id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0911.3558
Loet Leydesdorff
Lutz Bornmann, Loet Leydesdorff, Peter van den Besselaar
A Meta-evaluation of Scientific Research Proposals: Different Ways of Comparing Rejected to Awarded Applications
null
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Combining different data sets with information on grant and fellowship applications submitted to two renowned funding agencies, we are able to compare their funding decisions (award and rejection) with scientometric performance indicators across two fields of science (life sciences and social sciences). The data sets involve 671 applications in social sciences and 668 applications in life sciences. In both fields, awarded applicants perform on average better than all rejected applicants. If only the most preeminent rejected applicants are considered in both fields, they score better than the awardees on citation impact. With regard to productivity we find differences between the fields: While the awardees in life sciences outperform on average the most preeminent rejected applicants, the situation is reversed in social sciences.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 14:41:41 GMT" } ]
2009-11-19T00:00:00
[ [ "Bornmann", "Lutz", "" ], [ "Leydesdorff", "Loet", "" ], [ "Besselaar", "Peter van den", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3581
Pasquale De Meo
P. De Meo, A. Garro, G. Terracina and D. Ursino
X-Learn: An XML-Based, Multi-agent System for Supporting "User-Device" Adaptive E-learning
18 pages, 5 figures
Proceedings of the International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE 2003), pages 739-756, Taormina, Italy, 2003. Lecture Notes in Computer Science, Springer
null
null
cs.CY cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present X-Learn, an XML-based, multi-agent system for supporting "user-device" adaptive e-learning. X-Learn is characterized by the following features: (i) it is highly subjective, since it handles quite a rich and detailed user profile that plays a key role during the learning activities; (ii) it is dynamic and flexible, i.e., it is capable of reacting to variations of exigencies and objectives; (iii) it is device-adaptive, since it decides the learning objects to present to the user on the basis of the device she/he is currently exploiting; (iv) it is generic, i.e., it is capable of operating in a large variety of learning contexts; (v) it is XML based, since it exploits many facilities of XML technology for handling and exchanging information connected to e-learning activities. The paper reports also various experimental results as well as a comparison between X-Learn and other related e-learning management systems already presented in the literature.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 15:59:42 GMT" } ]
2009-11-19T00:00:00
[ [ "De Meo", "P.", "" ], [ "Garro", "A.", "" ], [ "Terracina", "G.", "" ], [ "Ursino", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.3600
Pasquale De Meo
P. De Meo, G. Quattrone, G. Terracina, D. Ursino
"Almost automatic" and semantic integration of XML Schemas at various "severity" levels
18 pages, 3 Figures, 3 Tables
Proc. of the International Conference on Cooperative Information Systems (CoopIS 2003), pages 4 -21, Taormina, Italy, 2003. Lecture Notes in Computer Science, Springer
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach for the integration of a set of XML Schemas. The proposed approach is specialized for XML, is almost automatic, semantic and "light". As a further, original, peculiarity, it is parametric w.r.t. a "severity" level against which the integration task is performed. The paper describes the approach in all details, illustrates various theoretical results, presents the experiments we have performed for testing it and, finally, compares it with various related approaches already proposed in the literature.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 16:59:38 GMT" } ]
2009-11-19T00:00:00
[ [ "De Meo", "P.", "" ], [ "Quattrone", "G.", "" ], [ "Terracina", "G.", "" ], [ "Ursino", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0911.3633
Benjamin Rubinstein
Benjamin I. P. Rubinstein and J. Hyam Rubinstein
A Geometric Approach to Sample Compression
37 pages, 18 figures, submitted to the Journal of Machine Learning Research
null
null
null
cs.LG math.CO math.GT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sample Compression Conjecture of Littlestone & Warmuth has remained unsolved for over two decades. This paper presents a systematic geometric investigation of the compression of finite maximum concept classes. Simple arrangements of hyperplanes in Hyperbolic space, and Piecewise-Linear hyperplane arrangements, are shown to represent maximum classes, generalizing the corresponding Euclidean result. A main result is that PL arrangements can be swept by a moving hyperplane to unlabeled d-compress any finite maximum class, forming a peeling scheme as conjectured by Kuzmin & Warmuth. A corollary is that some d-maximal classes cannot be embedded into any maximum class of VC dimension d+k, for any constant k. The construction of the PL sweeping involves Pachner moves on the one-inclusion graph, corresponding to moves of a hyperplane across the intersection of d other hyperplanes. This extends the well known Pachner moves for triangulations to cubical complexes.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 19:22:09 GMT" } ]
2014-02-04T00:00:00
[ [ "Rubinstein", "Benjamin I. P.", "" ], [ "Rubinstein", "J. Hyam", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0911.3641
Loet Leydesdorff
Rob Goldstone, Loet Leydesdorff
The Import and Export of Cognitive Science
null
Cognitive Science 30(6) (2006), 983-993
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From its inception, a large part of the motivation for Cognitive Science has been the need for an interdisciplinary journal for the study of minds and intelligent systems. One threat to the interdisciplinarity of Cognitive Science, both the field and journal, is that it may become, or already be, too dominated by psychologists. In 2005, psychology was a keyword for 51% of submissions, followed distantly by linguistics (17%), artificial intelligence (13%), neuroscience (10%), computer science (9%), and philosophy (8%). The Institute for Scientific Information (ISI) gathers data not only on how individual articles cite one another, but also on macroscopic citation patterns among journals. Journals or sets of journals can be considered as proxies for fields. As fields become established, they often create journals. By studying the patterns of citations among journals that cite and are cited by Cognitive Science, we can better: 1) appreciate the scholarly ecology surrounding the journal and the journals role within this ecology, 2) establish competitor and alternate journals, and 3) determine the natural clustering of fields related to cognitive science.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 20:00:02 GMT" } ]
2009-11-19T00:00:00
[ [ "Goldstone", "Rob", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3643
Loet Leydesdorff
Iina Hellsten, Loet Leydesdorff, Paul Wouters
Multiple Presents: How Search Engines Re-write the Past
null
New Media & Society, 8(6) (2006), 901-924
null
null
cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet search engines function in a present which changes continuously. The search engines update their indices regularly, overwriting Web pages with newer ones, adding new pages to the index, and losing older ones. Some search engines can be used to search for information at the internet for specific periods of time. However, these 'date stamps' are not determined by the first occurrence of the pages in the Web, but by the last date at which a page was updated or a new page was added, and the search engine's crawler updated this change in the database. This has major implications for the use of search engines in scholarly research as well as theoretical implications for the conceptions of time and temporality. We examine the interplay between the different updating frequencies by using AltaVista and Google for searches at different moments of time. Both the retrieval of the results and the structure of the retrieved information erodes over time.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 20:05:51 GMT" } ]
2009-11-19T00:00:00
[ [ "Hellsten", "Iina", "" ], [ "Leydesdorff", "Loet", "" ], [ "Wouters", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3644
Iza Marfisi-Schottman
Franck Tarpin Bernard (LIESP), Iza Marfisi-Schottman (LIESP), Halima Habieb-Mammar (ICTT)
AnAmeter: The First Steps to Evaluating Adaptation
null
Sixth Workshop on User-Centred Design and Evaluation of Adaptive Systems, UMAP09 User Modeling, Adaptation, and Personalization, Trento : Italy (2009)
null
null
cs.HC cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the online AnAmeter framework that helps characterize the different types of adaptations a system features by helping the evaluator fill in a simple form. The provided information is then processed to obtain a quantitative evaluation of three parameters called global, semi-global and local adaptation degrees. By characterizing and quantifying adaptation, AnAmeter provides the first steps towards the evaluation of the quality of a system's adaptation. AnAmeter is an open tool available as freeware on the web and has been applied to a selection of well known systems. To build this evaluation grid we also collected a number of systems that cover the full range of adaptation types.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 20:08:34 GMT" } ]
2009-11-19T00:00:00
[ [ "Bernard", "Franck Tarpin", "", "LIESP" ], [ "Marfisi-Schottman", "Iza", "", "LIESP" ], [ "Habieb-Mammar", "Halima", "", "ICTT" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.3668
Mark McDonnell
Mark D. McDonnell and Adrian P. Flitney
Signal acquisition via polarization modulation in single photon sources
7 pages, 2 figures, accepted by Physical Review E. This version adds a reference
Physical Review E 80, 060102(R) (2009)
10.1103/PhysRevE.80.060102
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple model system is introduced for demonstrating how a single photon source might be used to transduce classical analog information. The theoretical scheme results in measurements of analog source samples that are (i) quantized in the sense of analog-to-digital conversion and (ii) corrupted by random noise that is solely due to the quantum uncertainty in detecting the polarization state of each photon. This noise is unavoidable if more than one bit per sample is to be transmitted, and we show how it may be exploited in a manner inspired by suprathreshold stochastic resonance. The system is analyzed information theoretically, as it can be modeled as a noisy optical communication channel, although unlike classical Poisson channels, the detector's photon statistics are binomial. Previous results on binomial channels are adapted to demonstrate numerically that the classical information capacity, and thus the accuracy of the transduction, increases logarithmically with the square root of the number of photons, N. Although the capacity is shown to be reduced when an additional detector nonideality is present, the logarithmic increase with N remains.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 22:05:28 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2009 04:01:19 GMT" } ]
2016-09-26T00:00:00
[ [ "McDonnell", "Mark D.", "" ], [ "Flitney", "Adrian P.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3672
Jan Cie\'sli\'nski L.
Jan L. Cieslinski
On the exact discretization of the classical harmonic oscillator equation
29 pages
Journal of Difference Equations and Applications 17(11) (2011) 1673-1694
10.1080/10236191003730563
null
math-ph cs.NA math.MP nlin.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the exact discretization of the classical harmonic oscillator equation (including the inhomogeneous case and multidimensional generalizations) with a special stress on the energy integral. We present and suggest some numerical applications.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 22:58:51 GMT" } ]
2023-03-20T00:00:00
[ [ "Cieslinski", "Jan L.", "" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" } ]
0911.3674
Sebastian Maneth
Omer Gim\'enez, Guillem Godoy, Sebastian Maneth
Deciding Regularity of the Set of Instances of a Set of Terms with Regular Constraints is EXPTIME-Complete
null
null
null
null
cs.SC cs.CC cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finite-state tree automata are a well studied formalism for representing term languages. This paper studies the problem of determining the regularity of the set of instances of a finite set of terms with variables, where each variable is restricted to instantiations of a regular set given by a tree automaton. The problem was recently proved decidable, but with an unknown complexity. Here, the exact complexity of the problem is determined by proving EXPTIME-completeness. The main contribution is a new, exponential time algorithm that performs various exponential transformations on the involved terms and tree automata, and decides regularity by analyzing formulas over inequality and height predicates.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 23:02:12 GMT" } ]
2009-11-20T00:00:00
[ [ "Giménez", "Omer", "" ], [ "Godoy", "Guillem", "" ], [ "Maneth", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.3676
Gerhard Kramer
Gerhard Kramer
Pipelined Encoding for Deterministic and Noisy Relay Networks
6 pages, 2 figures, 1 table; Presented at the 2009 Workshop on Network Coding, Theory, and Applications, EPFL, Lausanne, Switzerland, June 15-16, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent coding strategies for deterministic and noisy relay networks are related to the pipelining of block Markov encoding. For deterministic networks, it is shown that pipelined encoding improves encoding delay, as opposed to end-to-end delay. For noisy networks, it is observed that decode-and-forward exhibits good rate scaling when the signal-to-noise ratio (SNR) increases.
