id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0911.4910
Tao Zhou
Ci-Hang Jin, Jian-Guo Liu, Yi-Cheng Zhang, Tao Zhou
Adaptive information filtering for dynamic recommender systems
6 pages, 5 figures, 1 table
null
null
null
cs.IR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamic environment in the real world calls for the adaptive techniques for information filtering, namely to provide real-time responses to the changes of system data. Where many incremental algorithms are designed for this purpose, they are usually challenged by the worse and worse performance resulted from the cumulative errors over time. In this Letter, we propose two incremental diffusion-based algorithms for the personalized recommendations, which integrate some pieces of local and fast updatings to achieve the approximate results. In addition to the fast responses, the errors of the proposed algorithms do not cumulate over time, that is to say, the global recomputing is unnecessary. This remarkable advantage is demonstrated by several metrics on algorithmic accuracy for two movie recommender systems and a social bookmarking system.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 16:34:13 GMT" } ]
2009-11-26T00:00:00
[ [ "Jin", "Ci-Hang", "" ], [ "Liu", "Jian-Guo", "" ], [ "Zhang", "Yi-Cheng", "" ], [ "Zhou", "Tao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.4940
Sebastian F. Walter
Sebastian F. Walter
Efficient Higher Order Derivatives of Objective Functions Composed of Matrix Operations
null
null
null
null
cs.DS cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the efficient evaluation of higher-order derivatives of functions $f$ that are composed of matrix operations. I.e., we want to compute the $D$-th derivative tensor $\nabla^D f(X) \in \mathbb R^{N^D}$, where $f:\mathbb R^{N} \to \mathbb R$ is given as an algorithm that consists of many matrix operations. We propose a method that is a combination of two well-known techniques from Algorithmic Differentiation (AD): univariate Taylor propagation on scalars (UTPS) and first-order forward and reverse on matrices. The combination leads to a technique that we would like to call univariate Taylor propagation on matrices (UTPM). The method inherits many desirable properties: It is easy to implement, it is very efficient and it returns not only $\nabla^D f$ but yields in the process also the derivatives $\nabla^d f$ for $d \leq D$. As performance test we compute the gradient $\nabla f(X)$ % and the Hessian $\nabla_A^2 f(A)$ by a combination of forward and reverse mode of $f(X) = \trace (X^{-1})$ in the reverse mode of AD for $X \in \mathbb R^{n \times n}$. We observe a speedup of about 100 compared to UTPS. Due to the nature of the method, the memory footprint is also small and therefore can be used to differentiate functions that are not accessible by standard methods due to limited physical memory.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 20:05:24 GMT" } ]
2016-09-08T00:00:00
[ [ "Walter", "Sebastian F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0911.4961
Lianlin Li Dr
Lianlin Li and Behnam Jafarpour
A Sparse Bayesian Estimation Framework for Conditioning Prior Geologic Models to Nonlinear Flow Measurements
null
null
10.1016/j.advwatres.2010.06.005
null
cs.NA physics.data-an physics.geo-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Bayesian framework for reconstruction of subsurface hydraulic properties from nonlinear dynamic flow data by imposing sparsity on the distribution of the solution coefficients in a compression transform domain.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 21:41:40 GMT" } ]
2015-05-14T00:00:00
[ [ "Li", "Lianlin", "" ], [ "Jafarpour", "Behnam", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.geo-ph", "description": "Atmospheric physics. Biogeosciences. Computational geophysics. Geographic location. Geoinformatics. Geophysical techniques. Hydrospheric geophysics. Magnetospheric physics. Mathematical geophysics. Planetology. Solar system. Solid earth geophysics. Space plasma physics. Mineral physics. High pressure physics.", "span": "(Geophysics)" } ]
0911.4963
Christian Wulff-Nilsen
Shay Mozes and Christian Wulff-Nilsen
Shortest Paths in Planar Graphs with Real Lengths in $O(n\log^2n/\log\log n)$ Time
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an $n$-vertex planar directed graph with real edge lengths and with no negative cycles, we show how to compute single-source shortest path distances in the graph in $O(n\log^2n/\log\log n)$ time with O(n) space. This is an improvement of a recent time bound of $O(n\log^2n)$ by Klein et al.
[ { "version": "v1", "created": "Wed, 25 Nov 2009 21:43:30 GMT" } ]
2009-11-30T00:00:00
[ [ "Mozes", "Shay", "" ], [ "Wulff-Nilsen", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.4981
Gonzalo Navarro
Jeremy Barbay, Francisco Claude, Travis Gagie, Gonzalo Navarro and Yakov Nekrich
Efficient Fully-Compressed Sequence Representations
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a data structure that stores a sequence $s[1..n]$ over alphabet $[1..\sigma]$ in $n\Ho(s) + o(n)(\Ho(s){+}1)$ bits, where $\Ho(s)$ is the zero-order entropy of $s$. This structure supports the queries \access, \rank\ and \select, which are fundamental building blocks for many other compressed data structures, in worst-case time $\Oh{\lg\lg\sigma}$ and average time $\Oh{\lg \Ho(s)}$. The worst-case complexity matches the best previous results, yet these had been achieved with data structures using $n\Ho(s)+o(n\lg\sigma)$ bits. On highly compressible sequences the $o(n\lg\sigma)$ bits of the redundancy may be significant compared to the the $n\Ho(s)$ bits that encode the data. Our representation, instead, compresses the redundancy as well. Moreover, our average-case complexity is unprecedented. Our technique is based on partitioning the alphabet into characters of similar frequency. The subsequence corresponding to each group can then be encoded using fast uncompressed representations without harming the overall compression ratios, even in the redundancy. The result also improves upon the best current compressed representations of several other data structures. For example, we achieve $(i)$ compressed redundancy, retaining the best time complexities, for the smallest existing full-text self-indexes; $(ii)$ compressed permutations $\pi$ with times for $\pi()$ and $\pii()$ improved to loglogarithmic; and $(iii)$ the first compressed representation of dynamic collections of disjoint sets. We also point out various applications to inverted indexes, suffix arrays, binary relations, and data compressors. ...
[ { "version": "v1", "created": "Wed, 25 Nov 2009 23:31:23 GMT" }, { "version": "v2", "created": "Sat, 6 Feb 2010 02:04:43 GMT" }, { "version": "v3", "created": "Sat, 26 Jun 2010 03:33:21 GMT" }, { "version": "v4", "created": "Mon, 2 Apr 2012 02:12:43 GMT" } ]
2012-04-03T00:00:00
[ [ "Barbay", "Jeremy", "" ], [ "Claude", "Francisco", "" ], [ "Gagie", "Travis", "" ], [ "Navarro", "Gonzalo", "" ], [ "Nekrich", "Yakov", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.4983
EPTCS
Thomas Anung Basuki (International Institute of Software Technology, United Nations University), Antonio Cerone (International Institute of Software Technology, United Nations University), Rafael V. Carvalho (International Institute of Software Technology, United Nations University)
Modelling Cell Cycle using Different Levels of Representation
null
EPTCS 11, 2009, pp. 51-69
10.4204/EPTCS.11.4
null
cs.CE cs.LO q-bio.CB q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding the behaviour of biological systems requires a complex setting of in vitro and in vivo experiments, which attracts high costs in terms of time and resources. The use of mathematical models allows researchers to perform computerised simulations of biological systems, which are called in silico experiments, to attain important insights and predictions about the system behaviour with a considerably lower cost. Computer visualisation is an important part of this approach, since it provides a realistic representation of the system behaviour. We define a formal methodology to model biological systems using different levels of representation: a purely formal representation, which we call molecular level, models the biochemical dynamics of the system; visualisation-oriented representations, which we call visual levels, provide views of the biological system at a higher level of organisation and are equipped with the necessary spatial information to generate the appropriate visualisation. We choose Spatial CLS, a formal language belonging to the class of Calculi of Looping Sequences, as the formalism for modelling all representation levels. We illustrate our approach using the budding yeast cell cycle as a case study.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:16:10 GMT" } ]
2009-11-30T00:00:00
[ [ "Basuki", "Thomas Anung", "", "International Institute of Software Technology,\n United Nations University" ], [ "Cerone", "Antonio", "", "International Institute of\n Software Technology, United Nations University" ], [ "Carvalho", "Rafael V.", "", "International Institute of Software Technology, United Nations University" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.CB", "description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology", "span": "(Cell Behavior)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4984
EPTCS
Federica Ciocchetta, Adam Duguid, Maria Luisa Guerriero
A compartmental model of the cAMP/PKA/MAPK pathway in Bio-PEPA
null
EPTCS 11, 2009, pp. 71-90
10.4204/EPTCS.11.5
null
cs.CE cs.LO q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vast majority of biochemical systems involve the exchange of information between different compartments, either in the form of transportation or via the intervention of membrane proteins which are able to transmit stimuli between bordering compartments. The correct quantitative handling of compartments is, therefore, extremely important when modelling real biochemical systems. The Bio-PEPA process algebra is equipped with the capability of explicitly defining quantitative information such as compartment volumes and membrane surface areas. Furthermore, the recent development of the Bio-PEPA Eclipse Plug-in allows us to perform a correct stochastic simulation of multi-compartmental models. Here we present a Bio-PEPA compartmental model of the cAMP/PKA/MAPK pathway. We analyse the system using the Bio-PEPA Eclipse Plug-in and we show the correctness of our model by comparison with an existing ODE model. Furthermore, we perform computational experiments in order to investigate certain properties of the pathway. Specifically, we focus on the system response to the inhibition and strengthening of feedback loops and to the variation in the activity of key pathway reactions and we observe how these modifications affect the behaviour of the pathway. These experiments are useful to understand the control and regulatory mechanisms of the system.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:17:48 GMT" } ]
2009-11-30T00:00:00
[ [ "Ciocchetta", "Federica", "" ], [ "Duguid", "Adam", "" ], [ "Guerriero", "Maria Luisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4985
EPTCS
Mariangiola Dezani-Ciancaglini (Dipartimento di Informatica, Universit\`a di Torino), Paola Giannini (Dipartimento di Informatica, Universit\`a del Piemonte Orientale), Angelo Troina (Dipartimento di Informatica, Universit\`a di Torino)
A Type System for a Stochastic CLS
null
EPTCS 11, 2009, pp. 91-105
10.4204/EPTCS.11.6
null
cs.FL cs.PL q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Stochastic Calculus of Looping Sequences is suitable to describe the evolution of microbiological systems, taking into account the speed of the described activities. We propose a type system for this calculus that models how the presence of positive and negative catalysers can modify these speeds. We claim that types are the right abstraction in order to represent the interaction between elements without specifying exactly the element positions. Our claim is supported through an example modelling the lactose operon.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:24:08 GMT" } ]
2009-11-30T00:00:00
[ [ "Dezani-Ciancaglini", "Mariangiola", "", "Dipartimento di Informatica,\n Università di Torino" ], [ "Giannini", "Paola", "", "Dipartimento di Informatica,\n Università del Piemonte Orientale" ], [ "Troina", "Angelo", "", "Dipartimento di\n Informatica, Università di Torino" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4986
EPTCS
Michael J. Dinneen (University of Auckland), Yun-Bum Kim (University of Auckland), Radu Nicolescu (University of Auckland)
New Solutions to the Firing Squad Synchronization Problems for Neural and Hyperdag P Systems
null
EPTCS 11, 2009, pp. 107-122
10.4204/EPTCS.11.7
null
cs.CE cs.DC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose two uniform solutions to an open question: the Firing Squad Synchronization Problem (FSSP), for hyperdag and symmetric neural P systems, with anonymous cells. Our solutions take e_c+5 and 6e_c+7 steps, respectively, where e_c is the eccentricity of the commander cell of the dag or digraph underlying these P systems. The first and fast solution is based on a novel proposal, which dynamically extends P systems with mobile channels. The second solution is substantially longer, but is solely based on classical rules and static channels. In contrast to the previous solutions, which work for tree-based P systems, our solutions synchronize to any subset of the underlying digraph; and do not require membrane polarizations or conditional rules, but require states, as typically used in hyperdag and neural P systems.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:26:39 GMT" } ]
2009-11-30T00:00:00
[ [ "Dinneen", "Michael J.", "", "University of Auckland" ], [ "Kim", "Yun-Bum", "", "University\n of Auckland" ], [ "Nicolescu", "Radu", "", "University of Auckland" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.4987
EPTCS
Rudolf Freund (Vienna University of Technology), Marian Kogler (Vienna University of Technology)
Drip and Mate Operations Acting in Test Tube Systems and Tissue-like P systems
null
EPTCS 11, 2009, pp. 123-135
10.4204/EPTCS.11.8
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The operations drip and mate considered in (mem)brane computing resemble the operations cut and recombination well known from DNA computing. We here consider sets of vesicles with multisets of objects on their outside membrane interacting by drip and mate in two different setups: in test tube systems, the vesicles may pass from one tube to another one provided they fulfill specific constraints; in tissue-like P systems, the vesicles are immediately passed to specified cells after having undergone a drip or mate operation. In both variants, computational completeness can be obtained, yet with different constraints for the drip and mate operations.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:33:04 GMT" } ]
2009-11-30T00:00:00
[ [ "Freund", "Rudolf", "", "Vienna University of Technology" ], [ "Kogler", "Marian", "", "Vienna\n University of Technology" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0911.4988
EPTCS
Roberta Gori (Dipartimento di informatica, Pisa.), Francesca Levi (Dipartimento di informatica, Pisa)
Abstract Interpretation for Probabilistic Termination of Biological Systems
null
EPTCS 11, 2009, pp. 137-153
10.4204/EPTCS.11.9
null
cs.LO cs.CE cs.FL q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous paper the authors applied the Abstract Interpretation approach for approximating the probabilistic semantics of biological systems, modeled specifically using the Chemical Ground Form calculus. The methodology is based on the idea of representing a set of experiments, which differ only for the initial concentrations, by abstracting the multiplicity of reagents present in a solution, using intervals. In this paper, we refine the approach in order to address probabilistic termination properties. More in details, we introduce a refinement of the abstract LTS semantics and we abstract the probabilistic semantics using a variant of Interval Markov Chains. The abstract probabilistic model safely approximates a set of concrete experiments and reports conservative lower and upper bounds for probabilistic termination.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:36:03 GMT" } ]
2009-12-01T00:00:00
[ [ "Gori", "Roberta", "", "Dipartimento di informatica, Pisa." ], [ "Levi", "Francesca", "", "Dipartimento di informatica, Pisa" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.4989
EPTCS
G. Michele Pinna, Andrea Saba
Dependencies and Simultaneity in Membrane Systems
null
EPTCS 11, 2009, pp. 155-169
10.4204/EPTCS.11.10
null
cs.CE cs.DC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Membrane system computations proceed in a synchronous fashion: at each step all the applicable rules are actually applied. Hence each step depends on the previous one. This coarse view can be refined by looking at the dependencies among rule occurrences, by recording, for an object, which was the a rule that produced it and subsequently (in a later step), which was the a rule that consumed it. In this paper we propose a way to look also at the other main ingredient in membrane system computations, namely the simultaneity in the rule applications. This is achieved using zero-safe nets that allows to synchronize transitions, i.e., rule occurrences. Zero-safe nets can be unfolded into occurrence nets in a classical way, and to this unfolding an event structure can be associated. The capability of capturing simultaneity of zero-safe nets is transferred on the level of event structure by adding a way to express which events occur simultaneously.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 00:39:34 GMT" } ]
