id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0912.0338
|
David Goldberg
|
David Gamarnik, David Goldberg, Theophane Weber
|
Correlation Decay in Random Decision Networks
| null | null | null | null |
math.PR cs.DC math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a decision network on an undirected graph in which each node
corresponds to a decision variable, and each node and edge of the graph is
associated with a reward function whose value depends only on the variables of
the corresponding nodes. The goal is to construct a decision vector which
maximizes the total reward. This decision problem encompasses a variety of
models, including maximum-likelihood inference in graphical models (Markov
Random Fields), combinatorial optimization on graphs, economic team theory and
statistical physics. The network is endowed with a probabilistic structure in
which costs are sampled from a distribution. Our aim is to identify sufficient
conditions to guarantee average-case polynomiality of the underlying
optimization problem. We construct a new decentralized algorithm called Cavity
Expansion and establish its theoretical performance for a variety of models.
Specifically, for certain classes of models we prove that our algorithm is able
to find near optimal solutions with high probability in a decentralized way.
The success of the algorithm is based on the network exhibiting a correlation
decay (long-range independence) property. Our results have the following
surprising implications in the area of average case complexity of algorithms.
Finding the largest independent (stable) set of a graph is a well known NP-hard
optimization problem for which no polynomial time approximation scheme is
possible even for graphs with largest connectivity equal to three, unless P=NP.
We show that the closely related maximum weighted independent set problem for
the same class of graphs admits a PTAS when the weights are i.i.d. with the
exponential distribution. Namely, randomization of the reward function turns an
NP-hard problem into a tractable one.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 05:03:48 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Gamarnik",
"David",
""
],
[
"Goldberg",
"David",
""
],
[
"Weber",
"Theophane",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0912.0360
|
Markus Kuster
|
M. G. Pia (1), T. Basaglia (2), Z. W. Bell (3), P. V. Dressendorfer
(4) ((1) INFN Sezione di Genova, (2) European Organization for Nuclear
Research (CERN), (3) Oak Ridge National Laboratory, (4) Editor-in-Chief, IEEE
TNS.)
|
Geant4 in Scientific Literature
|
6 pages, 9 figures and images, to appear in proceedings of the
Nuclear Science Symposium and Medical Imaging Conference 2009, Orlando
| null | null | null |
physics.comp-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Geant4 reference paper published in Nuclear Instruments and Methods A in
2003 has become the most cited publication in the whole Nuclear Science and
Technology category of Thomson-Reuter's Journal Citation Reports. It is
currently the second most cited article among the publications authored by two
major research institutes, CERN and INFN. An overview of Geant4 presence (and
absence) in scholarly literature is presented; the patterns of Geant4 citations
are quantitatively examined and discussed.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 08:46:24 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Pia",
"M. G.",
""
],
[
"Basaglia",
"T.",
""
],
[
"Bell",
"Z. W.",
""
],
[
"Dressendorfer",
"P. V.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0912.0368
|
Riccardo Dondi
|
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Yuri Pirola
|
Variants of Constrained Longest Common Subsequence
| null |
Information Processing Letters 110.20 (2010) 877-881
|
10.1016/j.ipl.2010.07.015
| null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we consider a variant of the classical Longest Common
Subsequence problem called Doubly-Constrained Longest Common Subsequence
(DC-LCS). Given two strings s1 and s2 over an alphabet A, a set C_s of strings,
and a function Co from A to N, the DC-LCS problem consists in finding the
longest subsequence s of s1 and s2 such that s is a supersequence of all the
strings in Cs and such that the number of occurrences in s of each symbol a in
A is upper bounded by Co(a). The DC-LCS problem provides a clear mathematical
formulation of a sequence comparison problem in Computational Biology and
generalizes two other constrained variants of the LCS problem: the Constrained
LCS and the Repetition-Free LCS. We present two results for the DC-LCS problem.
First, we illustrate a fixed-parameter algorithm where the parameter is the
length of the solution. Secondly, we prove a parameterized hardness result for
the Constrained LCS problem when the parameter is the number of the constraint
strings and the size of the alphabet A. This hardness result also implies the
parameterized hardness of the DC-LCS problem (with the same parameters) and its
NP-hardness when the size of the alphabet is constant.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 09:14:54 GMT"
}
] | 2013-11-20T00:00:00 |
[
[
"Bonizzoni",
"Paola",
""
],
[
"Della Vedova",
"Gianluca",
""
],
[
"Dondi",
"Riccardo",
""
],
[
"Pirola",
"Yuri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0912.0419
|
Roberto Amadio
|
Roberto Amadio (PPS), Patrick Baillot (LIP), Antoine Madet (PPS)
|
An affine-intuitionistic system of types and effects: confluence and
termination
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an affine-intuitionistic system of types and effects which can be
regarded as an extension of Barber-Plotkin Dual Intuitionistic Linear Logic to
multi-threaded programs with effects. In the system, dynamically generated
values such as references or channels are abstracted into a finite set of
regions. We introduce a discipline of region usage that entails the confluence
(and hence determinacy) of the typable programs. Further, we show that a
discipline of region stratification guarantees termination.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 12:55:11 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Amadio",
"Roberto",
"",
"PPS"
],
[
"Baillot",
"Patrick",
"",
"LIP"
],
[
"Madet",
"Antoine",
"",
"PPS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0912.0433
|
Arijit Laha Ph.D.
|
Arijit Laha
|
On the issues of building Information Warehouses
|
ACM Comptute 2010, January 22-23, 2010, Bangalore, India
| null | null | null |
cs.HC cs.IR cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While performing knowledge-intensive tasks of professional nature, the
knowledge workers need to access and process large volume of information. Apart
from the quantity, they also require that the information received is of high
quality in terms of authenticity and details. This, in turn, requires that the
information delivered should also include argumentative support, exhibiting the
reasoning process behind their development and provenance to indicate their
lineage. In conventional document-centric practices for information management,
such details are difficult to capture, represent/archive and retrieve/deliver.
To achieve such capability we need to re-think some core issues of information
management from the above requirements perspective. In this paper we develop a
framework for comprehensive representation of information in archive, capturing
informational contents along with their context. We shall call it the
"Information Warehouse (IW)" framework of information archival. The IW is a
significant yet technologically realizable conceptual advancement which can
support efficiently some interesting classes of applications which can be very
useful to the knowledge workers.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 15:16:27 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Laha",
"Arijit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0912.0448
|
Johan W\"astlund
|
Johan W\"astlund
|
The strange algebra of combinatorial games
|
21 pages
| null | null | null |
math.CO cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algebraic framework for the analysis of combinatorial games.
This framework embraces the classical theory of partizan games as well as a
number of misere games, comply-constrain games, and card games that have been
studied more recently. It focuses on the construction of the quotient monoid of
a game, an idea that has been successively applied to several classes of games.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 15:52:04 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Wästlund",
"Johan",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0912.0453
|
Matthieu Finiasz
|
Matthieu Finiasz
|
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem
| null | null | null | null |
cs.CR cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of Syndrome Decoding was proven to be NP-complete in 1978 and,
since then, quite a few cryptographic applications have had their security rely
on the (provable) difficulty of solving some instances of it. However, in most
cases, the instances to be solved follow some specific constraint: the target
weight is a function of the dimension and length of the code. In these cases,
is the Syndrome Decoding problem still NP-complete? This is the question that
this article intends to answer.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 16:07:32 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Finiasz",
"Matthieu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0473
|
David Fernandez-Amoros
|
David Fernandez-Amoros, Ruben Heradio, Jose Antonio Cerrada
|
Inferring Information from Feature Diagrams to Product Line Economic
Models
|
latex2e, 10 pages, 6 figures
|
Published in the Proceedings of the Software Product Line
Conference 2009, San Francisco
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing economic models support the estimation of the costs and benefits of
developing and evolving a Software Product Line (SPL) as compared to
undertaking traditional software development approaches. In addition, Feature
Diagrams (FDs) are a valuable tool to scope the domain of a SPL. This paper
proposes an algorithm to calculate, from a FD, the following information for
economic models: the total number of products of a SPL, the SPL homogeneity and
the commonality of the SPL requirements. The algorithm running time belongs to
the complexity class $O(f^42^c)$. In contrast to related work, the algorithm is
free of dependencies on off-the-self tools and is generally specified for an
abstract FD notation, that works as a pivot language for most of the available
notations for feature modeling.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 17:40:48 GMT"
}
] | 2009-12-03T00:00:00 |
[
[
"Fernandez-Amoros",
"David",
""
],
[
"Heradio",
"Ruben",
""
],
[
"Cerrada",
"Jose Antonio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0912.0537
|
David Eppstein
|
David Eppstein and Elena Mumford
|
Steinitz Theorems for Orthogonal Polyhedra
|
48 pages, 31 figures
|
J. Computational Geometry 5 (1): 179-244, 2014
|
10.20382/jocg.v5i1a10
| null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define a simple orthogonal polyhedron to be a three-dimensional polyhedron
with the topology of a sphere in which three mutually-perpendicular edges meet
at each vertex. By analogy to Steinitz's theorem characterizing the graphs of
convex polyhedra, we find graph-theoretic characterizations of three classes of
simple orthogonal polyhedra: corner polyhedra, which can be drawn by isometric
projection in the plane with only one hidden vertex, xyz polyhedra, in which
each axis-parallel line through a vertex contains exactly one other vertex, and
arbitrary simple orthogonal polyhedra. In particular, the graphs of xyz
polyhedra are exactly the bipartite cubic polyhedral graphs, and every
bipartite cubic polyhedral graph with a 4-connected dual graph is the graph of
a corner polyhedron. Based on our characterizations we find efficient
algorithms for constructing orthogonal polyhedra from their graphs.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 21:53:22 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Mumford",
"Elena",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0912.0549
|
Ralf-Michael Vetter
|
R.-M. Vetter, W. Lennartz, J.-V. Peetz
|
Modular Workflow Engine for Distributed Services using Lightweight Java
Clients
|
14 pages, 8 figures
| null | null | null |
cs.SE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we introduce the concept and the first implementation of a
lightweight client-server-framework as middleware for distributed computing. On
the client side an installation without administrative rights or privileged
ports can turn any computer into a worker node. Only a Java runtime environment
and the JAR files comprising the workflow client are needed. To connect all
clients to the engine one open server port is sufficient. The engine submits
data to the clients and orchestrates their work by workflow descriptions from a
central database. Clients request new task descriptions periodically, thus the
system is robust against network failures. In the basic set-up, data up- and
downloads are handled via HTTP communication with the server. The performance
of the modular system could additionally be improved using dedicated file
servers or distributed network file systems.
We demonstrate the design features of the proposed engine in real-world
applications from mechanical engineering. We have used this system on a compute
cluster in design-of-experiment studies, parameter optimisations and robustness
validations of finite element structures.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 01:31:36 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Vetter",
"R. -M.",
""
],
[
"Lennartz",
"W.",
""
],
[
"Peetz",
"J. -V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0912.0555
|
EPTCS
|
Pawe{\l} Soboci\'nski (ECS, University of Southampton)
|
A non-interleaving process calculus for multi-party synchronisation
| null |
EPTCS 12, 2009, pp. 87-98
|
10.4204/EPTCS.12.6
| null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the wire calculus. Its dynamic features are inspired by Milner's
CCS: a unary prefix operation, binary choice and a standard recursion
construct. Instead of an interleaving parallel composition operator there are
operators for synchronisation along a common boundary and non-communicating
parallel composition. The (operational) semantics is a labelled transition
system obtained with SOS rules. Bisimilarity is a congruence with respect to
the operators of the language. Quotienting terms by bisimilarity results in a
compact closed category.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 00:19:08 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Sobociński",
"Paweł",
"",
"ECS, University of Southampton"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0912.0568
|
Paul Beame
|
Paul Beame, Trinh Huynh, Toniann Pitassi
|
Hardness Amplification in Proof Complexity
|
28 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a general method for converting any family of unsatisfiable CNF
formulas that is hard for one of the simplest proof systems, tree resolution,
into formulas that require large rank in any proof system that manipulates
polynomials or polynomial threshold functions of degree at most k (known as
Th(k) proofs). Such systems include Lovasz-Schrijver and Cutting Planes proof
systems as well as their high degree analogues.
These are based on analyzing two new proof systems, denoted by T^cc(k) and
R^cc(k). The proof lines of T^cc(k) are arbitrary Boolean functions, each of
which can be evaluated by an efficient k-party randomized communication
protocol. They include Th{k-1} proofs as a special case. R^cc(k) proofs are
stronger and only require that each inference be locally checkable by an
efficient k-party randomized communication protocol.
Our main results are the following:
(1) When k is O(loglogn), for any unsatisfiable CNF formula F requiring
resolution rank r, there is a related CNF formula G=Lift_k(F) requiring
refutation rank r^Omega(1/k) log^O(1) n in all R^cc(k) systems.
(2) There are strict hierarchies for T^cc(k) and R^cc(k) systems with respect
to k when k is O(loglogn in that there are unsatisfiable CNF formulas requiring
large rank R^cc(k) refutations but having log^O(1) n rank Th(k) refutations.
(3) When k is O(loglogn) there are 2^(n^Omega(1/k)) lower bounds on the size
of tree-like T^cc(k) refutations for large classes of lifted CNF formulas.
(4) A general method for producing integrality gaps for low rank R^cc(2)
inference (and hence Cutting Planes and Th(1) inference) based on related gaps
for low rank resolution. These gaps are optimal for MAX-2t-SAT.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 02:09:22 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Beame",
"Paul",
""
],
[
"Huynh",
"Trinh",
""
],
[
"Pitassi",
"Toniann",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0572
|
Mingyu Fan
|
Mingyu Fan, Hong Qiao, and Bo Zhang
|
Isometric Multi-Manifolds Learning
| null | null | null | null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Isometric feature mapping (Isomap) is a promising manifold learning method.
However, Isomap fails to work on data which distribute on clusters in a single
manifold or manifolds. Many works have been done on extending Isomap to
multi-manifolds learning. In this paper, we first proposed a new
multi-manifolds learning algorithm (M-Isomap) with help of a general procedure.
