id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0911.4910
|
Tao Zhou
|
Ci-Hang Jin, Jian-Guo Liu, Yi-Cheng Zhang, Tao Zhou
|
Adaptive information filtering for dynamic recommender systems
|
6 pages, 5 figures, 1 table
| null | null | null |
cs.IR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The dynamic environment in the real world calls for the adaptive techniques
for information filtering, namely to provide real-time responses to the changes
of system data. Where many incremental algorithms are designed for this
purpose, they are usually challenged by the worse and worse performance
resulted from the cumulative errors over time. In this Letter, we propose two
incremental diffusion-based algorithms for the personalized recommendations,
which integrate some pieces of local and fast updatings to achieve the
approximate results. In addition to the fast responses, the errors of the
proposed algorithms do not cumulate over time, that is to say, the global
recomputing is unnecessary. This remarkable advantage is demonstrated by
several metrics on algorithmic accuracy for two movie recommender systems and a
social bookmarking system.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 16:34:13 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Jin",
"Ci-Hang",
""
],
[
"Liu",
"Jian-Guo",
""
],
[
"Zhang",
"Yi-Cheng",
""
],
[
"Zhou",
"Tao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.4940
|
Sebastian F. Walter
|
Sebastian F. Walter
|
Efficient Higher Order Derivatives of Objective Functions Composed of
Matrix Operations
| null | null | null | null |
cs.DS cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with the efficient evaluation of higher-order
derivatives of functions $f$ that are composed of matrix operations. I.e., we
want to compute the $D$-th derivative tensor $\nabla^D f(X) \in \mathbb
R^{N^D}$, where $f:\mathbb R^{N} \to \mathbb R$ is given as an algorithm that
consists of many matrix operations. We propose a method that is a combination
of two well-known techniques from Algorithmic Differentiation (AD): univariate
Taylor propagation on scalars (UTPS) and first-order forward and reverse on
matrices. The combination leads to a technique that we would like to call
univariate Taylor propagation on matrices (UTPM). The method inherits many
desirable properties: It is easy to implement, it is very efficient and it
returns not only $\nabla^D f$ but yields in the process also the derivatives
$\nabla^d f$ for $d \leq D$. As performance test we compute the gradient
$\nabla f(X)$ % and the Hessian $\nabla_A^2 f(A)$ by a combination of forward
and reverse mode of $f(X) = \trace (X^{-1})$ in the reverse mode of AD for $X
\in \mathbb R^{n \times n}$. We observe a speedup of about 100 compared to
UTPS. Due to the nature of the method, the memory footprint is also small and
therefore can be used to differentiate functions that are not accessible by
standard methods due to limited physical memory.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 20:05:24 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Walter",
"Sebastian F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0911.4961
|
Lianlin Li Dr
|
Lianlin Li and Behnam Jafarpour
|
A Sparse Bayesian Estimation Framework for Conditioning Prior Geologic
Models to Nonlinear Flow Measurements
| null | null |
10.1016/j.advwatres.2010.06.005
| null |
cs.NA physics.data-an physics.geo-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a Bayesian framework for reconstruction of subsurface hydraulic
properties from nonlinear dynamic flow data by imposing sparsity on the
distribution of the solution coefficients in a compression transform domain.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 21:41:40 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Li",
"Lianlin",
""
],
[
"Jafarpour",
"Behnam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.geo-ph",
"description": "Atmospheric physics. Biogeosciences. Computational geophysics. Geographic location. Geoinformatics. Geophysical techniques. Hydrospheric geophysics. Magnetospheric physics. Mathematical geophysics. Planetology. Solar system. Solid earth geophysics. Space plasma physics. Mineral physics. High pressure physics.",
"span": "(Geophysics)"
}
] |
0911.4963
|
Christian Wulff-Nilsen
|
Shay Mozes and Christian Wulff-Nilsen
|
Shortest Paths in Planar Graphs with Real Lengths in
$O(n\log^2n/\log\log n)$ Time
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given an $n$-vertex planar directed graph with real edge lengths and with no
negative cycles, we show how to compute single-source shortest path distances
in the graph in $O(n\log^2n/\log\log n)$ time with O(n) space. This is an
improvement of a recent time bound of $O(n\log^2n)$ by Klein et al.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 21:43:30 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Mozes",
"Shay",
""
],
[
"Wulff-Nilsen",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.4981
|
Gonzalo Navarro
|
Jeremy Barbay, Francisco Claude, Travis Gagie, Gonzalo Navarro and
Yakov Nekrich
|
Efficient Fully-Compressed Sequence Representations
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a data structure that stores a sequence $s[1..n]$ over alphabet
$[1..\sigma]$ in $n\Ho(s) + o(n)(\Ho(s){+}1)$ bits, where $\Ho(s)$ is the
zero-order entropy of $s$. This structure supports the queries \access, \rank\
and \select, which are fundamental building blocks for many other compressed
data structures, in worst-case time $\Oh{\lg\lg\sigma}$ and average time
$\Oh{\lg \Ho(s)}$. The worst-case complexity matches the best previous results,
yet these had been achieved with data structures using $n\Ho(s)+o(n\lg\sigma)$
bits. On highly compressible sequences the $o(n\lg\sigma)$ bits of the
redundancy may be significant compared to the the $n\Ho(s)$ bits that encode
the data. Our representation, instead, compresses the redundancy as well.
Moreover, our average-case complexity is unprecedented. Our technique is based
on partitioning the alphabet into characters of similar frequency. The
subsequence corresponding to each group can then be encoded using fast
uncompressed representations without harming the overall compression ratios,
even in the redundancy. The result also improves upon the best current
compressed representations of several other data structures. For example, we
achieve $(i)$ compressed redundancy, retaining the best time complexities, for
the smallest existing full-text self-indexes; $(ii)$ compressed permutations
$\pi$ with times for $\pi()$ and $\pii()$ improved to loglogarithmic; and
$(iii)$ the first compressed representation of dynamic collections of disjoint
sets. We also point out various applications to inverted indexes, suffix
arrays, binary relations, and data compressors. ...
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2009 23:31:23 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Feb 2010 02:04:43 GMT"
},
{
"version": "v3",
"created": "Sat, 26 Jun 2010 03:33:21 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Apr 2012 02:12:43 GMT"
}
] | 2012-04-03T00:00:00 |
[
[
"Barbay",
"Jeremy",
""
],
[
"Claude",
"Francisco",
""
],
[
"Gagie",
"Travis",
""
],
[
"Navarro",
"Gonzalo",
""
],
[
"Nekrich",
"Yakov",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.4983
|
EPTCS
|
Thomas Anung Basuki (International Institute of Software Technology,
United Nations University), Antonio Cerone (International Institute of
Software Technology, United Nations University), Rafael V. Carvalho
(International Institute of Software Technology, United Nations University)
|
Modelling Cell Cycle using Different Levels of Representation
| null |
EPTCS 11, 2009, pp. 51-69
|
10.4204/EPTCS.11.4
| null |
cs.CE cs.LO q-bio.CB q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding the behaviour of biological systems requires a complex setting
of in vitro and in vivo experiments, which attracts high costs in terms of time
and resources. The use of mathematical models allows researchers to perform
computerised simulations of biological systems, which are called in silico
experiments, to attain important insights and predictions about the system
behaviour with a considerably lower cost. Computer visualisation is an
important part of this approach, since it provides a realistic representation
of the system behaviour. We define a formal methodology to model biological
systems using different levels of representation: a purely formal
representation, which we call molecular level, models the biochemical dynamics
of the system; visualisation-oriented representations, which we call visual
levels, provide views of the biological system at a higher level of
organisation and are equipped with the necessary spatial information to
generate the appropriate visualisation. We choose Spatial CLS, a formal
language belonging to the class of Calculi of Looping Sequences, as the
formalism for modelling all representation levels. We illustrate our approach
using the budding yeast cell cycle as a case study.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:16:10 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Basuki",
"Thomas Anung",
"",
"International Institute of Software Technology,\n United Nations University"
],
[
"Cerone",
"Antonio",
"",
"International Institute of\n Software Technology, United Nations University"
],
[
"Carvalho",
"Rafael V.",
"",
"International Institute of Software Technology, United Nations University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.CB",
"description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology",
"span": "(Cell Behavior)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4984
|
EPTCS
|
Federica Ciocchetta, Adam Duguid, Maria Luisa Guerriero
|
A compartmental model of the cAMP/PKA/MAPK pathway in Bio-PEPA
| null |
EPTCS 11, 2009, pp. 71-90
|
10.4204/EPTCS.11.5
| null |
cs.CE cs.LO q-bio.MN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The vast majority of biochemical systems involve the exchange of information
between different compartments, either in the form of transportation or via the
intervention of membrane proteins which are able to transmit stimuli between
bordering compartments. The correct quantitative handling of compartments is,
therefore, extremely important when modelling real biochemical systems. The
Bio-PEPA process algebra is equipped with the capability of explicitly defining
quantitative information such as compartment volumes and membrane surface
areas. Furthermore, the recent development of the Bio-PEPA Eclipse Plug-in
allows us to perform a correct stochastic simulation of multi-compartmental
models.
Here we present a Bio-PEPA compartmental model of the cAMP/PKA/MAPK pathway.
We analyse the system using the Bio-PEPA Eclipse Plug-in and we show the
correctness of our model by comparison with an existing ODE model. Furthermore,
we perform computational experiments in order to investigate certain properties
of the pathway. Specifically, we focus on the system response to the inhibition
and strengthening of feedback loops and to the variation in the activity of key
pathway reactions and we observe how these modifications affect the behaviour
of the pathway. These experiments are useful to understand the control and
regulatory mechanisms of the system.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:17:48 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Ciocchetta",
"Federica",
""
],
[
"Duguid",
"Adam",
""
],
[
"Guerriero",
"Maria Luisa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4985
|
EPTCS
|
Mariangiola Dezani-Ciancaglini (Dipartimento di Informatica,
Universit\`a di Torino), Paola Giannini (Dipartimento di Informatica,
Universit\`a del Piemonte Orientale), Angelo Troina (Dipartimento di
Informatica, Universit\`a di Torino)
|
A Type System for a Stochastic CLS
| null |
EPTCS 11, 2009, pp. 91-105
|
10.4204/EPTCS.11.6
| null |
cs.FL cs.PL q-bio.MN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Stochastic Calculus of Looping Sequences is suitable to describe the
evolution of microbiological systems, taking into account the speed of the
described activities. We propose a type system for this calculus that models
how the presence of positive and negative catalysers can modify these speeds.
We claim that types are the right abstraction in order to represent the
interaction between elements without specifying exactly the element positions.
Our claim is supported through an example modelling the lactose operon.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:24:08 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Dezani-Ciancaglini",
"Mariangiola",
"",
"Dipartimento di Informatica,\n Università di Torino"
],
[
"Giannini",
"Paola",
"",
"Dipartimento di Informatica,\n Università del Piemonte Orientale"
],
[
"Troina",
"Angelo",
"",
"Dipartimento di\n Informatica, Università di Torino"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4986
|
EPTCS
|
Michael J. Dinneen (University of Auckland), Yun-Bum Kim (University
of Auckland), Radu Nicolescu (University of Auckland)
|
New Solutions to the Firing Squad Synchronization Problems for Neural
and Hyperdag P Systems
| null |
EPTCS 11, 2009, pp. 107-122
|
10.4204/EPTCS.11.7
| null |
cs.CE cs.DC cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose two uniform solutions to an open question: the Firing Squad
Synchronization Problem (FSSP), for hyperdag and symmetric neural P systems,
with anonymous cells. Our solutions take e_c+5 and 6e_c+7 steps, respectively,
where e_c is the eccentricity of the commander cell of the dag or digraph
underlying these P systems. The first and fast solution is based on a novel
proposal, which dynamically extends P systems with mobile channels. The second
solution is substantially longer, but is solely based on classical rules and
static channels. In contrast to the previous solutions, which work for
tree-based P systems, our solutions synchronize to any subset of the underlying
digraph; and do not require membrane polarizations or conditional rules, but
require states, as typically used in hyperdag and neural P systems.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:26:39 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Dinneen",
"Michael J.",
"",
"University of Auckland"
],
[
"Kim",
"Yun-Bum",
"",
"University\n of Auckland"
],
[
"Nicolescu",
"Radu",
"",
"University of Auckland"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.4987
|
EPTCS
|
Rudolf Freund (Vienna University of Technology), Marian Kogler (Vienna
University of Technology)
|
Drip and Mate Operations Acting in Test Tube Systems and Tissue-like P
systems
| null |
EPTCS 11, 2009, pp. 123-135
|
10.4204/EPTCS.11.8
| null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The operations drip and mate considered in (mem)brane computing resemble the
operations cut and recombination well known from DNA computing. We here
consider sets of vesicles with multisets of objects on their outside membrane
interacting by drip and mate in two different setups: in test tube systems, the
vesicles may pass from one tube to another one provided they fulfill specific
constraints; in tissue-like P systems, the vesicles are immediately passed to
specified cells after having undergone a drip or mate operation. In both
variants, computational completeness can be obtained, yet with different
constraints for the drip and mate operations.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:33:04 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Freund",
"Rudolf",
"",
"Vienna University of Technology"
],
[
"Kogler",
"Marian",
"",
"Vienna\n University of Technology"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0911.4988
|
EPTCS
|
Roberta Gori (Dipartimento di informatica, Pisa.), Francesca Levi
(Dipartimento di informatica, Pisa)
|
Abstract Interpretation for Probabilistic Termination of Biological
Systems
| null |
EPTCS 11, 2009, pp. 137-153
|
10.4204/EPTCS.11.9
| null |
cs.LO cs.CE cs.FL q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a previous paper the authors applied the Abstract Interpretation approach
for approximating the probabilistic semantics of biological systems, modeled
specifically using the Chemical Ground Form calculus. The methodology is based
on the idea of representing a set of experiments, which differ only for the
initial concentrations, by abstracting the multiplicity of reagents present in
a solution, using intervals. In this paper, we refine the approach in order to
address probabilistic termination properties. More in details, we introduce a
refinement of the abstract LTS semantics and we abstract the probabilistic
semantics using a variant of Interval Markov Chains. The abstract probabilistic
model safely approximates a set of concrete experiments and reports
conservative lower and upper bounds for probabilistic termination.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:36:03 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Gori",
"Roberta",
"",
"Dipartimento di informatica, Pisa."