2009-11-30T00:00:00
[ [ "Pinna", "G. Michele", "" ], [ "Saba", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5017
Sang Won Bae
Sang Won Bae and Yoshio Okamoto
Querying Two Boundary Points for Shortest Paths in a Polygonal Domain
12 pages, 3 figures, an extended abstract presented at ISAAC 2009
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a variant of two-point Euclidean shortest path query problem: given a polygonal domain, build a data structure for two-point shortest path query, provided that query points always lie on the boundary of the domain. As a main result, we show that a logarithmic-time query for shortest paths between boundary points can be performed using O~ (n^5) preprocessing time and O(n^5) space where n is the number of corners of the polygonal domain and the O~ notation suppresses the polylogarithmic factor. This is realized by observing a connection between Davenport-Schinzel sequences and our problem in the parameterized space. We also provide a tradeoff between space and query time; a sublinear time query is possible using O(n^{3+epsilon}) space. Our approach also extends to the case where query points should lie on a given set of line segments.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 07:11:59 GMT" } ]
2009-11-30T00:00:00
[ [ "Bae", "Sang Won", "" ], [ "Okamoto", "Yoshio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.5018
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Autosolvability of halting problem instances for instruction sequences
18 pages; notational mistakes in tables 5 and 6 corrected; erroneous definition in last paragraph of page 11 corrected
null
null
PRG0914
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We position Turing's result regarding the undecidability of the halting problem as a result about programs rather than machines. The mere requirement that a program of a certain kind must solve the halting problem for all programs of that kind leads to a contradiction in the case of a recent unsolvability result regarding the halting problem for programs. In this paper, we investigate this autosolvability requirement in a setting in which programs take the form of instruction sequences.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 07:32:11 GMT" }, { "version": "v2", "created": "Sat, 8 May 2010 12:39:24 GMT" }, { "version": "v3", "created": "Sun, 17 Oct 2010 20:33:05 GMT" } ]
2010-10-19T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.5026
Daniel Kharitonov
Daniel Kharitonov
Time-domain approach to energy efficiency in high-performance network element design
Pre-print for publication at GlobeCom 2009 proceedings
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency is a corner stone of sustainability in data center and high-performance networking. However, at present there is a notable structural mismatch between network silicon development targets and network equipment utilization patterns in the field. In particular, some aspects of network energy utilization (eg load-proportional energy consumption) routinely stay out of focus during system design and implementation. Drawing from hands-on research and development in high-speed and grid networking, we identify a novel approach to energy efficiency in network engineering. In this paper, we demonstrate how the problem of efficient network system design can be dissected into smaller sections based on timescales of traffic processing. The newly proposed approach allows R&D efforts to be tightly paired to resources and sustainability targets to improve energy efficiency in many classes of network and telecom devices.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 08:29:25 GMT" }, { "version": "v2", "created": "Mon, 5 Sep 2011 08:21:54 GMT" } ]
2011-09-06T00:00:00
[ [ "Kharitonov", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.5031
Shihabur Rahman Chowdhury
Shihabur Rahman Chowdhury, Masud Hasan, Sumaiya Iqbal, M. Sohel Rahman
An $O(n^2)$ Algorithm for Computing Longest Common Cyclic Subsequence
This paper has been withdrawn by the author due to a crucial error in the proofs
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The {\em longest common subsequence (LCS)} problem is a classic and well-studied problem in computer science. LCS is a central problem in stringology and finds broad applications in text compression, error-detecting codes and biological sequence comparison. However, in numerous contexts, words represent cyclic sequences of symbols and LCS must be generalized to consider all circular shifts of the strings. This occurs especially in computational biology when genetic material is sequenced form circular DNA or RNA molecules. This initiates the problem of {\em longest common cyclic subsequence (LCCS)} which finds the longest subsequence between all circular shifts of two strings. In this paper, we give an $O(n^2)$ algorithm for solving LCCS problem where $n$ is the number of symbols in the strings.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 08:49:48 GMT" }, { "version": "v2", "created": "Sun, 18 Apr 2010 15:53:33 GMT" } ]
2010-04-20T00:00:00
[ [ "Chowdhury", "Shihabur Rahman", "" ], [ "Hasan", "Masud", "" ], [ "Iqbal", "Sumaiya", "" ], [ "Rahman", "M. Sohel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.5043
Nicola Fanizzi
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
A Semantic Similarity Measure for Expressive Description Logics
13 pages, Appeared at CILC 2005, Convegno Italiano di Logica Computazionale also available at http://www.disp.uniroma2.it/CILC2005/downloads/papers/15.dAmato_CILC05.pdf
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A totally semantic measure is presented which is able to calculate a similarity value between concept descriptions and also between concept description and individual or between individuals expressed in an expressive description logic. It is applicable on symbolic descriptions although it uses a numeric approach for the calculus. Considering that Description Logics stand as the theoretic framework for the ontological knowledge representation and reasoning, the proposed measure can be effectively used for agglomerative and divisional clustering task applied to the semantic web domain.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 10:21:31 GMT" } ]
2009-11-30T00:00:00
[ [ "d'Amato", "Claudia", "" ], [ "Fanizzi", "Nicola", "" ], [ "Esposito", "Floriana", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5046
Joaqu\'in P\'erez-Iglesias
Joaqu\'in P\'erez-Iglesias, Jos\'e R. P\'erez-Ag\"uera, V\'ictor Fresno and Yuval Z. Feinstein
Integrating the Probabilistic Models BM25/BM25F into Lucene
Software can be downloaded from: http://nlp.uned.es/~jperezi/Lucene-BM25/
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document describes the BM25 and BM25F implementation using the Lucene Java Framework. Both models have stood out at TREC by their performance and are considered as state-of-the-art in the IR community. BM25 is applied to retrieval on plain text documents, that is for documents that do not contain fields, while BM25F is applied to documents with structure.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 10:27:14 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 13:41:05 GMT" } ]
2009-12-01T00:00:00
[ [ "Pérez-Iglesias", "Joaquín", "" ], [ "Pérez-Agüera", "José R.", "" ], [ "Fresno", "Víctor", "" ], [ "Feinstein", "Yuval Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.5067
Ralf Mueller
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
Asynchronous CDMA Systems with Random Spreading-Part II: Design Criteria
null
IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1498-1520, Apr. 2010
10.1109/TIT.2010.2040898
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Totally asynchronous code-division multiple-access (CDMA) systems are addressed. In Part I, the fundamental limits of asynchronous CDMA systems are analyzed in terms of spectral efficiency and SINR at the output of the optimum linear detector. The focus of Part II is the design of low-complexity implementations of linear multiuser detectors in systems with many users that admit a multistage representation, e.g. reduced rank multistage Wiener filters, polynomial expansion detectors, weighted linear parallel interference cancellers. The effects of excess bandwidth, chip-pulse shaping, and time delay distribution on CDMA with suboptimum linear receiver structures are investigated. Recursive expressions for universal weight design are given. The performance in terms of SINR is derived in the large-system limit and the performance improvement over synchronous systems is quantified. The considerations distinguish between two ways of forming discrete-time statistics: chip-matched filtering and oversampling.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 12:01:57 GMT" } ]
2010-07-13T00:00:00
[ [ "Cottatellucci", "Laura", "" ], [ "Mueller", "Ralf R.", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0911.5086
Menelaos Karavelas
Menelaos I. Karavelas and Eleni Tzanaki
Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes
22 pages, 5 figures, new proof of upper bound for the complexity of the convex hull of parallel polytopes (the new proof gives upper bounds for all face numbers of the convex hull of the parallel polytopes)
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set $\Sigma$ of spheres in $\mathbb{E}^d$, with $d\ge{}3$ and $d$ odd, having a fixed number of $m$ distinct radii $\rho_1,\rho_2,...,\rho_m$, we show that the worst-case combinatorial complexity of the convex hull $CH_d(\Sigma)$ of $\Sigma$ is $\Theta(\sum_{1\le{}i\ne{}j\le{}m}n_in_j^{\lfloor\frac{d}{2}\rfloor})$, where $n_i$ is the number of spheres in $\Sigma$ with radius $\rho_i$. To prove the lower bound, we construct a set of $\Theta(n_1+n_2)$ spheres in $\mathbb{E}^d$, with $d\ge{}3$ odd, where $n_i$ spheres have radius $\rho_i$, $i=1,2$, and $\rho_2\ne\rho_1$, such that their convex hull has combinatorial complexity $\Omega(n_1n_2^{\lfloor\frac{d}{2}\rfloor}+n_2n_1^{\lfloor\frac{d}{2}\rfloor})$. Our construction is then generalized to the case where the spheres have $m\ge{}3$ distinct radii. For the upper bound, we reduce the sphere convex hull problem to the problem of computing the worst-case combinatorial complexity of the convex hull of a set of $m$ $d$-dimensional convex polytopes lying on $m$ parallel hyperplanes in $\mathbb{E}^{d+1}$, where $d\ge{}3$ odd, a problem which is of independent interest. More precisely, we show that the worst-case combinatorial complexity of the convex hull of a set $\{\mathcal{P}_1,\mathcal{P}_2,...,\mathcal{P}_m\}$ of $m$ $d$-dimensional convex polytopes lying on $m$ parallel hyperplanes of $\mathbb{E}^{d+1}$ is $O(\sum_{1\le{}i\ne{}j\le{}m}n_in_j^{\lfloor\frac{d}{2}\rfloor})$, where $n_i$ is the number of vertices of $\mathcal{P}_i$. We end with algorithmic considerations, and we show how our tight bounds for the parallel polytope convex hull problem, yield tight bounds on the combinatorial complexity of the Minkowski sum of two convex polytopes in $\mathbb{E}^d$.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 20:06:03 GMT" }, { "version": "v2", "created": "Thu, 21 Jan 2010 10:31:13 GMT" }, { "version": "v3", "created": "Tue, 12 Oct 2010 12:11:30 GMT" }, { "version": "v4", "created": "Tue, 8 Mar 2011 14:22:14 GMT" }, { "version": "v5", "created": "Mon, 13 Jun 2011 04:51:21 GMT" } ]
2011-06-14T00:00:00
[ [ "Karavelas", "Menelaos I.", "" ], [ "Tzanaki", "Eleni", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.5094
Uriel Feige
Uriel Feige
Faster FAST(Feedback Arc Set in Tournaments)
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm that finds a feedback arc set of size $k$ in a tournament in time $n^{O(1)}2^{O(\sqrt{k})}$. This is asymptotically faster than the running time of previously known algorithms for this problem.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 14:43:31 GMT" } ]
2009-11-30T00:00:00
[ [ "Feige", "Uriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.5104
Pedro Alejandro Ortega
Pedro A. Ortega, Daniel A. Braun
A Bayesian Rule for Adaptive Control based on Causal Interventions
AGI-2010. 6 pages, 2 figures
AGI-2010
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Explaining adaptive behavior is a central problem in artificial intelligence research. Here we formalize adaptive agents as mixture distributions over sequences of inputs and outputs (I/O). Each distribution of the mixture constitutes a `possible world', but the agent does not know which of the possible worlds it is actually facing. The problem is to adapt the I/O stream in a way that is compatible with the true world. A natural measure of adaptation can be obtained by the Kullback-Leibler (KL) divergence between the I/O distribution of the true world and the I/O distribution expected by the agent that is uncertain about possible worlds. In the case of pure input streams, the Bayesian mixture provides a well-known solution for this problem. We show, however, that in the case of I/O streams this solution breaks down, because outputs are issued by the agent itself and require a different probabilistic syntax as provided by intervention calculus. Based on this calculus, we obtain a Bayesian control rule that allows modeling adaptive behavior with mixture distributions over I/O streams. This rule might allow for a novel approach to adaptive control based on a minimum KL-principle.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 15:52:33 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2009 23:34:14 GMT" } ]
2009-12-31T00:00:00
[ [ "Ortega", "Pedro A.", "" ], [ "Braun", "Daniel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.5106
Pedro Alejandro Ortega
Pedro A. Ortega, Daniel A. Braun
A conversion between utility and information
AGI-2010. 6 pages, 1 figure
AGI-2010
null
null
cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rewards typically express desirabilities or preferences over a set of alternatives. Here we propose that rewards can be defined for any probability distribution based on three desiderata, namely that rewards should be real-valued, additive and order-preserving, where the latter implies that more probable events should also be more desirable. Our main result states that rewards are then uniquely determined by the negative information content. To analyze stochastic processes, we define the utility of a realization as its reward rate. Under this interpretation, we show that the expected utility of a stochastic process is its negative entropy rate. Furthermore, we apply our results to analyze agent-environment interactions. We show that the expected utility that will actually be achieved by the agent is given by the negative cross-entropy from the input-output (I/O) distribution of the coupled interaction system and the agent's I/O distribution. Thus, our results allow for an information-theoretic interpretation of the notion of utility and the characterization of agent-environment interactions in terms of entropy dynamics.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 15:56:38 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2009 23:30:35 GMT" } ]
2009-12-31T00:00:00
[ [ "Ortega", "Pedro A.", "" ], [ "Braun", "Daniel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5116
Laurent Romary
Laurent Romary (INRIA Saclay - Ile de France, IDSL)
Standardization of the formal representation of lexical information for NLP
null
Dictionarie. An International Encyclopedia of Lexicography. Supplementary volume: Recent developments with special focus on computational lexicography (2010) -
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A survey of dictionary models and formats is presented as well as a presentation of corresponding recent standardisation activities.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 16:27:58 GMT" } ]
2009-11-30T00:00:00
[ [ "Romary", "Laurent", "", "INRIA Saclay - Ile de France, IDSL" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.5143
MohammadHossein Bateni
MohammadHossein Bateni and MohammadTaghi Hajiaghayi and D\'aniel Marx
Approximation Schemes for Steiner Forest on Planar Graphs and Graphs of Bounded Treewidth
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first polynomial-time approximation scheme (PTAS) for the Steiner forest problem on planar graphs and, more generally, on graphs of bounded genus. As a first step, we show how to build a Steiner forest spanner for such graphs. The crux of the process is a clustering procedure called prize-collecting clustering that breaks down the input instance into separate subinstances which are easier to handle; moreover, the terminals in different subinstances are far from each other. Each subinstance has a relatively inexpensive Steiner tree connecting all its terminals, and the subinstances can be solved (almost) separately. Another building block is a PTAS for Steiner forest on graphs of bounded treewidth. Surprisingly, Steiner forest is NP-hard even on graphs of treewidth 3. Therefore, our PTAS for bounded treewidth graph needs a nontrivial combination of approximation arguments and dynamic programming on the tree decomposition. We further show that Steiner forest can be solved in polynomial time for series-parallel graphs (graphs of treewidth at most two) by a novel combination of dynamic programming and minimum cut computations, completing our thorough complexity study of Steiner forest in the range of bounded treewidth graphs, planar graphs, and bounded genus graphs.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 19:19:53 GMT" } ]
2009-11-30T00:00:00
[ [ "Bateni", "MohammadHossein", "" ], [ "Hajiaghayi", "MohammadTaghi", "" ], [ "Marx", "Dániel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.5153
Athanasios Lioumpas S.