[ { "version": "v1", "created": "Wed, 18 Nov 2009 23:21:06 GMT" } ]
2009-11-20T00:00:00
[ [ "Kramer", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3708
Toby Walsh
Toby Walsh
Manipulability of Single Transferable Vote
Proceedings of the CARE'09 International Workshop on Collaborative Agents -- REsearch and Development, Melbourne 2009
null
null
null
cs.AI cs.CC cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For many voting rules, it is NP-hard to compute a successful manipulation. However, NP-hardness only bounds the worst-case complexity. Recent theoretical results suggest that manipulation may often be easy in practice. We study empirically the cost of manipulating the single transferable vote (STV) rule. This was one of the first rules shown to be NP-hard to manipulate. It also appears to be one of the harder rules to manipulate since it involves multiple rounds and since, unlike many other rules, it is NP-hard for a single agent to manipulate without weights on the votes or uncertainty about how the other agents have voted. In almost every election in our experiments, it was easy to compute how a single agent could manipulate the election or to prove that manipulation by a single agent was impossible. It remains an interesting open question if manipulation by a coalition of agents is hard to compute in practice.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 06:23:55 GMT" } ]
2012-04-18T00:00:00
[ [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.3717
Vir Dhar
V.K.Dhar, A.K.Tickoo, S.K.Kaul, R.Koul, B.P.Dubey
Artificial Neural Network-based error compensation procedure for low-cost encoders
16 pages, 4 figures. Accepted for Publication in Measurement Science and Technology (MST)
null
10.1088/0957-0233/21/1/015112
null
cs.NE astro-ph.IM physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An Artificial Neural Network-based error compensation method is proposed for improving the accuracy of resolver-based 16-bit encoders by compensating for their respective systematic error profiles. The error compensation procedure, for a particular encoder, involves obtaining its error profile by calibrating it on a precision rotary table, training the neural network by using a part of this data and then determining the corrected encoder angle by subtracting the ANN-predicted error from the measured value of the encoder angle. Since it is not guaranteed that all the resolvers will have exactly similar error profiles because of the inherent differences in their construction on a micro scale, the ANN has been trained on one error profile at a time and the corresponding weight file is then used only for compensating the systematic error of this particular encoder. The systematic nature of the error profile for each of the encoders has also been validated by repeated calibration of the encoders over a period of time and it was found that the error profiles of a particular encoder recorded at different epochs show near reproducible behavior. The ANN-based error compensation procedure has been implemented for 4 encoders by training the ANN with their respective error profiles and the results indicate that the accuracy of encoders can be improved by nearly an order of magnitude from quoted values of ~6 arc-min to ~0.65 arc-min when their corresponding ANN-generated weight files are used for determining the corrected encoder angle.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 07:51:03 GMT" } ]
2015-05-14T00:00:00
[ [ "Dhar", "V. K.", "" ], [ "Tickoo", "A. K.", "" ], [ "Kaul", "S. K.", "" ], [ "Koul", "R.", "" ], [ "Dubey", "B. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0911.3723
Tobias Kretz
Tobias Kretz
Applications of the Dynamic Distance Potential Field Method
Accepted as contribution to "Traffic and Granular Flow 09" proceedings. This is a slightly extended version
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently the dynamic distance potential field (DDPF) was introduced as a computationally efficient method to make agents in a simulation of pedestrians move rather on the quickest path than the shortest. It can be considered to be an estimated-remaining-journey-time-based one-shot dynamic assignment method for pedestrian route choice on the operational level of dynamics. In this contribution the method is shortly introduced and the effect of the method on RiMEA's test case 11 is investigated.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 08:38:30 GMT" } ]
2009-11-20T00:00:00
[ [ "Kretz", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.3753
Ronald Hochreiter
Ronald Hochreiter, David Wozabal
Evolutionary estimation of a Coupled Markov Chain credit risk model
null
Studies in Computational Intelligence 293: 31-44. 2010
10.1007/978-3-642-13950-5_3
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There exists a range of different models for estimating and simulating credit risk transitions to optimally manage credit risk portfolios and products. In this chapter we present a Coupled Markov Chain approach to model rating transitions and thereby default probabilities of companies. As the likelihood of the model turns out to be a non-convex function of the parameters to be estimated, we apply heuristics to find the ML estimators. To this extent, we outline the model and its likelihood function, and present both a Particle Swarm Optimization algorithm, as well as an Evolutionary Optimization algorithm to maximize the likelihood function. Numerical results are shown which suggest a further application of evolutionary optimization techniques for credit risk management.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 10:43:16 GMT" } ]
2014-01-21T00:00:00
[ [ "Hochreiter", "Ronald", "" ], [ "Wozabal", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0911.3784
Lucas Cordeiro Carvalho
Lucas Cordeiro, Bernd Fischer, and Joao Marques-Silva
Continuous Verification of Large Embedded Software using SMT-Based Bounded Model Checking
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall product quality. In this context, SAT-based bounded model checking has been successfully applied to discover subtle errors, but for larger applications, it often suffers from the state space explosion problem. This paper describes a new approach called continuous verification to detect design errors as quickly as possible by looking at the Software Configuration Management (SCM) system and by combining dynamic and static verification to reduce the state space to be explored. We also give a set of encodings that provide accurate support for program verification and use different background theories in order to improve scalability and precision in a completely automatic way. A case study from the telecommunications domain shows that the proposed approach improves the error-detection capability and reduces the overall verification time by up to 50%.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 12:48:54 GMT" } ]
2009-11-20T00:00:00
[ [ "Cordeiro", "Lucas", "" ], [ "Fischer", "Bernd", "" ], [ "Marques-Silva", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.3786
Frederic Prost
Dominique Duval (LJK), Rachid Echahed (LIG), Fr\'ed\'eric Prost (LIG)
Graph rewriting with polarized cloning
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the problem of graph transformation with a particular focus on node cloning. We propose a new approach to graph rewriting where nodes can be cloned zero, one or more times. A node can be cloned together with all its incident edges, with only its outgoing edges, with only its incoming edges or with none of its incident edges. We thus subsume previous works such as the sesqui-pushout, the heterogeneous pushout and the adaptive star grammars approaches. A rewrite rule is defined as a span where the right-hand and left-hand sides are graphs while the interface is a polarized graph. A polarized graph is a graph endowed with some annotations on nodes. The way a node is cloned is indicated by its polarization annotation. We use these annotations for designing graph transformation with polarized cloning. We show how a clone of a node can be built according to the different possible polarizations and define a rewrite step as a final pullback complement followed by a pushout. This is called the polarized sesqui-pushout approach. We also provide an algorithmic presentation of the proposed graph transformation with polarized cloning.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 12:54:50 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 09:36:22 GMT" }, { "version": "v3", "created": "Tue, 24 Apr 2012 07:11:36 GMT" } ]
2012-04-25T00:00:00
[ [ "Duval", "Dominique", "", "LJK" ], [ "Echahed", "Rachid", "", "LIG" ], [ "Prost", "Frédéric", "", "LIG" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3799
Bastian Laubner
Bastian Laubner
Capturing Polynomial Time on Interval Graphs
17 pages
Laubner, B.: Capturing polynomial time on interval graphs. In LICS 2010, pp. 199-208. 2010
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a characterization of all polynomial-time computable queries on the class of interval graphs by sentences of fixed-point logic with counting. More precisely, it is shown that on the class of unordered interval graphs, any query is polynomial-time computable if and only if it is definable in fixed-point logic with counting. This result is one of the first establishing the capturing of polynomial time on a graph class which is defined by forbidden induced subgraphs. For this, we define a canonical form of interval graphs using a type of modular decomposition, which is different from the method of tree decomposition that is used in most known capturing results for other graph classes, specifically those defined by forbidden minors. The method might also be of independent interest for its conceptual simplicity. Furthermore, it is shown that fixed-point logic with counting is not expressive enough to capture polynomial time on the classes of chordal graphs or incomparability graphs.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 14:29:45 GMT" }, { "version": "v2", "created": "Tue, 4 May 2010 12:17:54 GMT" }, { "version": "v3", "created": "Thu, 13 Jan 2011 15:44:34 GMT" } ]
2011-01-14T00:00:00
[ [ "Laubner", "Bastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.3823
Leonardo Ermann
Leonardo Ermann, Dima D.L. Shepelyansky
Google matrix and Ulam networks of intermittency maps
7 pages, 14 figures, research done at Quantware http://www.quantware.ups-tlse.fr/
PhysRev E. 81, 03622 (2010)
10.1103/PhysRevE.81.036221
null
cs.IR cond-mat.dis-nn nlin.AO nlin.CD physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the properties of the Google matrix of an Ulam network generated by intermittency maps. This network is created by the Ulam method which gives a matrix approximant for the Perron-Frobenius operator of dynamical map. The spectral properties of eigenvalues and eigenvectors of this matrix are analyzed. We show that the PageRank of the system is characterized by a power law decay with the exponent $\beta$ dependent on map parameters and the Google damping factor $\alpha$. Under certain conditions the PageRank is completely delocalized so that the Google search in such a situation becomes inefficient.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 15:24:51 GMT" } ]
2010-05-12T00:00:00
[ [ "Ermann", "Leonardo", "" ], [ "Shepelyansky", "Dima D. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3836
Edwin James Beggs
E. J. Beggs, J. F. Costa, J. V. Tucker
Limits to measurement in experiments governed by algorithms
32 pages approx
null
null
null
math.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We pose the following question: If a physical experiment were to be completely controlled by an algorithm, what effect would the algorithm have on the physical measurements made possible by the experiment? In a programme to study the nature of computation possible by physical systems, and by algorithms coupled with physical systems, we have begun to analyse (i) the algorithmic nature of experimental procedures, and (ii) the idea of using a physical experiment as an oracle to Turing Machines. To answer the question, we will extend our theory of experimental oracles in order to use Turing machines to model the experimental procedures that govern the conduct of physical experiments. First, we specify an experiment that measures mass via collisions in Newtonian Dynamics; we examine its properties in preparation for its use as an oracle. We start to classify the computational power of polynomial time Turing machines with this experimental oracle using non-uniform complexity classes. Second, we show that modelling an experimenter and experimental procedure algorithmically imposes a limit on what can be measured with equipment. Indeed, the theorems suggest a new form of uncertainty principle for our knowledge of physical quantities measured in simple physical experiments. We argue that the results established here are representative of a huge class of experiments.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 16:24:11 GMT" } ]
2009-11-20T00:00:00
[ [ "Beggs", "E. J.", "" ], [ "Costa", "J. F.", "" ], [ "Tucker", "J. V.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.3842
Luciano da Fontoura Costa
Debora C. Correa, Jose H. Saito and Luciano da F. Costa
Musical Genres: Beating to the Rhythms of Different Drums
35 pages, 13 figures, 13 tables
null
10.1088/1367-2630/12/5/053030
null
physics.data-an cs.IR cs.SD physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online music databases have increased signicantly as a consequence of the rapid growth of the Internet and digital audio, requiring the development of faster and more efficient tools for music content analysis. Musical genres are widely used to organize music collections. In this paper, the problem of automatic music genre classification is addressed by exploring rhythm-based features obtained from a respective complex network representation. A Markov model is build in order to analyse the temporal sequence of rhythmic notation events. Feature analysis is performed by using two multivariate statistical approaches: principal component analysis(unsupervised) and linear discriminant analysis (supervised). Similarly, two classifiers are applied in order to identify the category of rhythms: parametric Bayesian classifier under gaussian hypothesis (supervised), and agglomerative hierarchical clustering (unsupervised). Qualitative results obtained by Kappa coefficient and the obtained clusters corroborated the effectiveness of the proposed method.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 20:29:04 GMT" } ]
2015-05-14T00:00:00
[ [ "Correa", "Debora C.", "" ], [ "Saito", "Jose H.", "" ], [ "Costa", "Luciano da F.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.3856
Jorg Liebeherr
Jorg Liebeherr, Almut Burchard, Florin Ciucu
Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic
29 pages
IEEE Transactions on Information Theory 58 (2), 1010-1024, 2012
10.1109/TIT.2011.2173713
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide upper bounds on the end-to-end backlog and delay in a network with heavy-tailed and self-similar traffic. The analysis follows a network calculus approach where traffic is characterized by envelope functions and service is described by service curves. A key contribution of this paper is the derivation of a probabilistic sample path bound for heavy-tailed self-similar arrival processes, which is enabled by a suitable envelope characterization, referred to as `htss envelope'. We derive a heavy-tailed service curve for an entire network path when the service at each node on the path is characterized by heavy-tailed service curves. We obtain backlog and delay bounds for traffic that is characterized by an htss envelope and receives service given by a heavy-tailed service curve. The derived performance bounds are non-asymptotic in that they do not assume a steady-state, large buffer, or many sources regime. We also explore the scale of growth of delays as a function of the length of the path. The appendix contains an analysis for self-similar traffic with a Gaussian tail distribution.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 19:27:50 GMT" } ]
2013-12-30T00:00:00
[ [ "Liebeherr", "Jorg", "" ], [ "Burchard", "Almut", "" ], [ "Ciucu", "Florin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.3872
Mukul Agarwal
Mukul Agarwal, Anant Sahai, Sanjoy Mitter
Equivalence perspectives in communication, source-channel connections and universal source-channel separation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An operational perspective is used to understand the relationship between source and channel coding. This is based on a direct reduction of one problem to another that uses random coding (and hence common randomness) but unlike all prior work, does not involve any functional computations, in particular, no mutual-information computations. This result is then used to prove a universal source-channel separation theorem in the rate-distortion context where universality is in the sense of a compound ``general channel.''
[ { "version": "v1", "created": "Thu, 19 Nov 2009 19:08:41 GMT" } ]
2009-11-20T00:00:00
[ [ "Agarwal", "Mukul", "" ], [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3921
Sergey Loyka
Sergey Loyka, Victoria Kostina, Francois Gagnon
Error Rates of the Maximum-Likelihood Detector for Arbitrary Constellations: Convex/Concave Behavior and Applications
accepted by IEEE IT Transactions
IEEE Transactions on Information Theory, v. 56, N. 4, pp. 1948-1960, Apr. 2010
10.1109/TIT.2010.2040965
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by a recent surge of interest in convex optimization techniques, convexity/concavity properties of error rates of the maximum likelihood detector operating in the AWGN channel are studied and extended to frequency-flat slow-fading channels. Generic conditions are identified under which the symbol error rate (SER) is convex/concave for arbitrary multi-dimensional constellations. In particular, the SER is convex in SNR for any one- and two-dimensional constellation, and also in higher dimensions at high SNR. Pairwise error probability and bit error rate are shown to be convex at high SNR, for arbitrary constellations and bit mapping. Universal bounds for the SER 1st and 2nd derivatives are obtained, which hold for arbitrary constellations and are tight for some of them. Applications of the results are discussed, which include optimum power allocation in spatial multiplexing systems, optimum power/time sharing to decrease or increase (jamming problem) error rate, an implication for fading channels ("fading is never good in low dimensions") and optimization of a unitary-precoded OFDM system. For example, the error rate bounds of a unitary-precoded OFDM system with QPSK modulation, which reveal the best and worst precoding, are extended to arbitrary constellations, which may also include coding. The reported results also apply to the interference channel under Gaussian approximation, to the bit error rate when it can be expressed or approximated as a non-negative linear combination of individual symbol error rates, and to coded systems.