The new algorithm preserves intra-manifold geodesics and multiple
inter-manifolds edges precisely. Compared with previous methods, this algorithm
can isometrically learn data distributed on several manifolds. Secondly, the
original multi-cluster manifold learning algorithm first proposed in
\cite{DCIsomap} and called D-C Isomap has been revised so that the revised D-C
Isomap can learn multi-manifolds data. Finally, the features and effectiveness
of the proposed multi-manifolds learning algorithms are demonstrated and
compared through experiments.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 03:05:59 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Fan",
"Mingyu",
""
],
[
"Qiao",
"Hong",
""
],
[
"Zhang",
"Bo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0578
|
Rdv Ijcsis
|
Li Fang, Maylor K.H. Leung, Cheng Shao Chian
|
Making Palm Print Matching Mobile
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 001-009, November 2009, USA
| null |
ISSN 19475500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the growing importance of personal identification and authentication in
todays highly advanced world where most business and personal tasks are being
replaced by electronic means, the need for a technology that is able to
uniquely identify an individual and has high fraud resistance see the rise of
biometric technologies. Making biometric based solution mobile is a promising
trend. A new RST invariant square based palm print ROI extraction method was
successfully implemented and integrated into the current application suite. A
new set of palm print image database captured using embedded cameras in mobile
phone was created to test its robustness. Comparing to those extraction methods
that are based on boundary tracking of the overall hand shape that has
limitation of being unable to process palm print images that has one or more
fingers closed, the system can now effectively handle the segmentation of palm
print images with varying finger positioning. The high flexibility makes palm
print matching mobile possible.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 05:23:13 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Fang",
"Li",
""
],
[
"Leung",
"Maylor K. H.",
""
],
[
"Chian",
"Cheng Shao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0579
|
Rdv Ijcsis
|
Mohammad Ghulam Ali
|
A Multidatabase System as 4-Tiered Client-Server Distributed
Heterogeneous Database System
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 010-014, November 2009, USA
| null |
ISSN 19475500
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe a multidatabase system as 4tiered Client-Server
DBMS architectures. We discuss their functional components and provide an
overview of their performance characteristics. The first component of this
proposed system is a web based interface or Graphical User Interface, which
resides on top of the Client Application Program, the second component of the
system is a client Application program running in an application server, which
resides on top of the Global Database Management System, the third component of
the system is a Global Database Management System and global schema of the
multidatabase system server, which resides on top of the distributed
heterogeneous local component database system servers, and the fourth component
is remote heterogeneous local component database system servers. Transaction
submitted from client interface to a multidatabase system server through an
application server will be decomposed into a set of sub queries and will be
executed at various remote heterogeneous local component database servers and
also in case of information retrieval all sub queries will be composed and will
get back results to the end users.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 05:34:56 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Ali",
"Mohammad Ghulam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.0580
|
Rdv Ijcsis
|
Yunho Lee, Soojin Lee
|
A New Efficient Key Management Protocol for Wireless Sensor and Actor
Networks
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 015-022, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Research on sensor networks has become much more active and is currently
being applied to many different fields. However since sensor networks are
limited to only collecting and reporting information regarding a certain event,
and requires human intervention with that given information, it is often
difficult to react to an event or situation immediately and proactively. To
overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs)
with immediate-response actor nodes have been proposed which adds greater
mobility and activity to the existing sensor networks. Although WSANs share
many common grounds with sensor networks, it is difficult to apply existing
security technologies due to the fact that WSANs contain actor nodes that are
resource-independent and mobile. Therefore, this research seeks to demonstrate
ways to provide security, integrity, and authentication services for WSANs
secure operation, by separating networks into hierarchical structure by each
node's abilities and provides different encryption key based secure protocols
for each level of hierarchy, Pairwise key, node key, and region key for sensor
levels, and public key for actor
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 05:39:22 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Lee",
"Yunho",
""
],
[
"Lee",
"Soojin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0581
|
Mokshay Madiman
|
Oliver Johnson, Ioannis Kontoyiannis, Mokshay Madiman
|
Log-concavity, ultra-log-concavity, and a maximum entropy property of
discrete compound Poisson measures
|
30 pages. This submission supersedes arXiv:0805.4112v1. Changes in
v2: Updated references, typos corrected
|
Discrete Applied Mathematics, vol 161/9, pages 1232-1250, 2013
|
10.1016/j.dam.2011.08.025
| null |
math.CO cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sufficient conditions are developed, under which the compound Poisson
distribution has maximal entropy within a natural class of probability measures
on the nonnegative integers. Recently, one of the authors [O. Johnson, {\em
Stoch. Proc. Appl.}, 2007] used a semigroup approach to show that the Poisson
has maximal entropy among all ultra-log-concave distributions with fixed mean.
We show via a non-trivial extension of this semigroup approach that the natural
analog of the Poisson maximum entropy property remains valid if the compound
Poisson distributions under consideration are log-concave, but that it fails in
general. A parallel maximum entropy result is established for the family of
compound binomial measures. Sufficient conditions for compound distributions to
be log-concave are discussed and applications to combinatorics are examined;
new bounds are derived on the entropy of the cardinality of a random
independent set in a claw-free graph, and a connection is drawn to Mason's
conjecture for matroids. The present results are primarily motivated by the
desire to provide an information-theoretic foundation for compound Poisson
approximation and associated limit theorems, analogous to the corresponding
developments for the central limit theorem and for Poisson approximation. Our
results also demonstrate new links between some probabilistic methods and the
combinatorial notions of log-concavity and ultra-log-concavity, and they add to
the growing body of work exploring the applications of maximum entropy
characterizations to problems in discrete mathematics.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 05:41:46 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2011 04:58:57 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Johnson",
"Oliver",
""
],
[
"Kontoyiannis",
"Ioannis",
""
],
[
"Madiman",
"Mokshay",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0912.0583
|
David Meyer
|
David A. Meyer, James Pommersheim
|
Single query learning from abelian and non-abelian Hamming distance
oracles
|
14 pages
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of identifying an n-bit string using a single quantum
query to an oracle that computes the Hamming distance between the query and
hidden strings. The standard action of the oracle on a response register of
dimension r is by powers of the cycle (1...r), all of which, of course,
commute. We introduce a new model for the action of an oracle--by general
permutations in S_r--and explore how the success probability depends on r and
on the map from Hamming distances to permutations. In particular, we prove that
when r = 2, for even n the success probability is 1 with the right choice of
the map, while for odd n the success probability cannot be 1 for any choice.
Furthermore, for small odd n and r = 3, we demonstrate numerically that the
image of the optimal map generates a non-abelian group of permutations.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 06:02:06 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Meyer",
"David A.",
""
],
[
"Pommersheim",
"James",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0597
|
Michael Huber
|
Michael Huber
|
Constructing Optimal Authentication Codes with Perfect Multi-fold
Secrecy
|
4 pages (double-column); to appear in Proc. 2010 International Zurich
Seminar on Communications (IZS 2010, Zurich)
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish a construction of optimal authentication codes achieving perfect
multi-fold secrecy by means of combinatorial designs. This continues the
author's work (ISIT 2009) and answers an open question posed therein. As an
application, we present the first infinite class of optimal codes that provide
two-fold security against spoofing attacks and at the same time perfect two-
fold secrecy.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 08:40:51 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Huber",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0599
|
Rdv Ijcsis
|
Sabah Al Fedaghi, Alaa Alsaqa, Zahraa Fadel
|
Conceptual Model for Communication
|
13 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 029-041, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A variety of idealized models of communication systems exist, and all may
have something in common. Starting with Shannons communication model and ending
with the OSI model, this paper presents progressively more advanced forms of
modeling of communication systems by tying communication models together based
on the notion of flow. The basic communication process is divided into
different spheres (sources, channels, and destinations), each with its own five
interior stages, receiving, processing, creating, releasing, and transferring
of information. The flow of information is ontologically distinguished from the
flow of physical signals, accordingly, Shannons model, network based OSI
models, and TCP IP are redesigned.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 08:50:51 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Fedaghi",
"Sabah Al",
""
],
[
"Alsaqa",
"Alaa",
""
],
[
"Fadel",
"Zahraa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0600
|
Rdv Ijcsis
|
Alireza Ghahari, Reza Aghaeizadeh Zoroofi
|
Sequential Clustering based Facial Feature Extraction Method for
Automatic Creation of Facial Models from Orthogonal Views
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 042-047, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiview 3D face modeling has attracted increasing attention recently and
has become one of the potential avenues in future video systems. We aim to make
more reliable and robust automatic feature extraction and natural 3D feature
construction from 2D features detected on a pair of frontal and profile view
face images. We propose several heuristic algorithms to minimize possible
errors introduced by prevalent nonperfect orthogonal condition and noncoherent
luminance. In our approach, we first extract the 2D features that are visible
to both cameras in both views. Then, we estimate the coordinates of the
features in the hidden profile view based on the visible features extracted in
the two orthogonal views. Finally, based on the coordinates of the extracted
features, we deform a 3D generic model to perform the desired 3D clone
modeling. Present study proves the scope of resulted facial models for
practical applications like face recognition and facial animation.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 08:54:24 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Ghahari",
"Alireza",
""
],
[
"Zoroofi",
"Reza Aghaeizadeh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0602
|
Rdv Ijcsis
|
G.Ramesh, S.SundaraVadivelu
|
A Reliable and Fault Tolerant Routing for Optical WDM Networks
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 048-054, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In optical WDM networks, since each lightpath can carry a huge mount of
traffic, failures may seriously damage the end user applications. Hence fault
tolerance becomes an important issue on these networks. The light path which
carries traffic during normal operation is called as primary path. The traffic
is rerouted on a backup path in case of a failure. In this paper we propose to
design a reliable and fault tolerant routing algorithm for establishing primary
and backup paths. In order to establish the primary path, this algorithm uses
load balancing in which link cost metrics are estimated based on the current
load of the links. In backup path setup, the source calculates the blocking
probability through the received feedback from the destination by sending a
small fraction of probe packets along the existing paths. It then selects the
optimal light path with the lowest blocking probability. Based on the
simulation results, we show that the reliable and fault tolerant routing
algorithm reduces the blocking probability and latency while increasing the
throughput and channel utilization.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 08:58:34 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Ramesh",
"G.",
""
],
[
"SundaraVadivelu",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0603
|
Rdv Ijcsis
|
Mohammad Ghulam Ali
|
Object Oriented Approach for Integration of Heterogeneous Databases in a
Multidatabase System and Local Schemas Modifications Propagation
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 055-060, November 2009, USA
| null |
ISSN 1947 5500
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the challenging problems in the multidatabase systems is to find the
most viable solution to the problem of interoperability of distributed
heterogeneous autonomous local component databases. This has resulted in the
creation of a global schema over set of these local component database schemas
to provide a uniform representation of local schemas. The aim of this paper is
to use object oriented approach to integrate schemas of distributed
heterogeneous autonomous local component database schemas into a global schema.
The resulting global schema provides a uniform interface and high level of
location transparency for retrieval of data from the local component databases.
A set of integration operators are defined to integrate local schemas based on
the semantic relevance of their classes and to provide a model independent
representation of virtual classes of the global schema. The schematic
representation and heterogeneity is also taken into account in the integration
process. Justifications about Object Oriented Modal are also discussed. Bottom
up local schema modifications propagation in Global schema is also considered
to maintain Global schema as local schemas are autonomous and evolve over time.
An example illustrates the applicability of the integration operator defined.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 09:01:39 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Ali",
"Mohammad Ghulam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.0606
|
Rdv Ijcsis
|
C. Yaashuwanth, Dr. R. Ramesh
|
A New Scheduling Algorithms For Real Time Tasks
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 061-066, November 2009, USA
| null |
ISSN 1947 5500
|
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main objective of this paper is to develop the two different ways in
which round robin architecture is modified and made suitable to be implemented
in real time and embedded systems. The scheduling algorithm plays a significant
role in the design of real time embedded systems. Simple round robin
architecture is not efficient to be implemented in embedded systems because of
higher context switch rate, larger waiting time and larger response time.
Missing of deadlines will degrade the system performance in soft real time
systems. The main objective of this paper is to develop the scheduling
algorithm which removes the drawbacks in simple round robin architecture. A
comparison with round robin architecture to the proposed architectures has been
made. It is observed that the proposed architectures solves the problems
encountered in round robin architecture in soft real time by decreasing the
number of context switches waiting time and response time thereby increasing
the system throughput.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 09:06:59 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Yaashuwanth",
"C.",
""
],
[
"Ramesh",
"Dr. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0912.0607
|
Rdv Ijcsis
|
P. Meenakshi Devi, M.Venkatesan, K.Duraiswamy
|
Reversible Image Authentication with Tamper Localization Based on
Integer Wavelet Transform
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 067-074, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new reversible image authentication technique with tamper
localization based on watermarking in integer wavelet transform is proposed. If
the image authenticity is verified, then the distortion due to embedding the
watermark can be completely removed from the watermarked image. If the image is
tampered, then the tampering positions can also be localized. Two layers of
watermarking are used. The first layer embedded in spatial domain verifies
authenticity and the second layer embedded in transform domain provides
reversibility. This technique utilizes selective LSB embedding and histogram
characteristics of the difference images of the wavelet coefficients and
modifies pixel values slightly to embed the watermark. Experimental results
demonstrate that the proposed scheme can detect any modifications of the
watermarked image.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 09:11:19 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Devi",
"P. Meenakshi",
""
],
[
"Venkatesan",
"M.",
""
],
[
"Duraiswamy",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0625
|
Sebastian Kaune
|
Sebastian Kaune, Ruben Cuevas Rumin, Gareth Tyson, Andreas Mauthe,
Carmen Guerrero, and Ralf Steinmetz
|
Unraveling BitTorrent's File Unavailability: Measurements, Analysis and
Solution Exploration
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BitTorrent suffers from one fundamental problem: the long-term availability
of content. This occurs on a massive-scale with 38% of torrents becoming
unavailable within the first month. In this paper we explore this problem by
performing two large-scale measurement studies including 46K torrents and 29M
users. The studies go significantly beyond any previous work by combining
per-node, per-torrent and system-wide observations to ascertain the causes,
characteristics and repercussions of file unavailability. The study confirms
the conclusion from previous works that seeders have a significant impact on
both performance and availability. However, we also present some crucial new
findings: (i) the presence of seeders is not the sole factor involved in file
availability, (ii) 23.5% of nodes that operate in seedless torrents can finish
their downloads, and (iii) BitTorrent availability is discontinuous, operating
in cycles of temporary unavailability. Due to our new findings, we consider it
is important to revisit the solution space; to this end, we perform large-scale
trace-based simulations to explore the potential of two abstract approaches.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 11:02:33 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Kaune",
"Sebastian",
""
],
[
"Rumin",
"Ruben Cuevas",
""
],
[
"Tyson",
"Gareth",
""
],
[
"Mauthe",
"Andreas",
""
],
[
"Guerrero",
"Carmen",
""
],
[
"Steinmetz",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0670
|
Richard Weber
|
Richard Weber
|
The Anderson-Weber strategy is not optimal for symmetric rendezvous
search on K4
|
6 pages
| null | null | null |
math.OC cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the symmetric rendezvous search game on a complete graph of n
locations. In 1990, Anderson and Weber proposed a strategy in which, over
successive blocks of n-1 steps, the players independently choose either to stay
at their initial location or to tour the other n-1 locations, with
probabilities p and 1-p, respectively. Their strategy has been proved optimal
for n=2 with p=1/2, and for n=3 with p=1/3. The proof for n=3 is very
complicated and it has been difficult to guess what might be true for n>3.