Athanasios S. Lioumpas
Self-Reference Ultra-Wideband Systems
Submitted
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Towards employing low complexity transceivers for signal reception in Ultra-Wideband (UWB) systems, Transmitted Reference (TR) and Differential TR (DTR) schemes have attracted researchers attention. In this letter, we introduce an alternative, less complex scheme, called Self Reference (SR) UWB transceiver, which uses a modified replica of the received signal itself as reference pulse, resulting in double data rates compared to TR schemes. Moreover, SR eliminates the need for delay lines at the receiver side, which constitute a major drawback of the conventional TR and DTR schemes, while it also requires no channel estimations, resulting in lower complexity implementations and power savings. The performance of the SR scheme is investigated in high-frequency (HF) channels, showing that it offers a better or comparable performance to that of DTR, depending on the channel conditions.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 21:06:41 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2012 08:08:48 GMT" }, { "version": "v3", "created": "Sun, 11 Aug 2013 18:14:56 GMT" }, { "version": "v4", "created": "Fri, 8 Jun 2018 07:01:26 GMT" }, { "version": "v5", "created": "Wed, 27 Jun 2018 09:24:32 GMT" } ]
2018-06-28T00:00:00
[ [ "Lioumpas", "Athanasios S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.5157
Qi Chen
Hartmut Prautzsch and Qi Chen
Analyzing Midpoint Subdivision
The paper was improved by adding more explanations and by adding an illustration of how the statements depend on each other. We combined a few theorems to simplify the structure of the paper and better described the meaning of the statements and how they fit into the overall proof. 24 pages, 10 figures
null
null
null
cs.GR cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Midpoint subdivision generalizes the Lane-Riesenfeld algorithm for uniform tensor product splines and can also be applied to non regular meshes. For example, midpoint subdivision of degree 2 is a specific Doo-Sabin algorithm and midpoint subdivision of degree 3 is a specific Catmull-Clark algorithm. In 2001, Zorin and Schroeder were able to prove C1-continuity for midpoint subdivision surfaces analytically up to degree 9. Here, we develop general analysis tools to show that the limiting surfaces under midpoint subdivision of any degree >= 2 are C1-continuous at their extraordinary points.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 22:47:37 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 12:09:48 GMT" }, { "version": "v3", "created": "Wed, 27 Apr 2011 16:54:22 GMT" } ]
2011-04-28T00:00:00
[ [ "Prautzsch", "Hartmut", "" ], [ "Chen", "Qi", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.5171
Henning Thielemann
Henning Thielemann
Untangling Phase and Time in Monophonic Sounds
16 pages, 22 figures
null
10.4236/jsip.2010.11001
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are looking for a mathematical model of monophonic sounds with independent time and phase dimensions. With such a model we can resynthesise a sound with arbitrarily modulated frequency and progress of the timbre. We propose such a model and show that it exactly fulfils some natural properties, like a kind of time-invariance, robustness against non-harmonic frequencies, envelope preservation, and inclusion of plain resampling as a special case. The resulting algorithm is efficient and allows to process data in a streaming manner with phase and shape modulation at sample rate, what we demonstrate with an implementation in the functional language Haskell. It allows a wide range of applications, namely pitch shifting and time scaling, creative FM synthesis effects, compression of monophonic sounds, generating loops for sampled sounds, synthesise sounds similar to wavetable synthesis, or making ultrasound audible.
[ { "version": "v1", "created": "Thu, 26 Nov 2009 23:59:44 GMT" } ]
2011-03-22T00:00:00
[ [ "Thielemann", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0911.5203
Xiaochu Qi
Xiaochu Qi
An Implementation of the Language Lambda Prolog Organized around Higher-Order Pattern Unification
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis concerns the implementation of Lambda Prolog, a higher-order logic programming language that supports the lambda-tree syntax approach to representing and manipulating formal syntactic objects. Lambda Prolog achieves its functionality by extending a Prolog-like language by using typed lambda terms as data structures that it then manipulates via higher-order unification and some new program-level abstraction mechanisms. These additional features raise new implementation questions that must be adequately addressed for Lambda Prolog to be an effective programming tool. We consider these questions here, providing eventually a virtual machine and compilation based realization. A key idea is the orientation of the computation model of Lambda Prolog around a restricted version of higher-order unification with nice algorithmic properties and appearing to encompass most interesting applications. Our virtual machine embeds a treatment of this form of unification within the structure of the Warren Abstract Machine that is used in traditional Prolog implementations. Along the way, we treat various auxiliary issues such as the low-level representation of lambda terms, the implementation of reduction on such terms and the optimized processing of types in computation. We also develop an actual implementation of Lambda Prolog called Teyjus Version 2. A characteristic of this system is that it realizes an emulator for the virtual machine in the C language a compiler in the OCaml language. We present a treatment of the software issues that arise from this kind of mixing of languages within one system and we discuss issues relevant to the portability of our virtual machine emulator across arbitrary architectures. Finally, we assess the the efficacy of our various design ideas through experiments carried out using the system.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 06:18:15 GMT" } ]
2009-11-30T00:00:00
[ [ "Qi", "Xiaochu", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.5230
Yutaka Oiwa
Yutaka Oiwa, Hajime Watanabe, Hiromitsu Takagi
PAKE-based mutual HTTP authentication for preventing phishing attacks
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 10:09:39 GMT" } ]
2009-11-30T00:00:00
[ [ "Oiwa", "Yutaka", "" ], [ "Watanabe", "Hajime", "" ], [ "Takagi", "Hiromitsu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.5242
Coryn Bailer-Jones
C.A.L. Bailer-Jones (Max Planck Institute for Astronomy, Heidelberg)
The ILIUM forward modelling algorithm for multivariate parameter estimation and its application to derive stellar parameters from Gaia spectrophotometry
MNRAS, in press. This revision corrects a few minor errors and typos. A better formatted version for A4 paper is available at http://www.mpia.de/home/calj/ilium.pdf
null
10.1111/j.1365-2966.2009.16125.x
null
astro-ph.IM astro-ph.GA astro-ph.SR cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I introduce an algorithm for estimating parameters from multidimensional data based on forward modelling. In contrast to many machine learning approaches it avoids fitting an inverse model and the problems associated with this. The algorithm makes explicit use of the sensitivities of the data to the parameters, with the goal of better treating parameters which only have a weak impact on the data. The forward modelling approach provides uncertainty (full covariance) estimates in the predicted parameters as well as a goodness-of-fit for observations. I demonstrate the algorithm, ILIUM, with the estimation of stellar astrophysical parameters (APs) from simulations of the low resolution spectrophotometry to be obtained by Gaia. The AP accuracy is competitive with that obtained by a support vector machine. For example, for zero extinction stars covering a wide range of metallicity, surface gravity and temperature, ILIUM can estimate Teff to an accuracy of 0.3% at G=15 and to 4% for (lower signal-to-noise ratio) spectra at G=20. [Fe/H] and logg can be estimated to accuracies of 0.1-0.4dex for stars with G<=18.5. If extinction varies a priori over a wide range (Av=0-10mag), then Teff and Av can be estimated quite accurately (3-4% and 0.1-0.2mag respectively at G=15), but there is a strong and ubiquitous degeneracy in these parameters which limits our ability to estimate either accurately at faint magnitudes. Using the forward model we can map these degeneracies (in advance), and thus provide a complete probability distribution over solutions. (Abridged)
[ { "version": "v1", "created": "Fri, 27 Nov 2009 11:28:04 GMT" }, { "version": "v2", "created": "Mon, 4 Jan 2010 07:18:42 GMT" } ]
2015-05-14T00:00:00
[ [ "Bailer-Jones", "C. A. L.", "", "Max Planck Institute for Astronomy, Heidelberg" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "astro-ph.GA", "description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents", "span": "(Astrophysics of Galaxies)" }, { "class": "Physics", "code": "astro-ph.SR", "description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems", "span": "(Solar and Stellar Astrophysics)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0911.5246
Ian Pratt-Hartmann
Ivo D\"untsch, Ian Pratt-Hartmann
Complex Algebras of Arithmetic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An 'arithmetic circuit' is a labeled, acyclic directed graph specifying a sequence of arithmetic and logical operations to be performed on sets of natural numbers. Arithmetic circuits can also be viewed as the elements of the smallest subalgebra of the complex algebra of the semiring of natural numbers. In the present paper, we investigate the algebraic structure of complex algebras of natural numbers, and make some observations regarding the complexity of various theories of such algebras.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 11:43:04 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 17:39:28 GMT" } ]
2009-12-01T00:00:00
[ [ "Düntsch", "Ivo", "" ], [ "Pratt-Hartmann", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5258
Petros Petrosyan
R.R. Kamalian, P.A. Petrosyan
A note on upper bounds for the maximum span in interval edge colorings of graphs
7 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An edge coloring of a graph $G$ with colors $1,2,..., t$ is called an interval $t$-coloring if for each $i\in \{1,2,...,t\}$ there is at least one edge of $G$ colored by $i$, the colors of edges incident to any vertex of $G$ are distinct and form an interval of integers. In 1994 Asratian and Kamalian proved that if a connected graph $G$ admits an interval $t$-coloring, then $t\leq (d+1) (\Delta -1) +1$, and if $G$ is also bipartite, then this upper bound can be improved to $t\leq d(\Delta -1) +1$, where $\Delta$ is the maximum degree in $G$ and $d$ is the diameter of $G$. In this paper we show that these upper bounds can not be significantly improved.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 12:42:13 GMT" } ]
2009-11-30T00:00:00
[ [ "Kamalian", "R. R.", "" ], [ "Petrosyan", "P. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.5262
Rob Van Son
R.J.J.H. van Son
Quantifying Resource Use in Computations
26 pages, no figures
null
null
null
cs.CC cs.CR
http://creativecommons.org/licenses/by/3.0/
It is currently not possible to quantify the resources needed to perform a computation. As a consequence, it is not possible to reliably evaluate the hardware resources needed for the application of algorithms or the running of programs. This is apparent in both computer science, for instance, in cryptanalysis, and in neuroscience, for instance, comparative neuro-anatomy. A System versus Environment game formalism is proposed based on Computability Logic that allows to define a computational work function that describes the theoretical and physical resources needed to perform any purely algorithmic computation. Within this formalism, the cost of a computation is defined as the sum of information storage over the steps of the computation. The size of the computational device, eg, the action table of a Universal Turing Machine, the number of transistors in silicon, or the number and complexity of synapses in a neural net, is explicitly included in the computational cost. The proposed cost function leads in a natural way to known computational trade-offs and can be used to estimate the computational capacity of real silicon hardware and neural nets. The theory is applied to a historical case of 56 bit DES key recovery, as an example of application to cryptanalysis. Furthermore, the relative computational capacities of human brain neurons and the C. elegans nervous system are estimated as an example of application to neural nets.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 13:22:55 GMT" } ]
2009-11-30T00:00:00
[ [ "van Son", "R. J. J. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.5296
David J. Aldous
David J. Aldous
Which Connected Spatial Networks on Random Points have Linear Route-Lengths?
null
null
null
null
math.PR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a model of a connected network on random points in the plane, one expects that the mean length of the shortest route between vertices at distance $r$ apart should grow only as $O(r)$ as $r \to \infty$, but this is not always easy to verify. We give a general sufficient condition for such linearity, in the setting of a Poisson point process. In a $L \times L$ square, define a subnetwork $\GG_L$ to have the edges which are present regardless of the configuration outside the square; the condition is that the largest component of $\GG_L$ should contain a proportion $1 - o(1)$ of the vertices, as $L \to \infty$. The proof is by comparison with oriented percolation. We show that the general result applies to the relative neighborhood graph, and establishing the linearity property for this network immediately implies it for a large family of proximity graphs.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 15:55:23 GMT" } ]
2009-11-30T00:00:00
[ [ "Aldous", "David J.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.5300
William Matthews
Toby S. Cubitt, Debbie Leung, William Matthews, Andreas Winter
Improving zero-error classical communication with entanglement
6 pages, 2 figures. Version 2 is the same as the journal version plus figure 1 and the non-signalling box example
Phys. Rev. Lett. 104, 230503 (2010)
10.1103/PhysRevLett.104.230503
NSF-KITP-09-210
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given one or more uses of a classical channel, only a certain number of messages can be transmitted with zero probability of error. The study of this number and its asymptotic behaviour constitutes the field of classical zero-error information theory, the quantum generalisation of which has started to develop recently. We show that, given a single use of certain classical channels, entangled states of a system shared by the sender and receiver can be used to increase the number of (classical) messages which can be sent with no chance of error. In particular, we show how to construct such a channel based on any proof of the Bell-Kochen-Specker theorem. This is a new example of the use of quantum effects to improve the performance of a classical task. We investigate the connection between this phenomenon and that of ``pseudo-telepathy'' games. The use of generalised non-signalling correlations to assist in this task is also considered. In this case, a particularly elegant theory results and, remarkably, it is sometimes possible to transmit information with zero-error using a channel with no unassisted zero-error capacity.
[ { "version": "v1", "created": "Fri, 27 Nov 2009 16:45:00 GMT" }, { "version": "v2", "created": "Fri, 29 Oct 2010 15:28:39 GMT" } ]
2010-11-01T00:00:00
[ [ "Cubitt", "Toby S.", "" ], [ "Leung", "Debbie", "" ], [ "Matthews", "William", "" ], [ "Winter", "Andreas", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5372
Srinivas Turaga
Srinivas C. Turaga, Kevin L. Briggman, Moritz Helmstaedter, Winfried Denk, H. Sebastian Seung
Maximin affinity learning of image segmentation
null
null
null
null
cs.CV cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Images can be segmented by first using a classifier to predict an affinity graph that reflects the degree to which image pixels must be grouped together and then partitioning the graph to yield a segmentation. Machine learning has been applied to the affinity classifier to produce affinity graphs that are good in the sense of minimizing edge misclassification rates. However, this error measure is only indirectly related to the quality of segmentations produced by ultimately partitioning the affinity graph. We present the first machine learning algorithm for training a classifier to produce affinity graphs that are good in the sense of producing segmentations that directly minimize the Rand index, a well known segmentation performance measure. The Rand index measures segmentation performance by quantifying the classification of the connectivity of image pixel pairs after segmentation. By using the simple graph partitioning algorithm of finding the connected components of the thresholded affinity graph, we are able to train an affinity classifier to directly minimize the Rand index of segmentations resulting from the graph partitioning. Our learning algorithm corresponds to the learning of maximin affinities between image pixel pairs, which are predictive of the pixel-pair connectivity.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 04:58:38 GMT" } ]
2009-12-01T00:00:00
[ [ "Turaga", "Srinivas C.", "" ], [ "Briggman", "Kevin L.", "" ], [ "Helmstaedter", "Moritz", "" ], [ "Denk", "Winfried", "" ], [ "Seung", "H. Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.5378
Victor Odumuyiwa
Victor Odumuyiwa (LORIA)
De la recherche sociale d'information \`a la recherche collaborative d'information
null
7\`eme colloque du chapitre fran\c{c}ais de l'ISKO, Lyon : France (2009)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explain social information retrieval (SIR) and collaborative information retrieval (CIR). We see SIR as a way of knowing who to collaborate with in resolving an information problem while CIR entails the process of mutual understanding and solving of an information problem among collaborators. We are interested in the transition from SIR to CIR hence we developed a communication model to facilitate knowledge sharing during CIR.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 06:25:00 GMT" } ]
2009-12-01T00:00:00
[ [ "Odumuyiwa", "Victor", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.5384
Gregory Gutin
Robert Crowston, Gregory Gutin and Mark Jones
Note on Max Lin-2 above Average
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Max Lin-2 problem we are given a system $S$ of $m$ linear equations in $n$ variables over $\mathbb{F}_2$ in which Equation $j$ is assigned a positive integral weight $w_j$ for each $j$. We wish to find an assignment of values to the variables which maximizes the total weight of satisfied equations. This problem generalizes Max Cut. The expected weight of satisfied equations is $W/2$, where $W=w_1+... +w_m$; $W/2$ is a tight lower bound on the optimal solution of Max Lin-2. Mahajan et al. (J. Comput. Syst. Sci. 75, 2009) stated the following parameterized version of Max Lin-2: decide whether there is an assignment of values to the variables that satisfies equations of total weight at least $W/2+k$, where $k$ is the parameter. They asked whether this parameterized problem is fixed-parameter tractable, i.e., can be solved in time $f(k)(nm)^{O(1)}$, where $f(k)$ is an arbitrary computable function in $k$ only. Their question remains open, but using some probabilistic inequalities and, in one case, a Fourier analysis inequality, Gutin et al. (IWPEC 2009) proved that the problem is fixed-parameter tractable in three special cases. In this paper we significantly extend two of the three special cases using only tools from combinatorics. We show that one of our results can be used to obtain a combinatorial proof that another problem from Mahajan et al. (J. Comput. Syst. Sci. 75, 2009), Max $r$-SAT above the Average, is fixed-parameter tractable for each $r\ge 2.$ Note that Max $r$-SAT above the Average has been already shown to be fixed-parameter tractable by Alon et al. (SODA 2010), but the paper used the approach of Gutin et al. (IWPEC 2009).