],
[
"Levi",
"Francesca",
"",
"Dipartimento di informatica, Pisa"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.4989
|
EPTCS
|
G. Michele Pinna, Andrea Saba
|
Dependencies and Simultaneity in Membrane Systems
| null |
EPTCS 11, 2009, pp. 155-169
|
10.4204/EPTCS.11.10
| null |
cs.CE cs.DC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Membrane system computations proceed in a synchronous fashion: at each step
all the applicable rules are actually applied. Hence each step depends on the
previous one. This coarse view can be refined by looking at the dependencies
among rule occurrences, by recording, for an object, which was the a rule that
produced it and subsequently (in a later step), which was the a rule that
consumed it. In this paper we propose a way to look also at the other main
ingredient in membrane system computations, namely the simultaneity in the rule
applications. This is achieved using zero-safe nets that allows to synchronize
transitions, i.e., rule occurrences. Zero-safe nets can be unfolded into
occurrence nets in a classical way, and to this unfolding an event structure
can be associated. The capability of capturing simultaneity of zero-safe nets
is transferred on the level of event structure by adding a way to express which
events occur simultaneously.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 00:39:34 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Pinna",
"G. Michele",
""
],
[
"Saba",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5017
|
Sang Won Bae
|
Sang Won Bae and Yoshio Okamoto
|
Querying Two Boundary Points for Shortest Paths in a Polygonal Domain
|
12 pages, 3 figures, an extended abstract presented at ISAAC 2009
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a variant of two-point Euclidean shortest path query problem:
given a polygonal domain, build a data structure for two-point shortest path
query, provided that query points always lie on the boundary of the domain. As
a main result, we show that a logarithmic-time query for shortest paths between
boundary points can be performed using O~ (n^5) preprocessing time and O(n^5)
space where n is the number of corners of the polygonal domain and the O~
notation suppresses the polylogarithmic factor. This is realized by observing a
connection between Davenport-Schinzel sequences and our problem in the
parameterized space. We also provide a tradeoff between space and query time; a
sublinear time query is possible using O(n^{3+epsilon}) space. Our approach
also extends to the case where query points should lie on a given set of line
segments.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 07:11:59 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Bae",
"Sang Won",
""
],
[
"Okamoto",
"Yoshio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.5018
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Autosolvability of halting problem instances for instruction sequences
|
18 pages; notational mistakes in tables 5 and 6 corrected; erroneous
definition in last paragraph of page 11 corrected
| null | null |
PRG0914
|
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We position Turing's result regarding the undecidability of the halting
problem as a result about programs rather than machines. The mere requirement
that a program of a certain kind must solve the halting problem for all
programs of that kind leads to a contradiction in the case of a recent
unsolvability result regarding the halting problem for programs. In this paper,
we investigate this autosolvability requirement in a setting in which programs
take the form of instruction sequences.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 07:32:11 GMT"
},
{
"version": "v2",
"created": "Sat, 8 May 2010 12:39:24 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Oct 2010 20:33:05 GMT"
}
] | 2010-10-19T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.5026
|
Daniel Kharitonov
|
Daniel Kharitonov
|
Time-domain approach to energy efficiency in high-performance network
element design
|
Pre-print for publication at GlobeCom 2009 proceedings
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Energy efficiency is a corner stone of sustainability in data center and
high-performance networking. However, at present there is a notable structural
mismatch between network silicon development targets and network equipment
utilization patterns in the field. In particular, some aspects of network
energy utilization (eg load-proportional energy consumption) routinely stay out
of focus during system design and implementation. Drawing from hands-on
research and development in high-speed and grid networking, we identify a novel
approach to energy efficiency in network engineering. In this paper, we
demonstrate how the problem of efficient network system design can be dissected
into smaller sections based on timescales of traffic processing. The newly
proposed approach allows R&D efforts to be tightly paired to resources and
sustainability targets to improve energy efficiency in many classes of network
and telecom devices.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 08:29:25 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Sep 2011 08:21:54 GMT"
}
] | 2011-09-06T00:00:00 |
[
[
"Kharitonov",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.5031
|
Shihabur Rahman Chowdhury
|
Shihabur Rahman Chowdhury, Masud Hasan, Sumaiya Iqbal, M. Sohel Rahman
|
An $O(n^2)$ Algorithm for Computing Longest Common Cyclic Subsequence
|
This paper has been withdrawn by the author due to a crucial error in
the proofs
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The {\em longest common subsequence (LCS)} problem is a classic and
well-studied problem in computer science. LCS is a central problem in
stringology and finds broad applications in text compression, error-detecting
codes and biological sequence comparison. However, in numerous contexts, words
represent cyclic sequences of symbols and LCS must be generalized to consider
all circular shifts of the strings. This occurs especially in computational
biology when genetic material is sequenced form circular DNA or RNA molecules.
This initiates the problem of {\em longest common cyclic subsequence (LCCS)}
which finds the longest subsequence between all circular shifts of two strings.
In this paper, we give an $O(n^2)$ algorithm for solving LCCS problem where $n$
is the number of symbols in the strings.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 08:49:48 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Apr 2010 15:53:33 GMT"
}
] | 2010-04-20T00:00:00 |
[
[
"Chowdhury",
"Shihabur Rahman",
""
],
[
"Hasan",
"Masud",
""
],
[
"Iqbal",
"Sumaiya",
""
],
[
"Rahman",
"M. Sohel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.5043
|
Nicola Fanizzi
|
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
|
A Semantic Similarity Measure for Expressive Description Logics
|
13 pages, Appeared at CILC 2005, Convegno Italiano di Logica
Computazionale also available at
http://www.disp.uniroma2.it/CILC2005/downloads/papers/15.dAmato_CILC05.pdf
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A totally semantic measure is presented which is able to calculate a
similarity value between concept descriptions and also between concept
description and individual or between individuals expressed in an expressive
description logic. It is applicable on symbolic descriptions although it uses a
numeric approach for the calculus. Considering that Description Logics stand as
the theoretic framework for the ontological knowledge representation and
reasoning, the proposed measure can be effectively used for agglomerative and
divisional clustering task applied to the semantic web domain.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 10:21:31 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"d'Amato",
"Claudia",
""
],
[
"Fanizzi",
"Nicola",
""
],
[
"Esposito",
"Floriana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5046
|
Joaqu\'in P\'erez-Iglesias
|
Joaqu\'in P\'erez-Iglesias, Jos\'e R. P\'erez-Ag\"uera, V\'ictor
Fresno and Yuval Z. Feinstein
|
Integrating the Probabilistic Models BM25/BM25F into Lucene
|
Software can be downloaded from:
http://nlp.uned.es/~jperezi/Lucene-BM25/
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document describes the BM25 and BM25F implementation using the Lucene
Java Framework. Both models have stood out at TREC by their performance and are
considered as state-of-the-art in the IR community. BM25 is applied to
retrieval on plain text documents, that is for documents that do not contain
fields, while BM25F is applied to documents with structure.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 10:27:14 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 13:41:05 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Pérez-Iglesias",
"Joaquín",
""
],
[
"Pérez-Agüera",
"José R.",
""
],
[
"Fresno",
"Víctor",
""
],
[
"Feinstein",
"Yuval Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.5067
|
Ralf Mueller
|
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
|
Asynchronous CDMA Systems with Random Spreading-Part II: Design Criteria
| null |
IEEE Transactions on Information Theory, vol. 56, no. 4, pp.
1498-1520, Apr. 2010
|
10.1109/TIT.2010.2040898
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Totally asynchronous code-division multiple-access (CDMA) systems are
addressed. In Part I, the fundamental limits of asynchronous CDMA systems are
analyzed in terms of spectral efficiency and SINR at the output of the optimum
linear detector. The focus of Part II is the design of low-complexity
implementations of linear multiuser detectors in systems with many users that
admit a multistage representation, e.g. reduced rank multistage Wiener filters,
polynomial expansion detectors, weighted linear parallel interference
cancellers. The effects of excess bandwidth, chip-pulse shaping, and time delay
distribution on CDMA with suboptimum linear receiver structures are
investigated. Recursive expressions for universal weight design are given. The
performance in terms of SINR is derived in the large-system limit and the
performance improvement over synchronous systems is quantified. The
considerations distinguish between two ways of forming discrete-time
statistics: chip-matched filtering and oversampling.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 12:01:57 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Cottatellucci",
"Laura",
""
],
[
"Mueller",
"Ralf R.",
""
],
[
"Debbah",
"Merouane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0911.5086
|
Menelaos Karavelas
|
Menelaos I. Karavelas and Eleni Tzanaki
|
Convex hulls of spheres and convex hulls of convex polytopes lying on
parallel hyperplanes
|
22 pages, 5 figures, new proof of upper bound for the complexity of
the convex hull of parallel polytopes (the new proof gives upper bounds for
all face numbers of the convex hull of the parallel polytopes)
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a set $\Sigma$ of spheres in $\mathbb{E}^d$, with $d\ge{}3$ and $d$
odd, having a fixed number of $m$ distinct radii $\rho_1,\rho_2,...,\rho_m$, we
show that the worst-case combinatorial complexity of the convex hull
$CH_d(\Sigma)$ of $\Sigma$ is
$\Theta(\sum_{1\le{}i\ne{}j\le{}m}n_in_j^{\lfloor\frac{d}{2}\rfloor})$, where
$n_i$ is the number of spheres in $\Sigma$ with radius $\rho_i$.
To prove the lower bound, we construct a set of $\Theta(n_1+n_2)$ spheres in
$\mathbb{E}^d$, with $d\ge{}3$ odd, where $n_i$ spheres have radius $\rho_i$,
$i=1,2$, and $\rho_2\ne\rho_1$, such that their convex hull has combinatorial
complexity
$\Omega(n_1n_2^{\lfloor\frac{d}{2}\rfloor}+n_2n_1^{\lfloor\frac{d}{2}\rfloor})$.
Our construction is then generalized to the case where the spheres have
$m\ge{}3$ distinct radii.
For the upper bound, we reduce the sphere convex hull problem to the problem
of computing the worst-case combinatorial complexity of the convex hull of a
set of $m$ $d$-dimensional convex polytopes lying on $m$ parallel hyperplanes
in $\mathbb{E}^{d+1}$, where $d\ge{}3$ odd, a problem which is of independent
interest. More precisely, we show that the worst-case combinatorial complexity
of the convex hull of a set $\{\mathcal{P}_1,\mathcal{P}_2,...,\mathcal{P}_m\}$
of $m$ $d$-dimensional convex polytopes lying on $m$ parallel hyperplanes of
$\mathbb{E}^{d+1}$ is
$O(\sum_{1\le{}i\ne{}j\le{}m}n_in_j^{\lfloor\frac{d}{2}\rfloor})$, where $n_i$
is the number of vertices of $\mathcal{P}_i$.
We end with algorithmic considerations, and we show how our tight bounds for
the parallel polytope convex hull problem, yield tight bounds on the
combinatorial complexity of the Minkowski sum of two convex polytopes in
$\mathbb{E}^d$.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 20:06:03 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jan 2010 10:31:13 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Oct 2010 12:11:30 GMT"
},
{
"version": "v4",
"created": "Tue, 8 Mar 2011 14:22:14 GMT"
},
{
"version": "v5",
"created": "Mon, 13 Jun 2011 04:51:21 GMT"
}
] | 2011-06-14T00:00:00 |
[
[
"Karavelas",
"Menelaos I.",
""
],
[
"Tzanaki",
"Eleni",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.5094
|
Uriel Feige
|
Uriel Feige
|
Faster FAST(Feedback Arc Set in Tournaments)
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algorithm that finds a feedback arc set of size $k$ in a
tournament in time $n^{O(1)}2^{O(\sqrt{k})}$. This is asymptotically faster
than the running time of previously known algorithms for this problem.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 14:43:31 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Feige",
"Uriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.5104
|
Pedro Alejandro Ortega
|
Pedro A. Ortega, Daniel A. Braun
|
A Bayesian Rule for Adaptive Control based on Causal Interventions
|
AGI-2010. 6 pages, 2 figures
|
AGI-2010
| null | null |
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Explaining adaptive behavior is a central problem in artificial intelligence
research. Here we formalize adaptive agents as mixture distributions over
sequences of inputs and outputs (I/O). Each distribution of the mixture
constitutes a `possible world', but the agent does not know which of the
possible worlds it is actually facing. The problem is to adapt the I/O stream
in a way that is compatible with the true world. A natural measure of
adaptation can be obtained by the Kullback-Leibler (KL) divergence between the
I/O distribution of the true world and the I/O distribution expected by the
agent that is uncertain about possible worlds. In the case of pure input
streams, the Bayesian mixture provides a well-known solution for this problem.
We show, however, that in the case of I/O streams this solution breaks down,
because outputs are issued by the agent itself and require a different
probabilistic syntax as provided by intervention calculus. Based on this
calculus, we obtain a Bayesian control rule that allows modeling adaptive
behavior with mixture distributions over I/O streams. This rule might allow for
a novel approach to adaptive control based on a minimum KL-principle.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 15:52:33 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Dec 2009 23:34:14 GMT"
}
] | 2009-12-31T00:00:00 |
[
[
"Ortega",
"Pedro A.",
""
],
[
"Braun",
"Daniel A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.5106
|
Pedro Alejandro Ortega
|
Pedro A. Ortega, Daniel A. Braun
|
A conversion between utility and information
|
AGI-2010. 6 pages, 1 figure
|
AGI-2010
| null | null |
cs.AI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rewards typically express desirabilities or preferences over a set of
alternatives. Here we propose that rewards can be defined for any probability
distribution based on three desiderata, namely that rewards should be
real-valued, additive and order-preserving, where the latter implies that more
probable events should also be more desirable. Our main result states that
rewards are then uniquely determined by the negative information content. To
analyze stochastic processes, we define the utility of a realization as its
reward rate. Under this interpretation, we show that the expected utility of a
stochastic process is its negative entropy rate. Furthermore, we apply our
results to analyze agent-environment interactions. We show that the expected
utility that will actually be achieved by the agent is given by the negative
cross-entropy from the input-output (I/O) distribution of the coupled
interaction system and the agent's I/O distribution. Thus, our results allow
for an information-theoretic interpretation of the notion of utility and the
characterization of agent-environment interactions in terms of entropy
dynamics.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 15:56:38 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Dec 2009 23:30:35 GMT"
}
] | 2009-12-31T00:00:00 |
[
[
"Ortega",
"Pedro A.",
""
],
[
"Braun",
"Daniel A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5116
|
Laurent Romary
|
Laurent Romary (INRIA Saclay - Ile de France, IDSL)
|
Standardization of the formal representation of lexical information for
NLP
| null |
Dictionarie. An International Encyclopedia of Lexicography.
Supplementary volume: Recent developments with special focus on computational
lexicography (2010) -
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A survey of dictionary models and formats is presented as well as a
presentation of corresponding recent standardisation activities.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 16:27:58 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Romary",
"Laurent",
"",
"INRIA Saclay - Ile de France, IDSL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.5143
|
MohammadHossein Bateni
|
MohammadHossein Bateni and MohammadTaghi Hajiaghayi and D\'aniel Marx
|
Approximation Schemes for Steiner Forest on Planar Graphs and Graphs of
Bounded Treewidth
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give the first polynomial-time approximation scheme (PTAS) for the Steiner
forest problem on planar graphs and, more generally, on graphs of bounded
genus. As a first step, we show how to build a Steiner forest spanner for such
graphs. The crux of the process is a clustering procedure called
prize-collecting clustering that breaks down the input instance into separate
subinstances which are easier to handle; moreover, the terminals in different
subinstances are far from each other. Each subinstance has a relatively
inexpensive Steiner tree connecting all its terminals, and the subinstances can
be solved (almost) separately. Another building block is a PTAS for Steiner
forest on graphs of bounded treewidth. Surprisingly, Steiner forest is NP-hard
even on graphs of treewidth 3. Therefore, our PTAS for bounded treewidth graph
needs a nontrivial combination of approximation arguments and dynamic
programming on the tree decomposition. We further show that Steiner forest can
be solved in polynomial time for series-parallel graphs (graphs of treewidth at
most two) by a novel combination of dynamic programming and minimum cut
computations, completing our thorough complexity study of Steiner forest in the
range of bounded treewidth graphs, planar graphs, and bounded genus graphs.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 19:19:53 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Bateni",
"MohammadHossein",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
],
[
"Marx",
"Dániel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.5153
|
Athanasios Lioumpas S.
|
Athanasios S. Lioumpas
|
Self-Reference Ultra-Wideband Systems
|
Submitted
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Towards employing low complexity transceivers for signal reception in
Ultra-Wideband (UWB) systems, Transmitted Reference (TR) and Differential TR
(DTR) schemes have attracted researchers attention. In this letter, we
introduce an alternative, less complex scheme, called Self Reference (SR) UWB
transceiver, which uses a modified replica of the received signal itself as
reference pulse, resulting in double data rates compared to TR schemes.