[ { "version": "v1", "created": "Thu, 19 Nov 2009 22:13:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Loyka", "Sergey", "" ], [ "Kostina", "Victoria", "" ], [ "Gagnon", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.3944
Patrick J. Wolfe
Christopher M. White, Sanjeev P. Khudanpur, and Patrick J. Wolfe
Likelihood-based semi-supervised model selection with applications to speech processing
11 pages, 2 figures; submitted for publication
IEEE Journal of Selected Topics in Signal Processing, vol. 4, pp. 1016-1026, 2010
10.1109/JSTSP.2010.2076050
null
stat.ML cs.CL cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In conventional supervised pattern recognition tasks, model selection is typically accomplished by minimizing the classification error rate on a set of so-called development data, subject to ground-truth labeling by human experts or some other means. In the context of speech processing systems and other large-scale practical applications, however, such labeled development data are typically costly and difficult to obtain. This article proposes an alternative semi-supervised framework for likelihood-based model selection that leverages unlabeled data by using trained classifiers representing each model to automatically generate putative labels. The errors that result from this automatic labeling are shown to be amenable to results from robust statistics, which in turn provide for minimax-optimal censored likelihood ratio tests that recover the nonparametric sign test as a limiting case. This approach is then validated experimentally using a state-of-the-art automatic speech recognition system to select between candidate word pronunciations using unlabeled speech data that only potentially contain instances of the words under test. Results provide supporting evidence for the utility of this approach, and suggest that it may also find use in other applications of machine learning.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 01:30:36 GMT" } ]
2011-08-25T00:00:00
[ [ "White", "Christopher M.", "" ], [ "Khudanpur", "Sanjeev P.", "" ], [ "Wolfe", "Patrick J.", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0911.3945
Xiaoming Zhang
Xiao Ming Zhang
A Semantic Grid Oriented to E-Tourism
12 PAGES, 7 Figures
Xiao Ming Zhang, A Semantic Grid Oriented to E-Tourism, In: CloudCom 2009, LNCS 5931, pp. 485-496, 2009, M.G. Jaatun, G. Zhao, and C. Rong (Eds.), Springer-Verlag Berlin Heidelberg 2009
10.1007/978-3-642-10665-1_44
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With increasing complexity of tourism business models and tasks, there is a clear need of the next generation e-Tourism infrastructure to support flexible automation, integration, computation, storage, and collaboration. Currently several enabling technologies such as semantic Web, Web service, agent and grid computing have been applied in the different e-Tourism applications, however there is no a unified framework to be able to integrate all of them. So this paper presents a promising e-Tourism framework based on emerging semantic grid, in which a number of key design issues are discussed including architecture, ontologies structure, semantic reconciliation, service and resource discovery, role based authorization and intelligent agent. The paper finally provides the implementation of the framework.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 01:51:30 GMT" } ]
2015-05-14T00:00:00
[ [ "Zhang", "Xiao Ming", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.3950
Hariharan Narayanan
Hariharan Narayanan
Randomized Interior Point methods for Sampling and Optimization
null
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Markov chain (Dikin walk) for sampling from a convex body equipped with a self-concordant barrier, whose mixing time from a "central point" is strongly polynomial in the description of the convex set. The mixing time of this chain is invariant under affine transformations of the convex set, thus eliminating the need for first placing the body in an isotropic position. This recovers and extends previous results of from polytopes to more general convex sets. On every convex set of dimension $n$, there exists a self-concordant barrier whose "complexity" is polynomially bounded. Consequently, a rapidly mixing Markov chain of the kind we describe can be defined on any convex set. We use these results to design an algorithm consisting of a single random walk for optimizing a linear function on a convex set. We show that this random walk reaches an approximately optimal point in polynomial time with high probability and that the corresponding objective values converge with probability 1 to the optimal objective value as the number of steps tends to infinity. One technical contribution is a family of lower bounds for the isoperimetric constants of (weighted) Riemannian manifolds on which, interior point methods perform a kind of steepest descent. Using results of Barthe \cite{barthe} and Bobkov and Houdr\'e, on the isoperimetry of products of (weighted) Riemannian manifolds, we obtain sharper upper bounds on the mixing time of Dikin walk on products of convex sets than the bounds obtained from a direct application of the Localization Lemma, on which, since (Lov\'asz and Simonovits), the analyses of all random walks on convex sets have relied.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 02:46:03 GMT" }, { "version": "v2", "created": "Sun, 18 Apr 2010 22:56:34 GMT" }, { "version": "v3", "created": "Sun, 16 Aug 2015 13:26:54 GMT" }, { "version": "v4", "created": "Sun, 15 Nov 2015 21:48:56 GMT" } ]
2015-11-17T00:00:00
[ [ "Narayanan", "Hariharan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.3961
Yohan Payan
Olivier Chenu (TIMC), Nicolas Vuillerme (TIMC), Jacques Demongeot (TIMC), Yohan Payan (TIMC)
A wireless lingual feedback device to reduce overpressures in seated posture: a feasibility study
null
PLoS ONE 4, 10 (2009) e7550
10.1371/journal.pone.0007550
null
physics.med-ph cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BACKGROUND: Pressure sores are localized injuries to the skin and underlying tissues and are mainly resulting from overpressure. Paraplegic peoples are particularly subjects to pressure sores because of long-time seated postures and sensory deprivation at the lower limbs. METHODOLOGY/PRINCIPAL FINDINGS: Here we report outcomes of a feasibility trial involving a biofeedback system aimed at reducing buttock overpressure whilst an individual is seated. The system consists of (1) pressure sensors, (2) a laptop coupling sensors and actuator (3) a wireless Tongue Display Unit (TDU) consisting of a circuit embedded in a dental retainer with electrodes put in contact with the tongue. The principle consists in (1) detecting overpressures in people who are seated over long periods of time, (2) estimating a postural change that could reduce these overpressures and (3) communicating this change through directional information transmitted by the TDU. Twenty-four healthy subjects voluntarily participated in this study. CONCLUSIONS/SIGNIFICANCE: The findings suggest that, in this trial, subjects were able to use a tongue tactile feedback system to reduce buttock overpressure while seated. Further evaluation of this system on paraplegic subjects remains to be done.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 04:33:07 GMT" } ]
2009-11-24T00:00:00
[ [ "Chenu", "Olivier", "", "TIMC" ], [ "Vuillerme", "Nicolas", "", "TIMC" ], [ "Demongeot", "Jacques", "", "TIMC" ], [ "Payan", "Yohan", "", "TIMC" ] ]
[ { "class": "Physics", "code": "physics.med-ph", "description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.", "span": "(Medical Physics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.3979
Daniel Gayo Avello
Daniel Gayo-Avello, David J. Brenes
Making the road by searching - A search engine based on Swarm Information Foraging
null
null
null
null
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search engines are nowadays one of the most important entry points for Internet users and a central tool to solve most of their information needs. Still, there exist a substantial amount of users' searches which obtain unsatisfactory results. Needless to say, several lines of research aim to increase the relevancy of the results users retrieve. In this paper the authors frame this problem within the much broader (and older) one of information overload. They argue that users' dissatisfaction with search engines is a currently common manifestation of such a problem, and propose a different angle from which to tackle with it. As it will be discussed, their approach shares goals with a current hot research topic (namely, learning to rank for information retrieval) but, unlike the techniques commonly applied in that field, their technique cannot be exactly considered machine learning and, additionally, it can be used to change the search engine's response in real-time, driven by the users behavior. Their proposal adapts concepts from Swarm Intelligence (in particular, Ant Algorithms) from an Information Foraging point of view. It will be shown that the technique is not only feasible, but also an elegant solution to the stated problem; what's more, it achieves promising results, both increasing the performance of a major search engine for informational queries, and substantially reducing the time users require to answer complex information needs.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 20:57:33 GMT" } ]
2009-11-23T00:00:00
[ [ "Gayo-Avello", "Daniel", "" ], [ "Brenes", "David J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.3992
Eitan Yaakobi
Anxiao (Andrew) Jiang, Robert Mateescu, Eitan Yaakobi, Jehoshua Bruck, Paul H. Siegel, Alexander Vardy, Jack K. Wolf
Storage Coding for Wear Leveling in Flash Memories
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell is implemented as either NAND or NOR floating gate. NAND flash is currently the most widely used type of flash memory. In a NAND flash memory, every block of cells consists of numerous pages; rewriting even a single page requires the whole block to be erased and reprogrammed. Block erasures determine both the longevity and the efficiency of a flash memory. Therefore, when data in a NAND flash memory are reorganized, minimizing the total number of block erasures required to achieve the desired data movement is an important goal. This leads to the flash data movement problem studied in this paper. We show that coding can significantly reduce the number of block erasures required for data movement, and present several optimal or nearly optimal data-movement algorithms based upon ideas from coding theory and combinatorics. In particular, we show that the sorting-based (non-coding) schemes require at least O(nlogn) erasures to move data among n blocks, whereas coding-based schemes require only O(n) erasures. Furthermore, coding-based schemes use only one auxiliary block, which is the best possible, and achieve a good balance between the number of erasures in each of the n+1 blocks.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 09:01:26 GMT" } ]
2009-11-23T00:00:00
[ [ "Anxiao", "", "", "Andrew" ], [ "Jiang", "", "" ], [ "Mateescu", "Robert", "" ], [ "Yaakobi", "Eitan", "" ], [ "Bruck", "Jehoshua", "" ], [ "Siegel", "Paul H.", "" ], [ "Vardy", "Alexander", "" ], [ "Wolf", "Jack K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4033
Anas Abou El Kalam
Mahmoud Mostafa (IRIT), Anas Abou El Kalam (IRIT), Christian Fraboul (IRIT)
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing
null
19th International Conference on Computer Theory and Applications (ICCTA 2009), Alexandria : Egypt (2009)
null
null
cs.CR cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
security and QoS are the two most precious objectives for network systems to be attained. Unfortunately, they are in conflict, while QoS tries to minimize processing delay, strong security protection requires more processing time and cause packet delay. This article is a step towards resolving this conflict by extending the firewall session table to accelerate NAT, QoS classification, and routing processing time while providing the same level of security protection. Index Terms ? stateful packet filtering; firewall; session/state table; QoS; NAT; Routing.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 12:56:49 GMT" } ]
2009-11-23T00:00:00
[ [ "Mostafa", "Mahmoud", "", "IRIT" ], [ "Kalam", "Anas Abou El", "", "IRIT" ], [ "Fraboul", "Christian", "", "IRIT" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.4034
Anas Abou El Kalam
Mahmoud Mostafa (IRIT), Anas Abou El Kalam (IRIT), Christian Fraboul (IRIT)
Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework
null
Third IEEE / IFIP International Conference on New Technologies, Mobility and Security, Cairo : Egypt (2009)
null
null
cs.CR cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements into account. QoS is the ability of the network to provide a service at an assured service level while optimizing the global usage of network resources. The QoS level that a flow receives depends on a six-bit identifier in the IP header; the so-called Differentiated Services code point (DSCP). Basically, Multi-Field classifiers classify a packet by inspecting IP/TCP headers, to decide how the packet should be processed. The current IPSec standard does hardly offer any guidance to do this, because the existing IPSec ESP security protocol hides much of this information in its encrypted payloads, preventing network control devices such as routers and switches from utilizing this information in performing classification appropriately. To solve this problem, we propose a QoS-friendly Encapsulated Security Payload (Q-ESP) as a new IPSec security protocol that provides both security and QoS supports. We also present our NetBSD kernel-based implementation as well as our evaluation results of Q-ESP.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 12:59:13 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2009 09:41:56 GMT" } ]
2009-12-09T00:00:00
[ [ "Mostafa", "Mahmoud", "", "IRIT" ], [ "Kalam", "Anas Abou El", "", "IRIT" ], [ "Fraboul", "Christian", "", "IRIT" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.4040
Maurice Margenstern
Margenstern Maurice
About a new splitting for the algorithmic study of the tilings $\{p,q\}$ of the hyperbolic plane when $q$ is odd
20 pages, 19 figures This version significantly improves version 1 of the paper, by answering questions remained open in the previous version and by bringing in a new solution to a case raised by the new study
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we remind previous results about the tilings $\{p,q\}$ of the hyperbolic plane. We introduce two new ways to split the hyperbolic plane in order to algorithmically construct the tilings $\{p,q\}$ when $q$ is odd.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 14:58:51 GMT" }, { "version": "v2", "created": "Sat, 19 Dec 2009 10:31:10 GMT" } ]
2009-12-19T00:00:00
[ [ "Maurice", "Margenstern", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.4046
Ryota Tomioka
Ryota Tomioka, Taiji Suzuki, Masashi Sugiyama
Super-Linear Convergence of Dual Augmented-Lagrangian Algorithm for Sparsity Regularized Estimation
51 pages, 9 figures
Journal of Machine Learning Research, 12(May):1537-1586, 2011
null
null
stat.ML cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the convergence behaviour of a recently proposed algorithm for regularized estimation called Dual Augmented Lagrangian (DAL). Our analysis is based on a new interpretation of DAL as a proximal minimization algorithm. We theoretically show under some conditions that DAL converges super-linearly in a non-asymptotic and global sense. Due to a special modelling of sparse estimation problems in the context of machine learning, the assumptions we make are milder and more natural than those made in conventional analysis of augmented Lagrangian algorithms. In addition, the new interpretation enables us to generalize DAL to wide varieties of sparse estimation problems. We experimentally confirm our analysis in a large scale $\ell_1$-regularized logistic regression problem and extensively compare the efficiency of DAL algorithm to previously proposed algorithms on both synthetic and benchmark datasets.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 13:44:28 GMT" }, { "version": "v2", "created": "Wed, 12 May 2010 12:33:07 GMT" }, { "version": "v3", "created": "Sun, 2 Jan 2011 07:04:21 GMT" } ]
2011-06-07T00:00:00
[ [ "Tomioka", "Ryota", "" ], [ "Suzuki", "Taiji", "" ], [ "Sugiyama", "Masashi", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0911.4047
Elvira Albert
G. Puebla and E. Albert and M. Hermenegildo
Efficient Local Unfolding with Ancestor Stacks
Number of pages: 32 Number of figures: 7 Number of Tables: 3
null
null
null
cs.PL cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most successful unfolding rules used nowadays in the partial evaluation of logic programs are based on well quasi orders (wqo) applied over (covering) ancestors, i.e., a subsequence of the atoms selected during a derivation. Ancestor (sub)sequences are used to increase the specialization power of unfolding while still guaranteeing termination and also to reduce the number of atoms for which the wqo has to be checked. Unfortunately, maintaining the structure of the ancestor relation during unfolding introduces significant overhead. We propose an efficient, practical local unfolding rule based on the notion of covering ancestors which can be used in combination with a wqo and allows a stack-based implementation without losing any opportunities for specialization. Using our technique, certain non-leftmost unfoldings are allowed as long as local unfolding is performed, i.e., we cover depth-first strategies.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 13:44:59 GMT" } ]
2009-11-23T00:00:00
[ [ "Puebla", "G.", "" ], [ "Albert", "E.", "" ], [ "Hermenegildo", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.4051
Pablo Arrighi
Pablo Arrighi, Gilles Dowek
A computational definition of the notion of vectorial space
14 pages, latex
Proc. of 5th International Workshop on Rewriting Logic and its Applications 2004 (WRLA) and ENTCS 117, 249-261, (2005).
null
null
cs.LO cs.PL cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We usually define an algebraic structure by a set, some operations defined on this set and some propositions that the algebraic structure must validate. In some cases, we can replace these propositions by an algorithm on terms constructed upon these operations that the algebraic structure must validate. We show in this note that this is the case for the notions of vectorial space and bilinear operation. KEYWORDS: Rewrite system, vector space, bilinear operation, tensorial product, semantics, quantum programming languages, probabilistic programming languages.