[ { "version": "v1", "created": "Mon, 30 Nov 2009 15:59:51 GMT" } ]
2009-12-01T00:00:00
[ [ "Crowston", "Robert", "" ], [ "Gutin", "Gregory", "" ], [ "Jones", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.5385
Ralf Mueller
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
Asynchronous CDMA Systems with Random Spreading-Part I: Fundamental Limits
null
IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1477-1497, Apr. 2010
10.1109/TIT.2010.2040890
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectral efficiency for asynchronous code division multiple access (CDMA) with random spreading is calculated in the large system limit allowing for arbitrary chip waveforms and frequency-flat fading. Signal to interference and noise ratios (SINRs) for suboptimal receivers, such as the linear minimum mean square error (MMSE) detectors, are derived. The approach is general and optionally allows even for statistics obtained by under-sampling the received signal. All performance measures are given as a function of the chip waveform and the delay distribution of the users in the large system limit. It turns out that synchronizing users on a chip level impairs performance for all chip waveforms with bandwidth greater than the Nyquist bandwidth, e.g., positive roll-off factors. For example, with the pulse shaping demanded in the UMTS standard, user synchronization reduces spectral efficiency up to 12% at 10 dB normalized signal-to-noise ratio. The benefits of asynchronism stem from the finding that the excess bandwidth of chip waveforms actually spans additional dimensions in signal space, if the users are de-synchronized on the chip-level. The analysis of linear MMSE detectors shows that the limiting interference effects can be decoupled both in the user domain and in the frequency domain such that the concept of the effective interference spectral density arises. This generalizes and refines Tse and Hanly's concept of effective interference. In Part II, the analysis is extended to any linear detector that admits a representation as multistage detector and guidelines for the design of low complexity multistage detectors with universal weights are provided.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 09:11:25 GMT" } ]
2010-07-13T00:00:00
[ [ "Cottatellucci", "Laura", "" ], [ "Mueller", "Ralf R.", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0911.5394
Ping Zhu
Ping Zhu
Covering rough sets based on neighborhoods: An approach without using neighborhoods
13 pages; to appear in International Journal of Approximate Reasoning
International Journal of Approximate Reasoning, 52(3): 461-472, 2011
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Rough set theory, a mathematical tool to deal with inexact or uncertain knowledge in information systems, has originally described the indiscernibility of elements by equivalence relations. Covering rough sets are a natural extension of classical rough sets by relaxing the partitions arising from equivalence relations to coverings. Recently, some topological concepts such as neighborhood have been applied to covering rough sets. In this paper, we further investigate the covering rough sets based on neighborhoods by approximation operations. We show that the upper approximation based on neighborhoods can be defined equivalently without using neighborhoods. To analyze the coverings themselves, we introduce unary and composition operations on coverings. A notion of homomorphismis provided to relate two covering approximation spaces. We also examine the properties of approximations preserved by the operations and homomorphisms, respectively.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 11:04:06 GMT" }, { "version": "v2", "created": "Fri, 10 Dec 2010 06:34:05 GMT" } ]
2015-03-13T00:00:00
[ [ "Zhu", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.5395
Ping Zhu
Ping Zhu
An axiomatic approach to the roughness measure of rough sets
to appear in the Fundamenta Informaticae
Fundamenta Informaticae, 109(4): 463-480, 2011
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In Pawlak's rough set theory, a set is approximated by a pair of lower and upper approximations. To measure numerically the roughness of an approximation, Pawlak introduced a quantitative measure of roughness by using the ratio of the cardinalities of the lower and upper approximations. Although the roughness measure is effective, it has the drawback of not being strictly monotonic with respect to the standard ordering on partitions. Recently, some improvements have been made by taking into account the granularity of partitions. In this paper, we approach the roughness measure in an axiomatic way. After axiomatically defining roughness measure and partition measure, we provide a unified construction of roughness measure, called strong Pawlak roughness measure, and then explore the properties of this measure. We show that the improved roughness measures in the literature are special instances of our strong Pawlak roughness measure and introduce three more strong Pawlak roughness measures as well. The advantage of our axiomatic approach is that some properties of a roughness measure follow immediately as soon as the measure satisfies the relevant axiomatic definition.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 11:07:59 GMT" }, { "version": "v2", "created": "Tue, 25 May 2010 12:04:06 GMT" } ]
2015-03-13T00:00:00
[ [ "Zhu", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.5404
Vivek Agrawal
Atul Chowdhary, Vivek Agrawal, Subhajit Karmakar, Sandip Sarkar
Laser Actuated Presentation System
7 pages, 20 figures
null
null
null
cs.HC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here a pattern sensitive PowerPoint presentation scheme. The presentation is actuated by simple patterns drawn on the presentation screen by a laser pointer. A specific pattern corresponds to a particular command required to operate the presentation. Laser spot on the screen is captured by a RGB webcam with a red filter mounted, and its location is identified at the blue layer of each captured frame by estimating the mean position of the pixels whose intensity is above a given threshold value. Measured Reliability, Accuracy and Latency of our system are 90%, 10 pixels (in the worst case) and 38 ms respectively.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 16:06:49 GMT" } ]
2009-12-01T00:00:00
[ [ "Chowdhary", "Atul", "" ], [ "Agrawal", "Vivek", "" ], [ "Karmakar", "Subhajit", "" ], [ "Sarkar", "Sandip", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0911.5425
Jan Cie\'sli\'nski L.
Jan L. Cieslinski
Comment on `conservative discretizations of the Kepler motion'
6 pages
null
10.1088/1751-8113/43/22/228001
null
math-ph cs.NA math.MP math.NA physics.space-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the exact integrator for the classical Kepler motion, recently found by Kozlov ({\it J. Phys. A: Math. Theor.\} {\bf 40} (2007) 4529-4539), can be derived in a simple natural way (using well known exact discretization of the harmonic oscillator). We also turn attention on important earlier references, where the exact discretization of the 4-dimensional isotropic harmonic oscillator has been applied to the perturbed Kepler problem.
[ { "version": "v1", "created": "Sat, 28 Nov 2009 20:59:03 GMT" } ]
2015-05-14T00:00:00
[ [ "Cieslinski", "Jan L.", "" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.space-ph", "description": "Space plasma physics. Heliophysics. Space weather. Planetary magnetospheres, ionospheres and magnetotail. Auroras. Interplanetary space. Cosmic rays. Synchrotron radiation. Radio astronomy.", "span": "(Space Physics)" } ]
0911.5438
Jochen L. Leidner
Jochen L. Leidner and Gary Berosik
Building and Installing a Hadoop/MapReduce Cluster from Commodity Components
Technical Report; 15 pages, 1 figure
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This tutorial presents a recipe for the construction of a compute cluster for processing large volumes of data, using cheap, easily available personal computer hardware (Intel/AMD based PCs) and freely available open source software (Ubuntu Linux, Apache Hadoop).
[ { "version": "v1", "created": "Sat, 28 Nov 2009 23:50:28 GMT" } ]
2009-12-01T00:00:00
[ [ "Leidner", "Jochen L.", "" ], [ "Berosik", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.5444
EPTCS
Marco Carbone (IT University of Copenhagen), Joshua Guttman (Worcester Polytechnic Institute)
Choreographies with Secure Boxes and Compromised Principals
null
EPTCS 12, 2009, pp. 1-15
10.4204/EPTCS.12.1
null
cs.CR cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes" annotated with the intended source and destination of those components. The boxes are to be implemented with cryptography. Strand spaces provide a semantics for these choreographies, in which some roles may be played by compromised principals. A skeleton is a partially ordered structure containing local behaviors (strands) executed by regular (non-compromised) principals. A skeleton is realized if it contains enough regular strands so that it could actually occur, in combination with any possible activity of compromised principals. It is delivery guaranteed (DG) realized if, in addition, every message transmitted to a regular participant is also delivered. We define a novel transition system on skeletons, in which the steps add regular strands. These steps solve tests, i.e. parts of the skeleton that could not occur without additional regular behavior. We prove three main results about the transition system. First, each minimal DG realized skeleton is reachable, using the transition system, from any skeleton it embeds. Second, if no step is possible from a skeleton A, then A is DG realized. Finally, if a DG realized B is accessible from A, then B is minimal. Thus, the transition system provides a systematic way to construct the possible behaviors of the choreography, in the presence of compromised principals.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 00:20:33 GMT" } ]
2009-12-01T00:00:00
[ [ "Carbone", "Marco", "", "IT University of Copenhagen" ], [ "Guttman", "Joshua", "", "Worcester\n Polytechnic Institute" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0911.5445
EPTCS
Dave Clarke (Dept. Computer Science, Katholieke Universiteit Leuven), Jos\'e Proen\c{c}a (CWI)
Coordination via Interaction Constraints I: Local Logic
null
EPTCS 12, 2009, pp. 17-39
10.4204/EPTCS.12.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wegner describes coordination as constrained interaction. We take this approach literally and define a coordination model based on interaction constraints and partial, iterative and interactive constraint satisfaction. Our model captures behaviour described in terms of synchronisation and data flow constraints, plus various modes of interaction with the outside world provided by external constraint symbols, on-the-fly constraint generation, and coordination variables. Underlying our approach is an engine performing (partial) constraint satisfaction of the sets of constraints. Our model extends previous work on three counts: firstly, a more advanced notion of external interaction is offered; secondly, our approach enables local satisfaction of constraints with appropriate partial solutions, avoiding global synchronisation over the entire constraints set; and, as a consequence, constraint satisfaction can finally occur concurrently, and multiple parts of a set of constraints can be solved and interact with the outside world in an asynchronous manner, unless synchronisation is required by the constraints. This paper describes the underlying logic, which enables a notion of local solution, and relates this logic to the more global approach of our previous work based on classical logic.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 00:22:21 GMT" } ]
2009-12-01T00:00:00
[ [ "Clarke", "Dave", "", "Dept. Computer Science, Katholieke Universiteit Leuven" ], [ "Proença", "José", "", "CWI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5446
EPTCS
Mohamad Jaber (VERIMAG, Centre \'Equation), Ananda Basu (VERIMAG, Centre \'Equation), Simon Bliudze (CEA, LIST)
Symbolic Implementation of Connectors in BIP
null
EPTCS 12, 2009, pp. 41-55
10.4204/EPTCS.12.3
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BIP is a component framework for constructing systems by superposing three layers of modeling: Behavior, Interaction, and Priority. Behavior is represented by labeled transition systems communicating through ports. Interactions are sets of ports. A synchronization between components is possible through the interactions specified by a set of connectors. When several interactions are possible, priorities allow to restrict the non-determinism by choosing an interaction, which is maximal according to some given strict partial order. The BIP component framework has been implemented in a language and a tool-set. The execution of a BIP program is driven by a dedicated engine, which has access to the set of connectors and priority model of the program. A key performance issue is the computation of the set of possible interactions of the BIP program from a given state. Currently, the choice of the interaction to be executed involves a costly exploration of enumerative representations for connectors. This leads to a considerable overhead in execution times. In this paper, we propose a symbolic implementation of the execution model of BIP, which drastically reduces this overhead. The symbolic implementation is based on computing boolean representation for components, connectors, and priorities with an existing BDD package.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 06:27:55 GMT" } ]
2009-12-01T00:00:00
[ [ "Jaber", "Mohamad", "", "VERIMAG, Centre Équation" ], [ "Basu", "Ananda", "", "VERIMAG,\n Centre Équation" ], [ "Bliudze", "Simon", "", "CEA, LIST" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5447
EPTCS
Christian Krause (CWI)
Integrated Structure and Semantics for Reo Connectors and Petri Nets
null
EPTCS 12, 2009, pp. 57-69
10.4204/EPTCS.12.4
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an integrated structural and behavioral model of Reo connectors and Petri nets, allowing a direct comparison of the two concurrency models. For this purpose, we introduce a notion of connectors which consist of a number of interconnected, user-defined primitives with fixed behavior. While the structure of connectors resembles hypergraphs, their semantics is given in terms of so-called port automata. We define both models in a categorical setting where composition operations can be elegantly defined and integrated. Specifically, we formalize structural gluings of connectors as pushouts, and joins of port automata as pullbacks. We then define a semantical functor from the connector to the port automata category which preserves this composition. We further show how to encode Reo connectors and Petri nets into this model and indicate applications to dynamic reconfigurations modeled using double pushout graph transformation.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 00:27:28 GMT" } ]
2009-12-01T00:00:00
[ [ "Krause", "Christian", "", "CWI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5449
EPTCS
Luca Padovani (University of Urbino)
Session Types at the Mirror
null
EPTCS 12, 2009, pp. 71-86
10.4204/EPTCS.12.5
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We (re)define session types as projections of process behaviors with respect to the communication channels they use. In this setting, we give session types a semantics based on fair testing. The outcome is a unified theory of behavioral types that shares common aspects with conversation types and that encompass features of both dyadic and multi-party session types. The point of view we provide sheds light on the nature of session types and gives us a chance to reason about them in a framework where every notion, from well-typedness to the subtyping relation between session types, is semantically -rather than syntactically- grounded.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 00:35:42 GMT" } ]
2009-12-01T00:00:00
[ [ "Padovani", "Luca", "", "University of Urbino" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.5459
Graham Norton
Graham H. Norton
Shortest Two-way Linear Recurrences
This paper has been withdrawn by the author as the proof of Part (b) of Theorem 4.10(ii) is incorrect
null
null
null
cs.IT cs.SC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $s$ be a finite sequence over a field of length $n$. It is well-known that if $s$ satisfies a linear recurrence of order $d$ with non-zero constant term, then the reverse of $s$ also satisfies a recurrence of order $d$ (with coefficients in reverse order). A recent article of A. Salagean proposed an algorithm to find such a shortest 'two-way' recurrence -- which may be longer than a linear recurrence for $s$ of shortest length $\LC_n$. We give a new and simpler algorithm to compute a shortest two-way linear recurrence. First we show that the pairs of polynomials we use to construct a minimal polynomial iteratively are always relatively prime; we also give the extended multipliers. Then we combine degree lower bounds with a straightforward rewrite of a published algorithm due to the author to obtain our simpler algorithm. The increase in shortest length is $\max\{n+1-2\LC_n,0\}$.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 04:36:32 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2009 03:12:58 GMT" }, { "version": "v3", "created": "Thu, 22 Jul 2010 22:27:50 GMT" } ]
2010-07-26T00:00:00
[ [ "Norton", "Graham H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5462
Mahdi S. Hosseini
Mahdi S. Hosseini, Babak N. Araabi, and Hamid Soltanian-Zadeh
Pigment Melanin: Pattern for Iris Recognition
To be Published on Special Issue on Biometrics, IEEE Transaction on Instruments and Measurements, Volume 59, Issue number 4, April 2010
null
10.1109/TIM.2009.2037996
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognition of iris based on Visible Light (VL) imaging is a difficult problem because of the light reflection from the cornea. Nonetheless, pigment melanin provides a rich feature source in VL, unavailable in Near-Infrared (NIR) imaging. This is due to biological spectroscopy of eumelanin, a chemical not stimulated in NIR. In this case, a plausible solution to observe such patterns may be provided by an adaptive procedure using a variational technique on the image histogram. To describe the patterns, a shape analysis method is used to derive feature-code for each subject. An important question is how much the melanin patterns, extracted from VL, are independent of iris texture in NIR. With this question in mind, the present investigation proposes fusion of features extracted from NIR and VL to boost the recognition performance. We have collected our own database (UTIRIS) consisting of both NIR and VL images of 158 eyes of 79 individuals. This investigation demonstrates that the proposed algorithm is highly sensitive to the patterns of cromophores and improves the iris recognition rate.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 07:07:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Hosseini", "Mahdi S.", "" ], [ "Araabi", "Babak N.", "" ], [ "Soltanian-Zadeh", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0911.5486
Jinshan Zhang
Jinshan Zhang, Heng Liang, Fengshan Bai
Approximating Partition Functions of Two-State Spin Systems
15pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-state spin systems is a classical topic in statistical physics. We consider the problem of computing the partition function of the systems on a bounded degree graph. Based on the self-avoiding tree, we prove the systems exhibits strong correlation decay under the condition that the absolute value of "inverse temperature" is small. Due to strong correlation decay property, an FPTAS for the partition function is presented under the same condition. This condition is sharp for Ising model.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 14:05:43 GMT" } ]
2009-12-01T00:00:00
[ [ "Zhang", "Jinshan", "" ], [ "Liang", "Heng", "" ], [ "Bai", "Fengshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.5487
Jinshan Zhang
Jinshan Zhang, Heng Liang, Fengshan Bai
Strong Spatial Mixing for Binary Markov Random Fields
13pages
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gibbs distribution of binary Markov random fields on a sparse on average graph is considered in this paper. The strong spatial mixing is proved under the condition that the `external field' is uniformly large or small. Such condition on `external field' is meaningful in physics.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 14:10:36 GMT" } ]
2009-12-01T00:00:00
[ [ "Zhang", "Jinshan", "" ], [ "Liang", "Heng", "" ], [ "Bai", "Fengshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5498
Benjamin Burton
Benjamin A. Burton
The complexity of the normal surface solution space
Extended abstract (i.e., conference-style), 14 pages, 8 figures, 2 tables; v2: added minor clarifications
SCG '10: Proceedings of the Twenty-Sixth Annual Symposium on Computational Geometry, ACM, 2010, pp. 201-209
10.1145/1810959.1810995
null
math.GT cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Normal surface theory is a central tool in algorithmic three-dimensional topology, and the enumeration of vertex normal surfaces is the computational bottleneck in many important algorithms. However, it is not well understood how the number of such surfaces grows in relation to the size of the underlying triangulation. Here we address this problem in both theory and practice. In theory, we tighten the exponential upper bound substantially; furthermore, we construct pathological triangulations that prove an exponential bound to be unavoidable. In practice, we undertake a comprehensive analysis of millions of triangulations and find that in general the number of vertex normal surfaces is remarkably small, with strong evidence that our pathological triangulations may in fact be the worst case scenarios. This analysis is the first of its kind, and the striking behaviour that we observe has important implications for the feasibility of topological algorithms in three dimensions.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 20:56:48 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 06:47:53 GMT" } ]
2010-06-18T00:00:00
[ [ "Burton", "Benjamin A.", "" ] ]
[ { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.5508
G David Forney Jr.