Moreover, SR eliminates the need for delay lines at the receiver side, which
constitute a major drawback of the conventional TR and DTR schemes, while it
also requires no channel estimations, resulting in lower complexity
implementations and power savings. The performance of the SR scheme is
investigated in high-frequency (HF) channels, showing that it offers a better
or comparable performance to that of DTR, depending on the channel conditions.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 21:06:41 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2012 08:08:48 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Aug 2013 18:14:56 GMT"
},
{
"version": "v4",
"created": "Fri, 8 Jun 2018 07:01:26 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Jun 2018 09:24:32 GMT"
}
] | 2018-06-28T00:00:00 |
[
[
"Lioumpas",
"Athanasios S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.5157
|
Qi Chen
|
Hartmut Prautzsch and Qi Chen
|
Analyzing Midpoint Subdivision
|
The paper was improved by adding more explanations and by adding an
illustration of how the statements depend on each other. We combined a few
theorems to simplify the structure of the paper and better described the
meaning of the statements and how they fit into the overall proof. 24 pages,
10 figures
| null | null | null |
cs.GR cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Midpoint subdivision generalizes the Lane-Riesenfeld algorithm for uniform
tensor product splines and can also be applied to non regular meshes. For
example, midpoint subdivision of degree 2 is a specific Doo-Sabin algorithm and
midpoint subdivision of degree 3 is a specific Catmull-Clark algorithm. In
2001, Zorin and Schroeder were able to prove C1-continuity for midpoint
subdivision surfaces analytically up to degree 9. Here, we develop general
analysis tools to show that the limiting surfaces under midpoint subdivision of
any degree >= 2 are C1-continuous at their extraordinary points.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 22:47:37 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2010 12:09:48 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Apr 2011 16:54:22 GMT"
}
] | 2011-04-28T00:00:00 |
[
[
"Prautzsch",
"Hartmut",
""
],
[
"Chen",
"Qi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.5171
|
Henning Thielemann
|
Henning Thielemann
|
Untangling Phase and Time in Monophonic Sounds
|
16 pages, 22 figures
| null |
10.4236/jsip.2010.11001
| null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are looking for a mathematical model of monophonic sounds with independent
time and phase dimensions. With such a model we can resynthesise a sound with
arbitrarily modulated frequency and progress of the timbre. We propose such a
model and show that it exactly fulfils some natural properties, like a kind of
time-invariance, robustness against non-harmonic frequencies, envelope
preservation, and inclusion of plain resampling as a special case. The
resulting algorithm is efficient and allows to process data in a streaming
manner with phase and shape modulation at sample rate, what we demonstrate with
an implementation in the functional language Haskell. It allows a wide range of
applications, namely pitch shifting and time scaling, creative FM synthesis
effects, compression of monophonic sounds, generating loops for sampled sounds,
synthesise sounds similar to wavetable synthesis, or making ultrasound audible.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 23:59:44 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Thielemann",
"Henning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0911.5203
|
Xiaochu Qi
|
Xiaochu Qi
|
An Implementation of the Language Lambda Prolog Organized around
Higher-Order Pattern Unification
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This thesis concerns the implementation of Lambda Prolog, a higher-order
logic programming language that supports the lambda-tree syntax approach to
representing and manipulating formal syntactic objects. Lambda Prolog achieves
its functionality by extending a Prolog-like language by using typed lambda
terms as data structures that it then manipulates via higher-order unification
and some new program-level abstraction mechanisms. These additional features
raise new implementation questions that must be adequately addressed for Lambda
Prolog to be an effective programming tool. We consider these questions here,
providing eventually a virtual machine and compilation based realization. A key
idea is the orientation of the computation model of Lambda Prolog around a
restricted version of higher-order unification with nice algorithmic properties
and appearing to encompass most interesting applications. Our virtual machine
embeds a treatment of this form of unification within the structure of the
Warren Abstract Machine that is used in traditional Prolog implementations.
Along the way, we treat various auxiliary issues such as the low-level
representation of lambda terms, the implementation of reduction on such terms
and the optimized processing of types in computation. We also develop an actual
implementation of Lambda Prolog called Teyjus Version 2. A characteristic of
this system is that it realizes an emulator for the virtual machine in the C
language a compiler in the OCaml language. We present a treatment of the
software issues that arise from this kind of mixing of languages within one
system and we discuss issues relevant to the portability of our virtual machine
emulator across arbitrary architectures. Finally, we assess the the efficacy of
our various design ideas through experiments carried out using the system.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 06:18:15 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Qi",
"Xiaochu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.5230
|
Yutaka Oiwa
|
Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi
|
PAKE-based mutual HTTP authentication for preventing phishing attacks
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a new password-based mutual authentication protocol for
Web systems which prevents various kinds of phishing attacks. This protocol
provides a protection of user's passwords against any phishers even if
dictionary attack is employed, and prevents phishers from imitating a false
sense of successful authentication to users. The protocol is designed
considering interoperability with many recent Web applications which requires
many features which current HTTP authentication does not provide. The protocol
is proposed as an Internet Draft submitted to IETF, and implemented in both
server side (as an Apache extension) and client side (as a Mozilla-based
browser and an IE-based one). The paper also proposes a new user-interface for
this protocol which is always distinguishable from fake dialogs provided by
phishers.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 10:09:39 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Oiwa",
"Yutaka",
""
],
[
"Watanabe",
"Hajime",
""
],
[
"Takagi",
"Hiromitsu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.5242
|
Coryn Bailer-Jones
|
C.A.L. Bailer-Jones (Max Planck Institute for Astronomy, Heidelberg)
|
The ILIUM forward modelling algorithm for multivariate parameter
estimation and its application to derive stellar parameters from Gaia
spectrophotometry
|
MNRAS, in press. This revision corrects a few minor errors and typos.
A better formatted version for A4 paper is available at
http://www.mpia.de/home/calj/ilium.pdf
| null |
10.1111/j.1365-2966.2009.16125.x
| null |
astro-ph.IM astro-ph.GA astro-ph.SR cs.NE stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I introduce an algorithm for estimating parameters from multidimensional data
based on forward modelling. In contrast to many machine learning approaches it
avoids fitting an inverse model and the problems associated with this. The
algorithm makes explicit use of the sensitivities of the data to the
parameters, with the goal of better treating parameters which only have a weak
impact on the data. The forward modelling approach provides uncertainty (full
covariance) estimates in the predicted parameters as well as a goodness-of-fit
for observations. I demonstrate the algorithm, ILIUM, with the estimation of
stellar astrophysical parameters (APs) from simulations of the low resolution
spectrophotometry to be obtained by Gaia. The AP accuracy is competitive with
that obtained by a support vector machine. For example, for zero extinction
stars covering a wide range of metallicity, surface gravity and temperature,
ILIUM can estimate Teff to an accuracy of 0.3% at G=15 and to 4% for (lower
signal-to-noise ratio) spectra at G=20. [Fe/H] and logg can be estimated to
accuracies of 0.1-0.4dex for stars with G<=18.5. If extinction varies a priori
over a wide range (Av=0-10mag), then Teff and Av can be estimated quite
accurately (3-4% and 0.1-0.2mag respectively at G=15), but there is a strong
and ubiquitous degeneracy in these parameters which limits our ability to
estimate either accurately at faint magnitudes. Using the forward model we can
map these degeneracies (in advance), and thus provide a complete probability
distribution over solutions. (Abridged)
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 11:28:04 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Jan 2010 07:18:42 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Bailer-Jones",
"C. A. L.",
"",
"Max Planck Institute for Astronomy, Heidelberg"
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.GA",
"description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents",
"span": "(Astrophysics of Galaxies)"
},
{
"class": "Physics",
"code": "astro-ph.SR",
"description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems",
"span": "(Solar and Stellar Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0911.5246
|
Ian Pratt-Hartmann
|
Ivo D\"untsch, Ian Pratt-Hartmann
|
Complex Algebras of Arithmetic
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An 'arithmetic circuit' is a labeled, acyclic directed graph specifying a
sequence of arithmetic and logical operations to be performed on sets of
natural numbers. Arithmetic circuits can also be viewed as the elements of the
smallest subalgebra of the complex algebra of the semiring of natural numbers.
In the present paper, we investigate the algebraic structure of complex
algebras of natural numbers, and make some observations regarding the
complexity of various theories of such algebras.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 11:43:04 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 17:39:28 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Düntsch",
"Ivo",
""
],
[
"Pratt-Hartmann",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5258
|
Petros Petrosyan
|
R.R. Kamalian, P.A. Petrosyan
|
A note on upper bounds for the maximum span in interval edge colorings
of graphs
|
7 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An edge coloring of a graph $G$ with colors $1,2,..., t$ is called an
interval $t$-coloring if for each $i\in \{1,2,...,t\}$ there is at least one
edge of $G$ colored by $i$, the colors of edges incident to any vertex of $G$
are distinct and form an interval of integers. In 1994 Asratian and Kamalian
proved that if a connected graph $G$ admits an interval $t$-coloring, then
$t\leq (d+1) (\Delta -1) +1$, and if $G$ is also bipartite, then this upper
bound can be improved to $t\leq d(\Delta -1) +1$, where $\Delta$ is the maximum
degree in $G$ and $d$ is the diameter of $G$. In this paper we show that these
upper bounds can not be significantly improved.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 12:42:13 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Kamalian",
"R. R.",
""
],
[
"Petrosyan",
"P. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.5262
|
Rob Van Son
|
R.J.J.H. van Son
|
Quantifying Resource Use in Computations
|
26 pages, no figures
| null | null | null |
cs.CC cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
It is currently not possible to quantify the resources needed to perform a
computation. As a consequence, it is not possible to reliably evaluate the
hardware resources needed for the application of algorithms or the running of
programs. This is apparent in both computer science, for instance, in
cryptanalysis, and in neuroscience, for instance, comparative neuro-anatomy. A
System versus Environment game formalism is proposed based on Computability
Logic that allows to define a computational work function that describes the
theoretical and physical resources needed to perform any purely algorithmic
computation. Within this formalism, the cost of a computation is defined as the
sum of information storage over the steps of the computation. The size of the
computational device, eg, the action table of a Universal Turing Machine, the
number of transistors in silicon, or the number and complexity of synapses in a
neural net, is explicitly included in the computational cost. The proposed cost
function leads in a natural way to known computational trade-offs and can be
used to estimate the computational capacity of real silicon hardware and neural
nets. The theory is applied to a historical case of 56 bit DES key recovery, as
an example of application to cryptanalysis. Furthermore, the relative
computational capacities of human brain neurons and the C. elegans nervous
system are estimated as an example of application to neural nets.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 13:22:55 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"van Son",
"R. J. J. H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.5296
|
David J. Aldous
|
David J. Aldous
|
Which Connected Spatial Networks on Random Points have Linear
Route-Lengths?
| null | null | null | null |
math.PR cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a model of a connected network on random points in the plane, one expects
that the mean length of the shortest route between vertices at distance $r$
apart should grow only as $O(r)$ as $r \to \infty$, but this is not always easy
to verify. We give a general sufficient condition for such linearity, in the
setting of a Poisson point process. In a $L \times L$ square, define a
subnetwork $\GG_L$ to have the edges which are present regardless of the
configuration outside the square; the condition is that the largest component
of $\GG_L$ should contain a proportion $1 - o(1)$ of the vertices, as $L \to
\infty$. The proof is by comparison with oriented percolation. We show that the
general result applies to the relative neighborhood graph, and establishing the
linearity property for this network immediately implies it for a large family
of proximity graphs.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 15:55:23 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Aldous",
"David J.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.5300
|
William Matthews
|
Toby S. Cubitt, Debbie Leung, William Matthews, Andreas Winter
|
Improving zero-error classical communication with entanglement
|
6 pages, 2 figures. Version 2 is the same as the journal version plus
figure 1 and the non-signalling box example
|
Phys. Rev. Lett. 104, 230503 (2010)
|
10.1103/PhysRevLett.104.230503
|
NSF-KITP-09-210
|
quant-ph cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given one or more uses of a classical channel, only a certain number of
messages can be transmitted with zero probability of error. The study of this
number and its asymptotic behaviour constitutes the field of classical
zero-error information theory, the quantum generalisation of which has started
to develop recently. We show that, given a single use of certain classical
channels, entangled states of a system shared by the sender and receiver can be
used to increase the number of (classical) messages which can be sent with no
chance of error. In particular, we show how to construct such a channel based
on any proof of the Bell-Kochen-Specker theorem. This is a new example of the
use of quantum effects to improve the performance of a classical task. We
investigate the connection between this phenomenon and that of
``pseudo-telepathy'' games. The use of generalised non-signalling correlations
to assist in this task is also considered. In this case, a particularly elegant
theory results and, remarkably, it is sometimes possible to transmit
information with zero-error using a channel with no unassisted zero-error
capacity.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2009 16:45:00 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Oct 2010 15:28:39 GMT"
}
] | 2010-11-01T00:00:00 |
[
[
"Cubitt",
"Toby S.",
""
],
[
"Leung",
"Debbie",
""
],
[
"Matthews",
"William",
""
],
[
"Winter",
"Andreas",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5372
|
Srinivas Turaga
|
Srinivas C. Turaga, Kevin L. Briggman, Moritz Helmstaedter, Winfried
Denk, H. Sebastian Seung
|
Maximin affinity learning of image segmentation
| null | null | null | null |
cs.CV cs.AI cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Images can be segmented by first using a classifier to predict an affinity
graph that reflects the degree to which image pixels must be grouped together
and then partitioning the graph to yield a segmentation. Machine learning has
been applied to the affinity classifier to produce affinity graphs that are
good in the sense of minimizing edge misclassification rates. However, this
error measure is only indirectly related to the quality of segmentations
produced by ultimately partitioning the affinity graph. We present the first
machine learning algorithm for training a classifier to produce affinity graphs
that are good in the sense of producing segmentations that directly minimize
the Rand index, a well known segmentation performance measure. The Rand index
measures segmentation performance by quantifying the classification of the
connectivity of image pixel pairs after segmentation. By using the simple graph
partitioning algorithm of finding the connected components of the thresholded
affinity graph, we are able to train an affinity classifier to directly
minimize the Rand index of segmentations resulting from the graph partitioning.
Our learning algorithm corresponds to the learning of maximin affinities
between image pixel pairs, which are predictive of the pixel-pair connectivity.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 04:58:38 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Turaga",
"Srinivas C.",
""
],
[
"Briggman",
"Kevin L.",
""
],
[
"Helmstaedter",
"Moritz",
""
],
[
"Denk",
"Winfried",
""
],
[
"Seung",
"H. Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.5378
|
Victor Odumuyiwa
|
Victor Odumuyiwa (LORIA)
|
De la recherche sociale d'information \`a la recherche collaborative
d'information
| null |
7\`eme colloque du chapitre fran\c{c}ais de l'ISKO, Lyon : France
(2009)
| null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we explain social information retrieval (SIR) and
collaborative information retrieval (CIR). We see SIR as a way of knowing who
to collaborate with in resolving an information problem while CIR entails the
process of mutual understanding and solving of an information problem among
collaborators. We are interested in the transition from SIR to CIR hence we
developed a communication model to facilitate knowledge sharing during CIR.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 06:25:00 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Odumuyiwa",
"Victor",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.5384
|
Gregory Gutin
|
Robert Crowston, Gregory Gutin and Mark Jones
|
Note on Max Lin-2 above Average
| null | null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the Max Lin-2 problem we are given a system $S$ of $m$ linear equations in
$n$ variables over $\mathbb{F}_2$ in which Equation $j$ is assigned a positive
integral weight $w_j$ for each $j$. We wish to find an assignment of values to
the variables which maximizes the total weight of satisfied equations. This
problem generalizes Max Cut. The expected weight of satisfied equations is
$W/2$, where $W=w_1+... +w_m$; $W/2$ is a tight lower bound on the optimal
solution of Max Lin-2.
