",
"DiMI,\n University of Udine"
],
[
"Miculan",
"Marino",
"",
"DiMI, University of Udine"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4511
|
Gowtham Bellala
|
Gowtham Bellala, Suresh Bhavnani and Clayton Scott
|
Group-based Query Learning for rapid diagnosis in time-critical
situations
|
25 pages
| null | null | null |
stat.ML cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In query learning, the goal is to identify an unknown object while minimizing
the number of "yes or no" questions (queries) posed about that object. We
consider three extensions of this fundamental problem that are motivated by
practical considerations in real-world, time-critical identification tasks such
as emergency response. First, we consider the problem where the objects are
partitioned into groups, and the goal is to identify only the group to which
the object belongs. Second, we address the situation where the queries are
partitioned into groups, and an algorithm may suggest a group of queries to a
human user, who then selects the actual query. Third, we consider the problem
of query learning in the presence of persistent query noise, and relate it to
group identification. To address these problems we show that a standard
algorithm for query learning, known as the splitting algorithm or generalized
binary search, may be viewed as a generalization of Shannon-Fano coding. We
then extend this result to the group-based settings, leading to new algorithms.
The performance of our algorithms is demonstrated on simulated data and on a
database used by first responders for toxic chemical identification.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 19:53:54 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Bellala",
"Gowtham",
""
],
[
"Bhavnani",
"Suresh",
""
],
[
"Scott",
"Clayton",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4513
|
EPTCS
|
Giorgio Bacci (DiMI, University of Udine), Davide Grohmann (DiMI,
University of Udine), Marino Miculan (DiMI, University of Udine)
|
A framework for protein and membrane interactions
| null |
EPTCS 11, 2009, pp. 19-33
|
10.4204/EPTCS.11.2
| null |
cs.CE cs.LO q-bio.MN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the BioBeta Framework, a meta-model for both protein-level and
membrane-level interactions of living cells. This formalism aims to provide a
formal setting where to encode, compare and merge models at different
abstraction levels; in particular, higher-level (e.g. membrane) activities can
be given a formal biological justification in terms of low-level (i.e.,
protein) interactions. A BioBeta specification provides a protein signature
together a set of protein reactions, in the spirit of the kappa-calculus.
Moreover, the specification describes when a protein configuration triggers one
of the only two membrane interaction allowed, that is "pinch" and "fuse". In
this paper we define the syntax and semantics of BioBeta, analyse its
properties, give it an interpretation as biobigraphical reactive systems, and
discuss its expressivity by comparing with kappa-calculus and modelling
significant examples. Notably, BioBeta has been designed after a bigraphical
metamodel for the same purposes. Hence, each instance of the calculus
corresponds to a bigraphical reactive system, and vice versa (almost).
Therefore, we can inherith the rich theory of bigraphs, such as the automatic
construction of labelled transition systems and behavioural congruences.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 23:07:04 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Bacci",
"Giorgio",
"",
"DiMI, University of Udine"
],
[
"Grohmann",
"Davide",
"",
"DiMI,\n University of Udine"
],
[
"Miculan",
"Marino",
"",
"DiMI, University of Udine"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4521
|
Bruno Bauwens
|
Bruno Bauwens
|
On the equivalence between minimal sufficient statistics, minimal
typical models and initial segments of the Halting sequence
|
25 pages
| null | null | null |
cs.CC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown that the length of the algorithmic minimal sufficient statistic
of a binary string x, either in a representation of a finite set, computable
semimeasure, or a computable function, has a length larger than the
computational depth of x, and can solve the Halting problem for all programs
