id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0912.0338
David Goldberg
David Gamarnik, David Goldberg, Theophane Weber
Correlation Decay in Random Decision Networks
null
null
null
null
math.PR cs.DC math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a decision network on an undirected graph in which each node corresponds to a decision variable, and each node and edge of the graph is associated with a reward function whose value depends only on the variables of the corresponding nodes. The goal is to construct a decision vector which maximizes the total reward. This decision problem encompasses a variety of models, including maximum-likelihood inference in graphical models (Markov Random Fields), combinatorial optimization on graphs, economic team theory and statistical physics. The network is endowed with a probabilistic structure in which costs are sampled from a distribution. Our aim is to identify sufficient conditions to guarantee average-case polynomiality of the underlying optimization problem. We construct a new decentralized algorithm called Cavity Expansion and establish its theoretical performance for a variety of models. Specifically, for certain classes of models we prove that our algorithm is able to find near optimal solutions with high probability in a decentralized way. The success of the algorithm is based on the network exhibiting a correlation decay (long-range independence) property. Our results have the following surprising implications in the area of average case complexity of algorithms. Finding the largest independent (stable) set of a graph is a well known NP-hard optimization problem for which no polynomial time approximation scheme is possible even for graphs with largest connectivity equal to three, unless P=NP. We show that the closely related maximum weighted independent set problem for the same class of graphs admits a PTAS when the weights are i.i.d. with the exponential distribution. Namely, randomization of the reward function turns an NP-hard problem into a tractable one.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 05:03:48 GMT" } ]
2009-12-03T00:00:00
[ [ "Gamarnik", "David", "" ], [ "Goldberg", "David", "" ], [ "Weber", "Theophane", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0912.0360
Markus Kuster
M. G. Pia (1), T. Basaglia (2), Z. W. Bell (3), P. V. Dressendorfer (4) ((1) INFN Sezione di Genova, (2) European Organization for Nuclear Research (CERN), (3) Oak Ridge National Laboratory, (4) Editor-in-Chief, IEEE TNS.)
Geant4 in Scientific Literature
6 pages, 9 figures and images, to appear in proceedings of the Nuclear Science Symposium and Medical Imaging Conference 2009, Orlando
null
null
null
physics.comp-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Geant4 reference paper published in Nuclear Instruments and Methods A in 2003 has become the most cited publication in the whole Nuclear Science and Technology category of Thomson-Reuter's Journal Citation Reports. It is currently the second most cited article among the publications authored by two major research institutes, CERN and INFN. An overview of Geant4 presence (and absence) in scholarly literature is presented; the patterns of Geant4 citations are quantitatively examined and discussed.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 08:46:24 GMT" } ]
2009-12-03T00:00:00
[ [ "Pia", "M. G.", "" ], [ "Basaglia", "T.", "" ], [ "Bell", "Z. W.", "" ], [ "Dressendorfer", "P. V.", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0912.0368
Riccardo Dondi
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi, Yuri Pirola
Variants of Constrained Longest Common Subsequence
null
Information Processing Letters 110.20 (2010) 877-881
10.1016/j.ipl.2010.07.015
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider a variant of the classical Longest Common Subsequence problem called Doubly-Constrained Longest Common Subsequence (DC-LCS). Given two strings s1 and s2 over an alphabet A, a set C_s of strings, and a function Co from A to N, the DC-LCS problem consists in finding the longest subsequence s of s1 and s2 such that s is a supersequence of all the strings in Cs and such that the number of occurrences in s of each symbol a in A is upper bounded by Co(a). The DC-LCS problem provides a clear mathematical formulation of a sequence comparison problem in Computational Biology and generalizes two other constrained variants of the LCS problem: the Constrained LCS and the Repetition-Free LCS. We present two results for the DC-LCS problem. First, we illustrate a fixed-parameter algorithm where the parameter is the length of the solution. Secondly, we prove a parameterized hardness result for the Constrained LCS problem when the parameter is the number of the constraint strings and the size of the alphabet A. This hardness result also implies the parameterized hardness of the DC-LCS problem (with the same parameters) and its NP-hardness when the size of the alphabet is constant.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 09:14:54 GMT" } ]
2013-11-20T00:00:00
[ [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Dondi", "Riccardo", "" ], [ "Pirola", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0912.0419
Roberto Amadio
Roberto Amadio (PPS), Patrick Baillot (LIP), Antoine Madet (PPS)
An affine-intuitionistic system of types and effects: confluence and termination
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an affine-intuitionistic system of types and effects which can be regarded as an extension of Barber-Plotkin Dual Intuitionistic Linear Logic to multi-threaded programs with effects. In the system, dynamically generated values such as references or channels are abstracted into a finite set of regions. We introduce a discipline of region usage that entails the confluence (and hence determinacy) of the typable programs. Further, we show that a discipline of region stratification guarantees termination.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 12:55:11 GMT" } ]
2009-12-03T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Baillot", "Patrick", "", "LIP" ], [ "Madet", "Antoine", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0912.0433
Arijit Laha Ph.D.