[ { "version": "v1", "created": "Fri, 20 Nov 2009 13:56:14 GMT" } ]
2009-11-23T00:00:00
[ [ "Arrighi", "Pablo", "" ], [ "Dowek", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0911.4146
Adrian Dumitrescu
Adrian Dumitrescu and Evan Hilscher
On convexification of polygons by pops
6 pages, 2 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a polygon $P$ in the plane, a {\em pop} operation is the reflection of a vertex with respect to the line through its adjacent vertices. We define a family of alternating polygons, and show that any polygon from this family cannot be convexified by pop operations. This family contains simple, as well as non-simple (i.e., self-intersecting) polygons, as desired. We thereby answer in the negative an open problem posed by Demaine and O'Rourke \cite[Open Problem 5.3]{DO07}.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 00:08:31 GMT" } ]
2009-11-24T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Hilscher", "Evan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.4150
Rajgopal Kannan
Rajgopal Kannan and Costas Busch
The Impact of Exponential Utility Costs in Bottleneck Routing Games
AMS Latex 10 pages 2 Figures
null
null
Louisiana State University Tech report LSU-CSC-09-01
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study bottleneck routing games where the social cost is determined by the worst congestion on any edge in the network. Bottleneck games have been studied in the literature by having the player's utility costs to be determined by the worst congested edge in their paths. However, the Nash equilibria of such games are inefficient since the price of anarchy can be very high with respect to the parameters of the game. In order to obtain smaller price of anarchy we explore {\em exponential bottleneck games} where the utility costs of the players are exponential functions on the congestion of the edges in their paths. We find that exponential bottleneck games are very efficient giving a poly-log bound on the price of anarchy: O(log L log |E|), where L is the largest path length in the players strategy sets and E is the set of edges in the graph.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 01:10:39 GMT" } ]
2009-11-24T00:00:00
[ [ "Kannan", "Rajgopal", "" ], [ "Busch", "Costas", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.4167
Ertem Tuncel
Jayanth Nayak, Ertem Tuncel, and Deniz Gunduz
Wyner-Ziv Coding over Broadcast Channels: Digital Schemes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses lossy transmission of a common source over a broadcast channel when there is correlated side information at the receivers, with emphasis on the quadratic Gaussian and binary Hamming cases. A digital scheme that combines ideas from the lossless version of the problem, i.e., Slepian-Wolf coding over broadcast channels, and dirty paper coding, is presented and analyzed. This scheme uses layered coding where the common layer information is intended for both receivers and the refinement information is destined only for one receiver. For the quadratic Gaussian case, a quantity characterizing the overall quality of each receiver is identified in terms of channel and side information parameters. It is shown that it is more advantageous to send the refinement information to the receiver with "better" overall quality. In the case where all receivers have the same overall quality, the presented scheme becomes optimal. Unlike its lossless counterpart, however, the problem eludes a complete characterization.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 08:20:59 GMT" } ]
2009-11-24T00:00:00
[ [ "Nayak", "Jayanth", "" ], [ "Tuncel", "Ertem", "" ], [ "Gunduz", "Deniz", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4178
Morgan Harvey
Morgan Harvey, Mark Baillie, Ian Ruthven, David Elsweiler
Folksonomic Tag Clouds as an Aid to Content Indexing
SIGIR 2009 Workshop on Search in Social Media (SSM 2009)
null
null
null
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social tagging systems have recently developed as a popular method of data organisation on the Internet. These systems allow users to organise their content in a way that makes sense to them, rather than forcing them to use a pre-determined and rigid set of categorisations. These folksonomies provide well populated sources of unstructured tags describing web resources which could potentially be used as semantic index terms for these resources. However getting people to agree on what tags best describe a resource is a difficult problem, therefore any feature which increases the consistency and stability of terms chosen would be extremely beneficial. We investigate how the provision of a tag cloud, a weighted list of terms commonly used to assist in browsing a folksonomy, during the tagging process itself influences the tags produced and how difficult the user perceived the task to be. We show that illustrating the most popular tags to users assists in the tagging process and encourages a stable and consistent folksonomy to form.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 12:55:54 GMT" } ]
2009-11-24T00:00:00
[ [ "Harvey", "Morgan", "" ], [ "Baillie", "Mark", "" ], [ "Ruthven", "Ian", "" ], [ "Elsweiler", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.4191
Shmuel Onn
Shmuel Onn
Theory and Applications of N-Fold Integer Programming
IMA Volume on Mixed Integer Nonlinear Programming, Frontier Series, Springer, to appear
null
null
null
math.OC cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We overview our recently introduced theory of n-fold integer programming which enables the polynomial time solution of fundamental linear and nonlinear integer programming problems in variable dimension. We demonstrate its power by obtaining the first polynomial time algorithms in several application areas including multicommodity flows and privacy in statistical databases.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 16:32:32 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2009 19:05:49 GMT" } ]
2010-06-07T00:00:00
[ [ "Onn", "Shmuel", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.4199
Ali Dehghan
Arash Ahadi, Ali Dehghan
Upper bounds for the 2-hued chromatic number of graphs in terms of the independence number
Dynamic chromatic number; conditional (k, 2)-coloring; 2-hued chromatic number; 2-hued coloring; Independence number; Probabilistic method
Discrete Applied Mathematics 160(2012)2142--2146
10.1016/j.dam.2012.05.003
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A 2-hued coloring of a graph $G$ (also known as conditional $(k, 2)$-coloring and dynamic coloring) is a coloring such that for every vertex $v\in V(G)$ of degree at least $2$, the neighbors of $v$ receive at least $2$ colors. The smallest integer $k$ such that $G$ has a 2-hued coloring with $ k $ colors, is called the {\it 2-hued chromatic number} of $G$ and denoted by $\chi_2(G)$. In this paper, we will show that if $G$ is a regular graph, then $ \chi_{2}(G)- \chi(G) \leq 2 \log _{2}(\alpha(G)) +\mathcal{O}(1) $ and if $G$ is a graph and $\delta(G)\geq 2$, then $ \chi_{2}(G)- \chi(G) \leq 1+\lceil \sqrt[\delta -1]{4\Delta^{2}} \rceil ( 1+ \log _{\frac{2\Delta(G)}{2\Delta(G)-\delta(G)}} (\alpha(G)) ) $ and in general case if $G$ is a graph, then $ \chi_{2}(G)- \chi(G) \leq 2+ \min \lbrace \alpha^{\prime}(G),\frac{\alpha(G)+\omega(G)}{2}\rbrace $.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 20:09:24 GMT" }, { "version": "v2", "created": "Mon, 22 Feb 2010 07:14:39 GMT" }, { "version": "v3", "created": "Wed, 14 Apr 2010 16:09:17 GMT" }, { "version": "v4", "created": "Fri, 2 Dec 2011 16:04:32 GMT" }, { "version": "v5", "created": "Mon, 26 Jan 2015 11:51:11 GMT" } ]
2017-02-06T00:00:00
[ [ "Ahadi", "Arash", "" ], [ "Dehghan", "Ali", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4202
Maxim Kolosovskiy
Maxim A. Kolosovskiy, Elena N. Kryuchkova (Altai State Technical University, Russia)
Network congestion control using NetFlow
10 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of congestion control is to avoid congestion in network elements. A network element is congested if it is being offered more traffic than it can process. To detect such situations and to neutralize them we should monitor traffic in the network. In this paper, we propose using Cisco's NetFlow technology, which allows collecting statistics about traffic in the network by generating special NetFlow packets. Cisco's routers can send NetFlow packets to a special node, so we can collect these packets, analyze its content and detect network congestion. We use Cisco's feature as example, some other vendors (Juniper, 3COM, Alcatel, etc.) provide similar features for their routers. We also consider a simple system, which collects statistical information about network elements, determines overloaded elements and identifies flows, which congest them.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 20:59:27 GMT" } ]
2009-11-24T00:00:00
[ [ "Kolosovskiy", "Maxim A.", "", "Altai State Technical\n University, Russia" ], [ "Kryuchkova", "Elena N.", "", "Altai State Technical\n University, Russia" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4203
Mathieu Boespflug
Mathieu Boespflug (LIX)
From Self-Interpreters to Normalization by Evaluation
null
2009 Workshop on Normalization by Evaluation, Los Angeles : \'Etats-Unis d'Am\'erique (2009)
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize normalization by evaluation as the composition of a self-interpreter with a self-reducer using a special representation scheme, in the sense of Mogensen (1992). We do so by deriving in a systematic way an untyped normalization by evaluation algorithm from a standard interpreter for the ?-calculus. The derived algorithm is not novel and indeed other published algorithms may be obtained in the same manner through appropriate adaptations to the representation scheme.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 21:19:33 GMT" } ]
2009-11-24T00:00:00
[ [ "Boespflug", "Mathieu", "", "LIX" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.4207
Rafael S. Calsaverini
Rafael S. Calsaverini, Renato Vicente
An information theoretic approach to statistical dependence: copula information
to appear in Europhysics Letters
Europ. Phys. Lett. 88 68003 (2009)
10.1209/0295-5075/88/68003
null
q-fin.ST cs.IT math.IT physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the connection between information and copula theories by showing that a copula can be employed to decompose the information content of a multivariate distribution into marginal and dependence components, with the latter quantified by the mutual information. We define the information excess as a measure of deviation from a maximum entropy distribution. The idea of marginal invariant dependence measures is also discussed and used to show that empirical linear correlation underestimates the amplitude of the actual correlation in the case of non-Gaussian marginals. The mutual information is shown to provide an upper bound for the asymptotic empirical log-likelihood of a copula. An analytical expression for the information excess of T-copulas is provided, allowing for simple model identification within this family. We illustrate the framework in a financial data set.
[ { "version": "v1", "created": "Sat, 21 Nov 2009 22:41:35 GMT" } ]
2011-10-26T00:00:00
[ [ "Calsaverini", "Rafael S.", "" ], [ "Vicente", "Renato", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.ST", "description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data", "span": "(Statistical Finance)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0911.4219
Andrea Montanari
David L. Donoho and Arian Maleki and Andrea Montanari
Message Passing Algorithms for Compressed Sensing: I. Motivation and Construction
5 pages, IEEE Information Theory Workshop, Cairo 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper, the authors proposed a new class of low-complexity iterative thresholding algorithms for reconstructing sparse signals from a small set of linear measurements \cite{DMM}. The new algorithms are broadly referred to as AMP, for approximate message passing. This is the first of two conference papers describing the derivation of these algorithms, connection with the related literature, extensions of the original framework, and new empirical evidence. In particular, the present paper outlines the derivation of AMP from standard sum-product belief propagation, and its extension in several directions. We also discuss relations with formal calculations based on statistical mechanics methods.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 03:00:43 GMT" } ]
2009-11-24T00:00:00
[ [ "Donoho", "David L.", "" ], [ "Maleki", "Arian", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4222
Andrea Montanari
David L. Donoho and Arian Maleki and Andrea Montanari
Message Passing Algorithms for Compressed Sensing: II. Analysis and Validation
5 pages, 3 pdf figures, IEEE Information Theory Workshop, Cairo 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper, the authors proposed a new class of low-complexity iterative thresholding algorithms for reconstructing sparse signals from a small set of linear measurements \cite{DMM}. The new algorithms are broadly referred to as AMP, for approximate message passing. This is the second of two conference papers describing the derivation of these algorithms, connection with related literature, extensions of original framework, and new empirical evidence. This paper describes the state evolution formalism for analyzing these algorithms, and some of the conclusions that can be drawn from this formalism. We carried out extensive numerical simulations to confirm these predictions. We present here a few representative results.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 02:54:51 GMT" } ]
2009-11-24T00:00:00
[ [ "Donoho", "David L.", "" ], [ "Maleki", "Arian", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4223
Alberto Pepe
Alberto Pepe, Marko A. Rodriguez
Collaboration in sensor network research: an in-depth longitudinal analysis of assortative mixing patterns
Scientometrics (In press)
Scientometrics. Volume 84, Number 3. 2010
10.1007/s11192-009-0147-2
null
physics.data-an cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many investigations of scientific collaboration are based on statistical analyses of large networks constructed from bibliographic repositories. These investigations often rely on a wealth of bibliographic data, but very little or no other information about the individuals in the network, and thus, fail to illustrate the broader social and academic landscape in which collaboration takes place. In this article, we perform an in-depth longitudinal analysis of a relatively small network of scientific collaboration (N = 291) constructed from the bibliographic record of a research center involved in the development and application of sensor network and wireless technologies. We perform a preliminary analysis of selected structural properties of the network, computing its range, configuration and topology. We then support our preliminary statistical analysis with an in-depth temporal investigation of the assortative mixing of selected node characteristics, unveiling the researchers' propensity to collaborate preferentially with others with a similar academic profile. Our qualitative analysis of mixing patterns offers clues as to the nature of the scientific community being modeled in relation to its organizational, disciplinary, institutional, and international arrangements of collaboration.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 03:04:36 GMT" }, { "version": "v2", "created": "Fri, 11 Dec 2009 20:18:26 GMT" } ]
2010-12-24T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.4230
M Sabu THAMPI
Sabu M. Thampi
Introduction to Bioinformatics
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bioinformatics is a new discipline that addresses the need to manage and interpret the data that in the past decade was massively generated by genomic research. This discipline represents the convergence of genomics, biotechnology and information technology, and encompasses analysis and interpretation of data, modeling of biological phenomena, and development of algorithms and statistics. This article presents an introduction to bioinformatics
[ { "version": "v1", "created": "Sun, 22 Nov 2009 04:07:08 GMT" } ]
2009-11-24T00:00:00
[ [ "Thampi", "Sabu M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0911.4238
Chia-Mu Yu
Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo
Secure Multidimensional Queries in Tiered Sensor Networks
null
null
null
null
cs.NI cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, aiming at securing range query, top-k query, and skyline query in tiered sensor networks, we propose the Secure Range Query (SRQ), Secure Top-$k$ Query (STQ), and Secure Skyline Query (SSQ) schemes, respectively. In particular, SRQ, by using our proposed \emph{prime aggregation} technique, has the lowest communication overhead among prior works, while STQ and SSQ, to our knowledge, are the first proposals in tiered sensor networks for securing top-$k$ and skyline queries, respectively. Moreover, the relatively unexplored issue of the security impact of sensor node compromises on multidimensional queries is studied; two attacks incurred from the sensor node compromises, \emph{collusion attack} and \emph{false-incrimination attack}, are investigated in this paper. After developing a novel technique called \emph{subtree sampling}, we also explore methods of efficiently mitigating the threat of sensor node compromises. Performance analyses regarding the probability for detecting incomplete query-results and communication cost of the proposed schemes are also studied.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 08:36:13 GMT" }, { "version": "v2", "created": "Wed, 16 Dec 2009 15:46:53 GMT" } ]