with length shorter than the m-depth of x. It is also shown that there are
strings for which the algorithmic minimal sufficient statistics can contain a
substantial amount of information that is not Halting information. The weak
sufficient statistic is introduced, and it is shown that a minimal weak
sufficient statistic for x is equivalent to a minimal typical model of x, and
to the Halting problem for all strings shorter than the BB-depth of x.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 23:57:53 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Bauwens",
"Bruno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4522
|
Arya Mazumdar
|
Alexander Barg, Arya Mazumdar
|
On the Number of Errors Correctable with Codes on Graphs
|
Published in the Ralf Koetter Memorial Issue of IEEE Transactions on
Information Theory
|
IEEE Transactions on Information Theory, Vol. 57, No. 2, February
2011
|
10.1109/TIT.2010.2094812
| null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study ensembles of codes on graphs (generalized low-density parity-check,
or LDPC codes) constructed from random graphs and fixed local constrained
codes, and their extension to codes on hypergraphs. It is known that the
average minimum distance of codes in these ensembles grows linearly with the
code length. We show that these codes can correct a linearly growing number of
errors under simple iterative decoding algorithms. In particular, we show that
this property extends to codes constructed by parallel concatenation of Hamming
codes and other codes with small minimum distance. Previously known results
that proved this property for graph codes relied on graph expansion and
required the choice of local codes with large distance relative to their
length.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 23:49:13 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2011 19:56:18 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4530
|
Xiaohu Shang
|
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor
|
MIMO Z-Interference Channels: Capacity Under Strong and Noisy
Interference
|
5 pages, presented at Asilomar 09
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The capacity regions of multiple-input multiple-output Gaussian
Z-interference channels are established for the very strong interference and
aligned strong interference cases. The sum-rate capacity of such channels is
established under noisy interference. These results generalize known results
for scalar Gaussian Z-interference channels.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 02:49:56 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4544
|
Anand Louis
|
Anand Louis, Nisheeth Vishnoi
|
Improved Algorithm for Degree Bounded Survivable Network Design Problem
| null | null |
10.1007/978-3-642-13731-0_38
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the Degree-Bounded Survivable Network Design Problem: the
objective is to find a minimum cost subgraph satisfying the given connectivity
requirements as well as the degree bounds on the vertices. If we denote the
upper bound on the degree of a vertex v by b(v), then we present an algorithm
that finds a solution whose cost is at most twice the cost of the optimal
solution while the degree of a degree constrained vertex v is at most 2b(v) +
2. This improves upon the results of Lau and Singh and that of Lau, Naor,
Salavatipour and Singh.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 05:27:19 GMT"
}
] | 2010-07-08T00:00:00 |
[
[
"Louis",
"Anand",
""
],
[
"Vishnoi",
"Nisheeth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4590
|
Toshimasa Ishii
|
Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno
|
A tight upper bound on the (2,1)-total labeling number of outerplanar
graphs
|
17 pages, 9figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $(2,1)$-total labeling of a graph $G$ is an assignment $f$ from the vertex
set $V(G)$ and the edge set $E(G)$ to the set $\{0,1,...,k\}$ of nonnegative
integers such that $|f(x)-f(y)|\ge 2$ if $x$ is a vertex and $y$ is an edge
incident to $x$, and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are a pair of adjacent
vertices or a pair of adjacent edges, for all $x$ and $y$ in $V(G)\cup E(G)$.
The $(2,1)$-total labeling number $\lambda^T_2(G)$ of a graph $G$ is defined as
the minimum $k$ among all possible assignments. In [D. Chen and W. Wang.