Anderson and Weber suspected that their strategy might not be optimal for n>3,
but they had no particular reason to believe this and no one has been able to
find anything better. This paper describes a strategy that is better than
Anderson--Weber for n=4. However, it is better by only a tiny fraction of a
percent.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 15:03:32 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Weber",
"Richard",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0912.0681
|
Michael Mahoney
|
Michael W. Mahoney, Lorenzo Orecchia, Nisheeth K. Vishnoi
|
A Local Spectral Method for Graphs: with Applications to Improving Graph
Partitions and Exploring Data Graphs Locally
|
24 pages. Completely rewritten; substance is still the same, but the
presentation is reworked
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The second eigenvalue of the Laplacian matrix and its associated eigenvector
are fundamental features of an undirected graph, and as such they have found
widespread use in scientific computing, machine learning, and data analysis. In
many applications, however, graphs that arise have several \emph{local} regions
of interest, and the second eigenvector will typically fail to provide
information fine-tuned to each local region. In this paper, we introduce a
locally-biased analogue of the second eigenvector, and we demonstrate its
usefulness at highlighting local properties of data graphs in a semi-supervised
manner. To do so, we first view the second eigenvector as the solution to a
constrained optimization problem, and we incorporate the local information as
an additional constraint; we then characterize the optimal solution to this new
problem and show that it can be interpreted as a generalization of a
Personalized PageRank vector; and finally, as a consequence, we show that the
solution can be computed in nearly-linear time. In addition, we show that this
locally-biased vector can be used to compute an approximation to the best
partition \emph{near} an input seed set in a manner analogous to the way in
which the second eigenvector of the Laplacian can be used to obtain an
approximation to the best partition in the entire input graph. Such a primitive
is useful for identifying and refining clusters locally, as it allows us to
focus on a local region of interest in a semi-supervised manner. Finally, we
provide a detailed empirical evaluation of our method by showing how it can
applied to finding locally-biased sparse cuts around an input vertex seed set
in social and information networks.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 15:20:59 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Apr 2011 14:30:57 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Oct 2011 03:18:01 GMT"
}
] | 2011-10-24T00:00:00 |
[
[
"Mahoney",
"Michael W.",
""
],
[
"Orecchia",
"Lorenzo",
""
],
[
"Vishnoi",
"Nisheeth K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0685
|
Matthias M\"uller-Hannemann
|
Annabell Berger and Matthias M\"uller-Hannemann
|
Uniform sampling of undirected and directed graphs with a fixed degree
sequence
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many applications in network analysis require algorithms to sample uniformly
at random from the set of all graphs with a prescribed degree sequence. We
present a Markov chain based approach which converges to the uniform
distribution of all realizations for both the directed and undirected case. It
remains an open challenge whether these Markov chains are rapidly mixing.
For the case of directed graphs, we also explain in this paper that a popular
switching algorithm fails in general to sample uniformly at random because the
state graph of the Markov chain decomposes into different isomorphic
components. We call degree sequences for which the state graph is strongly
connected arc swap sequences. To handle arbitrary degree sequences, we develop
two different solutions. The first uses an additional operation (a
reorientation of induced directed 3-cycles) which makes the state graph
strongly connected, the second selects randomly one of the isomorphic
components and samples inside it. Our main contribution is a precise
characterization of arc swap sequences, leading to an efficient recognition
algorithm. Finally, we point out some interesting consequences for network
analysis.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 15:46:31 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Dec 2009 16:39:13 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Mar 2010 15:38:10 GMT"
}
] | 2010-03-05T00:00:00 |
[
[
"Berger",
"Annabell",
""
],
[
"Müller-Hannemann",
"Matthias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0717
|
Karol Gregor
|
Karol Gregor, Gregory Griffin
|
Behavior and performance of the deep belief networks on image
classification
|
8 pages, 9 figures
| null | null | null |
cs.NE cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We apply deep belief networks of restricted Boltzmann machines to bags of
words of sift features obtained from databases of 13 Scenes, 15 Scenes and
Caltech 256 and study experimentally their behavior and performance. We find
that the final performance in the supervised phase is reached much faster if
the system is pre-trained. Pre-training the system on a larger dataset keeping
the supervised dataset fixed improves the performance (for the 13 Scenes case).
After the unsupervised pre-training, neurons arise that form approximate
explicit representations for several categories (meaning they are mostly active
for this category). The last three facts suggest that unsupervised training
really discovers structure in these data. Pre-training can be done on a
completely different dataset (we use Corel dataset) and we find that the
supervised phase performs just as good (on the 15 Scenes dataset). This leads
us to conjecture that one can pre-train the system once (e.g. in a factory) and
subsequently apply it to many supervised problems which then learn much faster.
The best performance is obtained with single hidden layer system suggesting
that the histogram of sift features doesn't have much high level structure. The
overall performance is almost equal, but slightly worse then that of the
support vector machine and the spatial pyramidal matching.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 19:20:14 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Gregor",
"Karol",
""
],
[
"Griffin",
"Gregory",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0741
|
Turlough Neary
|
Turlough Neary
|
A boundary between universality and non-universality in spiking neural P
systems
|
Version 1 (arXiv:0912.0741v1) of this paper contained some technical
errors that were mainly due to the restriction of counter machines used.
Definition 3 given in this version differs from the definition given in
version 1. This new definition necessitated some minor adjustments in proofs
of Theorems 1, 2 and 3.
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we offer a significant improvement on the previous smallest
spiking neural P systems and solve the problem of finding the smallest possible
extended spiking neural P system. Paun and Paun gave a universal spiking neural
P system with 84 neurons and another that has extended rules with 49 neurons.
Subsequently, Zhang et al. reduced the number of neurons used to give
universality to 67 for spiking neural P systems and to 41 for the extended
model. Here we give a small universal spiking neural P system that has only 17
neurons and another that has extended rules with 5 neurons. All of the above
mentioned spiking neural P systems suffer from an exponential slow down when
simulating Turing machines. Using a more relaxed encoding technique we get a
universal spiking neural P system that has extended rules with only 4 neurons.
This latter spiking neural P system simulates 2-counter machines in linear time
and thus suffer from a double exponential time overhead when simulating Turing
machines. We show that extended spiking neural P systems with 3 neurons are
simulated by log-space bounded Turing machines, and so there exists no such
universal system with 3 neurons. It immediately follows that our 4-neuron
system is the smallest possible extended spiking neural P system that is
universal. Finally, we show that if we generalise the output technique we can
give a universal spiking neural P system with extended rules that has only 3
neurons. This system is also the smallest of its kind as a universal spiking
neural P system with extended rules and generalised output is not possible with
2 neurons.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:36:55 GMT"
},
{
"version": "v2",
"created": "Sun, 16 May 2010 14:33:32 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Neary",
"Turlough",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0745
|
Rdv Ijcsis
|
Mary Lourde R., Anjali Kuppayil Saji
|
A Digital Guitar Tuner
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 082-088, November 2009, USA
| null |
ISSN 1947 5500
|
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The objective of this paper is to understand the critical parameters that
need to be addressed while designing a guitar tuner. The focus of the design
lies in developing a suitable algorithm to accurately detect the fundamental
frequency of a plucked guitar string from its frequency spectrum. A
userfriendly graphical interface is developed using Matlab to allow any user to
easily tune his guitar using the developed program.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:27:14 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"R.",
"Mary Lourde",
""
],
[
"Saji",
"Anjali Kuppayil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0912.0746
|
J\'er\'emie Roland
|
Boris Altshuler, Hari Krovi and Jeremie Roland
|
Anderson localization casts clouds over adiabatic quantum optimization
|
14 pages, 4 figures
|
Proceedings of the National Academy of Sciences of the United
States of America, 107(28):12446-12450, 2010
|
10.1073/pnas.1002116107
| null |
quant-ph cond-mat.mes-hall cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding NP-complete problems is a central topic in computer science.
This is why adiabatic quantum optimization has attracted so much attention, as
it provided a new approach to tackle NP-complete problems using a quantum
computer. The efficiency of this approach is limited by small spectral gaps
between the ground and excited states of the quantum computer's Hamiltonian. We
show that the statistics of the gaps can be analyzed in a novel way, borrowed
from the study of quantum disordered systems in statistical mechanics. It turns
out that due to a phenomenon similar to Anderson localization, exponentially
small gaps appear close to the end of the adiabatic algorithm for large random
instances of NP-complete problems. This implies that unfortunately, adiabatic
quantum optimization fails: the system gets trapped in one of the numerous
local minima.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 22:31:36 GMT"
}
] | 2010-12-13T00:00:00 |
[
[
"Altshuler",
"Boris",
""
],
[
"Krovi",
"Hari",
""
],
[
"Roland",
"Jeremie",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.mes-hall",
"description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures",
"span": "(Mesoscale and Nanoscale Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0912.0750
|
Aran Nayebi
|
Aran Nayebi
|
Fast matrix multiplication techniques based on the Adleman-Lipton model
|
To appear in the International Journal of Computer Engineering
Research. Minor changes made to make the preprint as similar as possible to
the published version
|
International Journal of Computer Engineering Research,
3(1):10-19, January 2012
|
10.5897/IJCER10.016
| null |
q-bio.QM cs.DS cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
On distributed memory electronic computers, the implementation and
association of fast parallel matrix multiplication algorithms has yielded
astounding results and insights. In this discourse, we use the tools of
molecular biology to demonstrate the theoretical encoding of Strassen's fast
matrix multiplication algorithm with DNA based on an $n$-moduli set in the
residue number system, thereby demonstrating the viability of computational
mathematics with DNA. As a result, a general scalable implementation of this
model in the DNA computing paradigm is presented and can be generalized to the
application of \emph{all} fast matrix multiplication algorithms on a DNA
computer. We also discuss the practical capabilities and issues of this
scalable implementation. Fast methods of matrix computations with DNA are
important because they also allow for the efficient implementation of other
algorithms (i.e. inversion, computing determinants, and graph theory) with DNA.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 23:04:18 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Sep 2010 16:43:23 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Feb 2011 15:44:55 GMT"
},
{
"version": "v4",
"created": "Sat, 28 May 2011 16:25:32 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Dec 2011 04:17:30 GMT"
}
] | 2012-02-10T00:00:00 |
[
[
"Nayebi",
"Aran",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.ET",
"description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.",
"span": "(Emerging Technologies)"
}
] |
0912.0756
|
Melissa Duarte
|
Melissa Duarte, Ashutosh Sabharwal, Chris Dick and Raghu Rao
|
Beamforming in MISO Systems: Empirical Results and EVM-based Analysis
|
Submitted to IEEE Transactions on Wireless Communications, November
2009
| null |
10.1109/TWC.2010.072610.091720
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an analytical, simulation, and experimental-based study of
beamforming Multiple Input Single Output (MISO) systems. We analyze the
performance of beamforming MISO systems taking into account implementation
complexity and effects of imperfect channel estimate, delayed feedback, real
Radio Frequency (RF) hardware, and imperfect timing synchronization. Our
results show that efficient implementation of codebook-based beamforming MISO
systems with good performance is feasible in the presence of channel and
implementation-induced imperfections. As part of our study we develop a
framework for Average Error Vector Magnitude Squared (AEVMS)-based analysis of
beamforming MISO systems which facilitates comparison of analytical,
simulation, and experimental results on the same scale. In addition, AEVMS
allows fair comparison of experimental results obtained from different wireless
testbeds. We derive novel expressions for the AEVMS of beamforming MISO systems
and show how the AEVMS relates to important system characteristics like the
diversity gain, coding gain, and error floor.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 23:27:07 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Duarte",
"Melissa",
""
],
[
"Sabharwal",
"Ashutosh",
""
],
[
"Dick",
"Chris",
""
],
[
"Rao",
"Raghu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0758
|
Rdv Ijcsis
|
Sudipta Chattopadhyay, Salil Kumar Sanyal
|
Comparison of Performance Metrics for QPSK and OQPSK Transmission Using
Root Raised Cosine and Raised Cosine Pulse shaping Filters for Applications
in Mobile Communication
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 106-112, November 2009, USA
| null |
ISSN 1947 5500
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quadrature Phase Shift Keying (QPSK) and Offset Quadrature Phase Shift Keying
(OQPSK) are two well accepted modulation techniques used in Code Division
Multiple Access (CDMA) system. The Pulse Shaping Filters play an important role
in digital transmission. The type of Pulse Shaping Filter used, and its
behavior would influence the performance of the communication system. This in
turn, would have an effect on the performance of the Mobile Communication
system, in which the digital communication technique has been employed. In this
paper we have presented comparative study of some performance parameters or
performance metrics of a digital communication system like, Error Vector
Magnitude (EVM), Magnitude Error, Phase Error and Bandwidth Efficiency for a
QPSK transmission system. Root Raised Cosine (RRC) and Raised Cosine (RC) Pulse
shaping filters have been used for comparison. The measurement results serve as
a guideline to the system designer to select the proper pulse shaping filter
with the appropriate value of filter roll off factor (a) in a QPSK modulated
mobile communication system for optimal values of its different performance
metrics.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:44:11 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Chattopadhyay",
"Sudipta",
""
],
[
"Sanyal",
"Salil Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0759
|
EPTCS
|
Filippo Bonchi (CWI, Netherland), Davide Grohmann (University of
Udine, Italy), Paola Spoletini (University of Insubria - Como, Italy), Emilio
Tuosto (University of Leicester, UK)
|
Proceedings 2nd Interaction and Concurrency Experience: Structured
Interactions
| null |
EPTCS 12, 2009
|
10.4204/EPTCS.12
| null |
cs.LO cs.CR cs.DC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the 2nd Workshop on Interaction and
Concurrency Experience (ICE'09). The workshop was held in Bologna, Italy on
31th of August 2009, as a satellite workshop of CONCUR'09. The previous edition
of ICE has been organized in Reykjavik (2008).