2009-12-16T00:00:00
[ [ "Yu", "Chia-Mu", "" ], [ "Lu", "Chun-Shien", "" ], [ "Kuo", "Sy-Yen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4239
Chia-Mu Yu
Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo
Constrained Function Based En-Route Filtering for Sensor Networks
26 pages, single column, extension from a preliminary version appeared in IEEE WCNC 2009
null
null
null
cs.NI cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor networks are vulnerable to \emph{false data injection attack} and \emph{path-based DoS} (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an \emph{en-route filtering} scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication (CFA) scheme, which can be thought of as a hash function directly supporting the en-route filtering functionality. Together with the \emph{redundancy property} of sensor networks, which means that an event can be simultaneously observed by multiple sensor nodes, the devised CFA scheme is used to construct a CFA-based en-route filtering (CFAEF) scheme. In contrast to most of the existing methods, which rely on complicated security associations among sensor nodes, our design, which directly exploits an en-route filtering hash function, appears to be novel. We examine the CFA and CFAEF schemes from both the theoretical and numerical aspects to demonstrate their efficiency and effectiveness.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 08:56:07 GMT" } ]
2009-11-24T00:00:00
[ [ "Yu", "Chia-Mu", "" ], [ "Lu", "Chun-Shien", "" ], [ "Kuo", "Sy-Yen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4262
Iza Marfisi-Schottman
Iza Marfisi-Schottman (LIESP), Aymen Sghaier (LIESP), S\'ebastien George (LIESP), Franck Tarpin-Bernard (LIESP), Patrick Pr\'ev\^ot (LIESP)
Towards Industrialized Conception and Production of Serious Games
null
ICTE INTERNATIONAL CONFERENCE ON TECHNOLOGY AND EDUCATION, Paris : France (2009)
null
null
cs.LG cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Serious Games (SGs) have experienced a tremendous outburst these last years. Video game companies have been producing fun, user-friendly SGs, but their educational value has yet to be proven. Meanwhile, cognition research scientist have been developing SGs in such a way as to guarantee an educational gain, but the fun and attractive characteristics featured often would not meet the public's expectations. The ideal SG must combine these two aspects while still being economically viable. In this article, we propose a production chain model to efficiently conceive and produce SGs that are certified for their educational gain and fun qualities. Each step of this chain will be described along with the human actors, the tools and the documents that intervene.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 16:01:09 GMT" } ]
2009-11-24T00:00:00
[ [ "Marfisi-Schottman", "Iza", "", "LIESP" ], [ "Sghaier", "Aymen", "", "LIESP" ], [ "George", "Sébastien", "", "LIESP" ], [ "Tarpin-Bernard", "Franck", "", "LIESP" ], [ "Prévôt", "Patrick", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.4288
Kyoung-Dae Kim
Kyoung-Dae Kim and P. R. Kumar
The Importance, Design and Implementation of a Middleware for Networked Control Systems
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the advancement of computing and communication technology, networked control systems may soon become prevalent in many control applications. While the capability of employing the communication network in the control loop certainly provides many benefits, it also raises several challenges which need to be overcome to utilize the benefits. In this chapter, we focus on one major challenge: a middleware framework that enables a networked control system to be implemented. Indeed our thesis is that a middleware for networked control sys important for the future of networked control systems. We discuss the fundamental issues which need to be considered in the design and development of an appropriate middleware for networked control systems. We describe \emph{Etherware}, a middleware for networked control system which has been developed at the University of Illinois, as an example of such a middleware framework, to illustrate how these issues can be addressed in the design of a middleware. Using a networked inverted pendulum control system as an example, we demonstrate the powerful capabilities provided by Etherware for a networked control system.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 21:11:56 GMT" } ]
2009-11-24T00:00:00
[ [ "Kim", "Kyoung-Dae", "" ], [ "Kumar", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4292
Loet Leydesdorff
Loet Leydesdorff
Similarity Measures, Author Cocitation Analysis, and Information Theory
null
Journal of the American Society for Information Science & Technology, 56(7), 2005, 769-772
null
null
cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of Pearson's correlation coefficient in Author Cocitation Analysis was compared with Salton's cosine measure in a number of recent contributions. Unlike the Pearson correlation, the cosine is insensitive to the number of zeros. However, one has the option of applying a logarithmic transformation in correlation analysis. Information calculus is based on both the logarithmic transformation and provides a non-parametric statistics. Using this methodology one can cluster a document set in a precise way and express the differences in terms of bits of information. The algorithm is explained and used on the data set which was made the subject of this discussion.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 21:35:51 GMT" } ]
2009-11-24T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.4302
Loet Leydesdorff
Diana Lucio-Arias, Loet Leydesdorff
An Indicator of Research Front Activity: Measuring Intellectual Organization as Uncertainty Reduction in Document Sets
null
Journal of the American Society for Information Science & Technology 60(12) (2009) 2488-2498
null
null
cs.DL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When using scientific literature to model scholarly discourse, a research specialty can be operationalized as an evolving set of related documents. Each publication can be expected to contribute to the further development of the specialty at the research front. The specific combinations of title words and cited references in a paper can then be considered as a signature of the knowledge claim in the paper: new words and combinations of words can be expected to represent variation, while each paper is at the same time selectively positioned into the intellectual organization of a field using context-relevant references. Can the mutual information among these three dimensions--title words, cited references, and sequence numbers--be used as an indicator of the extent to which intellectual organization structures the uncertainty prevailing at a research front? The effect of the discovery of nanotubes (1991) on the previously existing field of fullerenes is used as a test case. Thereafter, this method is applied to science studies with a focus on scientometrics using various sample delineations. An emerging research front about citation analysis can be indicated.
[ { "version": "v1", "created": "Sun, 22 Nov 2009 22:12:55 GMT" } ]
2009-11-24T00:00:00
[ [ "Lucio-Arias", "Diana", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.4313
Joaquin Garcia-Alfaro
Joaquin Garcia-Alfaro, Michel Barbeau, Evangelos Kranakis
Evaluation of Anonymized ONS Queries
14 pages
Proc. 2008 Security of Autonomous and Spontaneous Networks, Editions Publibook Universite, pages 47-60, Loctudy, Brittany, France, October, 2008
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 00:40:26 GMT" } ]
2009-11-27T00:00:00
[ [ "Garcia-Alfaro", "Joaquin", "" ], [ "Barbeau", "Michel", "" ], [ "Kranakis", "Evangelos", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4322
Alexander Gutfraind
Alexander Gutfraind, Kiyan Ahmadizadeh
Markovian Network Interdiction and the Four Color Theorem
7 pages, 2 figures
null
null
LA-UR-09-07611
cs.DM cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Unreactive Markovian Evader Interdiction Problem (UME) asks to optimally place sensors on a network to detect Markovian motion by one or more "evaders". It was previously proved that finding the optimal sensor placement is NP-hard if the number of evaders is unbounded. Here we show that the problem is NP-hard with just 2 evaders using a connection to coloring of planar graphs. The results suggest that approximation algorithms are needed even in applications where the number of evaders is small. It remains an open problem to determine the complexity of the 1-evader case or to devise efficient algorithms.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 03:57:04 GMT" } ]
2009-11-24T00:00:00
[ [ "Gutfraind", "Alexander", "" ], [ "Ahmadizadeh", "Kiyan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.4329
Ki-Hoon Lee
Ki-Hoon Lee, Kyu-Young Whang, Wook-Shin Han, and Min-Soo Kim
Structural Consistency: Enabling XML Keyword Search to Eliminate Spurious Results Consistently
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML keyword search is a user-friendly way to query XML data using only keywords. In XML keyword search, to achieve high precision without sacrificing recall, it is important to remove spurious results not intended by the user. Efforts to eliminate spurious results have enjoyed some success by using the concepts of LCA or its variants, SLCA and MLCA. However, existing methods still could find many spurious results. The fundamental cause for the occurrence of spurious results is that the existing methods try to eliminate spurious results locally without global examination of all the query results and, accordingly, some spurious results are not consistently eliminated. In this paper, we propose a novel keyword search method that removes spurious results consistently by exploiting the new concept of structural consistency.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 06:45:37 GMT" }, { "version": "v2", "created": "Tue, 24 Nov 2009 01:00:10 GMT" } ]
2009-11-24T00:00:00
[ [ "Lee", "Ki-Hoon", "" ], [ "Whang", "Kyu-Young", "" ], [ "Han", "Wook-Shin", "" ], [ "Kim", "Min-Soo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0911.4332
Swaminathan Sankararaman
Swaminathan Sankararaman, Alon Efrat, Srinivasan Ramasubramanian, Javad Taheri
Scheduling Sensors for Guaranteed Sparse Coverage
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor networks are particularly applicable to the tracking of objects in motion. For such applications, it may not necessary that the whole region be covered by sensors as long as the uncovered region is not too large. This notion has been formalized by Balasubramanian et.al. as the problem of $\kappa$-weak coverage. This model of coverage provides guarantees about the regions in which the objects may move undetected. In this paper, we analyse the theoretical aspects of the problem and provide guarantees about the lifetime achievable. We introduce a number of practical algorithms and analyse their significance. The main contribution is a novel linear programming based algorithm which provides near-optimal lifetime. Through extensive experimentation, we analyse the performance of these algorithms based on several parameters defined.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 07:11:49 GMT" }, { "version": "v2", "created": "Fri, 26 Feb 2010 19:41:27 GMT" } ]
2010-02-26T00:00:00
[ [ "Sankararaman", "Swaminathan", "" ], [ "Efrat", "Alon", "" ], [ "Ramasubramanian", "Srinivasan", "" ], [ "Taheri", "Javad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4337
Srikanth Srinivasan
Vikraman Arvind, Srikanth Srinivasan
Circuit Lower Bounds, Help Functions, and the Remote Point Problem
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the power of Algebraic Branching Programs (ABPs) augmented with help polynomials, and constant-depth Boolean circuits augmented with help functions. We relate the problem of proving explicit lower bounds in both these models to the Remote Point Problem (introduced by Alon, Panigrahy, and Yekhanin (RANDOM '09)). More precisely, proving lower bounds for ABPs with help polynomials is related to the Remote Point Problem w.r.t. the rank metric, and for constant-depth circuits with help functions it is related to the Remote Point Problem w.r.t. the Hamming metric. For algebraic branching programs with help polynomials with some degree restrictions we show exponential size lower bounds for explicit polynomials.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 08:25:40 GMT" } ]
2009-11-24T00:00:00
[ [ "Arvind", "Vikraman", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.4351
Sonny Ben-Shimon
Sonny Ben-Shimon, Michael Krivelevich, Benny Sudakov
Local resilience and Hamiltonicity Maker-Breaker games in random-regular graphs
34 pages. 1 figure
Combinatorics, Probability, and Computing, 20(2):173--211, 2011
10.1017/S0963548310000453
null
math.CO cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For an increasing monotone graph property $\mP$ the \emph{local resilience} of a graph $G$ with respect to $\mP$ is the minimal $r$ for which there exists of a subgraph $H\subseteq G$ with all degrees at most $r$ such that the removal of the edges of $H$ from $G$ creates a graph that does not possesses $\mP$. This notion, which was implicitly studied for some ad-hoc properties, was recently treated in a more systematic way in a paper by Sudakov and Vu. Most research conducted with respect to this distance notion focused on the Binomial random graph model $\GNP$ and some families of pseudo-random graphs with respect to several graph properties such as containing a perfect matching and being Hamiltonian, to name a few. In this paper we continue to explore the local resilience notion, but turn our attention to random and pseudo-random \emph{regular} graphs of constant degree. We investigate the local resilience of the typical random $d$-regular graph with respect to edge and vertex connectivity, containing a perfect matching, and being Hamiltonian. In particular we prove that for every positive $\epsilon$ and large enough values of $d$ with high probability the local resilience of the random $d$-regular graph, $\GND$, with respect to being Hamiltonian is at least $(1-\epsilon)d/6$. We also prove that for the Binomial random graph model $\GNP$, for every positive $\epsilon>0$ and large enough values of $K$, if $p>\frac{K\ln n}{n}$ then with high probability the local resilience of $\GNP$ with respect to being Hamiltonian is at least $(1-\epsilon)np/6$. Finally, we apply similar techniques to Positional Games and prove that if $d$ is large enough then with high probability a typical random $d$-regular graph $G$ is such that in the unbiased Maker-Breaker game played on the edges of $G$, Maker has a winning strategy to create a Hamilton cycle.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 10:16:58 GMT" }, { "version": "v2", "created": "Wed, 17 Mar 2010 23:31:35 GMT" }, { "version": "v3", "created": "Wed, 9 Jun 2010 16:18:51 GMT" }, { "version": "v4", "created": "Sun, 20 Jun 2010 23:49:55 GMT" } ]
2011-02-01T00:00:00
[ [ "Ben-Shimon", "Sonny", "" ], [ "Krivelevich", "Michael", "" ], [ "Sudakov", "Benny", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0911.4357
Virag Shah
Virag Shah, Neelesh B. Mehta, Raymond Yim
Splitting Algorithms for Fast Relay Selection: Generalizations, Analysis, and a Unified View
20 pages, 7 figures, 1 table, Accepted for publication in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2010.04.091364
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, we develop a novel, yet simple, asymptotic analysis of a splitting-based multiple access selection algorithm to find the single best relay. The analysis leads to simpler and alternate expressions for the average number of slots required to find the best user. By introducing a new `contention load' parameter, the analysis shows that the parameter settings used in the existing literature can be improved upon. New and simple bounds are also derived. Furthermore, we propose a new algorithm that addresses the general problem of selecting the best $Q \ge 1$ relays, and analyze and optimize it. Even for a large number of relays, the algorithm selects the best two relays within 4.406 slots and the best three within 6.491 slots, on average. We also propose a new and simple scheme for the practically relevant case of discrete metrics. Altogether, our results develop a unifying perspective about the general problem of distributed selection in cooperative systems and several other multi-node systems.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 11:20:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Shah", "Virag", "" ], [ "Mehta", "Neelesh B.", "" ], [ "Yim", "Raymond", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4366
Gwena\"el Joret
Samuel Fiorini, Gwena\"el Joret, Ugo Pietropaoli
Hitting Diamonds and Growing Cacti
v2: several minor changes.