Mahajan et al. (J. Comput. Syst. Sci. 75, 2009) stated the following
parameterized version of Max Lin-2: decide whether there is an assignment of
values to the variables that satisfies equations of total weight at least
$W/2+k$, where $k$ is the parameter. They asked whether this parameterized
problem is fixed-parameter tractable, i.e., can be solved in time
$f(k)(nm)^{O(1)}$, where $f(k)$ is an arbitrary computable function in $k$
only. Their question remains open, but using some probabilistic inequalities
and, in one case, a Fourier analysis inequality, Gutin et al. (IWPEC 2009)
proved that the problem is fixed-parameter tractable in three special cases.
In this paper we significantly extend two of the three special cases using
only tools from combinatorics. We show that one of our results can be used to
obtain a combinatorial proof that another problem from Mahajan et al. (J.
Comput. Syst. Sci. 75, 2009), Max $r$-SAT above the Average, is fixed-parameter
tractable for each $r\ge 2.$ Note that Max $r$-SAT above the Average has been
already shown to be fixed-parameter tractable by Alon et al. (SODA 2010), but
the paper used the approach of Gutin et al. (IWPEC 2009).
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 15:59:51 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Crowston",
"Robert",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Jones",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.5385
|
Ralf Mueller
|
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
|
Asynchronous CDMA Systems with Random Spreading-Part I: Fundamental
Limits
| null |
IEEE Transactions on Information Theory, vol. 56, no. 4, pp.
1477-1497, Apr. 2010
|
10.1109/TIT.2010.2040890
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spectral efficiency for asynchronous code division multiple access (CDMA)
with random spreading is calculated in the large system limit allowing for
arbitrary chip waveforms and frequency-flat fading. Signal to interference and
noise ratios (SINRs) for suboptimal receivers, such as the linear minimum mean
square error (MMSE) detectors, are derived. The approach is general and
optionally allows even for statistics obtained by under-sampling the received
signal.
All performance measures are given as a function of the chip waveform and the
delay distribution of the users in the large system limit. It turns out that
synchronizing users on a chip level impairs performance for all chip waveforms
with bandwidth greater than the Nyquist bandwidth, e.g., positive roll-off
factors. For example, with the pulse shaping demanded in the UMTS standard,
user synchronization reduces spectral efficiency up to 12% at 10 dB normalized
signal-to-noise ratio. The benefits of asynchronism stem from the finding that
the excess bandwidth of chip waveforms actually spans additional dimensions in
signal space, if the users are de-synchronized on the chip-level. The analysis
of linear MMSE detectors shows that the limiting interference effects can be
decoupled both in the user domain and in the frequency domain such that the
concept of the effective interference spectral density arises. This generalizes
and refines Tse and Hanly's concept of effective interference.
In Part II, the analysis is extended to any linear detector that admits a
representation as multistage detector and guidelines for the design of low
complexity multistage detectors with universal weights are provided.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 09:11:25 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Cottatellucci",
"Laura",
""
],
[
"Mueller",
"Ralf R.",
""
],
[
"Debbah",
"Merouane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0911.5394
|
Ping Zhu
|
Ping Zhu
|
Covering rough sets based on neighborhoods: An approach without using
neighborhoods
|
13 pages; to appear in International Journal of Approximate Reasoning
|
International Journal of Approximate Reasoning, 52(3): 461-472,
2011
| null | null |
cs.AI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Rough set theory, a mathematical tool to deal with inexact or uncertain
knowledge in information systems, has originally described the indiscernibility
of elements by equivalence relations. Covering rough sets are a natural
extension of classical rough sets by relaxing the partitions arising from
equivalence relations to coverings. Recently, some topological concepts such as
neighborhood have been applied to covering rough sets. In this paper, we
further investigate the covering rough sets based on neighborhoods by
approximation operations. We show that the upper approximation based on
neighborhoods can be defined equivalently without using neighborhoods. To
analyze the coverings themselves, we introduce unary and composition operations
on coverings. A notion of homomorphismis provided to relate two covering
approximation spaces. We also examine the properties of approximations
preserved by the operations and homomorphisms, respectively.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 11:04:06 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Dec 2010 06:34:05 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Zhu",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.5395
|
Ping Zhu
|
Ping Zhu
|
An axiomatic approach to the roughness measure of rough sets
|
to appear in the Fundamenta Informaticae
|
Fundamenta Informaticae, 109(4): 463-480, 2011
| null | null |
cs.AI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In Pawlak's rough set theory, a set is approximated by a pair of lower and
upper approximations. To measure numerically the roughness of an approximation,
Pawlak introduced a quantitative measure of roughness by using the ratio of the
cardinalities of the lower and upper approximations. Although the roughness
measure is effective, it has the drawback of not being strictly monotonic with
respect to the standard ordering on partitions. Recently, some improvements
have been made by taking into account the granularity of partitions. In this
paper, we approach the roughness measure in an axiomatic way. After
axiomatically defining roughness measure and partition measure, we provide a
unified construction of roughness measure, called strong Pawlak roughness
measure, and then explore the properties of this measure. We show that the
improved roughness measures in the literature are special instances of our
strong Pawlak roughness measure and introduce three more strong Pawlak
roughness measures as well. The advantage of our axiomatic approach is that
some properties of a roughness measure follow immediately as soon as the
measure satisfies the relevant axiomatic definition.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 11:07:59 GMT"
},
{
"version": "v2",
"created": "Tue, 25 May 2010 12:04:06 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Zhu",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.5404
|
Vivek Agrawal
|
Atul Chowdhary, Vivek Agrawal, Subhajit Karmakar, Sandip Sarkar
|
Laser Actuated Presentation System
|
7 pages, 20 figures
| null | null | null |
cs.HC cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present here a pattern sensitive PowerPoint presentation scheme. The
presentation is actuated by simple patterns drawn on the presentation screen by
a laser pointer. A specific pattern corresponds to a particular command
required to operate the presentation. Laser spot on the screen is captured by a
RGB webcam with a red filter mounted, and its location is identified at the
blue layer of each captured frame by estimating the mean position of the pixels
whose intensity is above a given threshold value. Measured Reliability,
Accuracy and Latency of our system are 90%, 10 pixels (in the worst case) and
38 ms respectively.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 16:06:49 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Chowdhary",
"Atul",
""
],
[
"Agrawal",
"Vivek",
""
],
[
"Karmakar",
"Subhajit",
""
],
[
"Sarkar",
"Sandip",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0911.5425
|
Jan Cie\'sli\'nski L.
|
Jan L. Cieslinski
|
Comment on `conservative discretizations of the Kepler motion'
|
6 pages
| null |
10.1088/1751-8113/43/22/228001
| null |
math-ph cs.NA math.MP math.NA physics.space-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the exact integrator for the classical Kepler motion, recently
found by Kozlov ({\it J. Phys. A: Math. Theor.\} {\bf 40} (2007) 4529-4539),
can be derived in a simple natural way (using well known exact discretization
of the harmonic oscillator). We also turn attention on important earlier
references, where the exact discretization of the 4-dimensional isotropic
harmonic oscillator has been applied to the perturbed Kepler problem.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 20:59:03 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Cieslinski",
"Jan L.",
""
]
] |
[
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.space-ph",
"description": "Space plasma physics. Heliophysics. Space weather. Planetary magnetospheres, ionospheres and magnetotail. Auroras. Interplanetary space. Cosmic rays. Synchrotron radiation. Radio astronomy.",
"span": "(Space Physics)"
}
] |
0911.5438
|
Jochen L. Leidner
|
Jochen L. Leidner and Gary Berosik
|
Building and Installing a Hadoop/MapReduce Cluster from Commodity
Components
|
Technical Report; 15 pages, 1 figure
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This tutorial presents a recipe for the construction of a compute cluster for
processing large volumes of data, using cheap, easily available personal
computer hardware (Intel/AMD based PCs) and freely available open source
software (Ubuntu Linux, Apache Hadoop).
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 23:50:28 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Leidner",
"Jochen L.",
""
],
[
"Berosik",
"Gary",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.5444
|
EPTCS
|
Marco Carbone (IT University of Copenhagen), Joshua Guttman (Worcester
Polytechnic Institute)
|
Choreographies with Secure Boxes and Compromised Principals
| null |
EPTCS 12, 2009, pp. 1-15
|
10.4204/EPTCS.12.1
| null |
cs.CR cs.DC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We equip choreography-level session descriptions with a simple abstraction of
a security infrastructure. Message components may be enclosed within (possibly
nested) "boxes" annotated with the intended source and destination of those
components. The boxes are to be implemented with cryptography. Strand spaces
provide a semantics for these choreographies, in which some roles may be played
by compromised principals. A skeleton is a partially ordered structure
containing local behaviors (strands) executed by regular (non-compromised)
principals. A skeleton is realized if it contains enough regular strands so
that it could actually occur, in combination with any possible activity of
compromised principals. It is delivery guaranteed (DG) realized if, in
addition, every message transmitted to a regular participant is also delivered.
We define a novel transition system on skeletons, in which the steps add
regular strands. These steps solve tests, i.e. parts of the skeleton that could
not occur without additional regular behavior. We prove three main results
about the transition system. First, each minimal DG realized skeleton is
reachable, using the transition system, from any skeleton it embeds. Second, if
no step is possible from a skeleton A, then A is DG realized. Finally, if a DG
realized B is accessible from A, then B is minimal. Thus, the transition system
provides a systematic way to construct the possible behaviors of the
choreography, in the presence of compromised principals.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 00:20:33 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Carbone",
"Marco",
"",
"IT University of Copenhagen"
],
[
"Guttman",
"Joshua",
"",
"Worcester\n Polytechnic Institute"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0911.5445
|
EPTCS
|
Dave Clarke (Dept. Computer Science, Katholieke Universiteit Leuven),
Jos\'e Proen\c{c}a (CWI)
|
Coordination via Interaction Constraints I: Local Logic
| null |
EPTCS 12, 2009, pp. 17-39
|
10.4204/EPTCS.12.2
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wegner describes coordination as constrained interaction. We take this
approach literally and define a coordination model based on interaction
constraints and partial, iterative and interactive constraint satisfaction. Our
model captures behaviour described in terms of synchronisation and data flow
constraints, plus various modes of interaction with the outside world provided
by external constraint symbols, on-the-fly constraint generation, and
coordination variables. Underlying our approach is an engine performing
(partial) constraint satisfaction of the sets of constraints. Our model extends
previous work on three counts: firstly, a more advanced notion of external
interaction is offered; secondly, our approach enables local satisfaction of
constraints with appropriate partial solutions, avoiding global synchronisation
over the entire constraints set; and, as a consequence, constraint satisfaction
can finally occur concurrently, and multiple parts of a set of constraints can
be solved and interact with the outside world in an asynchronous manner, unless
synchronisation is required by the constraints. This paper describes the
underlying logic, which enables a notion of local solution, and relates this
logic to the more global approach of our previous work based on classical
logic.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 00:22:21 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Clarke",
"Dave",
"",
"Dept. Computer Science, Katholieke Universiteit Leuven"
],
[
"Proença",
"José",
"",
"CWI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5446
|
EPTCS
|
Mohamad Jaber (VERIMAG, Centre \'Equation), Ananda Basu (VERIMAG,
Centre \'Equation), Simon Bliudze (CEA, LIST)
|
Symbolic Implementation of Connectors in BIP
| null |
EPTCS 12, 2009, pp. 41-55
|
10.4204/EPTCS.12.3
| null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BIP is a component framework for constructing systems by superposing three
layers of modeling: Behavior, Interaction, and Priority. Behavior is
represented by labeled transition systems communicating through ports.
Interactions are sets of ports. A synchronization between components is
possible through the interactions specified by a set of connectors. When
several interactions are possible, priorities allow to restrict the
non-determinism by choosing an interaction, which is maximal according to some
given strict partial order.
The BIP component framework has been implemented in a language and a
tool-set. The execution of a BIP program is driven by a dedicated engine, which
has access to the set of connectors and priority model of the program. A key
performance issue is the computation of the set of possible interactions of the
BIP program from a given state.
Currently, the choice of the interaction to be executed involves a costly
exploration of enumerative representations for connectors. This leads to a
considerable overhead in execution times. In this paper, we propose a symbolic
implementation of the execution model of BIP, which drastically reduces this
overhead. The symbolic implementation is based on computing boolean
representation for components, connectors, and priorities with an existing BDD
package.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 06:27:55 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Jaber",
"Mohamad",
"",
"VERIMAG, Centre Équation"
],
[
"Basu",
"Ananda",
"",
"VERIMAG,\n Centre Équation"
],
[
"Bliudze",
"Simon",
"",
"CEA, LIST"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5447
|
EPTCS
|
Christian Krause (CWI)
|
Integrated Structure and Semantics for Reo Connectors and Petri Nets
| null |
EPTCS 12, 2009, pp. 57-69
|
10.4204/EPTCS.12.4
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present an integrated structural and behavioral model of
Reo connectors and Petri nets, allowing a direct comparison of the two
concurrency models. For this purpose, we introduce a notion of connectors which
consist of a number of interconnected, user-defined primitives with fixed
behavior. While the structure of connectors resembles hypergraphs, their
semantics is given in terms of so-called port automata. We define both models
in a categorical setting where composition operations can be elegantly defined
and integrated. Specifically, we formalize structural gluings of connectors as
pushouts, and joins of port automata as pullbacks. We then define a semantical
functor from the connector to the port automata category which preserves this
composition. We further show how to encode Reo connectors and Petri nets into
this model and indicate applications to dynamic reconfigurations modeled using
double pushout graph transformation.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 00:27:28 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Krause",
"Christian",
"",
"CWI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5449
|
EPTCS
|
Luca Padovani (University of Urbino)
|
Session Types at the Mirror
| null |
EPTCS 12, 2009, pp. 71-86
|
10.4204/EPTCS.12.5
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We (re)define session types as projections of process behaviors with respect
to the communication channels they use. In this setting, we give session types
a semantics based on fair testing. The outcome is a unified theory of
behavioral types that shares common aspects with conversation types and that
encompass features of both dyadic and multi-party session types. The point of
view we provide sheds light on the nature of session types and gives us a
chance to reason about them in a framework where every notion, from
well-typedness to the subtyping relation between session types, is semantically
-rather than syntactically- grounded.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 00:35:42 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Padovani",
"Luca",
"",
"University of Urbino"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.5459
|
Graham Norton
|
Graham H. Norton
|
Shortest Two-way Linear Recurrences
|
This paper has been withdrawn by the author as the proof of Part (b)
of Theorem 4.10(ii) is incorrect
| null | null | null |
cs.IT cs.SC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $s$ be a finite sequence over a field of length $n$. It is well-known
that if $s$ satisfies a linear recurrence of order $d$ with non-zero constant
term, then the reverse of $s$ also satisfies a recurrence of order $d$ (with
coefficients in reverse order). A recent article of A. Salagean proposed an
algorithm to find such a shortest 'two-way' recurrence -- which may be longer
than a linear recurrence for $s$ of shortest length $\LC_n$.