The ICE workshop is intended as a series of international scientific meetings
oriented to researchers in various fields of theoretical computer science and,
each year, the workshop focuses on a specific topic: ICE 2009 focused on
structured interactions meant as the class of synchronisations that go beyond
the "simple" point-to-point synchronisations (e.g., multicast or broadcast
synchronisations, even-notification based interactions, time dependent
interactions, distributed transactions,...).
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2009 23:55:44 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Bonchi",
"Filippo",
"",
"CWI, Netherland"
],
[
"Grohmann",
"Davide",
"",
"University of\n Udine, Italy"
],
[
"Spoletini",
"Paola",
"",
"University of Insubria - Como, Italy"
],
[
"Tuosto",
"Emilio",
"",
"University of Leicester, UK"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0912.0765
|
Jamshid Abouei
|
Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, and
Subbarayan Pasupathy
|
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor
Networks
|
submitted to IEEE Transactions on Wireless Communications (25 pages)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the first in-depth analysis on the energy efficiency of
LT codes with Non Coherent M-ary Frequency Shift Keying (NC-MFSK), known as
green modulation [1], in a proactive Wireless Sensor Network (WSN) over
Rayleigh flat-fading channels with path-loss. We describe the proactive system
model according to a pre-determined time-based process utilized in practical
sensor nodes. The present analysis is based on realistic parameters including
the effect of channel bandwidth used in the IEEE 802.15.4 standard, and the
active mode duration. A comprehensive analysis, supported by some simulation
studies on the probability mass function of the LT code rate and coding gain,
shows that among uncoded NC-MFSK and various classical channel coding schemes,
the optimized LT coded NC-MFSK is the most energy-efficient scheme for distance
$d$ greater than the pre-determined threshold level $d_T$, where the
optimization is performed over coding and modulation parameters. In addition,
although uncoded NC-MFSK outperforms coded schemes for $d < d_T$, the energy
gap between LT coded and uncoded NC-MFSK is negligible for $d < d_T$ compared
to the other coded schemes. These results come from the flexibility of the LT
code to adjust its rate to suit instantaneous channel conditions, and suggest
that LT codes are beneficial in practical low-power WSNs with dynamic position
sensor nodes.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 02:14:05 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Abouei",
"Jamshid",
""
],
[
"Brown",
"J. David",
""
],
[
"Plataniotis",
"Konstantinos N.",
""
],
[
"Pasupathy",
"Subbarayan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0779
|
Hartmut Neven
|
Hartmut Neven, Vasil S. Denchev, Geordie Rose, William G. Macready
|
Training a Large Scale Classifier with the Quantum Adiabatic Algorithm
|
14 pages, 5 figures
| null | null | null |
quant-ph cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a previous publication we proposed discrete global optimization as a
method to train a strong binary classifier constructed as a thresholded sum
over weak classifiers. Our motivation was to cast the training of a classifier
into a format amenable to solution by the quantum adiabatic algorithm. Applying
adiabatic quantum computing (AQC) promises to yield solutions that are superior
to those which can be achieved with classical heuristic solvers. Interestingly
we found that by using heuristic solvers to obtain approximate solutions we
could already gain an advantage over the standard method AdaBoost. In this
communication we generalize the baseline method to large scale classifier
training. By large scale we mean that either the cardinality of the dictionary
of candidate weak classifiers or the number of weak learners used in the strong
classifier exceed the number of variables that can be handled effectively in a
single global optimization. For such situations we propose an iterative and
piecewise approach in which a subset of weak classifiers is selected in each
iteration via global optimization. The strong classifier is then constructed by
concatenating the subsets of weak classifiers. We show in numerical studies
that the generalized method again successfully competes with AdaBoost. We also
provide theoretical arguments as to why the proposed optimization method, which
does not only minimize the empirical loss but also adds L0-norm regularization,
is superior to versions of boosting that only minimize the empirical loss. By
conducting a Quantum Monte Carlo simulation we gather evidence that the quantum
adiabatic algorithm is able to handle a generic training problem efficiently.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 06:30:27 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Neven",
"Hartmut",
""
],
[
"Denchev",
"Vasil S.",
""
],
[
"Rose",
"Geordie",
""
],
[
"Macready",
"William G.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0912.0797
|
Lorenzo Cappellari
|
Lorenzo Cappellari
|
On Syndrome Decoding for Slepian-Wolf Coding Based on Convolutional and
Turbo Codes
|
3 pages, 1 figure (2 graphic files arranged with subfigure); a note
was added; to appear on IEEE Comm. Letters
|
IEEE Comm. Letters, vol. 14, no. 6, pp. 554-556, Jun. 2010
|
10.1109/LCOMM.2010.06.100283
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In source coding, either with or without side information at the decoder, the
ultimate performance can be achieved by means of random binning. Structured
binning into cosets of performing channel codes has been successfully employed
in practical applications. In this letter it is formally shown that various
convolutional- and turbo-syndrome decoding algorithms proposed in literature
lead in fact to the same estimate. An equivalent implementation is also
delineated by directly tackling syndrome decoding as a maximum a posteriori
probability problem and solving it by means of iterative message-passing. This
solution takes advantage of the exact same structures and algorithms used by
the conventional channel decoder for the code according to which the syndrome
is formed.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 09:09:51 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 08:51:54 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Apr 2010 13:36:04 GMT"
}
] | 2010-08-03T00:00:00 |
[
[
"Cappellari",
"Lorenzo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0803
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Nicolae Tapus
|
New Algorithmic Approaches for Computing Optimal Network Paths with
Several Types of QoS Constraints
| null |
Proceedings of the 8th RoEduNet International Conference, pp.
7-12, Galati, Romania, 3-4 December, 2009. (ISBN: 978-606-8085-15-9)
| null | null |
cs.DS cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of efficiently delivering data within networks is very important
nowadays, especially in the context of the large volumes of data which are
being produced each year and of the increased data access needs of the users.
Efficient data delivery strategies must satisfy several types of Quality of
Service (QoS) constraints which are imposed by the data consumers. One
possibility of achieving this goal (particularly in the case of in-order data
transfers) is to choose a satisfactory network delivery path. In this paper we
present novel algorithmic approaches for computing optimal network paths which
satisfy several types of (QoS) constraints.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 09:53:40 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tapus",
"Nicolae",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0807
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Nicolae Tapus
|
Practical Algorithmic Techniques for Several String Processing Problems
| null |
Proceedings of the 8th RoEduNet International Conference, pp.
136-141, Galati, Romania, 3-4 December, 2009. (ISBN: 978-606-8085-15-9)
| null | null |
cs.DS cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The domains of data mining and knowledge discovery make use of large amounts
of textual data, which need to be handled efficiently. Specific problems, like
finding the maximum weight ordered common subset of a set of ordered sets or
searching for specific patterns within texts, occur frequently in this context.
In this paper we present several novel and practical algorithmic techniques for
processing textual data (strings) in order to efficiently solve multiple
problems. Our techniques make use of efficient string algorithms and data
structures, like KMP, suffix arrays, tries and deterministic finite automata.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 10:04:16 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tapus",
"Nicolae",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0912.0821
|
Filippo Petroni
|
Filippo Petroni and Maurizio Serva
|
Lexical evolution rates by automated stability measure
| null | null |
10.1088/1742-5468/2010/03/P03015
| null |
cs.CL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Phylogenetic trees can be reconstructed from the matrix which contains the
distances between all pairs of languages in a family. Recently, we proposed a
new method which uses normalized Levenshtein distances among words with same
meaning and averages on all the items of a given list. Decisions about the
number of items in the input lists for language comparison have been debated
since the beginning of glottochronology. The point is that words associated to
some of the meanings have a rapid lexical evolution. Therefore, a large
vocabulary comparison is only apparently more accurate then a smaller one since
many of the words do not carry any useful information. In principle, one should
find the optimal length of the input lists studying the stability of the
different items. In this paper we tackle the problem with an automated
methodology only based on our normalized Levenshtein distance. With this
approach, the program of an automated reconstruction of languages relationships
is completed.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 11:33:54 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2009 07:54:25 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Petroni",
"Filippo",
""
],
[
"Serva",
"Maurizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0912.0840
|
Benjamin Nguyen
|
Benjamin Nguyen, Antoine Vion, Francois-Xavier Dudouet, Loic
Saint-Ghislain
|
Applying an XML Warehouse to Social Network Analysis, Lessons from the
WebStand Project
|
W3C Workshop on the Future of Social Networking
|
W3C Workshop on the Future of Social Networking, electronic
proceedings available at http://www.w3.org/2008/09/msnws/ Barcelona, Spain,
2009
| null | null |
cs.DB cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the state of advancement of the French ANR WebStand
project. The objective of this project is to construct a customizable XML based
warehouse platform to acquire, transform, analyze, store, query and export data
from the web, in particular mailing lists, with the final intension of using
this data to perform sociological studies focused on social groups of World
Wide Web, with a specific emphasis on the temporal aspects of this data. We are
currently using this system to analyze the standardization process of the W3C,
through its social network of standard setters.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 13:04:44 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Nguyen",
"Benjamin",
""
],
[
"Vion",
"Antoine",
""
],
[
"Dudouet",
"Francois-Xavier",
""
],
[
"Saint-Ghislain",
"Loic",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0912.0850
|
Travis Gagie
|
Travis Gagie and Pawel Gawrychowski
|
Grammar-Based Compression in a Streaming Model
|
Section on recent work added, sketching how to improve bounds and
support random access
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that, given a string $s$ of length $n$, with constant memory and
logarithmic passes over a constant number of streams we can build a
context-free grammar that generates $s$ and only $s$ and whose size is within
an $\Oh{\min (g \log g, \sqrt{n \log g})}$-factor of the minimum $g$. This
stands in contrast to our previous result that, with polylogarithmic memory and
polylogarithmic passes over a single stream, we cannot build such a grammar
whose size is within any polynomial of $g$.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 13:17:22 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Jan 2010 20:33:55 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 20:05:17 GMT"
},
{
"version": "v4",
"created": "Sat, 6 Feb 2010 02:09:00 GMT"
}
] | 2010-02-06T00:00:00 |
[
[
"Gagie",
"Travis",
""
],
[
"Gawrychowski",
"Pawel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0868
|
Urs Niesen
|
Urs Niesen
|
Interference Alignment in Dense Wireless Networks
|
21 pages
|
IEEE Transactions on Information Theory, vol. 57, pp. 2889-2901,
May 2011
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider arbitrary dense wireless networks, in which $n$ nodes are placed
in an arbitrary (deterministic) manner on a square region of unit area and
communicate with each other over Gaussian fading channels. We provide inner and
outer bounds for the $n\times n$-dimensional unicast and the $n\times
2^n$-dimensional multicast capacity regions of such a wireless network. These
inner and outer bounds differ only by a factor $O(\log(n))$, yielding a fairly
tight scaling characterization of the entire regions. The communication schemes
achieving the inner bounds use interference alignment as a central technique
and are, at least conceptually, surprisingly simple.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 14:42:18 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Sep 2010 12:57:22 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Jan 2011 15:21:00 GMT"
}
] | 2011-08-09T00:00:00 |
[
[
"Niesen",
"Urs",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0878
|
Robert Brijder
|
Robert Brijder, Hendrik Jan Hoogeboom
|
Nullity Invariance for Pivot and the Interlace Polynomial
|
small revision of Section 8 w.r.t. v2, 14 pages, 6 figures
|
Linear Algebra and its Applications, v. 435, 277-288, 2011
|
10.1016/j.laa.2011.01.024
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the effect of principal pivot transform on the nullity values of
the principal submatrices of a given (square) matrix is described by the
symmetric difference operator (for sets). We consider its consequences for
graphs, and in particular generalize the recursive relation of the interlace
polynomial and simplify its proof.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 15:25:18 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2010 12:15:48 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Aug 2010 15:20:16 GMT"
}
] | 2014-03-26T00:00:00 |
[
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0912.0884
|
Filippo Petroni
|
Filippo Petroni and Maurizio Serva
|
Measures of lexical distance between languages
| null | null |
10.1016/j.physa.2010.02.004
| null |
cs.CL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The idea of measuring distance between languages seems to have its roots in
the work of the French explorer Dumont D'Urville \cite{Urv}. He collected
comparative words lists of various languages during his voyages aboard the
Astrolabe from 1826 to 1829 and, in his work about the geographical division of
the Pacific, he proposed a method to measure the degree of relation among
languages. The method used by modern glottochronology, developed by Morris
Swadesh in the 1950s, measures distances from the percentage of shared
cognates, which are words with a common historical origin. Recently, we
proposed a new automated method which uses normalized Levenshtein distance
among words with the same meaning and averages on the words contained in a
list. Recently another group of scholars \cite{Bak, Hol} proposed a refined of
our definition including a second normalization. In this paper we compare the
information content of our definition with the refined version in order to
decide which of the two can be applied with greater success to resolve
relationships among languages.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 15:53:24 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Dec 2009 07:38:55 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Dec 2009 11:27:47 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Petroni",
"Filippo",
""
],
[
"Serva",
"Maurizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0912.0893
|
Achmad Benny Mutiara
|
A.D.Astuti and A.B. Mutiara
|
Performance Analysis on Molecular Dynamics Simulation of Protein Using
GROMACS
|
8 pages, 4 figures
| null | null | null |
cs.CE q-bio.BM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Development of computer technology in chemistry, bring many application of
chemistry. Not only the application to visualize the structure of molecule but
also to molecular dynamics simulation. One of them is Gromacs. Gromacs is an
example of molecular dynamics application developed by Groningen University.