null
10.1007/978-3-642-13036-6_15
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following NP-hard problem: in a weighted graph, find a minimum cost set of vertices whose removal leaves a graph in which no two cycles share an edge. We obtain a constant-factor approximation algorithm, based on the primal-dual method. Moreover, we show that the integrality gap of the natural LP relaxation of the problem is \Theta(\log n), where n denotes the number of vertices in the graph.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 11:14:06 GMT" }, { "version": "v2", "created": "Sun, 21 Mar 2010 21:03:38 GMT" } ]
2015-05-14T00:00:00
[ [ "Fiorini", "Samuel", "" ], [ "Joret", "Gwenaël", "" ], [ "Pietropaoli", "Ugo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4375
De Comite Francesco
Francesco De Comite, Jean-Paul Delahaye
Automated Proofs in Geometry : Computing Upper Bounds for the Heilbronn Problem for Triangles
null
null
null
null
cs.CG cs.DM cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for computing upper bounds for the Heilbronn problem for triangles.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 11:43:21 GMT" }, { "version": "v2", "created": "Thu, 10 Dec 2009 12:18:59 GMT" }, { "version": "v3", "created": "Mon, 8 Mar 2010 09:52:12 GMT" } ]
2010-03-09T00:00:00
[ [ "De Comite", "Francesco", "" ], [ "Delahaye", "Jean-Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0911.4384
Magnus Lie Hetland
Magnus Lie Hetland
Ptolemaic Indexing
null
Journ. of Comp. Geom., JoCG, vol 6, no 1 (2015) 165-184
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a new family of bounds for use in similarity search, related to those used in metric indexing, but based on Ptolemy's inequality, rather than the metric axioms. Ptolemy's inequality holds for the well-known Euclidean distance, but is also shown here to hold for quadratic form metrics in general, with Mahalanobis distance as an important special case. The inequality is examined empirically on both synthetic and real-world data sets and is also found to hold approximately, with a very low degree of error, for important distances such as the angular pseudometric and several Lp norms. Indexing experiments demonstrate a highly increased filtering power compared to existing, triangular methods. It is also shown that combining the Ptolemaic and triangular filtering can lead to better results than using either approach on its own.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 12:16:15 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 21:57:13 GMT" }, { "version": "v3", "created": "Thu, 2 Jul 2015 11:57:30 GMT" } ]
2015-07-08T00:00:00
[ [ "Hetland", "Magnus Lie", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4385
Mauricio Cerda
Mauricio Cerda (INRIA Lorraine - LORIA), Lucas Terissi, Bernard Girau (INRIA Lorraine - LORIA)
Bio-inspired speed detection and discrimination
null
4th International Conference on Bio-Inspired Models of Network, Information, and Computing Systems, Avignon : France (2009)
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the field of computer vision, a crucial task is the detection of motion (also called optical flow extraction). This operation allows analysis such as 3D reconstruction, feature tracking, time-to-collision and novelty detection among others. Most of the optical flow extraction techniques work within a finite range of speeds. Usually, the range of detection is extended towards higher speeds by combining some multiscale information in a serial architecture. This serial multi-scale approach suffers from the problem of error propagation related to the number of scales used in the algorithm. On the other hand, biological experiments show that human motion perception seems to follow a parallel multiscale scheme. In this work we present a bio-inspired parallel architecture to perform detection of motion, providing a wide range of operation and avoiding error propagation associated with the serial architecture. To test our algorithm, we perform relative error comparisons between both classical and proposed techniques, showing that the parallel architecture is able to achieve motion detection with results similar to the serial approach.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 12:23:39 GMT" } ]
2009-11-24T00:00:00
[ [ "Cerda", "Mauricio", "", "INRIA Lorraine - LORIA" ], [ "Terissi", "Lucas", "", "INRIA Lorraine - LORIA" ], [ "Girau", "Bernard", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.4395
M Sabu THAMPI
Sabu M. Thampi
Introduction to Distributed Systems
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing has passed through many transformations since the birth of the first computing machines. Developments in technology have resulted in the availability of fast and inexpensive processors, and progresses in communication technology have resulted in the availability of lucrative and highly proficient computer networks. Among these, the centralized networks have one component that is shared by users all the time. All resources are accessible, but there is a single point of control as well as a single point of failure. The integration of computer and networking technologies gave birth to new paradigm of computing called distributed computing in the late 1970s. Distributed computing has changed the face of computing and offered quick and precise solutions for a variety of complex problems for different fields. Nowadays, we are fully engrossed by the information age, and expending more time communicating and gathering information through the Internet. The Internet keeps on progressing along more than a few magnitudes, abiding end systems increasingly to communicate in more and more different ways. Over the years, several methods have evolved to enable these developments, ranging from simplistic data sharing to advanced systems supporting a multitude of services. This article provides an overview of distributed computing systems. The definition, architecture, characteristics of distributed systems and the various distributed computing fallacies are discussed in the beginning. Finally, discusses client/server computing, World Wide Web and types of distributed systems.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 13:14:35 GMT" } ]
2009-11-24T00:00:00
[ [ "Thampi", "Sabu M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.4414
Arijit Laha Ph.D.
Nikhil R. Pal, Arijit Laha and J. Das
Designing fuzzy rule based classifier using self-organizing feature map for analysis of multispectral satellite images
23 pages, 7 figures
International Journal of Remote Sensing, Volume 26, No 10, Pages 2219-2240, May 2005
10.1080/01431160500033419
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel scheme for designing fuzzy rule based classifier. An SOFM based method is used for generating a set of prototypes which is used to generate a set of fuzzy rules. Each rule represents a region in the feature space that we call the context of the rule. The rules are tuned with respect to their context. We justified that the reasoning scheme may be different in different context leading to context sensitive inferencing. To realize context sensitive inferencing we used a softmin operator with a tunable parameter. The proposed scheme is tested on several multispectral satellite image data sets and the performance is found to be much better than the results reported in the literature.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 14:26:00 GMT" } ]
2015-05-14T00:00:00
[ [ "Pal", "Nikhil R.", "" ], [ "Laha", "Arijit", "" ], [ "Das", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.4416
Arijit Laha Ph.D.
Arijit Laha, Nikhil R. Pal, and J. Das
Land cover classification using fuzzy rules and aggregation of contextual information through evidence theory
14 pages, 2 figures
IEEE Transactions on Geoscience and Remote Sensing, Vol. 44, No. 6, pp. 1633-1642, June 2006
10.1109/TGRS.2006.864391
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Land cover classification using multispectral satellite image is a very challenging task with numerous practical applications. We propose a multi-stage classifier that involves fuzzy rule extraction from the training data and then generation of a possibilistic label vector for each pixel using the fuzzy rule base. To exploit the spatial correlation of land cover types we propose four different information aggregation methods which use the possibilistic class label of a pixel and those of its eight spatial neighbors for making the final classification decision. Three of the aggregation methods use Dempster-Shafer theory of evidence while the remaining one is modeled after the fuzzy k-NN rule. The proposed methods are tested with two benchmark seven channel satellite images and the results are found to be quite satisfactory. They are also compared with a Markov random field (MRF) model-based contextual classification method and found to perform consistently better.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 14:33:27 GMT" } ]
2015-05-14T00:00:00
[ [ "Laha", "Arijit", "" ], [ "Pal", "Nikhil R.", "" ], [ "Das", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.4432
Aylin Yener
Xiang He, Aylin Yener
The Role of Feedback in Two-way Secure Communications
51 pages. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most practical communication links are bi-directional. In these models, since the source node also receives signals, its encoder has the option of computing its output based on the signals it received in the past. On the other hand, from a practical point of view, it would also be desirable to identify the cases where such an encoder design may not improve communication rates. This question is particularly interesting for the case where the transmitted messages and the feedback signals are subject to eavesdropping. In this work, we investigate the question of how much impact the feedback has on the secrecy capacity by studying two fundamental models. First, we consider the Gaussian two-way wiretap channel and derive an outer bound for its secrecy capacity region. We show that the secrecy rate loss can be unbounded when feedback signals are not utilized except for a special case we identify, and thus conclude that utilizing feedback can be highly beneficial in general. Second, we consider a half-duplex Gaussian two-way relay channel where the relay node is also an eavesdropper, and find that the impact of feedback is less pronounced compared to the previous scenario. Specifically, the loss in secrecy rate, when ignoring the feedback, is quantified to be less than 0.5 bit per channel use when the relay power goes to infinity. This achievable rate region is obtained with simple time sharing along with cooperative jamming, which, with its simplicity and near optimum performance, is a viable alternative to an encoder that utilizes feedback signals.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 15:54:53 GMT" } ]
2009-11-24T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4459
Petros Petrosyan
Petros A. Petrosyan
Interval edge colorings of some products of graphs
14 pages, 5 figures, minor changes
null
null
null
cs.DM
http://creativecommons.org/licenses/by/3.0/
An edge coloring of a graph $G$ with colors $1,2,\ldots ,t$ is called an interval $t$-coloring if for each $i\in \{1,2,\ldots,t\}$ there is at least one edge of $G$ colored by $i$, and the colors of edges incident to any vertex of $G$ are distinct and form an interval of integers. A graph $G$ is interval colorable, if there is an integer $t\geq 1$ for which $G$ has an interval $t$-coloring. Let $\mathfrak{N}$ be the set of all interval colorable graphs. In 2004 Kubale and Giaro showed that if $G,H\in \mathfrak{N}$, then the Cartesian product of these graphs belongs to $\mathfrak{N}$. Also, they formulated a similar problem for the lexicographic product as an open problem. In this paper we first show that if $G\in \mathfrak{N}$, then $G[nK_{1}]\in \mathfrak{N}$ for any $n\in \mathbf{N}$. Furthermore, we show that if $G,H\in \mathfrak{N}$ and $H$ is a regular graph, then strong and lexicographic products of graphs $G,H$ belong to $\mathfrak{N}$. We also prove that tensor and strong tensor products of graphs $G,H$ belong to $\mathfrak{N}$ if $G\in \mathfrak{N}$ and $H$ is a regular graph.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 18:26:31 GMT" }, { "version": "v2", "created": "Thu, 12 Aug 2010 07:15:58 GMT" } ]
2010-08-13T00:00:00
[ [ "Petrosyan", "Petros A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4498
Anton Korobeynikov
Anton Korobeynikov
Computation- and Space-Efficient Implementation of SSA
27 pages, 8 figures
Statistics and Its Interface, 3 (3), 2010, pp 357-368
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computational complexity of different steps of the basic SSA is discussed. It is shown that the use of the general-purpose "blackbox" routines (e.g. found in packages like LAPACK) leads to huge waste of time resources since the special Hankel structure of the trajectory matrix is not taken into account. We outline several state-of-the-art algorithms (for example, Lanczos-based truncated SVD) which can be modified to exploit the structure of the trajectory matrix. The key components here are hankel matrix-vector multiplication and hankelization operator. We show that both can be computed efficiently by the means of Fast Fourier Transform. The use of these methods yields the reduction of the worst-case computational complexity from O(N^3) to O(k N log(N)), where N is series length and k is the number of eigentriples desired.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 21:41:17 GMT" }, { "version": "v2", "created": "Tue, 13 Apr 2010 18:42:16 GMT" } ]
2012-07-02T00:00:00
[ [ "Korobeynikov", "Anton", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0911.4507
Cenk M. Yetis
Cenk M. Yetis, Tiangao Gou, Syed A. Jafar and Ahmet H. Kayran
On Feasibility of Interference Alignment in MIMO Interference Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the feasibility of interference alignment in signal vector space -- based only on beamforming -- for K-user MIMO interference channels. Our main contribution is to relate the feasibility issue to the problem of determining the solvability of a multivariate polynomial system, considered extensively in algebraic geometry. It is well known, e.g. from Bezout's theorem, that generic polynomial systems are solvable if and only if the number of equations does not exceed the number of variables. Following this intuition, we classify signal space interference alignment problems as either proper or improper based on the number of equations and variables. Rigorous connections between feasible and proper systems are made through Bernshtein's theorem for the case where each transmitter uses only one beamforming vector. The multi-beam case introduces dependencies among the coefficients of a polynomial system so that the system is no longer generic in the sense required by both theorems. In this case, we show that the connection between feasible and proper systems can be further strengthened (since the equivalency between feasible and proper systems does not always hold) by including standard information theoretic outer bounds in the feasibility analysis.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 22:36:15 GMT" } ]
2009-11-25T00:00:00
[ [ "Yetis", "Cenk M.", "" ], [ "Gou", "Tiangao", "" ], [ "Jafar", "Syed A.", "" ], [ "Kayran", "Ahmet H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4510
EPTCS
Giorgio Bacci (DiMI, University of Udine), Davide Grohmann (DiMI, University of Udine), Marino Miculan (DiMI, University of Udine)
Bigraphical models for protein and membrane interactions
null
EPTCS 11, 2009, pp. 3-18
10.4204/EPTCS.11.1
null
cs.CE cs.LO q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a bigraphical framework suited for modeling biological systems both at protein level and at membrane level. We characterize formally bigraphs corresponding to biologically meaningful systems, and bigraphic rewriting rules representing biologically admissible interactions. At the protein level, these bigraphic reactive systems correspond exactly to systems of kappa-calculus. Membrane-level interactions are represented by just two general rules, whose application can be triggered by protein-level interactions in a well-de\"ined and precise way. This framework can be used to compare and merge models at different abstraction levels; in particular, higher-level (e.g. mobility) activities can be given a formal biological justification in terms of low-level (i.e., protein) interactions. As examples, we formalize in our framework the vesiculation and the phagocytosis processes.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 22:57:45 GMT" } ]
2009-11-25T00:00:00
[ [ "Bacci", "Giorgio", "", "DiMI, University of Udine" ], [ "Grohmann", "Davide", "", "DiMI,\n University of Udine" ], [ "Miculan", "Marino", "", "DiMI, University of Udine" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4511
Gowtham Bellala
Gowtham Bellala, Suresh Bhavnani and Clayton Scott
Group-based Query Learning for rapid diagnosis in time-critical situations
25 pages
null
null
null
stat.ML cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In query learning, the goal is to identify an unknown object while minimizing the number of "yes or no" questions (queries) posed about that object. We consider three extensions of this fundamental problem that are motivated by practical considerations in real-world, time-critical identification tasks such as emergency response. First, we consider the problem where the objects are partitioned into groups, and the goal is to identify only the group to which the object belongs. Second, we address the situation where the queries are partitioned into groups, and an algorithm may suggest a group of queries to a human user, who then selects the actual query. Third, we consider the problem of query learning in the presence of persistent query noise, and relate it to group identification. To address these problems we show that a standard algorithm for query learning, known as the splitting algorithm or generalized binary search, may be viewed as a generalization of Shannon-Fano coding. We then extend this result to the group-based settings, leading to new algorithms. The performance of our algorithms is demonstrated on simulated data and on a database used by first responders for toxic chemical identification.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 19:53:54 GMT" } ]
2009-11-25T00:00:00
[ [ "Bellala", "Gowtham", "" ], [ "Bhavnani", "Suresh", "" ], [ "Scott", "Clayton", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4513
EPTCS
Giorgio Bacci (DiMI, University of Udine), Davide Grohmann (DiMI, University of Udine), Marino Miculan (DiMI, University of Udine)
A framework for protein and membrane interactions
null
EPTCS 11, 2009, pp. 19-33
10.4204/EPTCS.11.2
null