We give a new and simpler algorithm to compute a shortest two-way linear
recurrence. First we show that the pairs of polynomials we use to construct a
minimal polynomial iteratively are always relatively prime; we also give the
extended multipliers. Then we combine degree lower bounds with a
straightforward rewrite of a published algorithm due to the author to obtain
our simpler algorithm. The increase in shortest length is
$\max\{n+1-2\LC_n,0\}$.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 04:36:32 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2009 03:12:58 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jul 2010 22:27:50 GMT"
}
] | 2010-07-26T00:00:00 |
[
[
"Norton",
"Graham H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5462
|
Mahdi S. Hosseini
|
Mahdi S. Hosseini, Babak N. Araabi, and Hamid Soltanian-Zadeh
|
Pigment Melanin: Pattern for Iris Recognition
|
To be Published on Special Issue on Biometrics, IEEE Transaction on
Instruments and Measurements, Volume 59, Issue number 4, April 2010
| null |
10.1109/TIM.2009.2037996
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recognition of iris based on Visible Light (VL) imaging is a difficult
problem because of the light reflection from the cornea. Nonetheless, pigment
melanin provides a rich feature source in VL, unavailable in Near-Infrared
(NIR) imaging. This is due to biological spectroscopy of eumelanin, a chemical
not stimulated in NIR. In this case, a plausible solution to observe such
patterns may be provided by an adaptive procedure using a variational technique
on the image histogram. To describe the patterns, a shape analysis method is
used to derive feature-code for each subject. An important question is how much
the melanin patterns, extracted from VL, are independent of iris texture in
NIR. With this question in mind, the present investigation proposes fusion of
features extracted from NIR and VL to boost the recognition performance. We
have collected our own database (UTIRIS) consisting of both NIR and VL images
of 158 eyes of 79 individuals. This investigation demonstrates that the
proposed algorithm is highly sensitive to the patterns of cromophores and
improves the iris recognition rate.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 07:07:54 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Hosseini",
"Mahdi S.",
""
],
[
"Araabi",
"Babak N.",
""
],
[
"Soltanian-Zadeh",
"Hamid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0911.5486
|
Jinshan Zhang
|
Jinshan Zhang, Heng Liang, Fengshan Bai
|
Approximating Partition Functions of Two-State Spin Systems
|
15pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two-state spin systems is a classical topic in statistical physics. We
consider the problem of computing the partition function of the systems on a
bounded degree graph. Based on the self-avoiding tree, we prove the systems
exhibits strong correlation decay under the condition that the absolute value
of "inverse temperature" is small. Due to strong correlation decay property, an
FPTAS for the partition function is presented under the same condition. This
condition is sharp for Ising model.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 14:05:43 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Zhang",
"Jinshan",
""
],
[
"Liang",
"Heng",
""
],
[
"Bai",
"Fengshan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.5487
|
Jinshan Zhang
|
Jinshan Zhang, Heng Liang, Fengshan Bai
|
Strong Spatial Mixing for Binary Markov Random Fields
|
13pages
| null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gibbs distribution of binary Markov random fields on a sparse on average
graph is considered in this paper. The strong spatial mixing is proved under
the condition that the `external field' is uniformly large or small. Such
condition on `external field' is meaningful in physics.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 14:10:36 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Zhang",
"Jinshan",
""
],
[
"Liang",
"Heng",
""
],
[
"Bai",
"Fengshan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5498
|
Benjamin Burton
|
Benjamin A. Burton
|
The complexity of the normal surface solution space
|
Extended abstract (i.e., conference-style), 14 pages, 8 figures, 2
tables; v2: added minor clarifications
|
SCG '10: Proceedings of the Twenty-Sixth Annual Symposium on
Computational Geometry, ACM, 2010, pp. 201-209
|
10.1145/1810959.1810995
| null |
math.GT cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Normal surface theory is a central tool in algorithmic three-dimensional
topology, and the enumeration of vertex normal surfaces is the computational
bottleneck in many important algorithms. However, it is not well understood how
the number of such surfaces grows in relation to the size of the underlying
triangulation. Here we address this problem in both theory and practice. In
theory, we tighten the exponential upper bound substantially; furthermore, we
construct pathological triangulations that prove an exponential bound to be
unavoidable. In practice, we undertake a comprehensive analysis of millions of
triangulations and find that in general the number of vertex normal surfaces is
remarkably small, with strong evidence that our pathological triangulations may
in fact be the worst case scenarios. This analysis is the first of its kind,
and the striking behaviour that we observe has important implications for the
feasibility of topological algorithms in three dimensions.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 20:56:48 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2010 06:47:53 GMT"
}
] | 2010-06-18T00:00:00 |
[
[
"Burton",
"Benjamin A.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.5508
|
G David Forney Jr.
|
G. David Forney Jr
|
Codes on graphs: Duality and MacWilliams identities
|
30 pages, 20 figures. Accepted for IEEE Transactions on Information
Theory. Preliminary versions presented at IEEE Information Theory Workshop,
Taormina, Italy, October 2009 and 2010 IEEE International Symposium on
Information Theory, Austin, TX, June 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A conceptual framework involving partition functions of normal factor graphs
is introduced, paralleling a similar recent development by Al-Bashabsheh and
Mao. The partition functions of dual normal factor graphs are shown to be a
Fourier transform pair, whether or not the graphs have cycles. The original
normal graph duality theorem follows as a corollary. Within this framework,
MacWilliams identities are found for various local and global weight generating
functions of general group or linear codes on graphs; this generalizes and
provides a concise proof of the MacWilliams identity for linear time-invariant
convolutional codes that was recently found by Gluesing-Luerssen and Schneider.
Further MacWilliams identities are developed for terminated convolutional
codes, particularly for tail-biting codes, similar to those studied recently by
Bocharova, Hug, Johannesson and Kudryashov.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 19:03:01 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 18:10:58 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Aug 2010 20:47:56 GMT"
},
{
"version": "v4",
"created": "Sat, 20 Nov 2010 16:53:47 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Forney",
"G. David",
"Jr"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5509
|
Rajesh Krishnamachari
|
Rajesh T Krishnamachari and Mahesh K Varanasi
|
Interference Alignment Under Limited Feedback for MIMO Interference
Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While interference alignment schemes have been employed to realize the full
multiplexing gain of $K$-user interference channels, the analyses performed so
far have predominantly focused on the case when global channel knowledge is
available at each node of the network. This paper considers the problem where
each receiver knows its channels from all the transmitters and feeds back this
information using a limited number of bits to all other terminals. In
particular, channel quantization over the composite Grassmann manifold is
proposed and analyzed. It is shown, for $K$-user multiple-input,
multiple-output (MIMO) interference channels, that when the transmitters use an
interference alignment strategy as if the quantized channel estimates obtained
via this limited feedback are perfect, the full sum degrees of freedom of the
interference channel can be achieved as long as the feedback bit rate scales
sufficiently fast with the signal-to-noise ratio. Moreover, this is only one
extreme point of a continuous tradeoff between achievable degrees of freedom
region and user feedback rate scalings which are allowed to be non-identical.
It is seen that a slower scaling of feedback rate for any one user leads to
commensurately fewer degrees of freedom for that user alone.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 19:26:59 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Krishnamachari",
"Rajesh T",
""
],
[
"Varanasi",
"Mahesh K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5515
|
{\O}yvind Ryan
|
{\O}. Ryan, A. Masucci, S. Yang, M. Debbah
|
Finite Dimensional Statistical Inference
|
14 pages, 13 figures. Submitted to IEEE Transactions on Information
Theory
| null |
10.1109/TIT.2011.2112010
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we derive the explicit series expansion of the eigenvalue
distribution of various models, namely the case of non-central Wishart
distributions, as well as correlated zero mean Wishart distributions. The tools
used extend those of the free probability framework, which have been quite
successful for high dimensional statistical inference (when the size of the
matrices tends to infinity), also known as free deconvolution. This
contribution focuses on the finite Gaussian case and proposes algorithmic
methods to compute the moments. Cases where asymptotic results fail to apply
are also discussed.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 21:00:28 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jul 2010 12:52:43 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Ryan",
"Ø.",
""
],
[
"Masucci",
"A.",
""
],
[
"Yang",
"S.",
""
],
[
"Debbah",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5524
|
Namrata Vaswani
|
Namrata Vaswani
|
LS-CS-residual (LS-CS): Compressive Sensing on Least Squares Residual
|
Accepted (with mandatory minor revisions) to IEEE Trans. Signal
Processing. 12 pages, 5 figures
|
IEEE Trans. Signal Processing, pages 4108 - 4120, vol. 58(8),
August 2010
|
10.1109/TSP.2010.2048105
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of recursively and causally reconstructing time
sequences of sparse signals (with unknown and time-varying sparsity patterns)
from a limited number of noisy linear measurements. The sparsity pattern is
assumed to change slowly with time. The idea of our proposed solution,
LS-CS-residual (LS-CS), is to replace compressed sensing (CS) on the
observation by CS on the least squares (LS) residual computed using the
previous estimate of the support. We bound CS-residual error and show that when
the number of available measurements is small, the bound is much smaller than
that on CS error if the sparsity pattern changes slowly enough. We also obtain
conditions for "stability" of LS-CS over time for a signal model that allows
support additions and removals, and that allows coefficients to gradually
increase (decrease) until they reach a constant value (become zero). By
"stability", we mean that the number of misses and extras in the support
estimate remain bounded by time-invariant values (in turn implying a
time-invariant bound on LS-CS error). The concept is meaningful only if the
bounds are small compared to the support size. Numerical experiments backing
our claims are shown.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 22:40:47 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 2010 17:00:12 GMT"
}
] | 2010-07-28T00:00:00 |
[
[
"Vaswani",
"Namrata",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5525
|
EPTCS
|
Paolo Torrini (University of Leicester), Reiko Heckel (University of
Leicester)
|
Towards an embedding of Graph Transformation in Intuitionistic Linear
Logic
| null |
EPTCS 12, 2009, pp. 99-115
|
10.4204/EPTCS.12.7
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear logics have been shown to be able to embed both rewriting-based
approaches and process calculi in a single, declarative framework. In this
paper we are exploring the embedding of double-pushout graph transformations
into quantified linear logic, leading to a Curry-Howard style isomorphism
between graphs and transformations on one hand, formulas and proof terms on the
other. With linear implication representing rules and reachability of graphs,
and the tensor modelling parallel composition of graphs and transformations, we
obtain a language able to encode graph transformation systems and their
computations as well as reason about their properties.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 23:14:32 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Torrini",
"Paolo",
"",
"University of Leicester"
],
[
"Heckel",
"Reiko",
"",
"University of\n Leicester"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5526
|
Moritz Hardt
|
Boaz Barak, Moritz Hardt, Thomas Holenstein, David Steurer
|
Subsampling Mathematical Relaxations and Average-case Complexity
|
Includes several more general results that subsume the previous
version of the paper.
| null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We initiate a study of when the value of mathematical relaxations such as
linear and semidefinite programs for constraint satisfaction problems (CSPs) is
approximately preserved when restricting the instance to a sub-instance induced
by a small random subsample of the variables. Let $C$ be a family of CSPs such
as 3SAT, Max-Cut, etc., and let $\Pi$ be a relaxation for $C$, in the sense
that for every instance $P\in C$, $\Pi(P)$ is an upper bound the maximum
fraction of satisfiable constraints of $P$. Loosely speaking, we say that
subsampling holds for $C$ and $\Pi$ if for every sufficiently dense instance $P
\in C$ and every $\epsilon>0$, if we let $P'$ be the instance obtained by
restricting $P$ to a sufficiently large constant number of variables, then
$\Pi(P') \in (1\pm \epsilon)\Pi(P)$. We say that weak subsampling holds if the
above guarantee is replaced with $\Pi(P')=1-\Theta(\gamma)$ whenever
$\Pi(P)=1-\gamma$. We show: 1. Subsampling holds for the BasicLP and BasicSDP
programs. BasicSDP is a variant of the relaxation considered by Raghavendra
(2008), who showed it gives an optimal approximation factor for every CSP under
the unique games conjecture. BasicLP is the linear programming analog of
BasicSDP. 2. For tighter versions of BasicSDP obtained by adding additional
constraints from the Lasserre hierarchy, weak subsampling holds for CSPs of
unique games type. 3. There are non-unique CSPs for which even weak subsampling
fails for the above tighter semidefinite programs. Also there are unique CSPs
for which subsampling fails for the Sherali-Adams linear programming hierarchy.
As a corollary of our weak subsampling for strong semidefinite programs, we
obtain a polynomial-time algorithm to certify that random geometric graphs (of
the type considered by Feige and Schechtman, 2002) of max-cut value $1-\gamma$
have a cut value at most $1-\gamma/10$.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 23:23:38 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Apr 2010 21:35:23 GMT"
}
] | 2010-05-03T00:00:00 |
[
[
"Barak",
"Boaz",
""
],
[
"Hardt",
"Moritz",
""
],
[
"Holenstein",
"Thomas",
""
],
[
"Steurer",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.5527
|
Kamyar Moshksar
|
Kamyar Moshksar, Alireza Bayesteh, Amir K. Khandani
|
A model for randomized resource allocation in decentralized wireless
networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a decentralized wireless communication network
with a fixed number $u$ of frequency sub-bands to be shared among $N$
transmitter-receiver pairs. It is assumed that the number of active users is a
random variable with a given probability mass function. Moreover, users are
unaware of each other's codebooks and hence, no multiuser detection is
possible. We propose a randomized Frequency Hopping (FH) scheme in which each
transmitter randomly hops over a subset of $u$ sub-bands from transmission to
transmission. We derive lower and upper bounds on the mutual information of
each user and demonstrate that, for large Signal-to-Noise Ratio (SNR) values,
the two bounds coincide. This observation enables us to compute the sum
multiplexing gain of the system and obtain the optimum hopping strategy for
maximizing this quantity. We compare the performance of the FH system with that
of the Frequency Division (FD) system in terms of several performance measures
and show that (depending on the probability mass function of the number of
active users) the FH system can offer a significant improvement implying a more
efficient usage of the spectrum.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 23:43:43 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Moshksar",
"Kamyar",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5548
|
Xiaofei Huang
|
Xiaofei Huang
|
A Decision-Optimization Approach to Quantum Mechanics and Game Theory
| null | null | null | null |
cs.GT cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The fundamental laws of quantum world upsets the logical foundation of
classic physics. They are completely counter-intuitive with many bizarre
behaviors. However, this paper shows that they may make sense from the
perspective of a general decision-optimization principle for cooperation. This
principle also offers a generalization of Nash equilibrium, a key concept in
game theory, for better payoffs and stability of game playing.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 16:43:52 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2009 16:58:11 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Huang",
"Xiaofei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.5553
|
Kamyar Moshksar
|
Kamyar Moshksar, Alireza Bayesteh, Amir K. Khandani
|
Randomized vs. orthogonal spectrum allocation in decentralized networks:
Outage Analysis
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address a decentralized wireless communication network with a fixed number
$u$ of frequency sub-bands to be shared among $N$ transmitter-receiver pairs.
It is assumed that the number of users $N$ is a random variable with a given
distribution and the channel gains are quasi-static Rayleigh fading. The
transmitters are assumed to be unaware of the number of active users in the
network as well as the channel gains and not capable of detecting the presence
of other users in a given frequency sub-band. Moreover, the users are unaware
of each other's codebooks and hence, no multiuser detection is possible. We
consider a randomized Frequency Hopping (FH) scheme in which each transmitter
randomly hops over a subset of the $u$ sub-bands from transmission to
transmission. Developing a new upper bound on the differential entropy of a
mixed Gaussian random vector and using entropy power inequality, we offer a
series of lower bounds on the achievable rate of each user. Thereafter, we
obtain lower bounds on the maximum transmission rate per user to ensure a
specified outage probability at a given Signal-to-Noise Ratio (SNR) level. We
demonstrate that the so-called outage capacity can be considerably higher in
the FH scheme than in the Frequency Division (FD) scenario for reasonable
distributions on the number of active users. This guarantees a higher spectral
efficiency in FH compared to FD.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 07:01:19 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Moshksar",
"Kamyar",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5565
|
Loet Leydesdorff
|
Loet Leydesdorff
|
The Communication of Meaning and the Structuration of Expectations:
Giddens' "structuration theory" and Luhmann's "self-organization"
| null | null | null | null |
cs.CY nlin.AO physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The communication of meaning as different from (Shannon-type) information is
central to Luhmann's social systems theory and Giddens' structuration theory of
action. These theories share an emphasis on reflexivity, but focus on meaning
along a divide between inter-human communication and intentful action as two
different systems of reference. Recombining these two theories into a theory
about the structuration of expectations, interactions, organization, and
self-organization of intentional communications can be simulated based on
algorithms from the computation of anticipatory systems. The self-organizing
and organizing layers remain rooted in the double contingency of the human
encounter which provides the variation. Organization and self-organization of
communication are reflexive upon and therefore reconstructive of each other.