This application is a non-commercial and able to work in the operating system
Linux. The main ability of Gromacs is to perform molecular dynamics simulation
and minimization energy. In this paper, the author discusses about how to work
Gromacs in molecular dynamics simulation of some protein. In the molecular
dynamics simulation, Gromacs does not work alone. Gromacs interact with pymol
and Grace. Pymol is an application to visualize molecule structure and Grace is
an application in Linux to display graphs. Both applications will support
analysis of molecular dynamics simulation.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 16:47:24 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Astuti",
"A. D.",
""
],
[
"Mutiara",
"A. B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
}
] |
0912.0898
|
Benjamin Nguyen
|
Pablo Andres Diaz, Francois-Xavier Dudouet, Jean-Christophe Graz,
Benjamin Nguyen, Antoine Vion
|
Gouverner la standardisation par les changements d'arene. Le cas du XML
|
Communication in the Economy of Politics and Politics of Economy
session of the French Political Sciences Association Congress (AFSP),
Grenoble, France 2009
|
Congres de l'Association Francaise de Sciences Politiques,
Grenoble, France, 2009
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we discuss the available approches of the new governance
structures of standardization, in order to propose new hypothesis on the way
computer sciences languages are dealt with. We consider the example of the XML
language and its applications in order to propose a dynamic analysis of this
governance, focusing on the coordination that is done by companies, and the
strategic usage they have of these arenas to further their goals. We advocate
the development of more of such empirical analysis in order to cover all the
perspectives of possible international policies in this area.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 17:01:52 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Diaz",
"Pablo Andres",
""
],
[
"Dudouet",
"Francois-Xavier",
""
],
[
"Graz",
"Jean-Christophe",
""
],
[
"Nguyen",
"Benjamin",
""
],
[
"Vion",
"Antoine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0912.0913
|
Rdv Ijcsis
|
Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe
Mangioni
|
Search for overlapped communities by parallel genetic algorithms
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 113-118, November 2009, USA
| null |
ISSN 1947 5500
|
cs.IR cs.GL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last decade the broad scope of complex networks has led to a rapid
progress. In this area a particular interest has the study of community
structures. The analysis of this type of structure requires the formalization
of the intuitive concept of community and the definition of indices of goodness
for the obtained results. A lot of algorithms has been presented to reach this
goal. In particular, an interesting problem is the search of overlapped
communities and it is field seems very interesting a solution based on the use
of genetic algorithms. The approach discusses in this paper is based on a
parallel implementation of a genetic algorithm and shows the performance
benefits of this solution.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:54:07 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Dec 2009 11:09:29 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Carchiolo",
"Vincenza",
""
],
[
"Longheu",
"Alessandro",
""
],
[
"Malgeri",
"Michele",
""
],
[
"Mangioni",
"Giuseppe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0912.0921
|
Bryan Ford
|
Janardhan Iyengar (Franklin and Marshall College), Bryan Ford (Yale
University)
|
Flow Splitting with Fate Sharing in a Next Generation Transport Services
Architecture
|
12 pages, 11 figures, 1 table
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The challenges of optimizing end-to-end performance over diverse Internet
paths has driven widespread adoption of in-path optimizers, which can
destructively interfere with TCP's end-to-end semantics and with each other,
and are incompatible with end-to-end IPsec. We identify the architectural cause
of these conflicts and resolve them in Tng, an experimental next-generation
transport services architecture, by factoring congestion control from
end-to-end semantic functions. Through a technique we call "queue sharing", Tng
enables in-path devices to interpose on, split, and optimize congestion
controlled flows without affecting or seeing the end-to-end content riding
these flows. Simulations show that Tng's decoupling cleanly addresses several
common performance problems, such as communication over lossy wireless links
and reduction of buffering-induced latency on residential links. A working
prototype and several incremental deployment paths suggest Tng's practicality.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 19:36:43 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Iyengar",
"Janardhan",
"",
"Franklin and Marshall College"
],
[
"Ford",
"Bryan",
"",
"Yale\n University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0926
|
Bryan Ford
|
Amittai Aviram and Bryan Ford (Yale University)
|
Deterministic Consistency: A Programming Model for Shared Memory
Parallelism
|
7 pages, 3 figures
| null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The difficulty of developing reliable parallel software is generating
interest in deterministic environments, where a given program and input can
yield only one possible result. Languages or type systems can enforce
determinism in new code, and runtime systems can impose synthetic schedules on
legacy parallel code. To parallelize existing serial code, however, we would
like a programming model that is naturally deterministic without language
restrictions or artificial scheduling. We propose "deterministic consistency",
a parallel programming model as easy to understand as the "parallel assignment"
construct in sequential languages such as Perl and JavaScript, where concurrent
threads always read their inputs before writing shared outputs. DC supports
common data- and task-parallel synchronization abstractions such as fork/join
and barriers, as well as non-hierarchical structures such as producer/consumer
pipelines and futures. A preliminary prototype suggests that software-only
implementations of DC can run applications written for popular parallel
environments such as OpenMP with low (<10%) overhead for some applications.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:10:12 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Feb 2010 16:27:48 GMT"
}
] | 2010-02-01T00:00:00 |
[
[
"Aviram",
"Amittai",
"",
"Yale University"
],
[
"Ford",
"Bryan",
"",
"Yale University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0912.0928
|
Turlough Neary
|
Turlough Neary
|
On the computational complexity of spiking neural P systems
| null | null | null | null |
cs.CC q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown that there is no standard spiking neural P system that simulates
Turing machines with less than exponential time and space overheads. The
spiking neural P systems considered here have a constant number of neurons that
is independent of the input length. Following this we construct a universal
spiking neural P system with exhaustive use of rules that simulates Turing
machines in linear time and has only 10 neurons.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:15:28 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Neary",
"Turlough",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0912.0930
|
Rdv Ijcsis
|
C. Kalyana Chakravarthy, P.V.G.D. Prasad Reddy
|
Modified Opportunistic Deficit Round Robin Scheduling for improved QOS
in IEEE 802.16 WBA networks
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 075-081, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Packet and flow scheduling algorithms for WiMAX has been a topic of interest
for a long time since the very inception of WiMAX networks. WiMAX offers
advantages particularly in terms of Quality of service it offers over a longer
range at the MAC level. In our work, we propose two credit based scheduling
schemes one in which completed flows distributes the left over credits equally
to all higher priority uncompleted flows(ODRREDC) and another in which
completed flows give away all the excess credits to the highest priority
uncompleted flow(ODRRSDC). Both the schemes are compatible with 802.16 MAC
protocol and can efficiently serve real time bursty traffic with reduced
latency and hence improved QOS for real time flows. We compare the two proposed
schemes for their latency, bandwidth utilization and throughput for real time
burst flows with the opportunity based Deficit Round Robin scheduling scheme.
While the ODRR scheduler focuses on reducing the credits for the flows with
errors, our approach also distributes these remaining credits together with the
credits from completed flows equally among the higher priority uncompleted
flows or totally to the highest priority uncompleted flow.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:20:54 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Chakravarthy",
"C. Kalyana",
""
],
[
"Reddy",
"P. V. G. D. Prasad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0931
|
Bart Jacobs
|
Bart Jacobs
|
Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories
| null |
Logical Methods in Computer Science, Volume 6, Issue 2 (June 18,
2010) lmcs:1083
|
10.2168/LMCS-6(2:1)2010
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is a sequel to arXiv:0902.2355 and continues the study of quantum
logic via dagger kernel categories. It develops the relation between these
categories and both orthomodular lattices and Foulis semigroups. The relation
between the latter two notions has been uncovered in the 1960s. The current
categorical perspective gives a broader context and reconstructs this
relationship between orthomodular lattices and Foulis semigroups as special
instance.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:36:49 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jun 2010 08:39:53 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Jun 2010 11:53:26 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Jacobs",
"Bart",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0912.0932
|
Rdv Ijcsis
|
Yasser .H. Elawady, A.S. Tolba
|
Educational Objectives Of Different Laboratory Types: A Comparative
Study
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 089-096, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Laboratory based courses play a critical role in scientific education.
Automation is changing the nature of the laboratories, and there is a long
running debate about the value of hands on versus simulated and remote
laboratories. The remote lab technology has brought a significant improvement
in communication within the Academic community and has improved students
learning experiences. There are different educational objectives as criteria
for judging the laboratories: Hands on advocates emphasize design skills, while
remote lab advocates focus on conceptual understanding. Remote laboratories
offer all the advantages of the new technology, but are often a poor
replacement for real laboratory work. Remote laboratories are similar to
simulation techniques in that they require minimal space and time, because the
experiments can be rapidly configured and run over the Internet [Web]. But
unlike simulations, they provide real data. This paper presents a comparative
analysis for the educational objectives of the three laboratory techniques,
hands on, simulated, and remote laboratories. In addition, it proposes
enhancements for the remote lab activities leading to improving its
performance.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 20:32:19 GMT"
}
] | 2009-12-07T00:00:00 |
[
[
"Elawady",
"Yasser . H.",
""
],
[
"Tolba",
"A. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0912.0936
|
Haroldo Campos Velho
|
F. F. Paes, H. F. Campos Velho
|
Neural-estimator for the surface emission rate of atmospheric gases
| null | null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The emission rate of minority atmospheric gases is inferred by a new approach
based on neural networks. The neural network applied is the multi-layer
perceptron with backpropagation algorithm for learning. The identification of
these surface fluxes is an inverse problem. A comparison between the new
neural-inversion and regularized inverse solution id performed. The results
obtained from the neural networks are significantly better. In addition, the
inversion with the neural netwroks is fster than regularized approaches, after
training.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:33:10 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Paes",
"F. F.",
""
],
[
"Velho",
"H. F. Campos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0912.0942
|
Rdv Ijcsis
|
Farnaz Towhidi, Maslin Masrom
|
A Survey on Recognition Based Graphical User Authentication Algorithms
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 119-127, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, user authentication is one of the important topics in information
security. Strong textbased password schemes could provide with certain degree
of security. However, the fact that strong passwords are difficult to memorize
often leads their owners to write them down on papers or even save them in a
computer file. Graphical authentication has been proposed as a possible
alternative solution to textbased authentication, motivated particularly by the
fact that humans can remember images better than text. In recent years, many
networks, computer systems and Internet based environments try used graphical
authentication technique for their users authentication. All of graphical
passwords have two different aspects which are usability and security.
Unfortunately none of these algorithms were being able to cover both of these
aspects at the same time. In this paper, we described eight recognition based
authentication algorithms in terms of their drawbacks and attacks. In the next
section, the usability standards from ISO and the related attributes for
graphical user authentication usability are discussed. The related attack
patterns for graphical user authentication security part are also discussed.
Finally, a comparison table of all recognition based algorithms is presented
based on ISO and attack patterns standards.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:02:26 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Towhidi",
"Farnaz",
""
],
[
"Masrom",
"Maslin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0946
|
Rdv Ijcsis
|
Md. Zahid Hasan, Mohammad Reaz Hossain, Md. Ashraful Islam, Riaz
Hossain
|
Comparative Study of Different Guard Time Intervals to Improve the BER
Performance of Wimax Systems to Minimize the Effects of ISI and ICI under
Adaptive Modulation Techniques over SUI1 and AWGN Communication Channels
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 128-132, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The WIMAX technology based on air interface standard 802.16 wireless MAN is
configured in the same way as a traditional cellular network with base stations
using point to multipoint architecture to drive a service over a radius up to
several kilometers. The range and the Non Line of Sight (NLOS) ability of WIMAX
make the system very attractive for users, but there will be slightly higher
BER at low SNR. The aim of this paper is the comparative study of different
guard time intervals effect for improving BER at different SNR under digital
modulation (QPSK, 16QAM and 64QAM) techniques and different communication
channels AWGN and fading channels Stanford University Interim (SUI 1) of an
WIMAX system. The comparison between these effects with Reed-Solomon (RS)
encoder with Convolutional encoder (half) rated codes in FEC channel coding
will be investigated. The simulation results of estimated Bit Error Rate (BER)
displays that the implementation of interleaved RS code (255,239,8) with (half)
rated Convolutional code of 0.25 guard time intervals under QPSK modulation
technique over AWGN channel is highly effective to combat in the Wimax
communication system. To complete this performance analysis in Wimax based
systems, a segment of audio signal is used for analysis. The transmitted audio
message is found to have retrieved effectively under noisy situation.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:07:38 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Hasan",
"Md. Zahid",
""
],
[
"Hossain",
"Mohammad Reaz",
""
],
[
"Islam",
"Md. Ashraful",
""
],
[
"Hossain",
"Riaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0947
|
Rdv Ijcsis
|
Samir B. Patel, Shrikant N. Pradhan, Saumitra U. Ambegaokar
|
A novel approach for implementing Steganography with computing power
obtained by combining Cuda and Matlab
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 133-137, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the current development of multiprocessor systems, strive for computing
data on such processor have also increased exponentially. If the multi core
processors are not fully utilized, then even though we have the computing power
the speed is not available to the end users for their respective applications.