cs.CE cs.LO q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the BioBeta Framework, a meta-model for both protein-level and membrane-level interactions of living cells. This formalism aims to provide a formal setting where to encode, compare and merge models at different abstraction levels; in particular, higher-level (e.g. membrane) activities can be given a formal biological justification in terms of low-level (i.e., protein) interactions. A BioBeta specification provides a protein signature together a set of protein reactions, in the spirit of the kappa-calculus. Moreover, the specification describes when a protein configuration triggers one of the only two membrane interaction allowed, that is "pinch" and "fuse". In this paper we define the syntax and semantics of BioBeta, analyse its properties, give it an interpretation as biobigraphical reactive systems, and discuss its expressivity by comparing with kappa-calculus and modelling significant examples. Notably, BioBeta has been designed after a bigraphical metamodel for the same purposes. Hence, each instance of the calculus corresponds to a bigraphical reactive system, and vice versa (almost). Therefore, we can inherith the rich theory of bigraphs, such as the automatic construction of labelled transition systems and behavioural congruences.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 23:07:04 GMT" } ]
2009-11-25T00:00:00
[ [ "Bacci", "Giorgio", "", "DiMI, University of Udine" ], [ "Grohmann", "Davide", "", "DiMI,\n University of Udine" ], [ "Miculan", "Marino", "", "DiMI, University of Udine" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4521
Bruno Bauwens
Bruno Bauwens
On the equivalence between minimal sufficient statistics, minimal typical models and initial segments of the Halting sequence
25 pages
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that the length of the algorithmic minimal sufficient statistic of a binary string x, either in a representation of a finite set, computable semimeasure, or a computable function, has a length larger than the computational depth of x, and can solve the Halting problem for all programs with length shorter than the m-depth of x. It is also shown that there are strings for which the algorithmic minimal sufficient statistics can contain a substantial amount of information that is not Halting information. The weak sufficient statistic is introduced, and it is shown that a minimal weak sufficient statistic for x is equivalent to a minimal typical model of x, and to the Halting problem for all strings shorter than the BB-depth of x.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 23:57:53 GMT" } ]
2009-11-25T00:00:00
[ [ "Bauwens", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4522
Arya Mazumdar
Alexander Barg, Arya Mazumdar
On the Number of Errors Correctable with Codes on Graphs
Published in the Ralf Koetter Memorial Issue of IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, Vol. 57, No. 2, February 2011
10.1109/TIT.2010.2094812
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study ensembles of codes on graphs (generalized low-density parity-check, or LDPC codes) constructed from random graphs and fixed local constrained codes, and their extension to codes on hypergraphs. It is known that the average minimum distance of codes in these ensembles grows linearly with the code length. We show that these codes can correct a linearly growing number of errors under simple iterative decoding algorithms. In particular, we show that this property extends to codes constructed by parallel concatenation of Hamming codes and other codes with small minimum distance. Previously known results that proved this property for graph codes relied on graph expansion and required the choice of local codes with large distance relative to their length.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 23:49:13 GMT" }, { "version": "v2", "created": "Mon, 21 Feb 2011 19:56:18 GMT" } ]
2011-02-22T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Mazumdar", "Arya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4530
Xiaohu Shang
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor
MIMO Z-Interference Channels: Capacity Under Strong and Noisy Interference
5 pages, presented at Asilomar 09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity regions of multiple-input multiple-output Gaussian Z-interference channels are established for the very strong interference and aligned strong interference cases. The sum-rate capacity of such channels is established under noisy interference. These results generalize known results for scalar Gaussian Z-interference channels.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 02:49:56 GMT" } ]
2009-11-25T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Kramer", "Gerhard", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4544
Anand Louis
Anand Louis, Nisheeth Vishnoi
Improved Algorithm for Degree Bounded Survivable Network Design Problem
null
null
10.1007/978-3-642-13731-0_38
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Degree-Bounded Survivable Network Design Problem: the objective is to find a minimum cost subgraph satisfying the given connectivity requirements as well as the degree bounds on the vertices. If we denote the upper bound on the degree of a vertex v by b(v), then we present an algorithm that finds a solution whose cost is at most twice the cost of the optimal solution while the degree of a degree constrained vertex v is at most 2b(v) + 2. This improves upon the results of Lau and Singh and that of Lau, Naor, Salavatipour and Singh.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 05:27:19 GMT" } ]
2010-07-08T00:00:00
[ [ "Louis", "Anand", "" ], [ "Vishnoi", "Nisheeth", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4590
Toshimasa Ishii
Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno
A tight upper bound on the (2,1)-total labeling number of outerplanar graphs
17 pages, 9figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $(2,1)$-total labeling of a graph $G$ is an assignment $f$ from the vertex set $V(G)$ and the edge set $E(G)$ to the set $\{0,1,...,k\}$ of nonnegative integers such that $|f(x)-f(y)|\ge 2$ if $x$ is a vertex and $y$ is an edge incident to $x$, and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are a pair of adjacent vertices or a pair of adjacent edges, for all $x$ and $y$ in $V(G)\cup E(G)$. The $(2,1)$-total labeling number $\lambda^T_2(G)$ of a graph $G$ is defined as the minimum $k$ among all possible assignments. In [D. Chen and W. Wang. (2,1)-Total labelling of outerplanar graphs. Discr. Appl. Math. 155, 2585--2593 (2007)], Chen and Wang conjectured that all outerplanar graphs $G$ satisfy $\lambda^T_2(G) \leq \Delta(G)+2$, where $\Delta(G)$ is the maximum degree of $G$, while they also showed that it is true for $G$ with $\Delta(G)\geq 5$. In this paper, we solve their conjecture completely, by proving that $\lambda^T_2(G) \leq \Delta(G)+2$ even in the case of $\Delta(G)\leq 4 $.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 14:45:48 GMT" } ]
2009-11-25T00:00:00
[ [ "Hasunuma", "Toru", "" ], [ "Ishii", "Toshimasa", "" ], [ "Ono", "Hirotaka", "" ], [ "Uno", "Yushi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4626
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
A characterization of Konig-Egervary graphs using a common property of all maximum matchings
9 pages, 5 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The independence number of a graph G, denoted by alpha(G), is the cardinality of an independent set of maximum size in G, while mu(G) is the size of a maximum matching in G, i.e., its matching number. G is a Konig-Egervary graph if its order equals alpha(G)+mu(G). In this paper we give a new characterization of Konig-Egervary graphs. We also deduce some properties of vertices belonging to all maximum independent sets of a Konig-Egervary graph.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 13:32:12 GMT" } ]
2009-11-26T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.4640
Ananthanarayanan Chockalingam
N. Srinidhi, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
Near-ML Signal Detection in Large-Dimension Linear Vector Channels Using Reactive Tabu Search
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-complexity near-optimal signal detection in large dimensional communication systems is a challenge. In this paper, we present a reactive tabu search (RTS) algorithm, a heuristic based combinatorial optimization technique, to achieve low-complexity near-maximum likelihood (ML) signal detection in linear vector channels with large dimensions. Two practically important large-dimension linear vector channels are considered: i) multiple-input multiple-output (MIMO) channels with large number (tens) of transmit and receive antennas, and ii) severely delay-spread MIMO inter-symbol interference (ISI) channels with large number (tens to hundreds) of multipath components. These channels are of interest because the former offers the benefit of increased spectral efficiency (several tens of bps/Hz) and the latter offers the benefit of high time-diversity orders. Our simulation results show that, while algorithms including variants of sphere decoding do not scale well for large dimensions, the proposed RTS algorithm scales well for signal detection in large dimensions while achieving increasingly closer to ML performance for increasing number of dimensions.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 15:04:52 GMT" } ]
2009-11-25T00:00:00
[ [ "Srinidhi", "N.", "" ], [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4642
Isabel Rodet
Nicolas Castagn\'e (ACROE), Claude Cadoz (ACROE, ICA), Ali Allaoui (ACROE, ICA), Olivier Michel Tache (ACROE)
G3 : GENESIS software envrionment update
null
International Computer Music Conference (ICMC), Montr\'eal : Canada (2009)
null
null
cs.SD cs.HC cs.MM cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
GENESIS3 is the new version of the GENESIS software environment for musical creation by means of mass-interaction physics network modeling. It was designed, and developed from scratch, in hindsight of more than 10 years working on and using the previous version. We take the opportunity of this birth to provide in this article (1) an analysis of the peculiarities in GENESIS, aiming at highlighting its core ?software paradigm?; and (2) an update on the features of the new version as compared to the last.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 15:07:37 GMT" } ]
2009-11-25T00:00:00
[ [ "Castagné", "Nicolas", "", "ACROE" ], [ "Cadoz", "Claude", "", "ACROE, ICA" ], [ "Allaoui", "Ali", "", "ACROE, ICA" ], [ "Tache", "Olivier Michel", "", "ACROE" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.4650
Gael Varoquaux
Ga\"el Varoquaux (INRIA Saclay - Ile de France, LNAO), Sepideh Sadaghiani (LCogn), Jean Baptiste Poline (LNAO), Bertrand Thirion (INRIA Saclay - Ile de France, LNAO)
CanICA: Model-based extraction of reproducible group-level ICA patterns from fMRI time series
null
Medical Image Computing and Computer Aided Intervention, London : United Kingdom (2009)
null
null
cs.CV stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spatial Independent Component Analysis (ICA) is an increasingly used data-driven method to analyze functional Magnetic Resonance Imaging (fMRI) data. To date, it has been used to extract meaningful patterns without prior information. However, ICA is not robust to mild data variation and remains a parameter-sensitive algorithm. The validity of the extracted patterns is hard to establish, as well as the significance of differences between patterns extracted from different groups of subjects. We start from a generative model of the fMRI group data to introduce a probabilistic ICA pattern-extraction algorithm, called CanICA (Canonical ICA). Thanks to an explicit noise model and canonical correlation analysis, our method is auto-calibrated and identifies the group-reproducible data subspace before performing ICA. We compare our method to state-of-the-art multi-subject fMRI ICA methods and show that the features extracted are more reproducible.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 15:25:38 GMT" } ]
2009-11-25T00:00:00
[ [ "Varoquaux", "Gaël", "", "INRIA Saclay - Ile de France, LNAO" ], [ "Sadaghiani", "Sepideh", "", "LCogn" ], [ "Poline", "Jean Baptiste", "", "LNAO" ], [ "Thirion", "Bertrand", "", "INRIA\n Saclay - Ile de France, LNAO" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0911.4704
Abdellatif Zaidi
Abdellatif Zaidi, Shiva Prasad Kotagiri, J. Nicholas Laneman, Luc Vandendorpe
Cooperative Relaying with State Available Non-Causally at the Relay
62 pages. To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, Gel'fand-Pinsker binning, and decode-and-forward relaying. The upper bound improves upon that obtained by assuming that the channel state is available at the source, the relay, and the destination. For the Gaussian case, we also derive lower and upper bounds on the capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, generalized dirty paper coding, and decode-and-forward relaying; the upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. In the case of degraded Gaussian channels, the lower bound meets with the upper bound for some special cases, and, so, the capacity is obtained for these cases. Furthermore, in the Gaussian case, we also extend the results to the case in which the relay operates in a half-duplex mode.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 20:15:43 GMT" } ]
2009-11-25T00:00:00
[ [ "Zaidi", "Abdellatif", "" ], [ "Kotagiri", "Shiva Prasad", "" ], [ "Laneman", "J. Nicholas", "" ], [ "Vandendorpe", "Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4724
Martin Roetteler
Martin Roetteler
Quantum algorithms to solve the hidden shift problem for quadratics and for functions of large Gowers norm
12 pages, no figures, Proc. MFCS'09, LNCS vol. 5734, pp. 663-674, 2009. Mezzanine tranche of earlier paper arXiv:0811.3208
Proceedings MFCS'09, LNCS vol. 5734, pp. 663-674, 2009
10.1007/978-3-642-03816-7_56
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most quantum algorithms that give an exponential speedup over classical algorithms exploit the Fourier transform in some way. In Shor's algorithm, sampling from the quantum Fourier spectrum is used to discover periodicity of the modular exponentiation function. In a generalization of this idea, quantum Fourier sampling can be used to discover hidden subgroup structures of some functions much more efficiently than it is possible classically. Another problem for which the Fourier transform has been recruited successfully on a quantum computer is the hidden shift problem. Quantum algorithms for hidden shift problems usually have a slightly different flavor from hidden subgroup algorithms, as they use the Fourier transform to perform a correlation with a given reference function, instead of sampling from the Fourier spectrum directly. In this paper we show that hidden shifts can be extracted efficiently from Boolean functions that are quadratic forms. We also show how to identify an unknown quadratic form on n variables using a linear number of queries, in contrast to the classical case were this takes Theta(n^2) many queries to a black box. What is more, we show that our quantum algorithm is robust in the sense that it can also infer the shift if the function is close to a quadratic, where we consider a Boolean function to be close to a quadratic if it has a large Gowers U_3 norm.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 21:07:02 GMT" } ]
2015-05-14T00:00:00
[ [ "Roetteler", "Martin", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.4727
Gert De Cooman
Gert de Cooman and Erik Quaeghebeur
Exchangeability and sets of desirable gambles
40 pages
null
10.1016/j.ijar.2010.12.002
null
math.PR cs.AI math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sets of desirable gambles constitute a quite general type of uncertainty model with an interesting geometrical interpretation. We give a general discussion of such models and their rationality criteria. We study exchangeability assessments for them, and prove counterparts of de Finetti's finite and infinite representation theorems. We show that the finite representation in terms of count vectors has a very nice geometrical interpretation, and that the representation in terms of frequency vectors is tied up with multivariate Bernstein (basis) polynomials. We also lay bare the relationships between the representations of updated exchangeable models, and discuss conservative inference (natural extension) under exchangeability and the extension of exchangeable sequences.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 21:11:44 GMT" }, { "version": "v2", "created": "Mon, 27 Sep 2010 08:20:31 GMT" }, { "version": "v3", "created": "Thu, 9 Dec 2010 10:58:45 GMT" } ]
2010-12-10T00:00:00
[ [ "de Cooman", "Gert", "" ], [ "Quaeghebeur", "Erik", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0911.4729
Tuhin Sahai
Tuhin Sahai, Alberto Speranzon and Andrzej Banaszuk
Hearing the clusters in a graph: A distributed algorithm
null
null
null
null
cs.DM cs.DC physics.comp-ph physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel distributed algorithm to cluster graphs. The algorithm recovers the solution obtained from spectral clustering without the need for expensive eigenvalue/vector computations. We prove that, by propagating waves through the graph, a local fast Fourier transform yields the local component of every eigenvector of the Laplacian matrix, thus providing clustering information. For large graphs, the proposed algorithm is orders of magnitude faster than random walk based approaches. We prove the equivalence of the proposed algorithm to spectral clustering and derive convergence rates. We demonstrate the benefit of using this decentralized clustering algorithm for community detection in social graphs, accelerating distributed estimation in sensor networks and efficient computation of distributed multi-agent search strategies.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 21:50:51 GMT" }, { "version": "v2", "created": "Mon, 14 Dec 2009 18:06:25 GMT" }, { "version": "v3", "created": "Wed, 27 Jan 2010 23:54:39 GMT" }, { "version": "v4", "created": "Mon, 21 Jun 2010 21:03:33 GMT" }, { "version": "v5", "created": "Fri, 15 Apr 2011 16:48:20 GMT" }, { "version": "v6", "created": "Mon, 18 Apr 2011 00:20:49 GMT" } ]
2015-03-13T00:00:00
[ [ "Sahai", "Tuhin", "" ], [ "Speranzon", "Alberto", "" ], [ "Banaszuk", "Andrzej", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.4732
Qi Ge
Qi Ge, Daniel Stefankovic
A graph polynomial for independent sets of bipartite graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new graph polynomial that encodes interesting properties of graphs, for example, the number of matchings and the number of perfect matchings. Most importantly, for bipartite graphs the polynomial encodes the number of independent sets (#BIS). We analyze the complexity of exact evaluation of the polynomial at rational points and show that for most points exact evaluation is #P-hard (assuming the generalized Riemann hypothesis) and for the rest of the points exact evaluation is trivial. We conjecture that a natural Markov chain can be used to approximately evaluate the polynomial for a range of parameters. The conjecture, if true, would imply an approximate counting algorithm for #BIS, a problem shown, by [Dyer et al. 2004], to be complete (with respect to, so called, AP-reductions) for a rich logically defined sub-class of #P. We give a mild support for our conjecture by proving that the Markov chain is rapidly mixing on trees. As a by-product we show that the "single bond flip" Markov chain for the random cluster model is rapidly mixing on constant tree-width graphs.