G. David Forney Jr
Codes on graphs: Duality and MacWilliams identities
30 pages, 20 figures. Accepted for IEEE Transactions on Information Theory. Preliminary versions presented at IEEE Information Theory Workshop, Taormina, Italy, October 2009 and 2010 IEEE International Symposium on Information Theory, Austin, TX, June 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conceptual framework involving partition functions of normal factor graphs is introduced, paralleling a similar recent development by Al-Bashabsheh and Mao. The partition functions of dual normal factor graphs are shown to be a Fourier transform pair, whether or not the graphs have cycles. The original normal graph duality theorem follows as a corollary. Within this framework, MacWilliams identities are found for various local and global weight generating functions of general group or linear codes on graphs; this generalizes and provides a concise proof of the MacWilliams identity for linear time-invariant convolutional codes that was recently found by Gluesing-Luerssen and Schneider. Further MacWilliams identities are developed for terminated convolutional codes, particularly for tail-biting codes, similar to those studied recently by Bocharova, Hug, Johannesson and Kudryashov.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 19:03:01 GMT" }, { "version": "v2", "created": "Mon, 10 May 2010 18:10:58 GMT" }, { "version": "v3", "created": "Sun, 1 Aug 2010 20:47:56 GMT" }, { "version": "v4", "created": "Sat, 20 Nov 2010 16:53:47 GMT" } ]
2010-11-23T00:00:00
[ [ "Forney", "G. David", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5509
Rajesh Krishnamachari
Rajesh T Krishnamachari and Mahesh K Varanasi
Interference Alignment Under Limited Feedback for MIMO Interference Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While interference alignment schemes have been employed to realize the full multiplexing gain of $K$-user interference channels, the analyses performed so far have predominantly focused on the case when global channel knowledge is available at each node of the network. This paper considers the problem where each receiver knows its channels from all the transmitters and feeds back this information using a limited number of bits to all other terminals. In particular, channel quantization over the composite Grassmann manifold is proposed and analyzed. It is shown, for $K$-user multiple-input, multiple-output (MIMO) interference channels, that when the transmitters use an interference alignment strategy as if the quantized channel estimates obtained via this limited feedback are perfect, the full sum degrees of freedom of the interference channel can be achieved as long as the feedback bit rate scales sufficiently fast with the signal-to-noise ratio. Moreover, this is only one extreme point of a continuous tradeoff between achievable degrees of freedom region and user feedback rate scalings which are allowed to be non-identical. It is seen that a slower scaling of feedback rate for any one user leads to commensurately fewer degrees of freedom for that user alone.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 19:26:59 GMT" } ]
2009-12-01T00:00:00
[ [ "Krishnamachari", "Rajesh T", "" ], [ "Varanasi", "Mahesh K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5515
{\O}yvind Ryan
{\O}. Ryan, A. Masucci, S. Yang, M. Debbah
Finite Dimensional Statistical Inference
14 pages, 13 figures. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2112010
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we derive the explicit series expansion of the eigenvalue distribution of various models, namely the case of non-central Wishart distributions, as well as correlated zero mean Wishart distributions. The tools used extend those of the free probability framework, which have been quite successful for high dimensional statistical inference (when the size of the matrices tends to infinity), also known as free deconvolution. This contribution focuses on the finite Gaussian case and proposes algorithmic methods to compute the moments. Cases where asymptotic results fail to apply are also discussed.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 21:00:28 GMT" }, { "version": "v2", "created": "Fri, 9 Jul 2010 12:52:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Ryan", "Ø.", "" ], [ "Masucci", "A.", "" ], [ "Yang", "S.", "" ], [ "Debbah", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5524
Namrata Vaswani
Namrata Vaswani
LS-CS-residual (LS-CS): Compressive Sensing on Least Squares Residual
Accepted (with mandatory minor revisions) to IEEE Trans. Signal Processing. 12 pages, 5 figures
IEEE Trans. Signal Processing, pages 4108 - 4120, vol. 58(8), August 2010
10.1109/TSP.2010.2048105
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of recursively and causally reconstructing time sequences of sparse signals (with unknown and time-varying sparsity patterns) from a limited number of noisy linear measurements. The sparsity pattern is assumed to change slowly with time. The idea of our proposed solution, LS-CS-residual (LS-CS), is to replace compressed sensing (CS) on the observation by CS on the least squares (LS) residual computed using the previous estimate of the support. We bound CS-residual error and show that when the number of available measurements is small, the bound is much smaller than that on CS error if the sparsity pattern changes slowly enough. We also obtain conditions for "stability" of LS-CS over time for a signal model that allows support additions and removals, and that allows coefficients to gradually increase (decrease) until they reach a constant value (become zero). By "stability", we mean that the number of misses and extras in the support estimate remain bounded by time-invariant values (in turn implying a time-invariant bound on LS-CS error). The concept is meaningful only if the bounds are small compared to the support size. Numerical experiments backing our claims are shown.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 22:40:47 GMT" }, { "version": "v2", "created": "Wed, 20 Jan 2010 17:00:12 GMT" } ]
2010-07-28T00:00:00
[ [ "Vaswani", "Namrata", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5525
EPTCS
Paolo Torrini (University of Leicester), Reiko Heckel (University of Leicester)
Towards an embedding of Graph Transformation in Intuitionistic Linear Logic
null
EPTCS 12, 2009, pp. 99-115
10.4204/EPTCS.12.7
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear logics have been shown to be able to embed both rewriting-based approaches and process calculi in a single, declarative framework. In this paper we are exploring the embedding of double-pushout graph transformations into quantified linear logic, leading to a Curry-Howard style isomorphism between graphs and transformations on one hand, formulas and proof terms on the other. With linear implication representing rules and reachability of graphs, and the tensor modelling parallel composition of graphs and transformations, we obtain a language able to encode graph transformation systems and their computations as well as reason about their properties.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 23:14:32 GMT" } ]
2009-12-01T00:00:00
[ [ "Torrini", "Paolo", "", "University of Leicester" ], [ "Heckel", "Reiko", "", "University of\n Leicester" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5526
Moritz Hardt
Boaz Barak, Moritz Hardt, Thomas Holenstein, David Steurer
Subsampling Mathematical Relaxations and Average-case Complexity
Includes several more general results that subsume the previous version of the paper.
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate a study of when the value of mathematical relaxations such as linear and semidefinite programs for constraint satisfaction problems (CSPs) is approximately preserved when restricting the instance to a sub-instance induced by a small random subsample of the variables. Let $C$ be a family of CSPs such as 3SAT, Max-Cut, etc., and let $\Pi$ be a relaxation for $C$, in the sense that for every instance $P\in C$, $\Pi(P)$ is an upper bound the maximum fraction of satisfiable constraints of $P$. Loosely speaking, we say that subsampling holds for $C$ and $\Pi$ if for every sufficiently dense instance $P \in C$ and every $\epsilon>0$, if we let $P'$ be the instance obtained by restricting $P$ to a sufficiently large constant number of variables, then $\Pi(P') \in (1\pm \epsilon)\Pi(P)$. We say that weak subsampling holds if the above guarantee is replaced with $\Pi(P')=1-\Theta(\gamma)$ whenever $\Pi(P)=1-\gamma$. We show: 1. Subsampling holds for the BasicLP and BasicSDP programs. BasicSDP is a variant of the relaxation considered by Raghavendra (2008), who showed it gives an optimal approximation factor for every CSP under the unique games conjecture. BasicLP is the linear programming analog of BasicSDP. 2. For tighter versions of BasicSDP obtained by adding additional constraints from the Lasserre hierarchy, weak subsampling holds for CSPs of unique games type. 3. There are non-unique CSPs for which even weak subsampling fails for the above tighter semidefinite programs. Also there are unique CSPs for which subsampling fails for the Sherali-Adams linear programming hierarchy. As a corollary of our weak subsampling for strong semidefinite programs, we obtain a polynomial-time algorithm to certify that random geometric graphs (of the type considered by Feige and Schechtman, 2002) of max-cut value $1-\gamma$ have a cut value at most $1-\gamma/10$.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 23:23:38 GMT" }, { "version": "v2", "created": "Thu, 29 Apr 2010 21:35:23 GMT" } ]
2010-05-03T00:00:00
[ [ "Barak", "Boaz", "" ], [ "Hardt", "Moritz", "" ], [ "Holenstein", "Thomas", "" ], [ "Steurer", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.5527
Kamyar Moshksar
Kamyar Moshksar, Alireza Bayesteh, Amir K. Khandani
A model for randomized resource allocation in decentralized wireless networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a decentralized wireless communication network with a fixed number $u$ of frequency sub-bands to be shared among $N$ transmitter-receiver pairs. It is assumed that the number of active users is a random variable with a given probability mass function. Moreover, users are unaware of each other's codebooks and hence, no multiuser detection is possible. We propose a randomized Frequency Hopping (FH) scheme in which each transmitter randomly hops over a subset of $u$ sub-bands from transmission to transmission. We derive lower and upper bounds on the mutual information of each user and demonstrate that, for large Signal-to-Noise Ratio (SNR) values, the two bounds coincide. This observation enables us to compute the sum multiplexing gain of the system and obtain the optimum hopping strategy for maximizing this quantity. We compare the performance of the FH system with that of the Frequency Division (FD) system in terms of several performance measures and show that (depending on the probability mass function of the number of active users) the FH system can offer a significant improvement implying a more efficient usage of the spectrum.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 23:43:43 GMT" } ]
2009-12-01T00:00:00
[ [ "Moshksar", "Kamyar", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5548
Xiaofei Huang
Xiaofei Huang
A Decision-Optimization Approach to Quantum Mechanics and Game Theory
null
null
null
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fundamental laws of quantum world upsets the logical foundation of classic physics. They are completely counter-intuitive with many bizarre behaviors. However, this paper shows that they may make sense from the perspective of a general decision-optimization principle for cooperation. This principle also offers a generalization of Nash equilibrium, a key concept in game theory, for better payoffs and stability of game playing.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 16:43:52 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 2009 16:58:11 GMT" } ]
2009-12-02T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.5553
Kamyar Moshksar
Kamyar Moshksar, Alireza Bayesteh, Amir K. Khandani
Randomized vs. orthogonal spectrum allocation in decentralized networks: Outage Analysis
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address a decentralized wireless communication network with a fixed number $u$ of frequency sub-bands to be shared among $N$ transmitter-receiver pairs. It is assumed that the number of users $N$ is a random variable with a given distribution and the channel gains are quasi-static Rayleigh fading. The transmitters are assumed to be unaware of the number of active users in the network as well as the channel gains and not capable of detecting the presence of other users in a given frequency sub-band. Moreover, the users are unaware of each other's codebooks and hence, no multiuser detection is possible. We consider a randomized Frequency Hopping (FH) scheme in which each transmitter randomly hops over a subset of the $u$ sub-bands from transmission to transmission. Developing a new upper bound on the differential entropy of a mixed Gaussian random vector and using entropy power inequality, we offer a series of lower bounds on the achievable rate of each user. Thereafter, we obtain lower bounds on the maximum transmission rate per user to ensure a specified outage probability at a given Signal-to-Noise Ratio (SNR) level. We demonstrate that the so-called outage capacity can be considerably higher in the FH scheme than in the Frequency Division (FD) scenario for reasonable distributions on the number of active users. This guarantees a higher spectral efficiency in FH compared to FD.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 07:01:19 GMT" } ]
2009-12-01T00:00:00
[ [ "Moshksar", "Kamyar", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5565
Loet Leydesdorff
Loet Leydesdorff
The Communication of Meaning and the Structuration of Expectations: Giddens' "structuration theory" and Luhmann's "self-organization"
null
null
null
null
cs.CY nlin.AO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The communication of meaning as different from (Shannon-type) information is central to Luhmann's social systems theory and Giddens' structuration theory of action. These theories share an emphasis on reflexivity, but focus on meaning along a divide between inter-human communication and intentful action as two different systems of reference. Recombining these two theories into a theory about the structuration of expectations, interactions, organization, and self-organization of intentional communications can be simulated based on algorithms from the computation of anticipatory systems. The self-organizing and organizing layers remain rooted in the double contingency of the human encounter which provides the variation. Organization and self-organization of communication are reflexive upon and therefore reconstructive of each other. Using mutual information in three dimensions, the imprint of meaning processing in the modeling system on the historical organization of uncertainty in the modeled system can be measured. This is shown empirically in the case of intellectual organization as "structurating" structure in the textual domain of scientific articles.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 07:58:08 GMT" }, { "version": "v2", "created": "Sat, 8 May 2010 15:05:01 GMT" }, { "version": "v3", "created": "Sat, 29 May 2010 09:31:06 GMT" } ]
2010-06-01T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.5568
Cedric Messiant
C\'edric Messiant (LIPN), Thierry Poibeau (LIPN)
Acquisition d'informations lexicales \`a partir de corpus C\'edric Messiant et Thierry Poibeau
3 pages
Troisi\`eme colloque international de l'Association Fran\c{c}aise de Linguistique Cognitive (AFLICO), Nanterre : France (2009)
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is about automatic acquisition of lexical information from corpora, especially subcategorization acquisition.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 08:07:16 GMT" } ]
2010-11-09T00:00:00
[ [ "Messiant", "Cédric", "", "LIPN" ], [ "Poibeau", "Thierry", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.5593
Yves Robert
Franck Cappello (LRI), Henri Casanova (ICS), Yves Robert (INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme, LIP)
Checkpointing vs. Migration for Post-Petascale Machines
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We craft a few scenarios for the execution of sequential and parallel jobs on future generation machines. Checkpointing or migration, which technique to choose?