(2,1)-Total labelling of outerplanar graphs. Discr. Appl. Math. 155, 2585--2593
(2007)], Chen and Wang conjectured that all outerplanar graphs $G$ satisfy
$\lambda^T_2(G) \leq \Delta(G)+2$, where $\Delta(G)$ is the maximum degree of
$G$, while they also showed that it is true for $G$ with $\Delta(G)\geq 5$. In
this paper, we solve their conjecture completely, by proving that
$\lambda^T_2(G) \leq \Delta(G)+2$ even in the case of $\Delta(G)\leq 4 $.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 14:45:48 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Hasunuma",
"Toru",
""
],
[
"Ishii",
"Toshimasa",
""
],
[
"Ono",
"Hirotaka",
""
],
[
"Uno",
"Yushi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4626
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
A characterization of Konig-Egervary graphs using a common property of
all maximum matchings
|
9 pages, 5 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The independence number of a graph G, denoted by alpha(G), is the cardinality
of an independent set of maximum size in G, while mu(G) is the size of a
maximum matching in G, i.e., its matching number. G is a Konig-Egervary graph
if its order equals alpha(G)+mu(G). In this paper we give a new
characterization of Konig-Egervary graphs. We also deduce some properties of
vertices belonging to all maximum independent sets of a Konig-Egervary graph.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 13:32:12 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.4640
|
Ananthanarayanan Chockalingam
|
N. Srinidhi, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
|
Near-ML Signal Detection in Large-Dimension Linear Vector Channels Using
Reactive Tabu Search
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Low-complexity near-optimal signal detection in large dimensional
communication systems is a challenge. In this paper, we present a reactive tabu
search (RTS) algorithm, a heuristic based combinatorial optimization technique,
to achieve low-complexity near-maximum likelihood (ML) signal detection in
linear vector channels with large dimensions. Two practically important
large-dimension linear vector channels are considered: i) multiple-input
multiple-output (MIMO) channels with large number (tens) of transmit and
receive antennas, and ii) severely delay-spread MIMO inter-symbol interference
(ISI) channels with large number (tens to hundreds) of multipath components.
These channels are of interest because the former offers the benefit of
increased spectral efficiency (several tens of bps/Hz) and the latter offers
the benefit of high time-diversity orders. Our simulation results show that,
while algorithms including variants of sphere decoding do not scale well for
large dimensions, the proposed RTS algorithm scales well for signal detection
in large dimensions while achieving increasingly closer to ML performance for
increasing number of dimensions.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 15:04:52 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Srinidhi",
"N.",
""
],
[
"Mohammed",
"Saif K.",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4642
|
Isabel Rodet
|
Nicolas Castagn\'e (ACROE), Claude Cadoz (ACROE, ICA), Ali Allaoui
(ACROE, ICA), Olivier Michel Tache (ACROE)
|
G3 : GENESIS software envrionment update
| null |
International Computer Music Conference (ICMC), Montr\'eal :
Canada (2009)
| null | null |
cs.SD cs.HC cs.MM cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GENESIS3 is the new version of the GENESIS software environment for musical
creation by means of mass-interaction physics network modeling. It was
designed, and developed from scratch, in hindsight of more than 10 years
working on and using the previous version. We take the opportunity of this
birth to provide in this article (1) an analysis of the peculiarities in
GENESIS, aiming at highlighting its core ?software paradigm?; and (2) an update
on the features of the new version as compared to the last.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 15:07:37 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Castagné",
"Nicolas",
"",
"ACROE"
],
[
"Cadoz",
"Claude",
"",
"ACROE, ICA"
],
[
"Allaoui",
"Ali",
"",
"ACROE, ICA"
],
[
"Tache",
"Olivier Michel",
"",
"ACROE"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.4650
|
Gael Varoquaux
|
Ga\"el Varoquaux (INRIA Saclay - Ile de France, LNAO), Sepideh
Sadaghiani (LCogn), Jean Baptiste Poline (LNAO), Bertrand Thirion (INRIA
Saclay - Ile de France, LNAO)
|
CanICA: Model-based extraction of reproducible group-level ICA patterns
from fMRI time series
| null |
Medical Image Computing and Computer Aided Intervention, London :
United Kingdom (2009)
| null | null |
cs.CV stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spatial Independent Component Analysis (ICA) is an increasingly used
data-driven method to analyze functional Magnetic Resonance Imaging (fMRI)
data. To date, it has been used to extract meaningful patterns without prior
information. However, ICA is not robust to mild data variation and remains a
parameter-sensitive algorithm. The validity of the extracted patterns is hard
to establish, as well as the significance of differences between patterns
extracted from different groups of subjects. We start from a generative model
of the fMRI group data to introduce a probabilistic ICA pattern-extraction
algorithm, called CanICA (Canonical ICA). Thanks to an explicit noise model and
canonical correlation analysis, our method is auto-calibrated and identifies
the group-reproducible data subspace before performing ICA. We compare our
method to state-of-the-art multi-subject fMRI ICA methods and show that the
features extracted are more reproducible.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 15:25:38 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Varoquaux",
"Gaël",
"",
"INRIA Saclay - Ile de France, LNAO"
],
[
"Sadaghiani",
"Sepideh",
"",
"LCogn"
],
[
"Poline",
"Jean Baptiste",
"",
"LNAO"
],
[
"Thirion",
"Bertrand",
"",
"INRIA\n Saclay - Ile de France, LNAO"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0911.4704
|
Abdellatif Zaidi
|
Abdellatif Zaidi, Shiva Prasad Kotagiri, J. Nicholas Laneman, Luc
Vandendorpe
|
Cooperative Relaying with State Available Non-Causally at the Relay
|
62 pages. To appear in IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a three-terminal state-dependent relay channel with the channel
state noncausally available at only the relay. Such a model may be useful for
designing cooperative wireless networks with some terminals equipped with
cognition capabilities, i.e., the relay in our setup. In the discrete
memoryless (DM) case, we establish lower and upper bounds on channel capacity.