Using mutual information in three dimensions, the imprint of meaning processing
in the modeling system on the historical organization of uncertainty in the
modeled system can be measured. This is shown empirically in the case of
intellectual organization as "structurating" structure in the textual domain of
scientific articles.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 07:58:08 GMT"
},
{
"version": "v2",
"created": "Sat, 8 May 2010 15:05:01 GMT"
},
{
"version": "v3",
"created": "Sat, 29 May 2010 09:31:06 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.5568
|
Cedric Messiant
|
C\'edric Messiant (LIPN), Thierry Poibeau (LIPN)
|
Acquisition d'informations lexicales \`a partir de corpus C\'edric
Messiant et Thierry Poibeau
|
3 pages
|
Troisi\`eme colloque international de l'Association Fran\c{c}aise
de Linguistique Cognitive (AFLICO), Nanterre : France (2009)
| null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is about automatic acquisition of lexical information from
corpora, especially subcategorization acquisition.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 08:07:16 GMT"
}
] | 2010-11-09T00:00:00 |
[
[
"Messiant",
"Cédric",
"",
"LIPN"
],
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.5593
|
Yves Robert
|
Franck Cappello (LRI), Henri Casanova (ICS), Yves Robert (INRIA
Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme, LIP)
|
Checkpointing vs. Migration for Post-Petascale Machines
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We craft a few scenarios for the execution of sequential and parallel jobs on
future generation machines. Checkpointing or migration, which technique to
choose?
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 09:39:15 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Cappello",
"Franck",
"",
"LRI"
],
[
"Casanova",
"Henri",
"",
"ICS"
],
[
"Robert",
"Yves",
"",
"INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme, LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.5642
|
Carlo Alberto Furia
|
Carlo A. Furia and Matteo Rossi
|
A Theory of Sampling for Continuous-time Metric Temporal Logic
|
Revised version, 43 pages.
|
ACM Transactions on Computational Logic, 12(1):1--40, October 2010
|
10.1145/1838552.1838560
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper revisits the classical notion of sampling in the setting of
real-time temporal logics for the modeling and analysis of systems. The
relationship between the satisfiability of Metric Temporal Logic (MTL) formulas
over continuous-time models and over discrete-time models is studied. It is
shown to what extent discrete-time sequences obtained by sampling
continuous-time signals capture the semantics of MTL formulas over the two time
domains. The main results apply to "flat" formulas that do not nest temporal
operators and can be applied to the problem of reducing the verification
problem for MTL over continuous-time models to the same problem over
discrete-time, resulting in an automated partial practically-efficient
discretization technique.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 13:51:26 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Apr 2010 12:08:17 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Furia",
"Carlo A.",
""
],
[
"Rossi",
"Matteo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.5652
|
Jean-Philippe Kotowicz
|
Alain Loisel (LITIS), Nathalie Chaignaud (LITIS), Jean-Philippe
Kotowicz (LITIS)
|
Modeling Human Interaction to Design a Human-Computer Dialog System
| null |
International Conference on Entreprise Information System,
ICEIS'08, Barcelone : Spain (2008)
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article presents the Cogni-CISMeF project, which aims at improving the
health information search engine CISMeF, by including a conversational agent
that interacts with the user in natural language. To study the cognitive
processes involved during information search, a bottom-up methodology was
adopted. An experiment has been set up to obtain human dialogs related to such
searches. The analysis of these dialogs underlines the establishment of a
common ground and accommodation effects to the user. A model of artificial
agent is proposed, that guides the user by proposing examples, assistance and
choices.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 14:19:48 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Loisel",
"Alain",
"",
"LITIS"
],
[
"Chaignaud",
"Nathalie",
"",
"LITIS"
],
[
"Kotowicz",
"Jean-Philippe",
"",
"LITIS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.5660
|
Katarzyna Paluch
|
Katarzyna Paluch
|
Faster and simpler approximation of stable matchings
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a 3/2-approximation algorithm for stable matchings that runs in
$O(m)$ time. The previously best known algorithm by McDermid has the same
approximation ratio but runs in $O(n^{3/2}m)$ time, where $n$ denotes the
number of people and $m$ is the total length of the preference lists in a given
instance. Also the algorithm and the analysis are much simpler. We also give
the extension of the algorithm for the many-to-many setting.
(This is the version of the paper from March 2011)
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 14:44:35 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Mar 2010 18:19:04 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Mar 2011 18:39:52 GMT"
},
{
"version": "v4",
"created": "Fri, 1 Jul 2011 15:51:41 GMT"
},
{
"version": "v5",
"created": "Fri, 4 Apr 2014 07:43:22 GMT"
}
] | 2014-04-07T00:00:00 |
[
[
"Paluch",
"Katarzyna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.5667
|
Christian Senger
|
Christian Senger, Steffen Schober, Tong Mao, Alexander Zeh
|
End-to-End Algebraic Network Coding for Wireless TCP/IP Networks
|
Accepted for the 17th International Conference on Telecommunications
2010 (ICT2010), Doha, Qatar, April 4 - 7, 2010. 6 pages, 7 figures
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Transmission Control Protocol (TCP) was designed to provide reliable
transport services in wired networks. In such networks, packet losses mainly
occur due to congestion. Hence, TCP was designed to apply congestion avoidance
techniques to cope with packet losses. Nowadays, TCP is also utilized in
wireless networks where, besides congestion, numerous other reasons for packet
losses exist. This results in reduced throughput and increased transmission
round-trip time when the state of the wireless channel is bad. We propose a new
network layer, that transparently sits below the transport layer and hides non
congestion-imposed packet losses from TCP. The network coding in this new layer
is based on the well-known class of Maximum Distance Separable (MDS) codes.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 15:18:39 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 08:09:40 GMT"
}
] | 2010-04-21T00:00:00 |
[
[
"Senger",
"Christian",
""
],
[
"Schober",
"Steffen",
""
],
[
"Mao",
"Tong",
""
],
[
"Zeh",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.5682
|
Jakub Mo\'scicki
|
Jakub T. Mo\'scicki, Maciej Wo\'s, Massimo Lamanna, Philippe de
Forcrand and Owe Philipsen
|
Lattice QCD Thermodynamics on the Grid
| null |
Comput.Phys.Commun.181:1715-1726,2010
|
10.1016/j.cpc.2010.06.027
| null |
cs.DC hep-lat
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe how we have used simultaneously ${\cal O}(10^3)$ nodes of the
EGEE Grid, accumulating ca. 300 CPU-years in 2-3 months, to determine an
important property of Quantum Chromodynamics. We explain how Grid resources
were exploited efficiently and with ease, using user-level overlay based on
Ganga and DIANE tools above standard Grid software stack. Application-specific
scheduling and resource selection based on simple but powerful heuristics
allowed to improve efficiency of the processing to obtain desired scientific
results by a specified deadline. This is also a demonstration of combined use
of supercomputers, to calculate the initial state of the QCD system, and Grids,
to perform the subsequent massively distributed simulations. The QCD simulation
was performed on a $16^3\times 4$ lattice. Keeping the strange quark mass at
its physical value, we reduced the masses of the up and down quarks until,
under an increase of temperature, the system underwent a second-order phase
transition to a quark-gluon plasma. Then we measured the response of this
system to an increase in the quark density. We find that the transition is
smoothened rather than sharpened. If confirmed on a finer lattice, this finding
makes it unlikely for ongoing experimental searches to find a QCD critical
point at small chemical potential.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 16:14:56 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Mościcki",
"Jakub T.",
""
],
[
"Woś",
"Maciej",
""
],
[
"Lamanna",
"Massimo",
""
],
[
"de Forcrand",
"Philippe",
""
],
[
"Philipsen",
"Owe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "hep-lat",
"description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.",
"span": "(High Energy Physics - Lattice)"
}
] |
0911.5703
|
Stevan Harnad
|
Olivier Picard, Alexandre Blondin-Masse, Stevan Harnad, Odile
Marcotte, Guillaume Chicoisne and Yassine Gargouri
|
Hierarchies in Dictionary Definition Space
|
9 pages, 5 figues, 2 tables, 12 references, 23rd Annual Conference on
Neural Information Processing Systems (NIPS): Workshop on Analyzing Networks
and Learning With Graphs
http://nips.cc/Conferences/2009/Program/event.php?ID=1504
| null | null | null |
cs.CL cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A dictionary defines words in terms of other words. Definitions can tell you
the meanings of words you don't know, but only if you know the meanings of the
defining words. How many words do you need to know (and which ones) in order to
be able to learn all the rest from definitions? We reduced dictionaries to
their "grounding kernels" (GKs), about 10% of the dictionary, from which all
the other words could be defined. The GK words turned out to have
psycholinguistic correlates: they were learned at an earlier age and more
concrete than the rest of the dictionary. But one can compress still more: the
GK turns out to have internal structure, with a strongly connected "kernel
core" (KC) and a surrounding layer, from which a hierarchy of definitional
distances can be derived, all the way out to the periphery of the full
dictionary. These definitional distances, too, are correlated with
psycholinguistic variables (age of acquisition, concreteness, imageability,
oral and written frequency) and hence perhaps with the "mental lexicon" in each
of our heads.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 18:15:35 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Picard",
"Olivier",
""
],
[
"Blondin-Masse",
"Alexandre",
""
],
[
"Harnad",
"Stevan",
""
],
[
"Marcotte",
"Odile",
""
],
[
"Chicoisne",
"Guillaume",
""
],
[
"Gargouri",
"Yassine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.5707
|
Daniel Perrucci
|
Daniel Perrucci
|
Linear Solving for Sign Determination
| null | null | null | null |
math.AG cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a specific method to solve with quadratic complexity the linear
systems arising in known algorithms to deal with the sign determination
problem. In particular, this enable us to improve the complexity bound for sign
determination in the univariate case.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 18:12:58 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Perrucci",
"Daniel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0911.5708
|
Benjamin Rubinstein
|
Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft
|
Learning in a Large Function Space: Privacy-Preserving Mechanisms for
SVM Learning
|
21 pages, 1 figure
| null | null | null |
cs.LG cs.CR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several recent studies in privacy-preserving learning have considered the
trade-off between utility or risk and the level of differential privacy
guaranteed by mechanisms for statistical query processing. In this paper we
study this trade-off in private Support Vector Machine (SVM) learning. We
present two efficient mechanisms, one for the case of finite-dimensional
feature mappings and one for potentially infinite-dimensional feature mappings
with translation-invariant kernels. For the case of translation-invariant
kernels, the proposed mechanism minimizes regularized empirical risk in a
random Reproducing Kernel Hilbert Space whose kernel uniformly approximates the
desired kernel with high probability. This technique, borrowed from large-scale
learning, allows the mechanism to respond with a finite encoding of the
classifier, even when the function class is of infinite VC dimension.
Differential privacy is established using a proof technique from algorithmic
stability. Utility--the mechanism's response function is pointwise
epsilon-close to non-private SVM with probability 1-delta--is proven by
appealing to the smoothness of regularized empirical risk minimization with
respect to small perturbations to the feature mapping. We conclude with a lower
bound on the optimal differential privacy of the SVM. This negative result
states that for any delta, no mechanism can be simultaneously
(epsilon,delta)-useful and beta-differentially private for small epsilon and
small beta.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 20:34:45 GMT"
}
] | 2009-12-01T00:00:00 |
[
[
"Rubinstein",
"Benjamin I. P.",
""
],
[
"Bartlett",
"Peter L.",
""
],
[
"Huang",
"Ling",
""
],
[
"Taft",
"Nina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.0027
|
Yunhui Fu
|
Matthew Cook and Yunhui Fu and Robert T. Schweller
|
Temperature 1 Self-Assembly: Deterministic Assembly in 3D and
Probabilistic Assembly in 2D
| null | null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the power of the Wang tile self-assembly model at temperature
1, a threshold value that permits attachment between any two tiles that share
even a single bond. When restricted to deterministic assembly in the plane, no
temperature 1 assembly system has been shown to build a shape with a tile
complexity smaller than the diameter of the shape. In contrast, we show that
temperature 1 self-assembly in 3 dimensions, even when growth is restricted to
at most 1 step into the third dimension, is capable of simulating a large class
of temperature 2 systems, in turn permitting the simulation of arbitrary Turing
machines and the assembly of $n\times n$ squares in near optimal $O(\log n)$
tile complexity. Further, we consider temperature 1 probabilistic assembly in
2D, and show that with a logarithmic scale up of tile complexity and shape
scale, the same general class of temperature $\tau=2$ systems can be simulated
with high probability, yielding Turing machine simulation and $O(\log^2 n)$
assembly of $n\times n$ squares with high probability. Our results show a sharp
contrast in achievable tile complexity at temperature 1 if either growth into
the third dimension or a small probability of error are permitted. Motivated by
applications in nanotechnology and molecular computing, and the plausibility of
implementing 3 dimensional self-assembly systems, our techniques may provide
the needed power of temperature 2 systems, while at the same time avoiding the
experimental challenges faced by those systems.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 21:45:29 GMT"
},
{
"version": "v2",
"created": "Thu, 13 May 2010 00:12:03 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Cook",
"Matthew",
""
],
[
"Fu",
"Yunhui",
""
],
[
"Schweller",
"Robert T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0912.0032
|
Giacomo Innocenti Doc.
|
Giacomo Innocenti, Luca Pretini
|
Abstraction and control techniques for non-stationary scheduling
problems
|
26 pages, 10 figures, technical (internal) report of the Dipartimento
di sistemi e Informatica, Universita' di Firenze
| null | null |
R.T.2/2009
|
nlin.AO cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper faces the problem of scheduling from a new perspective, trying to
bridge the gap between classical heuristic approaches and system identification
and control strategies. To this aim, a complete mathematical formulation of a
general scheduling process is derived, beginning from very broad assumptions.
This allows a greater freedom of manipulation and guarantee the resolution of
the identification (and control) techniques. Both an adaptive and a switching
strategies are presented in relation to the performances of a simple Round
Robin algorithm.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 21:57:32 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Innocenti",
"Giacomo",
""
],
[
"Pretini",
"Luca",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0912.0034
|
EPTCS
|
Gabriel Ciobanu
|
Proceedings Third Workshop on Membrane Computing and Biologically
Inspired Process Calculi 2009
|
In Memoriam Nadia Busi
|
EPTCS 11, 2009
|
10.4204/EPTCS.11
| null |
cs.CE cs.DC cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the accepted papers at the third Workshop on Membrane
Computing and Biologically Inspired Process Calculi, held in Bologna on 5th
September 2009. The papers are devoted to both membrane computing and
biologically inspired process calculi, as well as to other related formalisms.
The papers of this volume are selected by the programme committee due to their
quality and relevance; they have defined an exciting programme highlighting
interesting problems and stimulating the search for novel ways of describing
related biological phenomena. In addition, we had an invited talk given by Luca
Cardelli on a spatial process algebra for developmental biology. Membrane
systems were introduced as a class of distributed parallel computing devices
inspired by the observation that any biological system is a complex
hierarchical structure, with a flow of materials and information that underlies
their functioning. The emphasis is on the computational properties of the
model, and it makes use of automata, languages, and complexity theoretic tools.