In accordance to this, the users or application designers also have to design
newer applications taking care of the computing infrastructure available
within. Our approach is to use the CUDA (Compute Unified Device Architecture)
as backend and MATLAB as the front end to design an application for
implementing steganography. Steganography is the term used for hiding
information in the cover object like Image, Audio or Video data. As the
computing required for multimedia data is much more than the text information,
we have been successful in implementing image Steganography with the help of
technology for the next generation.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:12:22 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Patel",
"Samir B.",
""
],
[
"Pradhan",
"Shrikant N.",
""
],
[
"Ambegaokar",
"Saumitra U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0950
|
Rdv Ijcsis
|
B N Lavanya, K B Raja and K R Venugopal
|
Fingerprint Verification based on Gabor Filter Enhancement
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 138-144, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human fingerprints are reliable characteristics for personnel identification
as it is unique and persistence. A fingerprint pattern consists of ridges,
valleys and minutiae. In this paper we propose Fingerprint Verification based
on Gabor Filter Enhancement (FVGFE) algorithm for minutiae feature extraction
and post processing based on 9 pixel neighborhood. A global feature extraction
and fingerprints enhancement are based on Hong enhancement method which is
simultaneously able to extract local ridge orientation and ridge frequency. It
is observed that the Sensitivity and Specificity values are better compared to
the existing algorithms.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:17:20 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Lavanya",
"B N",
""
],
[
"Raja",
"K B",
""
],
[
"Venugopal",
"K R",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0951
|
Rdv Ijcsis
|
Arash Habibi Lashkari, Samaneh Farmand, Dr. Omar Bin Zakaria, Dr.
Rosli Saleh
|
Shoulder Surfing attack in graphical password authentication
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 145-154, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information and computer security is supported largely by passwords which are
the principle part of the authentication process. The most common computer
authentication method is to use alphanumerical username and password which has
significant drawbacks. To overcome the vulnerabilities of traditional methods,
visual or graphical password schemes have been developed as possible
alternative solutions to text based scheme. A potential drawback of graphical
password schemes is that they are more vulnerable to shoulder surfing than
conventional alphanumeric text passwords. When users input their passwords in a
public place, they may be at risk of attackers stealing their password. An
attacker can capture a password by direct observation or by recording the
individuals authentication session. This is referred to as shouldersurfing and
is a known risk, of special concern when authenticating in public places. In
this paper we will present a survey on graphical password schemes from 2005
till 2009 which are proposed to be resistant against shoulder surfing attacks.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:24:18 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Lashkari",
"Arash Habibi",
""
],
[
"Farmand",
"Samaneh",
""
],
[
"Zakaria",
"Dr. Omar Bin",
""
],
[
"Saleh",
"Dr. Rosli",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0954
|
Rdv Ijcsis
|
Samir B. Patel and Shrikant N. Pradhan
|
An approach to secure highly confidential documents of any size in the
corporate or institutes having unsecured networks
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 155-163, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the tremendous amount of computing because of the wide usage of internet
it is observed that some user(s) are not able to manage their desktop with
antivirus software properly installed. It is happening few times, that we allow
our friends, students and colleagues to sit on our networked PC. Sometimes the
user is unaware of the situation that there workstations are unsecured and so
some one else could also be monitoring your flow of information and your most
important data could go haywire, resulting into leakage of most confidential
data to unwanted or malicious user(s). Example of some such documents could be
question papers designed by the faculty member by various universities. Now a
day most of the universities are having the biggest threat about the question
papers and many other confidential documents designed by their faculty members.
We in this paper present the solution to over come such a situation using the
concept of Steganography. Steganography is a technique through which one can
hide information into some cover object. This technique, if used, in positive
direction could be of great help to solve such a problem and even other.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:46:32 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Patel",
"Samir B.",
""
],
[
"Pradhan",
"Shrikant N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0955
|
Rdv Ijcsis
|
Nazmeen Bibi Boodoo, and R. K. Subramanian
|
Robust Multi biometric Recognition Using Face and Ear Images
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 164-169, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study investigates the use of ear as a biometric for authentication and
shows experimental results obtained on a newly created dataset of 420 images.
Images are passed to a quality module in order to reduce False Rejection Rate.
The Principal Component Analysis (eigen ear) approach was used, obtaining 90.7
percent recognition rate. Improvement in recognition results is obtained when
ear biometric is fused with face biometric. The fusion is done at decision
level, achieving a recognition rate of 96 percent.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:51:03 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Boodoo",
"Nazmeen Bibi",
""
],
[
"Subramanian",
"R. K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0912.0956
|
Rdv Ijcsis
|
Rashid Sheikh, and Beerendra Kumar, Durgesh Kumar Mishra
|
Privacy Preserving k Secure Sum Protocol
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 184-188, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure Multiparty Computation (SMC) allows parties to know the result of
cooperative computation while preserving privacy of individual data. Secure sum
computation is an important application of SMC. In our proposed protocols
parties are allowed to compute the sum while keeping their individual data
secret with increased computation complexity for hacking individual data. In
this paper the data of individual party is broken into a fixed number of
segments. For increasing the complexity we have used the randomization
technique with segmentation
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 21:54:51 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Sheikh",
"Rashid",
""
],
[
"Kumar",
"Beerendra",
""
],
[
"Mishra",
"Durgesh Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0912.0962
|
Ramya Bhagavatula
|
Ramya Bhagavatula and Robert W. Heath Jr.
|
Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in
Cooperative Multicell Systems
|
28 pages, submitted to IEEE Transactions on Signal Processing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Base station cooperation improves the sum-rates that can be achieved in
cellular systems. Conventional cooperation techniques require sharing large
amounts of information over finite-capacity backhaul links and assume that base
stations have full channel state information (CSI) of all the active users in
the system. In this paper, a new limited feedback strategy is proposed for
multicell beamforming where cooperation is restricted to sharing only the CSI
of active users among base stations. The system setup considered is a linear
array of cells based on the Wyner model. Each cell contains single-antenna
users and multi-antenna base stations. Closed-form expressions for the
beamforming vectors that approximately maximize the sum-rates in a multicell
system are first presented, assuming full CSI at the transmitter. For the more
practical case of a finite-bandwidth feedback link, CSI of the desired and
interfering channels is quantized at the receiver before being fed back to the
base station. An upper bound on the mean loss in sum rate due to random vector
quantization is derived. A new feedback-bit allocation strategy, to partition
the available bits between the desired and interfering channels, is developed
to approximately minimize the mean loss in sum-rate due to quantization. The
proposed feedback-bit partitioning algorithm is shown, using simulations, to
yield sum-rates close to the those obtained using full CSI at base stations.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2009 23:57:32 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Bhagavatula",
"Ramya",
""
],
[
"Heath",
"Robert W.",
"Jr."
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0965
|
Adam Smith
|
Venkatesan Guruswami and Adam Smith
|
Explicit Capacity-achieving Codes for Worst-Case Additive Errors
|
This preprint has been withdrawn since it is superseded by
arXiv:1004.4017 [cs.IT] (same authors), which contains significantly more
general results. This preprint will no longer be updated by the authors.
| null | null | null |
cs.IT cs.CC math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For every p in (0,1/2), we give an explicit construction of binary codes of
rate approaching "capacity" 1-H(p) that enable reliable communication in the
presence of worst-case additive errors}, caused by a channel oblivious to the
codeword (but not necessarily the message). Formally, we give an efficient
"stochastic" encoding E(\cdot,\cdot) of messages combined with a small number
of auxiliary random bits, such that for every message m and every error vector
e (that could depend on m) that contains at most a fraction p of ones, w.h.p
over the random bits r chosen by the encoder, m can be efficiently recovered
from the corrupted codeword E(m,r) + e by a decoder without knowledge of the
encoder's randomness r.
Our construction for additive errors also yields explicit deterministic codes
of rate approaching 1-H(p) for the "average error" criterion: for every error
vector e of at most p fraction 1's, most messages m can be efficiently
(uniquely) decoded from the corrupted codeword C(m)+e. Note that such codes
cannot be linear, as the bad error patterns for all messages are the same in a
linear code. We also give a new proof of the existence of such codes based on
list decoding and certain algebraic manipulation detection codes. Our proof is
simpler than the previous proofs from the literature on arbitrarily varying
channels.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 00:31:48 GMT"
},
{
"version": "v2",
"created": "Sat, 1 May 2010 03:04:23 GMT"
}
] | 2010-05-04T00:00:00 |
[
[
"Guruswami",
"Venkatesan",
""
],
[
"Smith",
"Adam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.0970
|
Victor Bushkov
|
Victor Bushkov, Nina Yevtushenko, Tiziano Villa
|
Discussion on Supervisory Control by Solving Automata Equation
|
4 pages
|
IEEE Proc. EWDTS'09 (2009) 77-80
| null | null |
cs.OH math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider the supervisory control problem through language
equation solving. The equation solving approach allows to deal with more
general topologies and to find a largest supervisor which can be used as a
reservoir for deriving an optimal controller. We introduce the notions of
solutions under partial controllability and partial observability, and we show
how supervisory control problems with partial controllability and partial
observability can be solved by employing equation solving methods.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 01:56:41 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Bushkov",
"Victor",
""
],
[
"Yevtushenko",
"Nina",
""
],
[
"Villa",
"Tiziano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0912.0975
|
Julian McAuley
|
Julian J. McAuley, Tib\'erio S. Caetano
|
An expected-case sub-cubic solution to the all-pairs shortest path
problem in R
|
9 pages, 5 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It has been shown by Alon et al. that the so-called 'all-pairs shortest-path'
problem can be solved in O((MV)^2.688 * log^3(V)) for graphs with V vertices,
with integer distances bounded by M. We solve the more general problem for
graphs in R (assuming no negative cycles), with expected-case running time
O(V^2.5 * log(V)). While our result appears to violate the Omega(V^3)
requirement of "Funny Matrix Multiplication" (due to Kerr), we find that it has
a sub-cubic expected time solution subject to reasonable conditions on the data
distribution. The expected time solution arises when certain sub-problems are
uncorrelated, though we can do better/worse than the expected-case under
positive/negative correlation (respectively). Whether we observe
positive/negative correlation depends on the statistics of the graph in
question. In practice, our algorithm is significantly faster than
Floyd-Warshall, even for dense graphs.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 03:31:07 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"McAuley",
"Julian J.",
""
],
[
"Caetano",
"Tibério S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.0982
|
Rdv Ijcsis
|
G. Singaravel, Dr. V. Palanisamy, Dr. A. Krishnan
|
Ethics Understanding of Software Professional In Risk Reducing
Reusability Coding Using Inclusion Set Theory
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 189-193, November 2009, USA
| null |
ISSN 1947 5500
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The technical skill or ability of an individual is different to person in
software developments of projects. So, it is necessary to identify the talent
and attitude of an individual contribution can be uniformly distributed to the
different phases of software development cycle. The line of code analysis
metrics to understanding the various skills of the programmers in code
development. By using the inclusion set theory of n (AUB) refer to strength and
risk free code developed from union of software professionals and system must
comprise of achievement of the system goal, effective memory utilization and
intime delivery of the product.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 05:49:57 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Singaravel",
"G.",
""
],
[
"Palanisamy",
"Dr. V.",
""
],
[
"Krishnan",
"Dr. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0912.0983
|
Rdv Ijcsis
|
Lena Khaled
|
Architectural Design Activities for JAS
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 194-198, November 2009, USA
| null |
ISSN 1947 5500
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The critical part for building any software system is its architecture.
Architectural design is a design at a higher level of abstraction. A good
architecture ensures that software will satisfy its requirement. This paper
defines the most important activities of architectural design that used through
building any software; also it applies these activities on one type of
Electronic Commerce (EC) applications that is Job Agency System(JAS) to show
how these activities can work through these types of applications.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 05:52:20 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Khaled",
"Lena",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0912.0984
|
Rdv Ijcsis
|
A. Sabari, K. Duraiswamy,
|
Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc
Networks
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 199-207, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multicasting is effective when its group members are sparse and the speed is
low. On the other hand, broadcasting is effective when the group members dense
and the speed are high. Since mobile ad hoc networks are highly dynamic in
nature, either of the above two strategies can be adopted at different
scenarios. In this paper, we propose an ant agent based adaptive, multicast
protocol that exploits group members desire to simplify multicast routing and
invoke broadcast operations in appropriate localized regimes. By reducing the
number of group members that participate in the construction of the multicast
structure and by providing robustness to mobility by performing broadcasts in
densely clustered local regions, the proposed protocol achieves packet delivery
statistics that are comparable to that with a pure multicast protocol but with
significantly lower overheads. By our simulation results, we show that our
proposed protocol achieves increased Packet Delivery Fraction (PDF) with
reduced overhead and routing load.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 05:55:16 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Sabari",
"A.",
""
],
[
"Duraiswamy",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0985
|
Rdv Ijcsis
|
Ehsan Hosseini, Mohammad Ali Nematbakhsh
|
A New Approach to Cold Start in Peer to Peer File Sharing Networks
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 208-214, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Solving free riding and selecting a reliable service provider in P2P networks
has been separately investigated in last few years. Using trust has shown to be
one of the best ways of solving these problems. But using this approach to
simultaneously deal with both problems makes it impossible for newcomers to
join the network and the expansion of network is prevented. In this paper we
used the game theory to model the behavior of peers and developed a mechanism
in which free riding and providing bad service are dominated strategies for
peers. At the same time newcomers can participate and are encouraged to be
active in the network. The proposed model has been simulated and the results
showed that the trust value of free riders and bad service providers converge
to a finite value and trust of peers who provide good service is monotonically
increased despite the time they join the network.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 05:57:51 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Hosseini",
"Ehsan",
""
],
[
"Nematbakhsh",
"Mohammad Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.0986
|
Rdv Ijcsis
|
Mutasem Khalil Sari Alsmadi, Khairuddin Bin Omar, Shahrul Azman Noah
and Ibrahim Almarashdah
|
Fish recognition based on the combination between robust feature
selection, image segmentation and geometrical parameter techniques using
Artificial Neural Network and Decision Tree
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 215-221, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We presents in this paper a novel fish classification methodology based on a
combination between robust feature selection, image segmentation and
geometrical parameter techniques using Artificial Neural Network and Decision
Tree. Unlike existing works for fish classification, which propose descriptors
and do not analyze their individual impacts in the whole classification task
and do not make the combination between the feature selection, image
segmentation and geometrical parameter, we propose a general set of features
extraction using robust feature selection, image segmentation and geometrical
parameter and their correspondent weights that should be used as a priori
information by the classifier. In this sense, instead of studying techniques
for improving the classifiers structure itself, we consider it as a black box
and focus our research in the determination of which input information must
bring a robust fish discrimination.The main contribution of this paper is
enhancement recognize and classify fishes based on digital image and To develop
and implement a novel fish recognition prototype using global feature
extraction, image segmentation and geometrical parameters, it have the ability
to Categorize the given fish into its cluster and Categorize the clustered fish
into poison or non-poison fish, and categorizes the non-poison fish into its
family .