The lower bound is obtained by a coding scheme at the relay that uses a
combination of codeword splitting, Gel'fand-Pinsker binning, and
decode-and-forward relaying. The upper bound improves upon that obtained by
assuming that the channel state is available at the source, the relay, and the
destination. For the Gaussian case, we also derive lower and upper bounds on
the capacity. The lower bound is obtained by a coding scheme at the relay that
uses a combination of codeword splitting, generalized dirty paper coding, and
decode-and-forward relaying; the upper bound is also better than that obtained
by assuming that the channel state is available at the source, the relay, and
the destination. In the case of degraded Gaussian channels, the lower bound
meets with the upper bound for some special cases, and, so, the capacity is
obtained for these cases. Furthermore, in the Gaussian case, we also extend the
results to the case in which the relay operates in a half-duplex mode.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 20:15:43 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Zaidi",
"Abdellatif",
""
],
[
"Kotagiri",
"Shiva Prasad",
""
],
[
"Laneman",
"J. Nicholas",
""
],
[
"Vandendorpe",
"Luc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4724
|
Martin Roetteler
|
Martin Roetteler
|
Quantum algorithms to solve the hidden shift problem for quadratics and
for functions of large Gowers norm
|
12 pages, no figures, Proc. MFCS'09, LNCS vol. 5734, pp. 663-674,
2009. Mezzanine tranche of earlier paper arXiv:0811.3208
|
Proceedings MFCS'09, LNCS vol. 5734, pp. 663-674, 2009
|
10.1007/978-3-642-03816-7_56
| null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most quantum algorithms that give an exponential speedup over classical
algorithms exploit the Fourier transform in some way. In Shor's algorithm,
sampling from the quantum Fourier spectrum is used to discover periodicity of
the modular exponentiation function. In a generalization of this idea, quantum
Fourier sampling can be used to discover hidden subgroup structures of some
functions much more efficiently than it is possible classically. Another
problem for which the Fourier transform has been recruited successfully on a
quantum computer is the hidden shift problem. Quantum algorithms for hidden
shift problems usually have a slightly different flavor from hidden subgroup
algorithms, as they use the Fourier transform to perform a correlation with a
given reference function, instead of sampling from the Fourier spectrum
directly. In this paper we show that hidden shifts can be extracted efficiently
from Boolean functions that are quadratic forms. We also show how to identify
an unknown quadratic form on n variables using a linear number of queries, in
contrast to the classical case were this takes Theta(n^2) many queries to a
black box. What is more, we show that our quantum algorithm is robust in the
sense that it can also infer the shift if the function is close to a quadratic,
where we consider a Boolean function to be close to a quadratic if it has a
large Gowers U_3 norm.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 21:07:02 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Roetteler",
"Martin",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.4727
|
Gert De Cooman
|
Gert de Cooman and Erik Quaeghebeur
|
Exchangeability and sets of desirable gambles
|
40 pages
| null |
10.1016/j.ijar.2010.12.002
| null |
math.PR cs.AI math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sets of desirable gambles constitute a quite general type of uncertainty
model with an interesting geometrical interpretation. We give a general
discussion of such models and their rationality criteria. We study
exchangeability assessments for them, and prove counterparts of de Finetti's
finite and infinite representation theorems. We show that the finite
representation in terms of count vectors has a very nice geometrical
interpretation, and that the representation in terms of frequency vectors is
tied up with multivariate Bernstein (basis) polynomials. We also lay bare the
relationships between the representations of updated exchangeable models, and
discuss conservative inference (natural extension) under exchangeability and
the extension of exchangeable sequences.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 21:11:44 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Sep 2010 08:20:31 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Dec 2010 10:58:45 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"de Cooman",
"Gert",
""
],
[
"Quaeghebeur",
"Erik",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0911.4729
|
Tuhin Sahai
|
Tuhin Sahai, Alberto Speranzon and Andrzej Banaszuk
|