Arijit Laha
On the issues of building Information Warehouses
ACM Comptute 2010, January 22-23, 2010, Bangalore, India
null
null
null
cs.HC cs.IR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While performing knowledge-intensive tasks of professional nature, the knowledge workers need to access and process large volume of information. Apart from the quantity, they also require that the information received is of high quality in terms of authenticity and details. This, in turn, requires that the information delivered should also include argumentative support, exhibiting the reasoning process behind their development and provenance to indicate their lineage. In conventional document-centric practices for information management, such details are difficult to capture, represent/archive and retrieve/deliver. To achieve such capability we need to re-think some core issues of information management from the above requirements perspective. In this paper we develop a framework for comprehensive representation of information in archive, capturing informational contents along with their context. We shall call it the "Information Warehouse (IW)" framework of information archival. The IW is a significant yet technologically realizable conceptual advancement which can support efficiently some interesting classes of applications which can be very useful to the knowledge workers.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 15:16:27 GMT" } ]
2009-12-03T00:00:00
[ [ "Laha", "Arijit", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0912.0448
Johan W\"astlund
Johan W\"astlund
The strange algebra of combinatorial games
21 pages
null
null
null
math.CO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algebraic framework for the analysis of combinatorial games. This framework embraces the classical theory of partizan games as well as a number of misere games, comply-constrain games, and card games that have been studied more recently. It focuses on the construction of the quotient monoid of a game, an idea that has been successively applied to several classes of games.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 15:52:04 GMT" } ]
2009-12-03T00:00:00
[ [ "Wästlund", "Johan", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0912.0453
Matthieu Finiasz
Matthieu Finiasz
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem
null
null
null
null
cs.CR cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of Syndrome Decoding was proven to be NP-complete in 1978 and, since then, quite a few cryptographic applications have had their security rely on the (provable) difficulty of solving some instances of it. However, in most cases, the instances to be solved follow some specific constraint: the target weight is a function of the dimension and length of the code. In these cases, is the Syndrome Decoding problem still NP-complete? This is the question that this article intends to answer.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 16:07:32 GMT" } ]
2009-12-03T00:00:00
[ [ "Finiasz", "Matthieu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0473
David Fernandez-Amoros
David Fernandez-Amoros, Ruben Heradio, Jose Antonio Cerrada
Inferring Information from Feature Diagrams to Product Line Economic Models
latex2e, 10 pages, 6 figures
Published in the Proceedings of the Software Product Line Conference 2009, San Francisco
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing economic models support the estimation of the costs and benefits of developing and evolving a Software Product Line (SPL) as compared to undertaking traditional software development approaches. In addition, Feature Diagrams (FDs) are a valuable tool to scope the domain of a SPL. This paper proposes an algorithm to calculate, from a FD, the following information for economic models: the total number of products of a SPL, the SPL homogeneity and the commonality of the SPL requirements. The algorithm running time belongs to the complexity class $O(f^42^c)$. In contrast to related work, the algorithm is free of dependencies on off-the-self tools and is generally specified for an abstract FD notation, that works as a pivot language for most of the available notations for feature modeling.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 17:40:48 GMT" } ]
2009-12-03T00:00:00
[ [ "Fernandez-Amoros", "David", "" ], [ "Heradio", "Ruben", "" ], [ "Cerrada", "Jose Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0912.0537
David Eppstein
David Eppstein and Elena Mumford
Steinitz Theorems for Orthogonal Polyhedra
48 pages, 31 figures
J. Computational Geometry 5 (1): 179-244, 2014
10.20382/jocg.v5i1a10
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a simple orthogonal polyhedron to be a three-dimensional polyhedron with the topology of a sphere in which three mutually-perpendicular edges meet at each vertex. By analogy to Steinitz's theorem characterizing the graphs of convex polyhedra, we find graph-theoretic characterizations of three classes of simple orthogonal polyhedra: corner polyhedra, which can be drawn by isometric projection in the plane with only one hidden vertex, xyz polyhedra, in which each axis-parallel line through a vertex contains exactly one other vertex, and arbitrary simple orthogonal polyhedra. In particular, the graphs of xyz polyhedra are exactly the bipartite cubic polyhedral graphs, and every bipartite cubic polyhedral graph with a 4-connected dual graph is the graph of a corner polyhedron. Based on our characterizations we find efficient algorithms for constructing orthogonal polyhedra from their graphs.