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 06:04:03 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Alsmadi",
"Mutasem Khalil Sari",
""
],
[
"Omar",
"Khairuddin Bin",
""
],
[
"Noah",
"Shahrul Azman",
""
],
[
"Almarashdah",
"Ibrahim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0912.1004
|
Rdv Ijcsis
|
Shakeel Ahmad, Adli Mustafa, Bashir Ahmad, Arjamand Bano,
Al-Sammarraie Hosam
|
Comparative Study Of Congestion Control Techniques In High Speed
Networks
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 222-231, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Congestion in network occurs due to exceed in aggregate demand as compared to
the accessible capacity of the resources. Network congestion will increase as
network speed increases and new effective congestion control methods are
needed, especially to handle bursty traffic of todays very high speed networks.
Since late 90s numerous schemes i.e. [1]...[10] etc. have been proposed. This
paper concentrates on comparative study of the different congestion control
schemes based on some key performance metrics. An effort has been made to judge
the performance of Maximum Entropy (ME) based solution for a steady state
GE/GE/1/N censored queues with partial buffer sharing scheme against these key
performance metrics.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:28:55 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Ahmad",
"Shakeel",
""
],
[
"Mustafa",
"Adli",
""
],
[
"Ahmad",
"Bashir",
""
],
[
"Bano",
"Arjamand",
""
],
[
"Hosam",
"Al-Sammarraie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.1005
|
Rdv Ijcsis
|
Dr. G. Padmavathi, Dr. P. Subashini, Mr. M. Muthu Kumar and Suresh
Kumar Thakur
|
Performance analysis of Non Linear Filtering Algorithms for underwater
images
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 232-238, November 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image filtering algorithms are applied on images to remove the different
types of noise that are either present in the image during capturing or
injected in to the image during transmission. Underwater images when captured
usually have Gaussian noise, speckle noise and salt and pepper noise. In this
work, five different image filtering algorithms are compared for the three
different noise types. The performances of the filters are compared using the
Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). The modified
spatial median filter gives desirable results in terms of the above two
parameters for the three different noise. Forty underwater images are taken for
study.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:33:09 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Padmavathi",
"Dr. G.",
""
],
[
"Subashini",
"Dr. P.",
""
],
[
"Kumar",
"Mr. M. Muthu",
""
],
[
"Thakur",
"Suresh Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0912.1007
|
Rdv Ijcsis
|
Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, Abedin Vahedian, Hamed
Modaghegh
|
Designing Kernel Scheme for Classifiers Fusion
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 239-248, November 2009, USA
| null |
ISSN 1947 5500
|
cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a special fusion method for combining ensembles of
base classifiers utilizing new neural networks in order to improve overall
efficiency of classification. While ensembles are designed such that each
classifier is trained independently while the decision fusion is performed as a
final procedure, in this method, we would be interested in making the fusion
process more adaptive and efficient. This new combiner, called Neural Network
Kernel Least Mean Square1, attempts to fuse outputs of the ensembles of
classifiers. The proposed Neural Network has some special properties such as
Kernel abilities,Least Mean Square features, easy learning over variants of
patterns and traditional neuron capabilities. Neural Network Kernel Least Mean
Square is a special neuron which is trained with Kernel Least Mean Square
properties. This new neuron is used as a classifiers combiner to fuse outputs
of base neural network classifiers. Performance of this method is analyzed and
compared with other fusion methods. The analysis represents higher performance
of our new method as opposed to others.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:41:40 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Haghighi",
"Mehdi Salkhordeh",
""
],
[
"Yazdi",
"Hadi Sadoghi",
""
],
[
"Vahedian",
"Abedin",
""
],
[
"Modaghegh",
"Hamed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0912.1008
|
Rdv Ijcsis
|
Rajni Ranjan Singh, and Deepak Singh Tomar
|
Approaches for user profile Investigation in Orkut Social Network
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 259-268, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet becomes a large and rich repository of information about us as
individually. Any thing form user profile information to friends links the user
subscribes to are reflection of social interactions as user has in real worlds.
Social networking has created new ways to communicate and share information.
Social networking websites are being used regularly by millions of people, and
it now seems that social networking will be an enduring part of everyday life.
Social networks such as Orkut, Bebo, MySpace, Flickr, Facebook, Friendster and
LinkedIn, have attracted millions of internet user who are involved in bogging,
participatory book reviewing, personal networking and photo sharing. Social
network services are increasingly being used in legal and criminal
investigations. Information posted on sites such as Orkut and Facebook has been
used by police, probation, and university officials to prosecute users of said
sites. In some situations, content posted on web social network has been used
in court. In the proposed work degree of closeness is identified by link weight
approaches and information matrices are generated and matched on the basis of
similarity in user profile information. The proposed technique is useful to
investigate a user profile and calculate closeness or interaction between
users.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:49:53 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Singh",
"Rajni Ranjan",
""
],
[
"Tomar",
"Deepak Singh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0912.1009
|
Rdv Ijcsis
|
V.K.Panchal, Parminder Singh, Navdeep Kaur, Harish Kundra
|
Biogeography based Satellite Image Classification
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 269-274, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Biogeography is the study of the geographical distribution of biological
organisms. The mindset of the engineer is that we can learn from nature.
Biogeography Based Optimization is a burgeoning nature inspired technique to
find the optimal solution of the problem. Satellite image classification is an
important task because it is the only way we can know about the land cover map
of inaccessible areas. Though satellite images have been classified in past by
using various techniques, the researchers are always finding alternative
strategies for satellite image classification so that they may be prepared to
select the most appropriate technique for the feature extraction task in hand.
This paper is focused on classification of the satellite image of a particular
land cover using the theory of Biogeography based Optimization. The original
BBO algorithm does not have the inbuilt property of clustering which is
required during image classification. Hence modifications have been proposed to
the original algorithm and the modified algorithm is used to classify the
satellite image of a given region. The results indicate that highly accurate
land cover features can be extracted effectively when the proposed algorithm is
used.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:54:24 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Panchal",
"V. K.",
""
],
[
"Singh",
"Parminder",
""
],
[
"Kaur",
"Navdeep",
""
],
[
"Kundra",
"Harish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0912.1010
|
Rdv Ijcsis
|
Mohd Shahizan Othman, Lizawati Mi Yusuf, Juhana Salim
|
Web Document Analysis for Companies Listed in Bursa Malaysia
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 275-280, November 2009, USA
| null |
ISSN 1947 5500
|
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses a research on web document analysis for companies listed
on Bursa Malaysia which is the forerunner of financial and investment center in
Malaysia. Data set used in this research are from the company web documents
listed in the Main Board and Second Board on Bursa Malaysia. This research has
used the Web Resources Extraction System which was developed by the research
group mainly to extract information for the web documents involved. Our
research findings have shown that the level of website usage among the
companies on Bursa Malaysia is still minimal. Furthermore, research has also
found that 60.02 percent of the image files are utilized making it the most
used type of file in creating websites.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 12:58:43 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Othman",
"Mohd Shahizan",
""
],
[
"Yusuf",
"Lizawati Mi",
""
],
[
"Salim",
"Juhana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0912.1011
|
Rdv Ijcsis
|
R. Ashok Kumar, K. Ganesan
|
A Reliable Replication Strategy for VoD System using Markov Chain
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 281-290, November 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we have investigated on the reliability of streams for a VoD
system. The objective of the paper is to maximize the availability of streams
for the peers in the VoD system. We have achieved this by using data
replication technique in the peers. Hence, we proposed a new data replication
technique to optimally store the videos in the peers. The new data replication
technique generates more number of replicas than the existing techniques such
as random, minimum request and maximize hit. We have also investigated by
applying the CTMC model for the reliability of replications during the peer
failures. Our result shows that the mean lifetime of replicas are more under
various circumstances. We have addressed the practical issues of efficient
utilization of overall bandwidth and buffer in the VoD system. We achieved
greater success playback probability of videos than the existing techniques.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:03:17 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Kumar",
"R. Ashok",
""
],
[
"Ganesan",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.1013
|
Rdv Ijcsis
|
Prof P. Harini, Dr. O.B.V.Ramanaiah
|
An Efficient Admission Control Algorithm for Load Balancing In
Hierarchical Mobile IPv6 Networks
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 291-296, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In hierarchical Mobile IPv6 networks, Mobility Anchor Point (MAP) may become
a single point of bottleneck as it handles more and more mobile nodes (MNs). A
number of schemes have been proposed to achieve load balancing among different
MAPs. However, signaling reduction is still imperfect because these schemes
also avoid the effect of the number of CNs. Also only the balancing of MN is
performed, but not the balancing of the actual traffic load, since CN of each
MN may be different. This paper proposes an efficient admission control
algorithm along with a replacement mechanism for HMIPv6 networks. The admission
control algorithm is based on the number of serving CNs and achieves actual
load balancing among MAPs. Moreover, a replacement mechanism is introduced to
decrease the new MN blocking probability and the handoff MN dropping
probability. By simulation results, we show that, the handoff delay and packet
loss are reduced in our scheme, when compared with the standard HMIPv6 based
handoff.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:11:20 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Harini",
"Prof P.",
""
],
[
"Ramanaiah",
"Dr. O. B. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.1014
|
Rdv Ijcsis
|
Shailendra Singh, Sanjay Silakari
|
An ensemble approach for feature selection of Cyber Attack Dataset
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 297-302, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Feature selection is an indispensable preprocessing step when mining huge
datasets that can significantly improve the overall system performance.
Therefore in this paper we focus on a hybrid approach of feature selection.
This method falls into two phases. The filter phase select the features with
highest information gain and guides the initialization of search process for
wrapper phase whose output the final feature subset. The final feature subsets
are passed through the Knearest neighbor classifier for classification of
attacks. The effectiveness of this algorithm is demonstrated on DARPA KDDCUP99
cyber attack dataset.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:15:08 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Singh",
"Shailendra",
""
],
[
"Silakari",
"Sanjay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0912.1015
|
Rdv Ijcsis
|
Mrs. J. P. Rothe, Dr. A. K. Wadhwani, Dr. Mrs. S. Wadhwani
|
Short Term Load Forecasting Using Multi Parameter Regression
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 303-306, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Short Term Load forecasting in this paper uses input data dependent on
parameters such as load for current hour and previous two hours, temperature
for current hour and previous two hours, wind for current hour and previous two
hours, cloud for current hour and previous two hours. Forecasting will be of
load demand for coming hour based on input parameters at that hour. In this
paper we are using multiparameter regression method for forecasting which has
error within tolerable range. Algorithms implementing these forecasting
techniques have been programmed using MATLAB and applied to the case study.
Other methodologies in this area are ANN, Fuzzy and Evolutionary Algorithms for
which investigations are under process. Adaptive multiparameter regression for
load forecasting, in near future will be possible.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:18:35 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Rothe",
"Mrs. J. P.",
""
],
[
"Wadhwani",
"Dr. A. K.",
""
],
[
"Wadhwani",
"Dr. Mrs. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0912.1016
|
Rdv Ijcsis
|
Ayeesha Dsousa, Shalini Bhatia
|
Refactoring of a Database
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 307-315, November 2009, USA
| null |
ISSN 1947 5500
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The technique of database refactoring is all about applying disciplined and
controlled techniques to change an existing database schema. The problem is to
successfully create a Database Refactoring Framework for databases. This paper
concentrates on the feasibility of adapting this concept to work as a generic
template. To retain the constraints regardless of the modifications to the
metadata, the paper proposes a MetaData Manipulation Tool to facilitate change.
The tool adopts a Template Design Pattern to make it database independent. The
paper presents a drawback of using java for constraint extraction and proposes
an alternative.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:21:57 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Dsousa",
"Ayeesha",
""
],
[
"Bhatia",
"Shalini",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.1017
|
Rdv Ijcsis
|
Ismail A. Ismail, Nabawia A. ElRamly, Mohammed A. Abd-ElWahid, Passent
M. ElKafrawy and Mohammed M. Nasef
|
Genetic Programming Framework for Fingerprint Matching
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 316-321, November 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.CV cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A fingerprint matching is a very difficult problem. Minutiae based matching
is the most popular and widely used technique for fingerprint matching. The
minutiae points considered in automatic identification systems are based
normally on termination and bifurcation points. In this paper we propose a new
technique for fingerprint matching using minutiae points and genetic
programming. The goal of this paper is extracting the mathematical formula that
defines the minutiae points.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:27:10 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Ismail",
"Ismail A.",
""
],
[
"ElRamly",
"Nabawia A.",
""
],
[
"Abd-ElWahid",
"Mohammed A.",
""
],
[
"ElKafrawy",
"Passent M.",
""
],
[
"Nasef",
"Mohammed M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0912.1019
|
Rdv Ijcsis
|
B. Amutha, M.Ponnavaikko
|
Location Update Accuracy in Human Tracking system using Zigbee modules
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 322-331, November 2009, USA
| null |
ISSN 1947 5500
|
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A location and tracking system becomes very important to our future world of
pervasive computing. An algorithm for accurate location information is being
incorporated in the human walking model and in the blind human walking model.