Hearing the clusters in a graph: A distributed algorithm
| null | null | null | null |
cs.DM cs.DC physics.comp-ph physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel distributed algorithm to cluster graphs. The algorithm
recovers the solution obtained from spectral clustering without the need for
expensive eigenvalue/vector computations. We prove that, by propagating waves
through the graph, a local fast Fourier transform yields the local component of
every eigenvector of the Laplacian matrix, thus providing clustering
information. For large graphs, the proposed algorithm is orders of magnitude
faster than random walk based approaches. We prove the equivalence of the
proposed algorithm to spectral clustering and derive convergence rates. We
demonstrate the benefit of using this decentralized clustering algorithm for
community detection in social graphs, accelerating distributed estimation in
sensor networks and efficient computation of distributed multi-agent search
strategies.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 21:50:51 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Dec 2009 18:06:25 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Jan 2010 23:54:39 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Jun 2010 21:03:33 GMT"
},
{
"version": "v5",
"created": "Fri, 15 Apr 2011 16:48:20 GMT"
},
{
"version": "v6",
"created": "Mon, 18 Apr 2011 00:20:49 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Sahai",
"Tuhin",
""
],
[
"Speranzon",
"Alberto",
""
],
[
"Banaszuk",
"Andrzej",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.4732
|
Qi Ge
|
Qi Ge, Daniel Stefankovic
|
A graph polynomial for independent sets of bipartite graphs
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new graph polynomial that encodes interesting properties of
graphs, for example, the number of matchings and the number of perfect
matchings. Most importantly, for bipartite graphs the polynomial encodes the
number of independent sets (#BIS).
We analyze the complexity of exact evaluation of the polynomial at rational
points and show that for most points exact evaluation is #P-hard (assuming the
generalized Riemann hypothesis) and for the rest of the points exact evaluation
is trivial.
We conjecture that a natural Markov chain can be used to approximately
evaluate the polynomial for a range of parameters. The conjecture, if true,
would imply an approximate counting algorithm for #BIS, a problem shown, by
[Dyer et al. 2004], to be complete (with respect to, so called, AP-reductions)
for a rich logically defined sub-class of #P. We give a mild support for our
conjecture by proving that the Markov chain is rapidly mixing on trees. As a
by-product we show that the "single bond flip" Markov chain for the random
cluster model is rapidly mixing on constant tree-width graphs.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2009 21:46:56 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Jan 2010 05:11:34 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Jan 2010 20:21:21 GMT"
},
{
"version": "v4",
"created": "Wed, 10 Feb 2010 16:25:22 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Ge",
"Qi",
""
],
[
"Stefankovic",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4752
|
Yao Yu
|
Yao Yu, Athina P. Petropulu and H. Vincent Poor
|
MIMO Radar Using Compressive Sampling
|
39 pages and 14 figures. Y. Yu, A. P. Petropulu and H. V. Poor, "MIMO
Radar Using Compressive Sampling," IEEE Journal of Selected Topics in Signal
Processing, to appear in Feb. 2010
| null |
10.1109/JSTSP.2009.2038973
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A MIMO radar system is proposed for obtaining angle and Doppler information
on potential targets. Transmitters and receivers are nodes of a small scale
wireless network and are assumed to be randomly scattered on a disk. The
transmit nodes transmit uncorrelated waveforms. Each receive node applies
compressive sampling to the received signal to obtain a small number of
samples, which the node subsequently forwards to a fusion center. Assuming that
the targets are sparsely located in the angle- Doppler space, based on the
samples forwarded by the receive nodes the fusion center formulates an
l1-optimization problem, the solution of which yields target angle and Doppler
information. The proposed approach achieves the superior resolution of MIMO
radar with far fewer samples than required by other approaches. This implies
power savings during the communication phase between the receive nodes and the
fusion center. Performance in the presence of a jammer is analyzed for the case
of slowly moving targets. Issues related to forming the basis matrix that spans
the angle-Doppler space, and for selecting a grid for that space are discussed.