[ { "version": "v1", "created": "Tue, 24 Nov 2009 21:46:56 GMT" }, { "version": "v2", "created": "Thu, 14 Jan 2010 05:11:34 GMT" }, { "version": "v3", "created": "Fri, 22 Jan 2010 20:21:21 GMT" }, { "version": "v4", "created": "Wed, 10 Feb 2010 16:25:22 GMT" } ]
2010-02-10T00:00:00
[ [ "Ge", "Qi", "" ], [ "Stefankovic", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4752
Yao Yu
Yao Yu, Athina P. Petropulu and H. Vincent Poor
MIMO Radar Using Compressive Sampling
39 pages and 14 figures. Y. Yu, A. P. Petropulu and H. V. Poor, "MIMO Radar Using Compressive Sampling," IEEE Journal of Selected Topics in Signal Processing, to appear in Feb. 2010
null
10.1109/JSTSP.2009.2038973
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A MIMO radar system is proposed for obtaining angle and Doppler information on potential targets. Transmitters and receivers are nodes of a small scale wireless network and are assumed to be randomly scattered on a disk. The transmit nodes transmit uncorrelated waveforms. Each receive node applies compressive sampling to the received signal to obtain a small number of samples, which the node subsequently forwards to a fusion center. Assuming that the targets are sparsely located in the angle- Doppler space, based on the samples forwarded by the receive nodes the fusion center formulates an l1-optimization problem, the solution of which yields target angle and Doppler information. The proposed approach achieves the superior resolution of MIMO radar with far fewer samples than required by other approaches. This implies power savings during the communication phase between the receive nodes and the fusion center. Performance in the presence of a jammer is analyzed for the case of slowly moving targets. Issues related to forming the basis matrix that spans the angle-Doppler space, and for selecting a grid for that space are discussed. Extensive simulation results are provided to demonstrate the performance of the proposed approach at difference jammer and noise levels.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 03:19:13 GMT" } ]
2015-05-14T00:00:00
[ [ "Yu", "Yao", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4761
Theresa Velden
Theresa A. Velden, Asif-ul Haque, Carl J. Lagoze
A New Approach to Analyzing Patterns of Collaboration in Co-authorship Networks - Mesoscopic Analysis and Interpretation
An earlier version of the paper was presented at ISSI 2009, 14-17 July, Rio de Janeiro, Brazil. Revised version accepted on 2 April 2010 for publication in Scientometrics. Removed part on node-role connectivity profile analysis after finding error in calculation and deciding to postpone analysis.
null
10.1007/s11192-010-0224-6
null
cs.CY cs.DL physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper focuses on methods to study patterns of collaboration in co-authorship networks at the mesoscopic level. We combine qualitative methods (participant interviews) with quantitative methods (network analysis) and demonstrate the application and value of our approach in a case study comparing three research fields in chemistry. A mesoscopic level of analysis means that in addition to the basic analytic unit of the individual researcher as node in a co-author network, we base our analysis on the observed modular structure of co-author networks. We interpret the clustering of authors into groups as bibliometric footprints of the basic collective units of knowledge production in a research specialty. We find two types of coauthor-linking patterns between author clusters that we interpret as representing two different forms of cooperative behavior, transfer-type connections due to career migrations or one-off services rendered, and stronger, dedicated inter-group collaboration. Hence the generic coauthor network of a research specialty can be understood as the overlay of two distinct types of cooperative networks between groups of authors publishing in a research specialty. We show how our analytic approach exposes field specific differences in the social organization of research.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 04:42:44 GMT" }, { "version": "v2", "created": "Mon, 12 Apr 2010 16:44:35 GMT" } ]
2010-04-13T00:00:00
[ [ "Velden", "Theresa A.", "" ], [ "Haque", "Asif-ul", "" ], [ "Lagoze", "Carl J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.4792
Laurent Braud
Laurent Braud
Covering of ordinals
Accepted at FSTTCS'09
Proc. of FSTTCS 2009, pp.97-108
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper focuses on the structure of fundamental sequences of ordinals smaller than $\epsilon_0$. A first result is the construction of a monadic second-order formula identifying a given structure, whereas such a formula cannot exist for ordinals themselves. The structures are precisely classified in the pushdown hierarchy. Ordinals are also located in the hierarchy, and a direct presentation is given.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 10:43:38 GMT" } ]
2010-06-17T00:00:00
[ [ "Braud", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.4821
Laurent Poinsot
Laurent Poinsot (LIPN), G\'erard Duchamp (LIPN), Christophe Tollu (LIPN)
M\"obius inversion formula for monoids with zero
12 pages, r\'esum\'e \'etendu soumis \`a FPSAC 2010
Semigroup Forum (2010) 1-15
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The M\"obius inversion formula, introduced during the 19th century in number theory, was generalized to a wide class of monoids called locally finite such as the free partially commutative, plactic and hypoplactic monoids for instance. In this contribution are developed and used some topological and algebraic notions for monoids with zero, similar to ordinary objects such as the (total) algebra of a monoid, the augmentation ideal or the star operation on proper series. The main concern is to extend the study of the M\"obius function to some monoids with zero, i.e., with an absorbing element, in particular the so-called Rees quotients of locally finite monoids. Some relations between the M\"obius functions of a monoid and its Rees quotient are also provided.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 11:31:38 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 08:32:18 GMT" } ]
2010-09-30T00:00:00
[ [ "Poinsot", "Laurent", "", "LIPN" ], [ "Duchamp", "Gérard", "", "LIPN" ], [ "Tollu", "Christophe", "", "LIPN" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4833
Patricia Bouyer-Decitre
Patricia Bouyer, Thomas Brihaye, Fabrice Chevalier
O-Minimal Hybrid Reachability Games
null
Logical Methods in Computer Science, Volume 6, Issue 1 (January 12, 2010) lmcs:1206
10.2168/LMCS-6(1:1)2010
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider reachability games over general hybrid systems, and distinguish between two possible observation frameworks for those games: either the precise dynamics of the system is seen by the players (this is the perfect observation framework), or only the starting point and the delays are known by the players (this is the partial observation framework). In the first more classical framework, we show that time-abstract bisimulation is not adequate for solving this problem, although it is sufficient in the case of timed automata . That is why we consider an other equivalence, namely the suffix equivalence based on the encoding of trajectories through words. We show that this suffix equivalence is in general a correct abstraction for games. We apply this result to o-minimal hybrid systems, and get decidability and computability results in this framework. For the second framework which assumes a partial observation of the dynamics of the system, we propose another abstraction, called the superword encoding, which is suitable to solve the games under that assumption. In that framework, we also provide decidability and computability results.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 12:33:37 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2010 21:41:23 GMT" } ]
2015-07-01T00:00:00
[ [ "Bouyer", "Patricia", "" ], [ "Brihaye", "Thomas", "" ], [ "Chevalier", "Fabrice", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.4854
Giovanni Pardini
Roberto Barbuti, Andrea Maggiolo-Schettini, Paolo Milazzo, Giovanni Pardini, Aureliano Rama
A Process Calculus for Molecular Interaction Maps
15 pages; 8 figures; To be published on EPTCS, proceedings of MeCBIC 2009
EPTCS 11, 2009, pp. 33-49
10.4204/EPTCS.11.3
null
cs.CE cs.LO q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the MIM calculus, a modeling formalism with a strong biological basis, which provides biologically-meaningful operators for representing the interaction capabilities of molecular species. The operators of the calculus are inspired by the reaction symbols used in Molecular Interaction Maps (MIMs), a diagrammatic notation used by biologists. Models of the calculus can be easily derived from MIM diagrams, for which an unambiguous and executable interpretation is thus obtained. We give a formal definition of the syntax and semantics of the MIM calculus, and we study properties of the formalism. A case study is also presented to show the use of the calculus for modeling biomolecular networks.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 14:17:40 GMT" } ]
2009-11-26T00:00:00
[ [ "Barbuti", "Roberto", "" ], [ "Maggiolo-Schettini", "Andrea", "" ], [ "Milazzo", "Paolo", "" ], [ "Pardini", "Giovanni", "" ], [ "Rama", "Aureliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" } ]
0911.4863
Frank Nielsen
Frank Nielsen and Vincent Garcia
Statistical exponential families: A digest with flash cards
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document describes concisely the ubiquitous class of exponential family distributions met in statistics. The first part recalls definitions and summarizes main properties and duality with Bregman divergences (all proofs are skipped). The second part lists decompositions and related formula of common exponential family distributions. We recall the Fisher-Rao-Riemannian geometries and the dual affine connection information geometries of statistical manifolds. It is intended to maintain and update this document and catalog by adding new distribution items.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 14:26:54 GMT" }, { "version": "v2", "created": "Fri, 13 May 2011 01:52:49 GMT" } ]
2011-05-16T00:00:00
[ [ "Nielsen", "Frank", "" ], [ "Garcia", "Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.4874
Amelia Carolina Sparavigna
Amelia Carolina Sparavigna and Roberto Marazzato
Non-photorealistic image processing: an Impressionist rendering
Keywords: Image processing. Non-photorealistic processing. Image-based rendering
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes an image processing for a non-photorealistic rendering. The algorithm is based on a random choice of a set of pixels from those ot the original image and substitution of them with colour spots. An iterative procedure is applied to cover, at a desired level, the canvas. The resulting effect mimics the impressionist painting and Pointillism.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 15:16:53 GMT" }, { "version": "v2", "created": "Fri, 4 Dec 2009 12:58:23 GMT" } ]
2009-12-04T00:00:00
[ [ "Sparavigna", "Amelia Carolina", "" ], [ "Marazzato", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0911.4880
Ali Hormati
Ali Hormati, Amin Karbasi, Soheil Mohajer, Martin Vetterli
An Estimation Theoretic Approach for Sparsity Pattern Recovery in the Noisy Setting
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing deals with the reconstruction of sparse signals using a small number of linear measurements. One of the main challenges in compressed sensing is to find the support of a sparse signal. In the literature, several bounds on the scaling law of the number of measurements for successful support recovery have been derived where the main focus is on random Gaussian measurement matrices. In this paper, we investigate the noisy support recovery problem from an estimation theoretic point of view, where no specific assumption is made on the underlying measurement matrix. The linear measurements are perturbed by additive white Gaussian noise. We define the output of a support estimator to be a set of position values in increasing order. We set the error between the true and estimated supports as the $\ell_2$-norm of their difference. On the one hand, this choice allows us to use the machinery behind the $\ell_2$-norm error metric and on the other hand, converts the support recovery into a more intuitive and geometrical problem. First, by using the Hammersley-Chapman-Robbins (HCR) bound, we derive a fundamental lower bound on the performance of any \emph{unbiased} estimator of the support set. This lower bound provides us with necessary conditions on the number of measurements for reliable $\ell_2$-norm support recovery, which we specifically evaluate for uniform Gaussian measurement matrices. Then, we analyze the maximum likelihood estimator and derive conditions under which the HCR bound is achievable. This leads us to the number of measurements for the optimum decoder which is sufficient for reliable $\ell_2$-norm support recovery. Using this framework, we specifically evaluate sufficient conditions for uniform Gaussian measurement matrices.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 15:27:39 GMT" } ]
2009-11-26T00:00:00
[ [ "Hormati", "Ali", "" ], [ "Karbasi", "Amin", "" ], [ "Mohajer", "Soheil", "" ], [ "Vetterli", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4896
Ali Tajer
Ali Tajer and Aria Nosratinia
Diversity Order in ISI Channels with Single-Carrier Frequency-Domain Equalizers
30 pages, 6 figures, to appear in the IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the diversity gain achieved by single-carrier frequency-domain equalizer (SC-FDE) in frequency selective channels, and uncovers the interplay between diversity gain $d$, channel memory length $\nu$, transmission block length $L$, and the spectral efficiency $R$. We specifically show that for the class of minimum means-square error (MMSE) SC-FDE receivers, for rates $R\leq\log\frac{L}{\nu}$ full diversity of $d=\nu+1$ is achievable, while for higher rates the diversity is given by $d=\lfloor2^{-R}L\rfloor+1$. In other words, the achievable diversity gain depends not only on the channel memory length, but also on the desired spectral efficiency and the transmission block length. A similar analysis reveals that for zero forcing SC-FDE, the diversity order is always one irrespective of channel memory length and spectral efficiency. These results are supported by simulations.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 16:08:59 GMT" } ]
2009-11-26T00:00:00
[ [ "Tajer", "Ali", "" ], [ "Nosratinia", "Aria", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]