On the other hand, certain calculi such as mobile ambients and brane calculi
work with similar notions (compartments, membranes). These calculi are used to
model and analyze the various biological systems. The workshop on Membrane
Computing and Biologically Inspired Process Calculi brings together researchers
working in these fields to present their recent work and discuss new ideas
concerning the formalisms, their properties and relationships.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 22:24:42 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Ciobanu",
"Gabriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0912.0071
|
Anand Sarwate
|
Kamalika Chaudhuri, Claire Monteleoni, Anand D. Sarwate
|
Differentially Private Empirical Risk Minimization
|
40 pages, 7 figures, accepted to the Journal of Machine Learning
Research
| null | null | null |
cs.LG cs.AI cs.CR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Privacy-preserving machine learning algorithms are crucial for the
increasingly common setting in which personal data, such as medical or
financial records, are analyzed. We provide general techniques to produce
privacy-preserving approximations of classifiers learned via (regularized)
empirical risk minimization (ERM). These algorithms are private under the
$\epsilon$-differential privacy definition due to Dwork et al. (2006). First we
apply the output perturbation ideas of Dwork et al. (2006), to ERM
classification. Then we propose a new method, objective perturbation, for
privacy-preserving machine learning algorithm design. This method entails
perturbing the objective function before optimizing over classifiers. If the
loss and regularizer satisfy certain convexity and differentiability criteria,
we prove theoretical results showing that our algorithms preserve privacy, and
provide generalization bounds for linear and nonlinear kernels. We further
present a privacy-preserving technique for tuning the parameters in general
machine learning algorithms, thereby providing end-to-end privacy guarantees
for the training process. We apply these results to produce privacy-preserving
analogues of regularized logistic regression and support vector machines. We
obtain encouraging results from evaluating their performance on real
demographic and benchmark data sets. Our results show that both theoretically
and empirically, objective perturbation is superior to the previous
state-of-the-art, output perturbation, in managing the inherent tradeoff
between privacy and learning performance.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 04:35:44 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2010 19:33:44 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Feb 2010 05:26:22 GMT"
},
{
"version": "v4",
"created": "Wed, 2 Jun 2010 23:16:36 GMT"
},
{
"version": "v5",
"created": "Wed, 16 Feb 2011 22:35:55 GMT"
}
] | 2011-02-18T00:00:00 |
[
[
"Chaudhuri",
"Kamalika",
""
],
[
"Monteleoni",
"Claire",
""
],
[
"Sarwate",
"Anand D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.0086
|
Kamalika Chaudhuri
|
Kamalika Chaudhuri, Sanjoy Dasgupta, Andrea Vattani
|
Learning Mixtures of Gaussians using the k-means Algorithm
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most popular algorithms for clustering in Euclidean space is the
$k$-means algorithm; $k$-means is difficult to analyze mathematically, and few
theoretical guarantees are known about it, particularly when the data is {\em
well-clustered}. In this paper, we attempt to fill this gap in the literature
by analyzing the behavior of $k$-means on well-clustered data. In particular,
we study the case when each cluster is distributed as a different Gaussian --
or, in other words, when the input comes from a mixture of Gaussians.
We analyze three aspects of the $k$-means algorithm under this assumption.
First, we show that when the input comes from a mixture of two spherical
Gaussians, a variant of the 2-means algorithm successfully isolates the
subspace containing the means of the mixture components. Second, we show an
exact expression for the convergence of our variant of the 2-means algorithm,
when the input is a very large number of samples from a mixture of spherical
Gaussians. Our analysis does not require any lower bound on the separation
between the mixture components.
Finally, we study the sample requirement of $k$-means; for a mixture of 2
spherical Gaussians, we show an upper bound on the number of samples required
by a variant of 2-means to get close to the true solution. The sample
requirement grows with increasing dimensionality of the data, and decreasing
separation between the means of the Gaussians. To match our upper bound, we
show an information-theoretic lower bound on any algorithm that learns mixtures
of two spherical Gaussians; our lower bound indicates that in the case when the
overlap between the probability masses of the two distributions is small, the
sample requirement of $k$-means is {\em near-optimal}.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 19:10:46 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Chaudhuri",
"Kamalika",
""
],
[
"Dasgupta",
"Sanjoy",
""
],
[
"Vattani",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0912.0132
|
Fadi Badra
|
Fadi Badra (INRIA Lorraine - LORIA), Am\'elie Cordier (LIRIS), Jean
Lieber (INRIA Lorraine - LORIA)
|
Opportunistic Adaptation Knowledge Discovery
| null |
8th International Conference on Case-Based Reasoning, ICCBR 2009,
Seattle : United States (2009)
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Adaptation has long been considered as the Achilles' heel of case-based
reasoning since it requires some domain-specific knowledge that is difficult to
acquire. In this paper, two strategies are combined in order to reduce the
knowledge engineering cost induced by the adaptation knowledge (CA) acquisition
task: CA is learned from the case base by the means of knowledge discovery
techniques, and the CA acquisition sessions are opportunistically triggered,
i.e., at problem-solving time.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 12:08:47 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Badra",
"Fadi",
"",
"INRIA Lorraine - LORIA"
],
[
"Cordier",
"Amélie",
"",
"LIRIS"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0912.0134
|
Swan Dubois
|
Swan Dubois (LIP6, INRIA Rocquencourt), Maria Gradinariu
Potop-Butucaru (LIP6, INRIA Rocquencourt), Mikhail Nesterenko, S\'ebastien
Tixeuil (LIP6)
|
Self-Stabilizing Byzantine Asynchronous Unison
| null | null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore asynchronous unison in the presence of systemic transient and
permanent Byzantine faults in shared memory. We observe that the problem is not
solvable under less than strongly fair scheduler or for system topologies with
maximum node degree greater than two. We present a self-stabilizing
Byzantine-tolerant solution to asynchronous unison for chain and ring
topologies. Our algorithm has minimum possible containment radius and optimal
stabilization time.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 12:09:17 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Dubois",
"Swan",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Potop-Butucaru",
"Maria Gradinariu",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Nesterenko",
"Mikhail",
"",
"LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0149
|
Nuno Pratas
|
Nuno Pratas, Nicola Marchetti, Neeli Rashmi Prasad, Antonio Rodrigues
and Ramjee Prasad
|
Robust Cooperative Spectrum Sensing for Disaster Relief Networks in
Correlated Environments
|
10 Pages, 12 figures. Submitted to J-SAC - Special Issue on Advances
in Cognitive Radio Networking and Communications on December 1st of 2009
| null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Disaster relief networks are designed to be adaptable and resilient so to
encompass the demands of the emergency service. Cognitive Radio enhanced ad-hoc
architecture has been put forward as a candidate to enable such networks.
Spectrum sensing, the cornerstone of the Cognitive Radio paradigm, has been the
focus of intensive research, from which the main conclusion was that its
performance can be greatly enhanced through the use of cooperative sensing
schemes. To apply the Cognitive Radio paradigm to Ad-hoc disaster relief
networks, the design of effective cooperative spectrum sensing schemes is
essential. In this paper we propose a cluster based orchestration cooperative
sensing scheme, which adapts to the cluster nodes surrounding radio environment
state as well as to the degree of correlation observed between those nodes. The
proposed scheme is given both in a centralized as well as in a decentralized
approach. In the centralized approach, the cluster head controls and adapts the
distribution of the cluster sensing nodes according to the monitored spectrum
state. While in the decentralized approach, each of the cluster nodes decides
which spectrum it should monitor, according to the past local sensing decisions
of the cluster nodes. The centralized and decentralized schemes can be combined
to achieve a more robust cooperative spectrum sensing scheme. The proposed
scheme performance is evaluated through a framework, which allows measuring the
accuracy of the spectrum sensing cooperative scheme by measuring the error in
the estimation of the monitored spectrum state. Through this evaluation it is
shown that the proposed scheme outperforms the case where the choice of which
spectrum to sense is done without using the knowledge obtained in previous
sensing iterations, i.e. a implementation of a blind Round Robin scheme.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 13:37:36 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Pratas",
"Nuno",
""
],
[
"Marchetti",
"Nicola",
""
],
[
"Prasad",
"Neeli Rashmi",
""
],
[
"Rodrigues",
"Antonio",
""
],
[
"Prasad",
"Ramjee",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0912.0161
|
Peter Csermely
|
Istvan A. Kovacs, Robin Palotai, Mate S. Szalay and Peter Csermely
|
Community landscapes: an integrative approach to determine overlapping
network module hierarchy, identify key nodes and predict network dynamics
|
25 pages with 6 figures and a Glossary + Supporting Information
containing pseudo-codes of all algorithms used, 14 Figures, 5 Tables (with 18
module definitions, 129 different modularization methods, 13 module
comparision methods) and 396 references. All algorithms can be downloaded
from this web-site: http://www.linkgroup.hu/modules.php
|
PLoS ONE 5, e12528 (2010)
|
10.1371/journal.pone.0012528
| null |
physics.comp-ph cond-mat.dis-nn cs.MS physics.data-an physics.soc-ph q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: Network communities help the functional organization and
evolution of complex networks. However, the development of a method, which is
both fast and accurate, provides modular overlaps and partitions of a
heterogeneous network, has proven to be rather difficult. Methodology/Principal
Findings: Here we introduce the novel concept of ModuLand, an integrative
method family determining overlapping network modules as hills of an influence
function-based, centrality-type community landscape, and including several
widely used modularization methods as special cases. As various adaptations of
the method family, we developed several algorithms, which provide an efficient
analysis of weighted and directed networks, and (1) determine pervasively
overlapping modules with high resolution; (2) uncover a detailed hierarchical
network structure allowing an efficient, zoom-in analysis of large networks;
(3) allow the determination of key network nodes and (4) help to predict
network dynamics. Conclusions/Significance: The concept opens a wide range of
possibilities to develop new approaches and applications including network
routing, classification, comparison and prediction.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 10:36:18 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2009 12:58:48 GMT"
},
{
"version": "v3",
"created": "Sat, 13 Mar 2010 11:44:46 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Sep 2010 06:14:01 GMT"
}
] | 2010-09-06T00:00:00 |
[
[
"Kovacs",
"Istvan A.",
""
],
[
"Palotai",
"Robin",
""
],
[
"Szalay",
"Mate S.",
""
],
[
"Csermely",
"Peter",
""
]
] |
[
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
}
] |
0912.0180
|
Bram Reps
|
Bram Reps, Wim Vanroose and Hisham bin Zubair
|
On the indefinite Helmholtz equation: complex stretched absorbing
boundary layers, iterative analysis, and preconditioning
| null |
Journal of Computational Physics (2010)
|
10.1016/j.jcp.2010.07.022
| null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies and analyzes a preconditioned Krylov solver for Helmholtz
problems that are formulated with absorbing boundary layers based on complex
coordinate stretching. The preconditioner problem is a Helmholtz problem where
not only the coordinates in the absorbing layer have an imaginary part, but
also the coordinates in the interior region. This results into a preconditioner
problem that is invertible with a multigrid cycle. We give a numerical analysis
based on the eigenvalues and evaluate the performance with several numerical
experiments. The method is an alternative to the complex shifted Laplacian and
it gives a comparable performance for the studied model problems.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 15:15:44 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jun 2010 09:35:35 GMT"
}
] | 2010-08-19T00:00:00 |
[
[
"Reps",
"Bram",
""
],
[
"Vanroose",
"Wim",
""
],
[
"Zubair",
"Hisham bin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0912.0224
|
Nicolas A. Barriga
|
Nicolas A. Barriga, Mauricio Araya-L\'opez
|
A Multi-stage Probabilistic Algorithm for Dynamic Path-Planning
|
7 pages, 5 figures. Presented in Ingelectra 2009 conference
| null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Probabilistic sampling methods have become very popular to solve single-shot
path planning problems. Rapidly-exploring Random Trees (RRTs) in particular
have been shown to be efficient in solving high dimensional problems. Even
though several RRT variants have been proposed for dynamic replanning, these
methods only perform well in environments with infrequent changes. This paper
addresses the dynamic path planning problem by combining simple techniques in a
multi-stage probabilistic algorithm. This algorithm uses RRTs for initial
planning and informed local search for navigation. We show that this
combination of simple techniques provides better responses to highly dynamic
environments than the RRT extensions.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 20:55:01 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Barriga",
"Nicolas A.",
""
],
[
"Araya-López",
"Mauricio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0912.0226
|
Paul Bonsma
|
Paul Bonsma
|
Max-Leaves Spanning Tree is APX-hard for Cubic Graphs
| null | null | null | null |
cs.DM cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of finding a spanning tree with maximum number of
leaves (MaxLeaf). A 2-approximation algorithm is known for this problem, and a
3/2-approximation algorithm when restricted to graphs where every vertex has
degree 3 (cubic graphs). MaxLeaf is known to be APX-hard in general, and
NP-hard for cubic graphs. We show that the problem is also APX-hard for cubic
graphs. The APX-hardness of the related problem Minimum Connected Dominating
Set for cubic graphs follows.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 18:26:53 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Bonsma",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0228
|
Charles Sauerbier
|
Charles Sauerbier
|
Answering Hilbert's 1st Problem
|
7 pages, 0 figures; full revision of content to address critiques;
along with numerous complaints as to "style", "quality", and other nonsense
arising of opinion
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hilbert's first problem is of importance in relation to work being done in
computational systems. It is the question of equipollence of natural and real
numbers. By construction equipollence is established for real numbers in open
interval (0, 1) and natural numbers and, from such to all real numbers.
Construction stands in contradiction of the generally accepted diagonal
argument of Cantor. Mathematics being irrefutable, in absence rejection of all
theory of mathematics and logic, the problem exists in acceptance; that itself
arises of more fundamental a problem in science generally. The problem within
Hilbert's problem is of Schopenhauer's, et al, "will and representation" born.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 18:40:19 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 21:53:48 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Dec 2009 22:02:02 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Mar 2021 15:37:48 GMT"
},
{
"version": "v5",
"created": "Thu, 4 Mar 2021 08:20:03 GMT"
},
{
"version": "v6",
"created": "Fri, 26 Mar 2021 16:00:31 GMT"
}
] | 2021-03-29T00:00:00 |
[
[
"Sauerbier",
"Charles",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0912.0229
|
Anna Gilbert
|
Anna C. Gilbert, Yi Li, Ely Porat, Martin J. Strauss
|
Approximate Sparse Recovery: Optimizing Time and Measurements
| null |
SIAM J. Comput. 41(2), pp. 436-453, 2012
| null | null |
cs.DS cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An approximate sparse recovery system consists of parameters $k,N$, an
$m$-by-$N$ measurement matrix, $\Phi$, and a decoding algorithm, $\mathcal{D}$.
Given a vector, $x$, the system approximates $x$ by $\widehat x
=\mathcal{D}(\Phi x)$, which must satisfy $\| \widehat x - x\|_2\le C \|x -
x_k\|_2$, where $x_k$ denotes the optimal $k$-term approximation to $x$. For
each vector $x$, the system must succeed with probability at least 3/4. Among
the goals in designing such systems are minimizing the number $m$ of
measurements and the runtime of the decoding algorithm, $\mathcal{D}$.
In this paper, we give a system with $m=O(k \log(N/k))$
measurements--matching a lower bound, up to a constant factor--and decoding
time $O(k\log^c N)$, matching a lower bound up to $\log(N)$ factors.
We also consider the encode time (i.e., the time to multiply $\Phi$ by $x$),
the time to update measurements (i.e., the time to multiply $\Phi$ by a
1-sparse $x$), and the robustness and stability of the algorithm (adding noise
before and after the measurements). Our encode and update times are optimal up
to $\log(N)$ factors.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 18:47:24 GMT"
}
] | 2014-02-10T00:00:00 |
[
[
"Gilbert",
"Anna C.",
""
],
[
"Li",
"Yi",
""
],
[
"Porat",
"Ely",
""
],
[
"Strauss",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0238
|
Sebastiano Vigna
|
Sebastiano Vigna
|
Spectral Ranking
| null | null | null | null |
cs.IR cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We sketch the history of spectral ranking, a general umbrella name for
techniques that apply the theory of linear maps (in particular, eigenvalues and
eigenvectors) to matrices that do not represent geometric transformations, but
rather some kind of relationship between entities. Albeit recently made famous
by the ample press coverage of Google's PageRank algorithm, spectral ranking
was devised more than a century ago, and has been studied in tournament
ranking, psychology, social sciences, bibliometrics, economy and choice theory.