Extensive simulation results are provided to demonstrate the performance of the
proposed approach at difference jammer and noise levels.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 03:19:13 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Yu",
"Yao",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4761
|
Theresa Velden
|
Theresa A. Velden, Asif-ul Haque, Carl J. Lagoze
|
A New Approach to Analyzing Patterns of Collaboration in Co-authorship
Networks - Mesoscopic Analysis and Interpretation
|
An earlier version of the paper was presented at ISSI 2009, 14-17
July, Rio de Janeiro, Brazil. Revised version accepted on 2 April 2010 for
publication in Scientometrics. Removed part on node-role connectivity profile
analysis after finding error in calculation and deciding to postpone
analysis.
| null |
10.1007/s11192-010-0224-6
| null |
cs.CY cs.DL physics.soc-ph
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper focuses on methods to study patterns of collaboration in
co-authorship networks at the mesoscopic level. We combine qualitative methods
(participant interviews) with quantitative methods (network analysis) and
demonstrate the application and value of our approach in a case study comparing
three research fields in chemistry. A mesoscopic level of analysis means that
in addition to the basic analytic unit of the individual researcher as node in
a co-author network, we base our analysis on the observed modular structure of
co-author networks. We interpret the clustering of authors into groups as
bibliometric footprints of the basic collective units of knowledge production
in a research specialty. We find two types of coauthor-linking patterns between
author clusters that we interpret as representing two different forms of
cooperative behavior, transfer-type connections due to career migrations or
one-off services rendered, and stronger, dedicated inter-group collaboration.
Hence the generic coauthor network of a research specialty can be understood as
the overlay of two distinct types of cooperative networks between groups of
authors publishing in a research specialty. We show how our analytic approach
exposes field specific differences in the social organization of research.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 04:42:44 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Apr 2010 16:44:35 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Velden",
"Theresa A.",
""
],
[
"Haque",
"Asif-ul",
""
],
[
"Lagoze",
"Carl J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.4792
|
Laurent Braud
|
Laurent Braud
|
Covering of ordinals
|
Accepted at FSTTCS'09
|
Proc. of FSTTCS 2009, pp.97-108
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper focuses on the structure of fundamental sequences of ordinals
smaller than $\epsilon_0$. A first result is the construction of a monadic
second-order formula identifying a given structure, whereas such a formula
cannot exist for ordinals themselves. The structures are precisely classified
in the pushdown hierarchy. Ordinals are also located in the hierarchy, and a
direct presentation is given.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 10:43:38 GMT"
}
] | 2010-06-17T00:00:00 |
[
[
"Braud",
"Laurent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.4821
|
Laurent Poinsot
|
Laurent Poinsot (LIPN), G\'erard Duchamp (LIPN), Christophe Tollu
(LIPN)
|
M\"obius inversion formula for monoids with zero
|
12 pages, r\'esum\'e \'etendu soumis \`a FPSAC 2010
|
Semigroup Forum (2010) 1-15
| null | null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The M\"obius inversion formula, introduced during the 19th century in number
theory, was generalized to a wide class of monoids called locally finite such
as the free partially commutative, plactic and hypoplactic monoids for
instance. In this contribution are developed and used some topological and
algebraic notions for monoids with zero, similar to ordinary objects such as
the (total) algebra of a monoid, the augmentation ideal or the star operation
on proper series. The main concern is to extend the study of the M\"obius
function to some monoids with zero, i.e., with an absorbing element, in
particular the so-called Rees quotients of locally finite monoids. Some
relations between the M\"obius functions of a monoid and its Rees quotient are
also provided.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 11:31:38 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 08:32:18 GMT"
}
] | 2010-09-30T00:00:00 |
[
[