[ { "version": "v1", "created": "Mon, 30 Nov 2009 09:39:15 GMT" } ]
2009-12-01T00:00:00
[ [ "Cappello", "Franck", "", "LRI" ], [ "Casanova", "Henri", "", "ICS" ], [ "Robert", "Yves", "", "INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.5642
Carlo Alberto Furia
Carlo A. Furia and Matteo Rossi
A Theory of Sampling for Continuous-time Metric Temporal Logic
Revised version, 43 pages.
ACM Transactions on Computational Logic, 12(1):1--40, October 2010
10.1145/1838552.1838560
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper revisits the classical notion of sampling in the setting of real-time temporal logics for the modeling and analysis of systems. The relationship between the satisfiability of Metric Temporal Logic (MTL) formulas over continuous-time models and over discrete-time models is studied. It is shown to what extent discrete-time sequences obtained by sampling continuous-time signals capture the semantics of MTL formulas over the two time domains. The main results apply to "flat" formulas that do not nest temporal operators and can be applied to the problem of reducing the verification problem for MTL over continuous-time models to the same problem over discrete-time, resulting in an automated partial practically-efficient discretization technique.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 13:51:26 GMT" }, { "version": "v2", "created": "Tue, 6 Apr 2010 12:08:17 GMT" } ]
2015-03-13T00:00:00
[ [ "Furia", "Carlo A.", "" ], [ "Rossi", "Matteo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.5652
Jean-Philippe Kotowicz
Alain Loisel (LITIS), Nathalie Chaignaud (LITIS), Jean-Philippe Kotowicz (LITIS)
Modeling Human Interaction to Design a Human-Computer Dialog System
null
International Conference on Entreprise Information System, ICEIS'08, Barcelone : Spain (2008)
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents the Cogni-CISMeF project, which aims at improving the health information search engine CISMeF, by including a conversational agent that interacts with the user in natural language. To study the cognitive processes involved during information search, a bottom-up methodology was adopted. An experiment has been set up to obtain human dialogs related to such searches. The analysis of these dialogs underlines the establishment of a common ground and accommodation effects to the user. A model of artificial agent is proposed, that guides the user by proposing examples, assistance and choices.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 14:19:48 GMT" } ]
2009-12-01T00:00:00
[ [ "Loisel", "Alain", "", "LITIS" ], [ "Chaignaud", "Nathalie", "", "LITIS" ], [ "Kotowicz", "Jean-Philippe", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.5660
Katarzyna Paluch
Katarzyna Paluch
Faster and simpler approximation of stable matchings
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a 3/2-approximation algorithm for stable matchings that runs in $O(m)$ time. The previously best known algorithm by McDermid has the same approximation ratio but runs in $O(n^{3/2}m)$ time, where $n$ denotes the number of people and $m$ is the total length of the preference lists in a given instance. Also the algorithm and the analysis are much simpler. We also give the extension of the algorithm for the many-to-many setting. (This is the version of the paper from March 2011)
[ { "version": "v1", "created": "Mon, 30 Nov 2009 14:44:35 GMT" }, { "version": "v2", "created": "Sat, 27 Mar 2010 18:19:04 GMT" }, { "version": "v3", "created": "Thu, 31 Mar 2011 18:39:52 GMT" }, { "version": "v4", "created": "Fri, 1 Jul 2011 15:51:41 GMT" }, { "version": "v5", "created": "Fri, 4 Apr 2014 07:43:22 GMT" } ]
2014-04-07T00:00:00
[ [ "Paluch", "Katarzyna", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.5667
Christian Senger
Christian Senger, Steffen Schober, Tong Mao, Alexander Zeh
End-to-End Algebraic Network Coding for Wireless TCP/IP Networks
Accepted for the 17th International Conference on Telecommunications 2010 (ICT2010), Doha, Qatar, April 4 - 7, 2010. 6 pages, 7 figures
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Transmission Control Protocol (TCP) was designed to provide reliable transport services in wired networks. In such networks, packet losses mainly occur due to congestion. Hence, TCP was designed to apply congestion avoidance techniques to cope with packet losses. Nowadays, TCP is also utilized in wireless networks where, besides congestion, numerous other reasons for packet losses exist. This results in reduced throughput and increased transmission round-trip time when the state of the wireless channel is bad. We propose a new network layer, that transparently sits below the transport layer and hides non congestion-imposed packet losses from TCP. The network coding in this new layer is based on the well-known class of Maximum Distance Separable (MDS) codes.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 15:18:39 GMT" }, { "version": "v2", "created": "Tue, 20 Apr 2010 08:09:40 GMT" } ]
2010-04-21T00:00:00
[ [ "Senger", "Christian", "" ], [ "Schober", "Steffen", "" ], [ "Mao", "Tong", "" ], [ "Zeh", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.5682
Jakub Mo\'scicki
Jakub T. Mo\'scicki, Maciej Wo\'s, Massimo Lamanna, Philippe de Forcrand and Owe Philipsen
Lattice QCD Thermodynamics on the Grid
null
Comput.Phys.Commun.181:1715-1726,2010
10.1016/j.cpc.2010.06.027
null
cs.DC hep-lat
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe how we have used simultaneously ${\cal O}(10^3)$ nodes of the EGEE Grid, accumulating ca. 300 CPU-years in 2-3 months, to determine an important property of Quantum Chromodynamics. We explain how Grid resources were exploited efficiently and with ease, using user-level overlay based on Ganga and DIANE tools above standard Grid software stack. Application-specific scheduling and resource selection based on simple but powerful heuristics allowed to improve efficiency of the processing to obtain desired scientific results by a specified deadline. This is also a demonstration of combined use of supercomputers, to calculate the initial state of the QCD system, and Grids, to perform the subsequent massively distributed simulations. The QCD simulation was performed on a $16^3\times 4$ lattice. Keeping the strange quark mass at its physical value, we reduced the masses of the up and down quarks until, under an increase of temperature, the system underwent a second-order phase transition to a quark-gluon plasma. Then we measured the response of this system to an increase in the quark density. We find that the transition is smoothened rather than sharpened. If confirmed on a finer lattice, this finding makes it unlikely for ongoing experimental searches to find a QCD critical point at small chemical potential.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 16:14:56 GMT" } ]
2014-11-20T00:00:00
[ [ "Mościcki", "Jakub T.", "" ], [ "Woś", "Maciej", "" ], [ "Lamanna", "Massimo", "" ], [ "de Forcrand", "Philippe", "" ], [ "Philipsen", "Owe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "hep-lat", "description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.", "span": "(High Energy Physics - Lattice)" } ]
0911.5703
Stevan Harnad
Olivier Picard, Alexandre Blondin-Masse, Stevan Harnad, Odile Marcotte, Guillaume Chicoisne and Yassine Gargouri
Hierarchies in Dictionary Definition Space
9 pages, 5 figues, 2 tables, 12 references, 23rd Annual Conference on Neural Information Processing Systems (NIPS): Workshop on Analyzing Networks and Learning With Graphs http://nips.cc/Conferences/2009/Program/event.php?ID=1504
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A dictionary defines words in terms of other words. Definitions can tell you the meanings of words you don't know, but only if you know the meanings of the defining words. How many words do you need to know (and which ones) in order to be able to learn all the rest from definitions? We reduced dictionaries to their "grounding kernels" (GKs), about 10% of the dictionary, from which all the other words could be defined. The GK words turned out to have psycholinguistic correlates: they were learned at an earlier age and more concrete than the rest of the dictionary. But one can compress still more: the GK turns out to have internal structure, with a strongly connected "kernel core" (KC) and a surrounding layer, from which a hierarchy of definitional distances can be derived, all the way out to the periphery of the full dictionary. These definitional distances, too, are correlated with psycholinguistic variables (age of acquisition, concreteness, imageability, oral and written frequency) and hence perhaps with the "mental lexicon" in each of our heads.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 18:15:35 GMT" } ]
2009-12-01T00:00:00
[ [ "Picard", "Olivier", "" ], [ "Blondin-Masse", "Alexandre", "" ], [ "Harnad", "Stevan", "" ], [ "Marcotte", "Odile", "" ], [ "Chicoisne", "Guillaume", "" ], [ "Gargouri", "Yassine", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.5707
Daniel Perrucci
Daniel Perrucci
Linear Solving for Sign Determination
null
null
null
null
math.AG cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a specific method to solve with quadratic complexity the linear systems arising in known algorithms to deal with the sign determination problem. In particular, this enable us to improve the complexity bound for sign determination in the univariate case.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 18:12:58 GMT" } ]
2009-12-01T00:00:00
[ [ "Perrucci", "Daniel", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0911.5708
Benjamin Rubinstein
Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning
21 pages, 1 figure
null
null
null
cs.LG cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several recent studies in privacy-preserving learning have considered the trade-off between utility or risk and the level of differential privacy guaranteed by mechanisms for statistical query processing. In this paper we study this trade-off in private Support Vector Machine (SVM) learning. We present two efficient mechanisms, one for the case of finite-dimensional feature mappings and one for potentially infinite-dimensional feature mappings with translation-invariant kernels. For the case of translation-invariant kernels, the proposed mechanism minimizes regularized empirical risk in a random Reproducing Kernel Hilbert Space whose kernel uniformly approximates the desired kernel with high probability. This technique, borrowed from large-scale learning, allows the mechanism to respond with a finite encoding of the classifier, even when the function class is of infinite VC dimension. Differential privacy is established using a proof technique from algorithmic stability. Utility--the mechanism's response function is pointwise epsilon-close to non-private SVM with probability 1-delta--is proven by appealing to the smoothness of regularized empirical risk minimization with respect to small perturbations to the feature mapping. We conclude with a lower bound on the optimal differential privacy of the SVM. This negative result states that for any delta, no mechanism can be simultaneously (epsilon,delta)-useful and beta-differentially private for small epsilon and small beta.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 20:34:45 GMT" } ]
2009-12-01T00:00:00
[ [ "Rubinstein", "Benjamin I. P.", "" ], [ "Bartlett", "Peter L.", "" ], [ "Huang", "Ling", "" ], [ "Taft", "Nina", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.0027
Yunhui Fu
Matthew Cook and Yunhui Fu and Robert T. Schweller
Temperature 1 Self-Assembly: Deterministic Assembly in 3D and Probabilistic Assembly in 2D
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the power of the Wang tile self-assembly model at temperature 1, a threshold value that permits attachment between any two tiles that share even a single bond. When restricted to deterministic assembly in the plane, no temperature 1 assembly system has been shown to build a shape with a tile complexity smaller than the diameter of the shape. In contrast, we show that temperature 1 self-assembly in 3 dimensions, even when growth is restricted to at most 1 step into the third dimension, is capable of simulating a large class of temperature 2 systems, in turn permitting the simulation of arbitrary Turing machines and the assembly of $n\times n$ squares in near optimal $O(\log n)$ tile complexity. Further, we consider temperature 1 probabilistic assembly in 2D, and show that with a logarithmic scale up of tile complexity and shape scale, the same general class of temperature $\tau=2$ systems can be simulated with high probability, yielding Turing machine simulation and $O(\log^2 n)$ assembly of $n\times n$ squares with high probability. Our results show a sharp contrast in achievable tile complexity at temperature 1 if either growth into the third dimension or a small probability of error are permitted. Motivated by applications in nanotechnology and molecular computing, and the plausibility of implementing 3 dimensional self-assembly systems, our techniques may provide the needed power of temperature 2 systems, while at the same time avoiding the experimental challenges faced by those systems.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 21:45:29 GMT" }, { "version": "v2", "created": "Thu, 13 May 2010 00:12:03 GMT" } ]
2015-03-13T00:00:00
[ [ "Cook", "Matthew", "" ], [ "Fu", "Yunhui", "" ], [ "Schweller", "Robert T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0912.0032
Giacomo Innocenti Doc.