We describe the contribution given by previous scholars in precise and modern
mathematical terms: along the way, we show how to express in a general way
damped rankings, such as Katz's index, as dominant eigenvectors of perturbed
matrices, and then use results on the Drazin inverse to go back to the dominant
eigenvectors by a limit process. The result suggests a regularized definition
of spectral ranking that yields for a general matrix a unique vector depending
on a boundary condition.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 19:35:39 GMT"
},
{
"version": "v10",
"created": "Fri, 9 Aug 2013 14:01:58 GMT"
},
{
"version": "v11",
"created": "Sat, 7 Sep 2013 17:18:38 GMT"
},
{
"version": "v12",
"created": "Sat, 12 Oct 2013 10:45:57 GMT"
},
{
"version": "v13",
"created": "Fri, 8 Nov 2013 11:37:33 GMT"
},
{
"version": "v14",
"created": "Tue, 29 Sep 2015 21:26:47 GMT"
},
{
"version": "v15",
"created": "Fri, 8 Feb 2019 11:01:34 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Dec 2009 08:23:10 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Dec 2009 23:30:17 GMT"
},
{
"version": "v4",
"created": "Wed, 9 Dec 2009 16:53:20 GMT"
},
{
"version": "v5",
"created": "Fri, 11 Dec 2009 16:37:26 GMT"
},
{
"version": "v6",
"created": "Tue, 22 Dec 2009 01:14:01 GMT"
},
{
"version": "v7",
"created": "Wed, 10 Mar 2010 11:24:23 GMT"
},
{
"version": "v8",
"created": "Fri, 12 Nov 2010 16:19:25 GMT"
},
{
"version": "v9",
"created": "Wed, 2 Mar 2011 14:57:02 GMT"
}
] | 2019-02-11T00:00:00 |
[
[
"Vigna",
"Sebastiano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0912.0250
|
Ryan O'Donnell
|
Ryan O'Donnell, Yi Wu, Yuan Zhou
|
Optimal lower bounds for locality sensitive hashing (except when q is
tiny)
|
9 pages + abstract and references
| null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study lower bounds for Locality Sensitive Hashing (LSH) in the strongest
setting: point sets in {0,1}^d under the Hamming distance. Recall that here H
is said to be an (r, cr, p, q)-sensitive hash family if all pairs x, y in
{0,1}^d with dist(x,y) at most r have probability at least p of collision under
a randomly chosen h in H, whereas all pairs x, y in {0,1}^d with dist(x,y) at
least cr have probability at most q of collision. Typically, one considers d
tending to infinity, with c fixed and q bounded away from 0.
For its applications to approximate nearest neighbor search in high
dimensions, the quality of an LSH family H is governed by how small its "rho
parameter" rho = ln(1/p)/ln(1/q) is as a function of the parameter c. The
seminal paper of Indyk and Motwani showed that for each c, the extremely simple
family H = {x -> x_i : i in d} achieves rho at most 1/c. The only known lower
bound, due to Motwani, Naor, and Panigrahy, is that rho must be at least .46/c
(minus o_d(1)).
In this paper we show an optimal lower bound: rho must be at least 1/c (minus
o_d(1)). This lower bound for Hamming space yields a lower bound of 1/c^2 for
Euclidean space (or the unit sphere) and 1/c for the Jaccard distance on sets;
both of these match known upper bounds. Our proof is simple; the essence is
that the noise stability of a boolean function at e^{-t} is a log-convex
function of t.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 20:34:12 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"O'Donnell",
"Ryan",
""
],
[
"Wu",
"Yi",
""
],
[
"Zhou",
"Yuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0912.0255
|
Cristinel Diaconu
|
Dphep Study Group
|
Data Preservation in High Energy Physics
|
Intermediate report of the ICFA-DPHEP Study Group (18 pages, 2
figures)
| null | null |
DPHEP-2009-001
|
hep-ex cs.DL physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data from high-energy physics (HEP) experiments are collected with
significant financial and human effort and are mostly unique. At the same time,
HEP has no coherent strategy for data preservation and re-use. An
inter-experimental Study Group on HEP data preservation and long-term analysis
was convened at the end of 2008 and held two workshops, at DESY (January 2009)
and SLAC (May 2009). This document is an intermediate report to the
International Committee for Future Accelerators (ICFA) of the reflections of
this Study Group.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 22:32:31 GMT"
}
] | 2012-08-27T00:00:00 |
[
[
"Dphep Study Group",
"",
""
]
] |
[
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0912.0265
|
Gabriel Silva
|
Marius Buibas, Diana Yu, Krystal Nizar, Gabriel A. Silva
|
Mapping the spatiotemporal dynamics of calcium signaling in cellular
neural networks using optical flow
|
23 pages, 5 figures. Peer reviewed accepted version in press in
Annals of Biomedical Engineering
| null | null | null |
cs.CE cs.CV q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An optical flow gradient algorithm was applied to spontaneously forming net-
works of neurons and glia in culture imaged by fluorescence optical microscopy
in order to map functional calcium signaling with single pixel resolution.
Optical flow estimates the direction and speed of motion of objects in an image
between subsequent frames in a recorded digital sequence of images (i.e. a
movie). Computed vector field outputs by the algorithm were able to track the
spatiotemporal dynamics of calcium signaling pat- terns. We begin by briefly
reviewing the mathematics of the optical flow algorithm, and then describe how
to solve for the displacement vectors and how to measure their reliability. We
then compare computed flow vectors with manually estimated vectors for the
progression of a calcium signal recorded from representative astrocyte
cultures. Finally, we applied the algorithm to preparations of primary
astrocytes and hippocampal neurons and to the rMC-1 Muller glial cell line in
order to illustrate the capability of the algorithm for capturing different
types of spatiotemporal calcium activity. We discuss the imaging requirements,
parameter selection and threshold selection for reliable measurements, and
offer perspectives on uses of the vector data.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 21:17:53 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jan 2010 17:13:08 GMT"
}
] | 2010-01-22T00:00:00 |
[
[
"Buibas",
"Marius",
""
],
[
"Yu",
"Diana",
""
],
[
"Nizar",
"Krystal",
""
],
[
"Silva",
"Gabriel A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0912.0266
|
Nicolas A. Barriga
|
Nicolas A. Barriga, Mauricio Araya-L\'opez, Mauricio Solar
|
Combining a Probabilistic Sampling Technique and Simple Heuristics to
solve the Dynamic Path Planning Problem
|
8 pages, 7 figures. Presented at the XXVIII International Conference
of the Chilean Computer Society 2009
| null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Probabilistic sampling methods have become very popular to solve single-shot
path planning problems. Rapidly-exploring Random Trees (RRTs) in particular
have been shown to be very efficient in solving high dimensional problems. Even
though several RRT variants have been proposed to tackle the dynamic replanning
problem, these methods only perform well in environments with infrequent
changes. This paper addresses the dynamic path planning problem by combining
simple techniques in a multi-stage probabilistic algorithm. This algorithm uses
RRTs as an initial solution, informed local search to fix unfeasible paths and
a simple greedy optimizer. The algorithm is capable of recognizing when the
local search is stuck, and subsequently restart the RRT. We show that this
combination of simple techniques provides better responses to a highly dynamic
environment than the dynamic RRT variants.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 21:03:49 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Barriga",
"Nicolas A.",
""
],
[
"Araya-López",
"Mauricio",
""
],
[
"Solar",
"Mauricio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0912.0270
|
Nicolas A. Barriga
|
Nicolas A. Barriga
|
Single-Agent On-line Path Planning in Continuous, Unpredictable and
Highly Dynamic Environments
|
54 pages, Master of Science in Informatics Engineering thesis
| null | null | null |
cs.AI cs.RO
|
http://creativecommons.org/licenses/by/3.0/
|
This document is a thesis on the subject of single-agent on-line path
planning in continuous,unpredictable and highly dynamic environments. The
problem is finding and traversing a collision-free path for a holonomic robot,
without kinodynamic restrictions, moving in an environment with several
unpredictably moving obstacles or adversaries. The availability of perfect
information of the environment at all times is assumed.
Several static and dynamic variants of the Rapidly Exploring Random Trees
(RRT) algorithm are explored, as well as an evolutionary algorithm for planning
in dynamic environments called the Evolutionary Planner/Navigator. A
combination of both kinds of algorithms is proposed to overcome shortcomings in
both, and then a combination of a RRT variant for initial planning and informed
local search for navigation, plus a simple greedy heuristic for optimization.
We show that this combination of simple techniques provides better responses to
highly dynamic environments than the RRT extensions.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 21:13:36 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Barriga",
"Nicolas A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0912.0284
|
Thomas Schick
|
Laurent Bartholdi (1), Thomas Schick (1), Nat Smale (2), Steve Smale
(3), Anthony W. Baker (4) ((1) Georg-August-Universit\"at G\"ottingen, (2)
University of Utah, (3) City University of Hong Kong, (4) The Boing Company)
|
Hodge Theory on Metric Spaces
|
appendix by Anthony W. Baker, 48 pages, AMS-LaTeX. v2: final version,
to appear in Foundations of Computational Mathematics. Minor changes and
additions
|
Foundations of Computational Mathematics 12:1 (2012) 1-48
|
10.1007/s10208-011-9107-3
| null |
math.KT cs.CG math.GT math.NA stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hodge theory is a beautiful synthesis of geometry, topology, and analysis,
which has been developed in the setting of Riemannian manifolds. On the other
hand, spaces of images, which are important in the mathematical foundations of
vision and pattern recognition, do not fit this framework. This motivates us to
develop a version of Hodge theory on metric spaces with a probability measure.
We believe that this constitutes a step towards understanding the geometry of
vision.
The appendix by Anthony Baker provides a separable, compact metric space with
infinite dimensional \alpha-scale homology.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 22:22:47 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Nov 2011 19:08:34 GMT"
}
] | 2016-06-28T00:00:00 |
[
[
"Bartholdi",
"Laurent",
""
],
[
"Schick",
"Thomas",
""
],
[
"Smale",
"Nat",
""
],
[
"Smale",
"Steve",
""
],
[
"Baker",
"Anthony W.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.KT",
"description": "Algebraic and topological K-theory, relations with topology, commutative algebra, and operator algebras",
"span": "(K-Theory and Homology)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0912.0287
|
Rasmus Pagh
|
Martin Dietzfelbinger, Andreas Goerdt, Michael Mitzenmacher, Andrea
Montanari, Rasmus Pagh, and Michael Rink
|
Tight Thresholds for Cuckoo Hashing via XORSAT
|
Revision 3 contains missing details of proofs, as appendix D
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We settle the question of tight thresholds for offline cuckoo hashing. The
problem can be stated as follows: we have n keys to be hashed into m buckets
each capable of holding a single key. Each key has k >= 3 (distinct) associated
buckets chosen uniformly at random and independently of the choices of other
keys. A hash table can be constructed successfully if each key can be placed
into one of its buckets. We seek thresholds alpha_k such that, as n goes to
infinity, if n/m <= alpha for some alpha < alpha_k then a hash table can be
constructed successfully with high probability, and if n/m >= alpha for some
alpha > alpha_k a hash table cannot be constructed successfully with high
probability. Here we are considering the offline version of the problem, where
all keys and hash values are given, so the problem is equivalent to previous
models of multiple-choice hashing. We find the thresholds for all values of k >
2 by showing that they are in fact the same as the previously known thresholds
for the random k-XORSAT problem. We then extend these results to the setting
where keys can have differing number of choices, and provide evidence in the
form of an algorithm for a conjecture extending this result to cuckoo hash
tables that store multiple keys in a bucket.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2009 22:23:48 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Feb 2010 21:45:36 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Dec 2010 14:53:26 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Dietzfelbinger",
"Martin",
""
],
[
"Goerdt",
"Andreas",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Rink",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0309
|
Murray Patterson
|
Cedric Chauve, Jan Manuch and Murray Patterson
|
Hardness Results for the Gapped Consecutive-Ones Property
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by problems of comparative genomics and paleogenomics, in [Chauve
et al., 2009], the authors introduced the Gapped Consecutive-Ones Property
Problem (k,delta)-C1P: given a binary matrix M and two integers k and delta,
can the columns of M be permuted such that each row contains at most k blocks
of ones and no two consecutive blocks of ones are separated by a gap of more
than delta zeros. The classical C1P problem, which is known to be polynomial is
equivalent to the (1,0)-C1P problem. They showed that the (2,delta)-C1P Problem
is NP-complete for all delta >= 2 and that the (3,1)-C1P problem is
NP-complete. They also conjectured that the (k,delta)-C1P Problem is
NP-complete for k >= 2, delta >= 1 and (k,delta) =/= (2,1). Here, we prove that
this conjecture is true. The only remaining case is the (2,1)-C1P Problem,
which could be polynomial-time solvable.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 00:26:17 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Dec 2009 03:20:22 GMT"
}
] | 2009-12-05T00:00:00 |
[
[
"Chauve",
"Cedric",
""
],
[
"Manuch",
"Jan",
""
],
[
"Patterson",
"Murray",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0312
|
Zhihan Gao
|
Zhi-Han Gao and Fang-Wei Fu
|
The minimal polynomial of sequence obtained from componentwise linear
transformation of linear recurring sequence
|
This paper was submitted to the journal Theoretical Computer Science
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $S=(s_1,s_2,...,s_m,...)$ be a linear recurring sequence with terms in
$GF(q^n)$ and $T$ be a linear transformation of $GF(q^n)$ over $GF(q)$. Denote
$T(S)=(T(s_1),T(s_2),...,T(s_m),...)$. In this paper, we first present counter
examples to show the main result in [A.M. Youssef and G. Gong, On linear
complexity of sequences over $GF(2^n)$, Theoretical Computer Science,
352(2006), 288-292] is not correct in general since Lemma 3 in that paper is
incorrect. Then, we determine the minimal polynomial of $T(S)$ if the canonical
factorization of the minimal polynomial of $S$ without multiple roots is known
and thus present the solution to the problem which was mainly considered in the
above paper but incorrectly solved. Additionally, as a special case, we
determine the minimal polynomial of $T(S)$ if the minimal polynomial of $S$ is
primitive. Finally, we give an upper bound on the linear complexity of $T(S)$
when $T$ exhausts all possible linear transformations of $GF(q^n)$ over
$GF(q)$. This bound is tight in some cases.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 01:13:42 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Gao",
"Zhi-Han",
""
],
[
"Fu",
"Fang-Wei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0322
|
Shaddin Dughmi
|
Shaddin Dughmi
|
Submodular Functions: Extensions, Distributions, and Algorithms. A
Survey
|
This revision corrects an error in definition 2.2, as well as
provides additional intuition regarding the definitions of convex closure and
concave closure
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Submodularity is a fundamental phenomenon in combinatorial optimization.
Submodular functions occur in a variety of combinatorial settings such as
coverage problems, cut problems, welfare maximization, and many more.
Therefore, a lot of work has been concerned with maximizing or minimizing a
submodular function, often subject to combinatorial constraints. Many of these
algorithmic results exhibit a common structure. Namely, the function is
extended to a continuous, usually non-linear, function on a convex domain.
Then, this relaxation is solved, and the fractional solution rounded to yield
an integral solution. Often, the continuous extension has a natural
interpretation in terms of distributions on subsets of the ground set. This
interpretation is often crucial to the results and their analysis. The purpose
of this survey is to highlight this connection between extensions,
distributions, relaxations, and optimization in the context of submodular
functions. We also present the first constant factor approximation algorithm
for minimizing symmetric submodular functions subject to a cardinality
constraint.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 02:02:27 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2009 19:09:36 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Dec 2009 19:47:08 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Nov 2011 22:23:46 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Dughmi",
"Shaddin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.