"Poinsot",
"Laurent",
"",
"LIPN"
],
[
"Duchamp",
"Gérard",
"",
"LIPN"
],
[
"Tollu",
"Christophe",
"",
"LIPN"
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4833
|
Patricia Bouyer-Decitre
|
Patricia Bouyer, Thomas Brihaye, Fabrice Chevalier
|
O-Minimal Hybrid Reachability Games
| null |
Logical Methods in Computer Science, Volume 6, Issue 1 (January
12, 2010) lmcs:1206
|
10.2168/LMCS-6(1:1)2010
| null |
cs.LO cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider reachability games over general hybrid systems,
and distinguish between two possible observation frameworks for those games:
either the precise dynamics of the system is seen by the players (this is the
perfect observation framework), or only the starting point and the delays are
known by the players (this is the partial observation framework). In the first
more classical framework, we show that time-abstract bisimulation is not
adequate for solving this problem, although it is sufficient in the case of
timed automata . That is why we consider an other equivalence, namely the
suffix equivalence based on the encoding of trajectories through words. We show
that this suffix equivalence is in general a correct abstraction for games. We
apply this result to o-minimal hybrid systems, and get decidability and
computability results in this framework. For the second framework which assumes
a partial observation of the dynamics of the system, we propose another
abstraction, called the superword encoding, which is suitable to solve the
games under that assumption. In that framework, we also provide decidability
and computability results.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 12:33:37 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2010 21:41:23 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Bouyer",
"Patricia",
""
],
[
"Brihaye",
"Thomas",
""
],
[
"Chevalier",
"Fabrice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.4854
|
Giovanni Pardini
|
Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, Giovanni
Pardini, Aureliano Rama
|
A Process Calculus for Molecular Interaction Maps
|
15 pages; 8 figures; To be published on EPTCS, proceedings of MeCBIC
2009
|
EPTCS 11, 2009, pp. 33-49
|
10.4204/EPTCS.11.3
| null |
cs.CE cs.LO q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the MIM calculus, a modeling formalism with a strong biological
basis, which provides biologically-meaningful operators for representing the
interaction capabilities of molecular species. The operators of the calculus
are inspired by the reaction symbols used in Molecular Interaction Maps (MIMs),
a diagrammatic notation used by biologists. Models of the calculus can be
easily derived from MIM diagrams, for which an unambiguous and executable
interpretation is thus obtained. We give a formal definition of the syntax and
semantics of the MIM calculus, and we study properties of the formalism. A case
study is also presented to show the use of the calculus for modeling
biomolecular networks.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 14:17:40 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Barbuti",
"Roberto",
""
],
[
"Maggiolo-Schettini",
"Andrea",
""
],
[
"Milazzo",
"Paolo",
""
],
[
"Pardini",
"Giovanni",
""
],
[
"Rama",
"Aureliano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
}
] |
0911.4863
|
Frank Nielsen
|
Frank Nielsen and Vincent Garcia
|
Statistical exponential families: A digest with flash cards
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document describes concisely the ubiquitous class of exponential family
distributions met in statistics. The first part recalls definitions and
summarizes main properties and duality with Bregman divergences (all proofs are
skipped). The second part lists decompositions and related formula of common
exponential family distributions. We recall the Fisher-Rao-Riemannian
geometries and the dual affine connection information geometries of statistical
manifolds. It is intended to maintain and update this document and catalog by
adding new distribution items.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 14:26:54 GMT"
},
{
"version": "v2",
"created": "Fri, 13 May 2011 01:52:49 GMT"
}
] | 2011-05-16T00:00:00 |
[
[
"Nielsen",
"Frank",
""
],
[
"Garcia",
"Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.4874
|
Amelia Carolina Sparavigna
|
Amelia Carolina Sparavigna and Roberto Marazzato
|
Non-photorealistic image processing: an Impressionist rendering
|
Keywords: Image processing. Non-photorealistic processing.