Giacomo Innocenti, Luca Pretini
Abstraction and control techniques for non-stationary scheduling problems
26 pages, 10 figures, technical (internal) report of the Dipartimento di sistemi e Informatica, Universita' di Firenze
null
null
R.T.2/2009
nlin.AO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper faces the problem of scheduling from a new perspective, trying to bridge the gap between classical heuristic approaches and system identification and control strategies. To this aim, a complete mathematical formulation of a general scheduling process is derived, beginning from very broad assumptions. This allows a greater freedom of manipulation and guarantee the resolution of the identification (and control) techniques. Both an adaptive and a switching strategies are presented in relation to the performances of a simple Round Robin algorithm.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 21:57:32 GMT" } ]
2009-12-02T00:00:00
[ [ "Innocenti", "Giacomo", "" ], [ "Pretini", "Luca", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0912.0034
EPTCS
Gabriel Ciobanu
Proceedings Third Workshop on Membrane Computing and Biologically Inspired Process Calculi 2009
In Memoriam Nadia Busi
EPTCS 11, 2009
10.4204/EPTCS.11
null
cs.CE cs.DC cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the accepted papers at the third Workshop on Membrane Computing and Biologically Inspired Process Calculi, held in Bologna on 5th September 2009. The papers are devoted to both membrane computing and biologically inspired process calculi, as well as to other related formalisms. The papers of this volume are selected by the programme committee due to their quality and relevance; they have defined an exciting programme highlighting interesting problems and stimulating the search for novel ways of describing related biological phenomena. In addition, we had an invited talk given by Luca Cardelli on a spatial process algebra for developmental biology. Membrane systems were introduced as a class of distributed parallel computing devices inspired by the observation that any biological system is a complex hierarchical structure, with a flow of materials and information that underlies their functioning. The emphasis is on the computational properties of the model, and it makes use of automata, languages, and complexity theoretic tools. On the other hand, certain calculi such as mobile ambients and brane calculi work with similar notions (compartments, membranes). These calculi are used to model and analyze the various biological systems. The workshop on Membrane Computing and Biologically Inspired Process Calculi brings together researchers working in these fields to present their recent work and discuss new ideas concerning the formalisms, their properties and relationships.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 22:24:42 GMT" } ]
2009-12-02T00:00:00
[ [ "Ciobanu", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0912.0071
Anand Sarwate
Kamalika Chaudhuri, Claire Monteleoni, Anand D. Sarwate
Differentially Private Empirical Risk Minimization
40 pages, 7 figures, accepted to the Journal of Machine Learning Research
null
null
null
cs.LG cs.AI cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the $\epsilon$-differential privacy definition due to Dwork et al. (2006). First we apply the output perturbation ideas of Dwork et al. (2006), to ERM classification. Then we propose a new method, objective perturbation, for privacy-preserving machine learning algorithm design. This method entails perturbing the objective function before optimizing over classifiers. If the loss and regularizer satisfy certain convexity and differentiability criteria, we prove theoretical results showing that our algorithms preserve privacy, and provide generalization bounds for linear and nonlinear kernels. We further present a privacy-preserving technique for tuning the parameters in general machine learning algorithms, thereby providing end-to-end privacy guarantees for the training process. We apply these results to produce privacy-preserving analogues of regularized logistic regression and support vector machines. We obtain encouraging results from evaluating their performance on real demographic and benchmark data sets. Our results show that both theoretically and empirically, objective perturbation is superior to the previous state-of-the-art, output perturbation, in managing the inherent tradeoff between privacy and learning performance.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 04:35:44 GMT" }, { "version": "v2", "created": "Mon, 22 Feb 2010 19:33:44 GMT" }, { "version": "v3", "created": "Tue, 23 Feb 2010 05:26:22 GMT" }, { "version": "v4", "created": "Wed, 2 Jun 2010 23:16:36 GMT" }, { "version": "v5", "created": "Wed, 16 Feb 2011 22:35:55 GMT" } ]
2011-02-18T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Monteleoni", "Claire", "" ], [ "Sarwate", "Anand D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.0086
Kamalika Chaudhuri
Kamalika Chaudhuri, Sanjoy Dasgupta, Andrea Vattani
Learning Mixtures of Gaussians using the k-means Algorithm
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most popular algorithms for clustering in Euclidean space is the $k$-means algorithm; $k$-means is difficult to analyze mathematically, and few theoretical guarantees are known about it, particularly when the data is {\em well-clustered}. In this paper, we attempt to fill this gap in the literature by analyzing the behavior of $k$-means on well-clustered data. In particular, we study the case when each cluster is distributed as a different Gaussian -- or, in other words, when the input comes from a mixture of Gaussians. We analyze three aspects of the $k$-means algorithm under this assumption. First, we show that when the input comes from a mixture of two spherical Gaussians, a variant of the 2-means algorithm successfully isolates the subspace containing the means of the mixture components. Second, we show an exact expression for the convergence of our variant of the 2-means algorithm, when the input is a very large number of samples from a mixture of spherical Gaussians. Our analysis does not require any lower bound on the separation between the mixture components. Finally, we study the sample requirement of $k$-means; for a mixture of 2 spherical Gaussians, we show an upper bound on the number of samples required by a variant of 2-means to get close to the true solution. The sample requirement grows with increasing dimensionality of the data, and decreasing separation between the means of the Gaussians. To match our upper bound, we show an information-theoretic lower bound on any algorithm that learns mixtures of two spherical Gaussians; our lower bound indicates that in the case when the overlap between the probability masses of the two distributions is small, the sample requirement of $k$-means is {\em near-optimal}.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 19:10:46 GMT" } ]
2009-12-02T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Dasgupta", "Sanjoy", "" ], [ "Vattani", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0912.0132
Fadi Badra
Fadi Badra (INRIA Lorraine - LORIA), Am\'elie Cordier (LIRIS), Jean Lieber (INRIA Lorraine - LORIA)
Opportunistic Adaptation Knowledge Discovery
null
8th International Conference on Case-Based Reasoning, ICCBR 2009, Seattle : United States (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adaptation has long been considered as the Achilles' heel of case-based reasoning since it requires some domain-specific knowledge that is difficult to acquire. In this paper, two strategies are combined in order to reduce the knowledge engineering cost induced by the adaptation knowledge (CA) acquisition task: CA is learned from the case base by the means of knowledge discovery techniques, and the CA acquisition sessions are opportunistically triggered, i.e., at problem-solving time.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 12:08:47 GMT" } ]
2009-12-02T00:00:00
[ [ "Badra", "Fadi", "", "INRIA Lorraine - LORIA" ], [ "Cordier", "Amélie", "", "LIRIS" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0912.0134
Swan Dubois
Swan Dubois (LIP6, INRIA Rocquencourt), Maria Gradinariu Potop-Butucaru (LIP6, INRIA Rocquencourt), Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6)
Self-Stabilizing Byzantine Asynchronous Unison
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore asynchronous unison in the presence of systemic transient and permanent Byzantine faults in shared memory. We observe that the problem is not solvable under less than strongly fair scheduler or for system topologies with maximum node degree greater than two. We present a self-stabilizing Byzantine-tolerant solution to asynchronous unison for chain and ring topologies. Our algorithm has minimum possible containment radius and optimal stabilization time.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 12:09:17 GMT" } ]
2009-12-02T00:00:00
[ [ "Dubois", "Swan", "", "LIP6, INRIA Rocquencourt" ], [ "Potop-Butucaru", "Maria Gradinariu", "", "LIP6, INRIA Rocquencourt" ], [ "Nesterenko", "Mikhail", "", "LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0149
Nuno Pratas
Nuno Pratas, Nicola Marchetti, Neeli Rashmi Prasad, Antonio Rodrigues and Ramjee Prasad
Robust Cooperative Spectrum Sensing for Disaster Relief Networks in Correlated Environments
10 Pages, 12 figures. Submitted to J-SAC - Special Issue on Advances in Cognitive Radio Networking and Communications on December 1st of 2009
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Disaster relief networks are designed to be adaptable and resilient so to encompass the demands of the emergency service. Cognitive Radio enhanced ad-hoc architecture has been put forward as a candidate to enable such networks. Spectrum sensing, the cornerstone of the Cognitive Radio paradigm, has been the focus of intensive research, from which the main conclusion was that its performance can be greatly enhanced through the use of cooperative sensing schemes. To apply the Cognitive Radio paradigm to Ad-hoc disaster relief networks, the design of effective cooperative spectrum sensing schemes is essential. In this paper we propose a cluster based orchestration cooperative sensing scheme, which adapts to the cluster nodes surrounding radio environment state as well as to the degree of correlation observed between those nodes. The proposed scheme is given both in a centralized as well as in a decentralized approach. In the centralized approach, the cluster head controls and adapts the distribution of the cluster sensing nodes according to the monitored spectrum state. While in the decentralized approach, each of the cluster nodes decides which spectrum it should monitor, according to the past local sensing decisions of the cluster nodes. The centralized and decentralized schemes can be combined to achieve a more robust cooperative spectrum sensing scheme. The proposed scheme performance is evaluated through a framework, which allows measuring the accuracy of the spectrum sensing cooperative scheme by measuring the error in the estimation of the monitored spectrum state. Through this evaluation it is shown that the proposed scheme outperforms the case where the choice of which spectrum to sense is done without using the knowledge obtained in previous sensing iterations, i.e. a implementation of a blind Round Robin scheme.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 13:37:36 GMT" } ]
2009-12-02T00:00:00
[ [ "Pratas", "Nuno", "" ], [ "Marchetti", "Nicola", "" ], [ "Prasad", "Neeli Rashmi", "" ], [ "Rodrigues", "Antonio", "" ], [ "Prasad", "Ramjee", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0912.0161
Peter Csermely
Istvan A. Kovacs, Robin Palotai, Mate S. Szalay and Peter Csermely
Community landscapes: an integrative approach to determine overlapping network module hierarchy, identify key nodes and predict network dynamics
25 pages with 6 figures and a Glossary + Supporting Information containing pseudo-codes of all algorithms used, 14 Figures, 5 Tables (with 18 module definitions, 129 different modularization methods, 13 module comparision methods) and 396 references. All algorithms can be downloaded from this web-site: http://www.linkgroup.hu/modules.php
PLoS ONE 5, e12528 (2010)
10.1371/journal.pone.0012528
null
physics.comp-ph cond-mat.dis-nn cs.MS physics.data-an physics.soc-ph q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Network communities help the functional organization and evolution of complex networks. However, the development of a method, which is both fast and accurate, provides modular overlaps and partitions of a heterogeneous network, has proven to be rather difficult. Methodology/Principal Findings: Here we introduce the novel concept of ModuLand, an integrative method family determining overlapping network modules as hills of an influence function-based, centrality-type community landscape, and including several widely used modularization methods as special cases. As various adaptations of the method family, we developed several algorithms, which provide an efficient analysis of weighted and directed networks, and (1) determine pervasively overlapping modules with high resolution; (2) uncover a detailed hierarchical network structure allowing an efficient, zoom-in analysis of large networks; (3) allow the determination of key network nodes and (4) help to predict network dynamics. Conclusions/Significance: The concept opens a wide range of possibilities to develop new approaches and applications including network routing, classification, comparison and prediction.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 10:36:18 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 2009 12:58:48 GMT" }, { "version": "v3", "created": "Sat, 13 Mar 2010 11:44:46 GMT" }, { "version": "v4", "created": "Fri, 3 Sep 2010 06:14:01 GMT" } ]
2010-09-06T00:00:00
[ [ "Kovacs", "Istvan A.", "" ], [ "Palotai", "Robin", "" ], [ "Szalay", "Mate S.", "" ], [ "Csermely", "Peter", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" } ]
0912.0180
Bram Reps
Bram Reps, Wim Vanroose and Hisham bin Zubair
On the indefinite Helmholtz equation: complex stretched absorbing boundary layers, iterative analysis, and preconditioning
null
Journal of Computational Physics (2010)
10.1016/j.jcp.2010.07.022
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies and analyzes a preconditioned Krylov solver for Helmholtz problems that are formulated with absorbing boundary layers based on complex coordinate stretching. The preconditioner problem is a Helmholtz problem where not only the coordinates in the absorbing layer have an imaginary part, but also the coordinates in the interior region. This results into a preconditioner problem that is invertible with a multigrid cycle. We give a numerical analysis based on the eigenvalues and evaluate the performance with several numerical experiments. The method is an alternative to the complex shifted Laplacian and it gives a comparable performance for the studied model problems.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 15:15:44 GMT" }, { "version": "v2", "created": "Mon, 14 Jun 2010 09:35:35 GMT" } ]
2010-08-19T00:00:00
[ [ "Reps", "Bram", "" ], [ "Vanroose", "Wim", "" ], [ "Zubair", "Hisham bin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0912.0224
Nicolas A. Barriga
Nicolas A. Barriga, Mauricio Araya-L\'opez
A Multi-stage Probabilistic Algorithm for Dynamic Path-Planning
7 pages, 5 figures. Presented in Ingelectra 2009 conference
null
null
null
cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic sampling methods have become very popular to solve single-shot path planning problems. Rapidly-exploring Random Trees (RRTs) in particular have been shown to be efficient in solving high dimensional problems. Even though several RRT variants have been proposed for dynamic replanning, these methods only perform well in environments with infrequent changes. This paper addresses the dynamic path planning problem by combining simple techniques in a multi-stage probabilistic algorithm. This algorithm uses RRTs for initial planning and informed local search for navigation. We show that this combination of simple techniques provides better responses to highly dynamic environments than the RRT extensions.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 20:55:01 GMT" } ]
2009-12-02T00:00:00
[ [ "Barriga", "Nicolas A.", "" ], [ "Araya-López", "Mauricio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0912.0226
Paul Bonsma
Paul Bonsma
Max-Leaves Spanning Tree is APX-hard for Cubic Graphs
null
null
null
null
cs.DM cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of finding a spanning tree with maximum number of leaves (MaxLeaf). A 2-approximation algorithm is known for this problem, and a 3/2-approximation algorithm when restricted to graphs where every vertex has degree 3 (cubic graphs). MaxLeaf is known to be APX-hard in general, and NP-hard for cubic graphs. We show that the problem is also APX-hard for cubic graphs. The APX-hardness of the related problem Minimum Connected Dominating Set for cubic graphs follows.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 18:26:53 GMT" } ]
2009-12-02T00:00:00
[ [ "Bonsma", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0228
Charles Sauerbier
Charles Sauerbier
Answering Hilbert's 1st Problem
7 pages, 0 figures; full revision of content to address critiques; along with numerous complaints as to "style", "quality", and other nonsense arising of opinion
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hilbert's first problem is of importance in relation to work being done in computational systems. It is the question of equipollence of natural and real numbers. By construction equipollence is established for real numbers in open interval (0, 1) and natural numbers and, from such to all real numbers. Construction stands in contradiction of the generally accepted diagonal argument of Cantor. Mathematics being irrefutable, in absence rejection of all theory of mathematics and logic, the problem exists in acceptance; that itself arises of more fundamental a problem in science generally. The problem within Hilbert's problem is of Schopenhauer's, et al, "will and representation" born.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 18:40:19 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 21:53:48 GMT" }, { "version": "v3", "created": "Thu, 3 Dec 2009 22:02:02 GMT" }, { "version": "v4", "created": "Mon, 1 Mar 2021 15:37:48 GMT" }, { "version": "v5", "created": "Thu, 4 Mar 2021 08:20:03 GMT" }, { "version": "v6", "created": "Fri, 26 Mar 2021 16:00:31 GMT" } ]
2021-03-29T00:00:00
[ [ "Sauerbier", "Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0912.0229
Anna Gilbert
Anna C. Gilbert, Yi Li, Ely Porat, Martin J. Strauss
Approximate Sparse Recovery: Optimizing Time and Measurements
null
SIAM J. Comput. 41(2), pp. 436-453, 2012