We want to implement an accurate location tracking mechanism using Zigbee along
with GPS, we have incorporated Markov chain algorithm for establishing
accuracy. Normal Human and blind human walking steps were actually taken in the
known environment within our campus and the Markov chain algorithm was used for
smoothening the stepwise variation in location updates. A comparison module is
also implemented to show the difference between normal human and blind human
walking step variations. This accuracy is used for designing a blind tracking
device so that the device can be used by the blind for finding the path without
obstacles. We present a system level approach to localizing and tracking Human
and blind users on a basis of different sources of location information [GPS
plus Zigbee]. The system can be applied outdoors especially for avoiding
accidents, GPS as the source of location data. Performance evaluation shows
that the system is accurate and it is a future path finding device with service
for the blind.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:32:46 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Amutha",
"B.",
""
],
[
"Ponnavaikko",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0912.1020
|
Rdv Ijcsis
|
Waqar Asif, Muhammad Bilal Qasim, Syed Musa Raza Tirmzi, Usman
Muhammad Khan
|
Performance Evaluation of WiMAX (802.16) Using Different Encoding
Schemes
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 2, pp. 332-336, November 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the performance of Worldwide Interoperability for
Microwave Access (WiMAX), when we enhance its physical layer attributes with
help of different encoding techniques. For this evaluation Space Time Block
Codes (STBC) and Turbo codes are separately introduced into the architecture of
WiMAX that works on adaptive modulation technique.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:35:42 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Asif",
"Waqar",
""
],
[
"Qasim",
"Muhammad Bilal",
""
],
[
"Tirmzi",
"Syed Musa Raza",
""
],
[
"Khan",
"Usman Muhammad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.1023
|
Yu Zhang
|
Yu Zhang, Hanwen Luo, Wen Chen
|
Efficient Relay Beamforming Design with SIC Detection for Dual-Hop MIMO
Relay Networks
|
18 pages, 6 figures
|
IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp.
4192-4197, Oct. 2010
|
10.1109/TVT.2010.2065249
| null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a dual-hop Multiple Input Multiple Output (MIMO)
relay wireless network, in which a source-destination pair both equipped with
multiple antennas communicates through a large number of half-duplex
amplify-and-forward (AF) relay terminals. Two novel linear beamforming schemes
based on the matched filter (MF) and regularized zero-forcing (RZF) precoding
techniques are proposed for the MIMO relay system. We focus on the linear
process at the relay nodes and design the new relay beamformers by utilizing
the channel state information (CSI) of both backward channel and forward
channel. The proposed beamforming designs are based on the QR decomposition
(QRD) filter at the destination node which performs successive interference
cancellation (SIC) to achieve the maximum spatial multiplexing gain. Simulation
results demonstrate that the proposed beamformers that fulfil both the
intranode array gain and distributed array gain outperform other relaying
schemes under different system parameters in terms of the ergodic capacity.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 13:58:52 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jun 2010 13:39:16 GMT"
}
] | 2013-02-07T00:00:00 |
[
[
"Zhang",
"Yu",
""
],
[
"Luo",
"Hanwen",
""
],
[
"Chen",
"Wen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.1034
|
Janusz Brzozowski
|
J. Brzozowski, G. Jir\'askov\'a, C. Zou
|
Quotient Complexity of Closed Languages
|
12 pages, 5 eps figures, uses llncs
| null |
10.1007/978-3-642-13182-0_8
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A language L is prefix-closed if, whenever a word w is in L, then every
prefix of w is also in L. We define suffix-, factor-, and subword-closed
languages in the same way, where by subword we mean subsequence. We study the
quotient complexity (usually called state complexity) of operations on prefix-,
suffix-, factor-, and subword-closed languages. We find tight upper bounds on
the complexity of the prefix-, suffix-, factor-, and subword-closure of
arbitrary languages, and on the complexity of boolean operations,
concatenation, star and reversal in each of the four classes of closed
languages. We show that repeated application of positive closure and complement
to a closed language results in at most four distinct languages, while Kleene
closure and complement gives at most eight languages.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 16:08:39 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Brzozowski",
"J.",
""
],
[
"Jirásková",
"G.",
""
],
[
"Zou",
"C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0912.1045
|
Viswanath Nagarajan
|
Anupam Gupta, Viswanath Nagarajan, R. Ravi
|
Thresholded Covering Algorithms for Robust and Max-Min Optimization
|
24 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The general problem of robust optimization is this: one of several possible
scenarios will appear tomorrow, but things are more expensive tomorrow than
they are today. What should you anticipatorily buy today, so that the
worst-case cost (summed over both days) is minimized? Feige et al. and
Khandekar et al. considered the k-robust model where the possible outcomes
tomorrow are given by all demand-subsets of size k, and gave algorithms for the
set cover problem, and the Steiner tree and facility location problems in this
model, respectively.
In this paper, we give the following simple and intuitive template for
k-robust problems: "having built some anticipatory solution, if there exists a
single demand whose augmentation cost is larger than some threshold, augment
the anticipatory solution to cover this demand as well, and repeat". In this
paper we show that this template gives us improved approximation algorithms for
k-robust Steiner tree and set cover, and the first approximation algorithms for
k-robust Steiner forest, minimum-cut and multicut. All our approximation ratios
(except for multicut) are almost best possible.
As a by-product of our techniques, we also get algorithms for max-min
problems of the form: "given a covering problem instance, which k of the
elements are costliest to cover?".
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 19:04:49 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Dec 2010 19:11:39 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Feb 2011 19:39:07 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Gupta",
"Anupam",
""
],
[
"Nagarajan",
"Viswanath",
""
],
[
"Ravi",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0912.1050
|
Panos Giannopoulos
|
M. Fellows, P. Giannopoulos, C. Knauer, C. Paul, F. Rosamond, S.
Whitesides, N. Yu
|
Abstract Milling with Turn Costs
|
18 pages, 2 figures
| null | null | null |
cs.CC cs.CG cs.DS cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Abstract Milling problem is a natural and quite general graph-theoretic
model for geometric milling problems. Given a graph, one asks for a walk that
covers all its vertices with a minimum number of turns, as specified in the
graph model by a 0/1 turncost function fx at each vertex x giving, for each
ordered pair of edges (e,f) incident at x, the turn cost at x of a walk that
enters the vertex on edge e and departs on edge f. We describe an initial study
of the parameterized complexity of the problem. Our main positive result shows
that Abstract Milling, parameterized by: number of turns, treewidth and maximum
degree, is fixed-parameter tractable, We also show that Abstract Milling
parameterized by (only) the number of turns and the pathwidth, is hard for W[1]
-- one of the few parameterized intractability results for bounded pathwidth.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 20:15:21 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Fellows",
"M.",
""
],
[
"Giannopoulos",
"P.",
""
],
[
"Knauer",
"C.",
""
],
[
"Paul",
"C.",
""
],
[
"Rosamond",
"F.",
""
],
[
"Whitesides",
"S.",
""
],
[
"Yu",
"N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0912.1059
|
Yao Yu
|
Yao Yu, Athina P. Petropulu and H. Vincent Poor
|
Reduced Complexity Angle-Doppler-Range Estimation for MIMO Radar That
Employs Compressive Sensing
|
5 pages, 3 figures, Asilomar 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The authors recently proposed a MIMO radar system that is implemented by a
small wireless network. By applying compressive sensing (CS) at the receive
nodes, the MIMO radar super-resolution can be achieved with far fewer
observations than conventional approaches. This previous work considered the
estimation of direction of arrival and Doppler. Since the targets are sparse in
the angle-velocity space, target information can be extracted by solving an l1
minimization problem. In this paper, the range information is exploited by
introducing step frequency to MIMO radar with CS. The proposed approach is able
to achieve high range resolution and also improve the ambiguous velocity.
However, joint angle-Doppler-range estimation requires discretization of the
angle-Doppler-range space which causes a sharp rise in the computational burden
of the l1 minimization problem. To maintain an acceptable complexity, a
technique is proposed to successively estimate angle, Doppler and range in a
decoupled fashion. The proposed approach can significantly reduce the
complexity without sacrificing performance.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2009 22:40:12 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Yu",
"Yao",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0912.1072
|
Cameron Freer
|
Cameron E. Freer, Daniel M. Roy
|
Computable de Finetti measures
|
32 pages. Final journal version; expanded somewhat, with minor
corrections. To appear in Annals of Pure and Applied Logic. Extended abstract
appeared in Proceedings of CiE '09, LNCS 5635, pp. 218-231
|
Annals of Pure and Applied Logic 163 (2012) pp. 530-546
|
10.1016/j.apal.2011.06.011
| null |
math.LO cs.LO cs.PL math.PR math.ST stat.ML stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove a computable version of de Finetti's theorem on exchangeable
sequences of real random variables. As a consequence, exchangeable stochastic
processes expressed in probabilistic functional programming languages can be
automatically rewritten as procedures that do not modify non-local state. Along
the way, we prove that a distribution on the unit interval is computable if and
only if its moments are uniformly computable.
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 02:50:35 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Dec 2011 09:28:50 GMT"
}
] | 2012-02-03T00:00:00 |
[
[
"Freer",
"Cameron E.",
""
],
[
"Roy",
"Daniel M.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0912.1092
|
Amin Daneshmand Malayeri
|
Amin Daneshmand Malayeri, Jalal Abdollahi
|
Modern Symmetric Cryptography methodologies and its applications
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, using cryptographic systems play an effective role in security and
safety technologies. One of the most applied kind of cryptography is Symmetric
Cryptography and its applications. New aspects of symmetric Cryptography
methodologies and applications has been presented by this paper. Security-based
networks and some complex technologies such as RFID and parallel security
settings has been intro-duced by using Symmetric Cryptography is the main base
of discussion in this paper. Designing an unique protocol for Symmetric
Cryptography in security networks elements is our focus. Reviewing benefits of
using these methodologies has been pre-sented and discussed in this paper.
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 11:07:40 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Malayeri",
"Amin Daneshmand",
""
],
[
"Abdollahi",
"Jalal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0912.1110
|
Boris Verhaegen
|
Serge Boucher, Boris Verhaegen, Esteban Zim\'anyi
|
XML Multidimensional Modelling and Querying
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As XML becomes ubiquitous and XML storage and processing becomes more
efficient, the range of use cases for these technologies widens daily. One
promising area is the integration of XML and data warehouses, where an
XML-native database stores multidimensional data and processes OLAP queries
written in the XQuery interrogation language. This paper explores issues
arising in the implementation of such a data warehouse. We first compare
approaches for multidimensional data modelling in XML, then describe how
typical OLAP queries on these models can be expressed in XQuery. We then show
how, regardless of the model, the grouping features of XQuery 1.1 improve
performance and readability of these queries. Finally, we evaluate the
performance of query evaluation in each modelling choice using the eXist
database, which we extended with a grouping clause implementation.
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 15:26:43 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Boucher",
"Serge",
""
],
[
"Verhaegen",
"Boris",
""
],
[
"Zimányi",
"Esteban",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0912.1128
|
Timon Schroeter
|
David Baehrens, Timon Schroeter, Stefan Harmeling, Motoaki Kawanabe,
Katja Hansen, Klaus-Robert Mueller
|
How to Explain Individual Classification Decisions
|
31 pages, 14 figures
| null | null | null |
stat.ML cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
After building a classifier with modern tools of machine learning we
typically have a black box at hand that is able to predict well for unseen
data. Thus, we get an answer to the question what is the most likely label of a
given unseen data point. However, most methods will provide no answer why the
model predicted the particular label for a single instance and what features
were most influential for that particular instance. The only method that is
currently able to provide such explanations are decision trees. This paper
proposes a procedure which (based on a set of assumptions) allows to explain
the decisions of any classification method.
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 19:29:04 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Baehrens",
"David",
""
],
[
"Schroeter",
"Timon",
""
],
[
"Harmeling",
"Stefan",
""
],
[
"Kawanabe",
"Motoaki",
""
],
[
"Hansen",
"Katja",
""
],
[
"Mueller",
"Klaus-Robert",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0912.1135
|
Mark Tygert
|
Vladimir Rokhlin and Mark Tygert
|
A fast randomized algorithm for orthogonal projection
|
13 pages, 6 tables
|
SIAM Journal on Scientific Computing, 33 (2): 849-868, 2011
| null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an algorithm that, given any full-rank matrix A having fewer rows
than columns, can rapidly compute the orthogonal projection of any vector onto
the null space of A, as well as the orthogonal projection onto the row space of
A, provided that both A and its adjoint can be applied rapidly to arbitrary
vectors. As an intermediate step, the algorithm solves the overdetermined
linear least-squares regression involving the adjoint of A (and so can be used
for this, too). The basis of the algorithm is an obvious but numerically
unstable scheme; suitable use of a preconditioner yields numerical stability.
We generate the preconditioner rapidly via a randomized procedure that succeeds
with extremely high probability. In many circumstances, the method can
accelerate interior-point methods for convex optimization, such as linear
programming (Ming Gu, personal communication).
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 21:02:14 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Dec 2009 17:56:12 GMT"
}
] | 2011-05-26T00:00:00 |
[
[
"Rokhlin",
"Vladimir",
""
],
[
"Tygert",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0912.1137
|
MohammadHossein Bateni
|
MohammadHossein Bateni and MohammadTaghi Hajiaghayi
|
Euclidean Prize-collecting Steiner Forest
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider Steiner forest and its generalizations,
prize-collecting Steiner forest and k-Steiner forest, when the vertices of the
input graph are points in the Euclidean plane and the lengths are Euclidean
distances. First, we present a simpler analysis of the polynomial-time
approximation scheme (PTAS) of Borradaile et al. [12] for the Euclidean Steiner
forest problem. This is done by proving a new structural property and modifying
the dynamic programming by adding a new piece of information to each dynamic
programming state. Next we develop a PTAS for a well-motivated case, i.e., the
multiplicative case, of prize-collecting and budgeted Steiner forest. The ideas
used in the algorithm may have applications in design of a broad class of
bicriteria PTASs. At the end, we demonstrate why PTASs for these problems can
be hard in the general Euclidean case (and thus for PTASs we cannot go beyond
the multiplicative case).
|
[
{
"version": "v1",
"created": "Sun, 6 Dec 2009 21:15:49 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Bateni",
"MohammadHossein",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.