Image-based rendering
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper describes an image processing for a non-photorealistic rendering.
The algorithm is based on a random choice of a set of pixels from those ot the
original image and substitution of them with colour spots. An iterative
procedure is applied to cover, at a desired level, the canvas. The resulting
effect mimics the impressionist painting and Pointillism.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 15:16:53 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Dec 2009 12:58:23 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Sparavigna",
"Amelia Carolina",
""
],
[
"Marazzato",
"Roberto",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0911.4880
|
Ali Hormati
|
Ali Hormati, Amin Karbasi, Soheil Mohajer, Martin Vetterli
|
An Estimation Theoretic Approach for Sparsity Pattern Recovery in the
Noisy Setting
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compressed sensing deals with the reconstruction of sparse signals using a
small number of linear measurements. One of the main challenges in compressed
sensing is to find the support of a sparse signal. In the literature, several
bounds on the scaling law of the number of measurements for successful support
recovery have been derived where the main focus is on random Gaussian
measurement matrices. In this paper, we investigate the noisy support recovery
problem from an estimation theoretic point of view, where no specific
assumption is made on the underlying measurement matrix. The linear
measurements are perturbed by additive white Gaussian noise. We define the
output of a support estimator to be a set of position values in increasing
order. We set the error between the true and estimated supports as the
$\ell_2$-norm of their difference. On the one hand, this choice allows us to
use the machinery behind the $\ell_2$-norm error metric and on the other hand,
converts the support recovery into a more intuitive and geometrical problem.
First, by using the Hammersley-Chapman-Robbins (HCR) bound, we derive a
fundamental lower bound on the performance of any \emph{unbiased} estimator of
the support set. This lower bound provides us with necessary conditions on the
number of measurements for reliable $\ell_2$-norm support recovery, which we
specifically evaluate for uniform Gaussian measurement matrices. Then, we
analyze the maximum likelihood estimator and derive conditions under which the
HCR bound is achievable. This leads us to the number of measurements for the
optimum decoder which is sufficient for reliable $\ell_2$-norm support
recovery. Using this framework, we specifically evaluate sufficient conditions
for uniform Gaussian measurement matrices.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 15:27:39 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Hormati",
"Ali",
""
],
[
"Karbasi",
"Amin",
""
],
[
"Mohajer",
"Soheil",
""
],
[
"Vetterli",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4896
|
Ali Tajer
|
Ali Tajer and Aria Nosratinia
|
Diversity Order in ISI Channels with Single-Carrier Frequency-Domain
Equalizers
|
30 pages, 6 figures, to appear in the IEEE Transactions on Wireless
Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper analyzes the diversity gain achieved by single-carrier
frequency-domain equalizer (SC-FDE) in frequency selective channels, and
uncovers the interplay between diversity gain $d$, channel memory length $\nu$,
transmission block length $L$, and the spectral efficiency $R$. We specifically
show that for the class of minimum means-square error (MMSE) SC-FDE receivers,
for rates $R\leq\log\frac{L}{\nu}$ full diversity of $d=\nu+1$ is achievable,
while for higher rates the diversity is given by $d=\lfloor2^{-R}L\rfloor+1$.
In other words, the achievable diversity gain depends not only on the channel
memory length, but also on the desired spectral efficiency and the transmission
block length. A similar analysis reveals that for zero forcing SC-FDE, the
diversity order is always one irrespective of channel memory length and
spectral efficiency. These results are supported by simulations.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 16:08:59 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Tajer",
"Ali",
""
],
[
"Nosratinia",
"Aria",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.