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An approximate sparse recovery system consists of parameters $k,N$, an $m$-by-$N$ measurement matrix, $\Phi$, and a decoding algorithm, $\mathcal{D}$. Given a vector, $x$, the system approximates $x$ by $\widehat x =\mathcal{D}(\Phi x)$, which must satisfy $\| \widehat x - x\|_2\le C \|x - x_k\|_2$, where $x_k$ denotes the optimal $k$-term approximation to $x$. For each vector $x$, the system must succeed with probability at least 3/4. Among the goals in designing such systems are minimizing the number $m$ of measurements and the runtime of the decoding algorithm, $\mathcal{D}$. In this paper, we give a system with $m=O(k \log(N/k))$ measurements--matching a lower bound, up to a constant factor--and decoding time $O(k\log^c N)$, matching a lower bound up to $\log(N)$ factors. We also consider the encode time (i.e., the time to multiply $\Phi$ by $x$), the time to update measurements (i.e., the time to multiply $\Phi$ by a 1-sparse $x$), and the robustness and stability of the algorithm (adding noise before and after the measurements). Our encode and update times are optimal up to $\log(N)$ factors.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 18:47:24 GMT" } ]
2014-02-10T00:00:00
[ [ "Gilbert", "Anna C.", "" ], [ "Li", "Yi", "" ], [ "Porat", "Ely", "" ], [ "Strauss", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0238
Sebastiano Vigna
Sebastiano Vigna
Spectral Ranking
null
null
null
null
cs.IR cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We sketch the history of spectral ranking, a general umbrella name for techniques that apply the theory of linear maps (in particular, eigenvalues and eigenvectors) to matrices that do not represent geometric transformations, but rather some kind of relationship between entities. Albeit recently made famous by the ample press coverage of Google's PageRank algorithm, spectral ranking was devised more than a century ago, and has been studied in tournament ranking, psychology, social sciences, bibliometrics, economy and choice theory. We describe the contribution given by previous scholars in precise and modern mathematical terms: along the way, we show how to express in a general way damped rankings, such as Katz's index, as dominant eigenvectors of perturbed matrices, and then use results on the Drazin inverse to go back to the dominant eigenvectors by a limit process. The result suggests a regularized definition of spectral ranking that yields for a general matrix a unique vector depending on a boundary condition.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 19:35:39 GMT" }, { "version": "v10", "created": "Fri, 9 Aug 2013 14:01:58 GMT" }, { "version": "v11", "created": "Sat, 7 Sep 2013 17:18:38 GMT" }, { "version": "v12", "created": "Sat, 12 Oct 2013 10:45:57 GMT" }, { "version": "v13", "created": "Fri, 8 Nov 2013 11:37:33 GMT" }, { "version": "v14", "created": "Tue, 29 Sep 2015 21:26:47 GMT" }, { "version": "v15", "created": "Fri, 8 Feb 2019 11:01:34 GMT" }, { "version": "v2", "created": "Mon, 7 Dec 2009 08:23:10 GMT" }, { "version": "v3", "created": "Mon, 7 Dec 2009 23:30:17 GMT" }, { "version": "v4", "created": "Wed, 9 Dec 2009 16:53:20 GMT" }, { "version": "v5", "created": "Fri, 11 Dec 2009 16:37:26 GMT" }, { "version": "v6", "created": "Tue, 22 Dec 2009 01:14:01 GMT" }, { "version": "v7", "created": "Wed, 10 Mar 2010 11:24:23 GMT" }, { "version": "v8", "created": "Fri, 12 Nov 2010 16:19:25 GMT" }, { "version": "v9", "created": "Wed, 2 Mar 2011 14:57:02 GMT" } ]
2019-02-11T00:00:00
[ [ "Vigna", "Sebastiano", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0912.0250
Ryan O'Donnell
Ryan O'Donnell, Yi Wu, Yuan Zhou
Optimal lower bounds for locality sensitive hashing (except when q is tiny)
9 pages + abstract and references
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study lower bounds for Locality Sensitive Hashing (LSH) in the strongest setting: point sets in {0,1}^d under the Hamming distance. Recall that here H is said to be an (r, cr, p, q)-sensitive hash family if all pairs x, y in {0,1}^d with dist(x,y) at most r have probability at least p of collision under a randomly chosen h in H, whereas all pairs x, y in {0,1}^d with dist(x,y) at least cr have probability at most q of collision. Typically, one considers d tending to infinity, with c fixed and q bounded away from 0. For its applications to approximate nearest neighbor search in high dimensions, the quality of an LSH family H is governed by how small its "rho parameter" rho = ln(1/p)/ln(1/q) is as a function of the parameter c. The seminal paper of Indyk and Motwani showed that for each c, the extremely simple family H = {x -> x_i : i in d} achieves rho at most 1/c. The only known lower bound, due to Motwani, Naor, and Panigrahy, is that rho must be at least .46/c (minus o_d(1)). In this paper we show an optimal lower bound: rho must be at least 1/c (minus o_d(1)). This lower bound for Hamming space yields a lower bound of 1/c^2 for Euclidean space (or the unit sphere) and 1/c for the Jaccard distance on sets; both of these match known upper bounds. Our proof is simple; the essence is that the noise stability of a boolean function at e^{-t} is a log-convex function of t.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 20:34:12 GMT" } ]
2009-12-02T00:00:00
[ [ "O'Donnell", "Ryan", "" ], [ "Wu", "Yi", "" ], [ "Zhou", "Yuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0912.0255
Cristinel Diaconu
Dphep Study Group
Data Preservation in High Energy Physics
Intermediate report of the ICFA-DPHEP Study Group (18 pages, 2 figures)
null
null
DPHEP-2009-001
hep-ex cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data from high-energy physics (HEP) experiments are collected with significant financial and human effort and are mostly unique. At the same time, HEP has no coherent strategy for data preservation and re-use. An inter-experimental Study Group on HEP data preservation and long-term analysis was convened at the end of 2008 and held two workshops, at DESY (January 2009) and SLAC (May 2009). This document is an intermediate report to the International Committee for Future Accelerators (ICFA) of the reflections of this Study Group.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 22:32:31 GMT" } ]
2012-08-27T00:00:00
[ [ "Dphep Study Group", "", "" ] ]
[ { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0912.0265
Gabriel Silva
Marius Buibas, Diana Yu, Krystal Nizar, Gabriel A. Silva
Mapping the spatiotemporal dynamics of calcium signaling in cellular neural networks using optical flow
23 pages, 5 figures. Peer reviewed accepted version in press in Annals of Biomedical Engineering
null
null
null
cs.CE cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An optical flow gradient algorithm was applied to spontaneously forming net- works of neurons and glia in culture imaged by fluorescence optical microscopy in order to map functional calcium signaling with single pixel resolution. Optical flow estimates the direction and speed of motion of objects in an image between subsequent frames in a recorded digital sequence of images (i.e. a movie). Computed vector field outputs by the algorithm were able to track the spatiotemporal dynamics of calcium signaling pat- terns. We begin by briefly reviewing the mathematics of the optical flow algorithm, and then describe how to solve for the displacement vectors and how to measure their reliability. We then compare computed flow vectors with manually estimated vectors for the progression of a calcium signal recorded from representative astrocyte cultures. Finally, we applied the algorithm to preparations of primary astrocytes and hippocampal neurons and to the rMC-1 Muller glial cell line in order to illustrate the capability of the algorithm for capturing different types of spatiotemporal calcium activity. We discuss the imaging requirements, parameter selection and threshold selection for reliable measurements, and offer perspectives on uses of the vector data.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 21:17:53 GMT" }, { "version": "v2", "created": "Fri, 22 Jan 2010 17:13:08 GMT" } ]
2010-01-22T00:00:00
[ [ "Buibas", "Marius", "" ], [ "Yu", "Diana", "" ], [ "Nizar", "Krystal", "" ], [ "Silva", "Gabriel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0912.0266
Nicolas A. Barriga
Nicolas A. Barriga, Mauricio Araya-L\'opez, Mauricio Solar
Combining a Probabilistic Sampling Technique and Simple Heuristics to solve the Dynamic Path Planning Problem
8 pages, 7 figures. Presented at the XXVIII International Conference of the Chilean Computer Society 2009
null
null
null
cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic sampling methods have become very popular to solve single-shot path planning problems. Rapidly-exploring Random Trees (RRTs) in particular have been shown to be very efficient in solving high dimensional problems. Even though several RRT variants have been proposed to tackle the dynamic replanning problem, these methods only perform well in environments with infrequent changes. This paper addresses the dynamic path planning problem by combining simple techniques in a multi-stage probabilistic algorithm. This algorithm uses RRTs as an initial solution, informed local search to fix unfeasible paths and a simple greedy optimizer. The algorithm is capable of recognizing when the local search is stuck, and subsequently restart the RRT. We show that this combination of simple techniques provides better responses to a highly dynamic environment than the dynamic RRT variants.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 21:03:49 GMT" } ]
2009-12-03T00:00:00
[ [ "Barriga", "Nicolas A.", "" ], [ "Araya-López", "Mauricio", "" ], [ "Solar", "Mauricio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0912.0270
Nicolas A. Barriga
Nicolas A. Barriga
Single-Agent On-line Path Planning in Continuous, Unpredictable and Highly Dynamic Environments
54 pages, Master of Science in Informatics Engineering thesis
null
null
null
cs.AI cs.RO
http://creativecommons.org/licenses/by/3.0/
This document is a thesis on the subject of single-agent on-line path planning in continuous,unpredictable and highly dynamic environments. The problem is finding and traversing a collision-free path for a holonomic robot, without kinodynamic restrictions, moving in an environment with several unpredictably moving obstacles or adversaries. The availability of perfect information of the environment at all times is assumed. Several static and dynamic variants of the Rapidly Exploring Random Trees (RRT) algorithm are explored, as well as an evolutionary algorithm for planning in dynamic environments called the Evolutionary Planner/Navigator. A combination of both kinds of algorithms is proposed to overcome shortcomings in both, and then a combination of a RRT variant for initial planning and informed local search for navigation, plus a simple greedy heuristic for optimization. We show that this combination of simple techniques provides better responses to highly dynamic environments than the RRT extensions.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 21:13:36 GMT" } ]
2009-12-03T00:00:00
[ [ "Barriga", "Nicolas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0912.0284
Thomas Schick
Laurent Bartholdi (1), Thomas Schick (1), Nat Smale (2), Steve Smale (3), Anthony W. Baker (4) ((1) Georg-August-Universit\"at G\"ottingen, (2) University of Utah, (3) City University of Hong Kong, (4) The Boing Company)
Hodge Theory on Metric Spaces
appendix by Anthony W. Baker, 48 pages, AMS-LaTeX. v2: final version, to appear in Foundations of Computational Mathematics. Minor changes and additions
Foundations of Computational Mathematics 12:1 (2012) 1-48
10.1007/s10208-011-9107-3
null
math.KT cs.CG math.GT math.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hodge theory is a beautiful synthesis of geometry, topology, and analysis, which has been developed in the setting of Riemannian manifolds. On the other hand, spaces of images, which are important in the mathematical foundations of vision and pattern recognition, do not fit this framework. This motivates us to develop a version of Hodge theory on metric spaces with a probability measure. We believe that this constitutes a step towards understanding the geometry of vision. The appendix by Anthony Baker provides a separable, compact metric space with infinite dimensional \alpha-scale homology.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 22:22:47 GMT" }, { "version": "v2", "created": "Thu, 24 Nov 2011 19:08:34 GMT" } ]
2016-06-28T00:00:00
[ [ "Bartholdi", "Laurent", "" ], [ "Schick", "Thomas", "" ], [ "Smale", "Nat", "" ], [ "Smale", "Steve", "" ], [ "Baker", "Anthony W.", "" ] ]
[ { "class": "Mathematics", "code": "math.KT", "description": "Algebraic and topological K-theory, relations with topology, commutative algebra, and operator algebras", "span": "(K-Theory and Homology)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0912.0287
Rasmus Pagh
Martin Dietzfelbinger, Andreas Goerdt, Michael Mitzenmacher, Andrea Montanari, Rasmus Pagh, and Michael Rink
Tight Thresholds for Cuckoo Hashing via XORSAT
Revision 3 contains missing details of proofs, as appendix D
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key. Each key has k >= 3 (distinct) associated buckets chosen uniformly at random and independently of the choices of other keys. A hash table can be constructed successfully if each key can be placed into one of its buckets. We seek thresholds alpha_k such that, as n goes to infinity, if n/m <= alpha for some alpha < alpha_k then a hash table can be constructed successfully with high probability, and if n/m >= alpha for some alpha > alpha_k a hash table cannot be constructed successfully with high probability. Here we are considering the offline version of the problem, where all keys and hash values are given, so the problem is equivalent to previous models of multiple-choice hashing. We find the thresholds for all values of k > 2 by showing that they are in fact the same as the previously known thresholds for the random k-XORSAT problem. We then extend these results to the setting where keys can have differing number of choices, and provide evidence in the form of an algorithm for a conjecture extending this result to cuckoo hash tables that store multiple keys in a bucket.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 22:23:48 GMT" }, { "version": "v2", "created": "Wed, 10 Feb 2010 21:45:36 GMT" }, { "version": "v3", "created": "Tue, 21 Dec 2010 14:53:26 GMT" } ]
2010-12-22T00:00:00
[ [ "Dietzfelbinger", "Martin", "" ], [ "Goerdt", "Andreas", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Montanari", "Andrea", "" ], [ "Pagh", "Rasmus", "" ], [ "Rink", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0309
Murray Patterson
Cedric Chauve, Jan Manuch and Murray Patterson
Hardness Results for the Gapped Consecutive-Ones Property
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by problems of comparative genomics and paleogenomics, in [Chauve et al., 2009], the authors introduced the Gapped Consecutive-Ones Property Problem (k,delta)-C1P: given a binary matrix M and two integers k and delta, can the columns of M be permuted such that each row contains at most k blocks of ones and no two consecutive blocks of ones are separated by a gap of more than delta zeros. The classical C1P problem, which is known to be polynomial is equivalent to the (1,0)-C1P problem. They showed that the (2,delta)-C1P Problem is NP-complete for all delta >= 2 and that the (3,1)-C1P problem is NP-complete. They also conjectured that the (k,delta)-C1P Problem is NP-complete for k >= 2, delta >= 1 and (k,delta) =/= (2,1). Here, we prove that this conjecture is true. The only remaining case is the (2,1)-C1P Problem, which could be polynomial-time solvable.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 00:26:17 GMT" }, { "version": "v2", "created": "Sat, 5 Dec 2009 03:20:22 GMT" } ]
2009-12-05T00:00:00
[ [ "Chauve", "Cedric", "" ], [ "Manuch", "Jan", "" ], [ "Patterson", "Murray", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0312
Zhihan Gao
Zhi-Han Gao and Fang-Wei Fu
The minimal polynomial of sequence obtained from componentwise linear transformation of linear recurring sequence
This paper was submitted to the journal Theoretical Computer Science
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $S=(s_1,s_2,...,s_m,...)$ be a linear recurring sequence with terms in $GF(q^n)$ and $T$ be a linear transformation of $GF(q^n)$ over $GF(q)$. Denote $T(S)=(T(s_1),T(s_2),...,T(s_m),...)$. In this paper, we first present counter examples to show the main result in [A.M. Youssef and G. Gong, On linear complexity of sequences over $GF(2^n)$, Theoretical Computer Science, 352(2006), 288-292] is not correct in general since Lemma 3 in that paper is incorrect. Then, we determine the minimal polynomial of $T(S)$ if the canonical factorization of the minimal polynomial of $S$ without multiple roots is known and thus present the solution to the problem which was mainly considered in the above paper but incorrectly solved. Additionally, as a special case, we determine the minimal polynomial of $T(S)$ if the minimal polynomial of $S$ is primitive. Finally, we give an upper bound on the linear complexity of $T(S)$ when $T$ exhausts all possible linear transformations of $GF(q^n)$ over $GF(q)$. This bound is tight in some cases.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 01:13:42 GMT" } ]
2009-12-03T00:00:00
[ [ "Gao", "Zhi-Han", "" ], [ "Fu", "Fang-Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0322
Shaddin Dughmi
Shaddin Dughmi
Submodular Functions: Extensions, Distributions, and Algorithms. A Survey
This revision corrects an error in definition 2.2, as well as provides additional intuition regarding the definitions of convex closure and concave closure
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Submodularity is a fundamental phenomenon in combinatorial optimization. Submodular functions occur in a variety of combinatorial settings such as coverage problems, cut problems, welfare maximization, and many more. Therefore, a lot of work has been concerned with maximizing or minimizing a submodular function, often subject to combinatorial constraints. Many of these algorithmic results exhibit a common structure. Namely, the function is extended to a continuous, usually non-linear, function on a convex domain. Then, this relaxation is solved, and the fractional solution rounded to yield an integral solution. Often, the continuous extension has a natural interpretation in terms of distributions on subsets of the ground set. This interpretation is often crucial to the results and their analysis. The purpose of this survey is to highlight this connection between extensions, distributions, relaxations, and optimization in the context of submodular functions. We also present the first constant factor approximation algorithm for minimizing symmetric submodular functions subject to a cardinality constraint.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 02:02:27 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2009 19:09:36 GMT" }, { "version": "v3", "created": "Wed, 16 Dec 2009 19:47:08 GMT" }, { "version": "v4", "created": "Sun, 6 Nov 2011 22:23:46 GMT" } ]
2011-11-08T00:00:00
[ [ "Dughmi", "Shaddin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]