[ { "version": "v1", "created": "Wed, 2 Dec 2009 21:53:22 GMT" } ]
2016-08-12T00:00:00
[ [ "Eppstein", "David", "" ], [ "Mumford", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0912.0549
Ralf-Michael Vetter
R.-M. Vetter, W. Lennartz, J.-V. Peetz
Modular Workflow Engine for Distributed Services using Lightweight Java Clients
14 pages, 8 figures
null
null
null
cs.SE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files comprising the workflow client are needed. To connect all clients to the engine one open server port is sufficient. The engine submits data to the clients and orchestrates their work by workflow descriptions from a central database. Clients request new task descriptions periodically, thus the system is robust against network failures. In the basic set-up, data up- and downloads are handled via HTTP communication with the server. The performance of the modular system could additionally be improved using dedicated file servers or distributed network file systems. We demonstrate the design features of the proposed engine in real-world applications from mechanical engineering. We have used this system on a compute cluster in design-of-experiment studies, parameter optimisations and robustness validations of finite element structures.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 01:31:36 GMT" } ]
2009-12-04T00:00:00
[ [ "Vetter", "R. -M.", "" ], [ "Lennartz", "W.", "" ], [ "Peetz", "J. -V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0912.0555
EPTCS
Pawe{\l} Soboci\'nski (ECS, University of Southampton)
A non-interleaving process calculus for multi-party synchronisation
null
EPTCS 12, 2009, pp. 87-98
10.4204/EPTCS.12.6
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the wire calculus. Its dynamic features are inspired by Milner's CCS: a unary prefix operation, binary choice and a standard recursion construct. Instead of an interleaving parallel composition operator there are operators for synchronisation along a common boundary and non-communicating parallel composition. The (operational) semantics is a labelled transition system obtained with SOS rules. Bisimilarity is a congruence with respect to the operators of the language. Quotienting terms by bisimilarity results in a compact closed category.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 00:19:08 GMT" } ]
2009-12-04T00:00:00
[ [ "Sobociński", "Paweł", "", "ECS, University of Southampton" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0912.0568
Paul Beame
Paul Beame, Trinh Huynh, Toniann Pitassi
Hardness Amplification in Proof Complexity
28 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general method for converting any family of unsatisfiable CNF formulas that is hard for one of the simplest proof systems, tree resolution, into formulas that require large rank in any proof system that manipulates polynomials or polynomial threshold functions of degree at most k (known as Th(k) proofs). Such systems include Lovasz-Schrijver and Cutting Planes proof systems as well as their high degree analogues. These are based on analyzing two new proof systems, denoted by T^cc(k) and R^cc(k). The proof lines of T^cc(k) are arbitrary Boolean functions, each of which can be evaluated by an efficient k-party randomized communication protocol. They include Th{k-1} proofs as a special case. R^cc(k) proofs are stronger and only require that each inference be locally checkable by an efficient k-party randomized communication protocol. Our main results are the following: (1) When k is O(loglogn), for any unsatisfiable CNF formula F requiring resolution rank r, there is a related CNF formula G=Lift_k(F) requiring refutation rank r^Omega(1/k) log^O(1) n in all R^cc(k) systems. (2) There are strict hierarchies for T^cc(k) and R^cc(k) systems with respect to k when k is O(loglogn in that there are unsatisfiable CNF formulas requiring large rank R^cc(k) refutations but having log^O(1) n rank Th(k) refutations. (3) When k is O(loglogn) there are 2^(n^Omega(1/k)) lower bounds on the size of tree-like T^cc(k) refutations for large classes of lifted CNF formulas. (4) A general method for producing integrality gaps for low rank R^cc(2) inference (and hence Cutting Planes and Th(1) inference) based on related gaps for low rank resolution. These gaps are optimal for MAX-2t-SAT.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 02:09:22 GMT" } ]
2009-12-04T00:00:00
[ [ "Beame", "Paul", "" ], [ "Huynh", "Trinh", "" ], [ "Pitassi", "Toniann", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0572
Mingyu Fan
Mingyu Fan, Hong Qiao, and Bo Zhang
Isometric Multi-Manifolds Learning
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Isometric feature mapping (Isomap) is a promising manifold learning method. However, Isomap fails to work on data which distribute on clusters in a single manifold or manifolds. Many works have been done on extending Isomap to multi-manifolds learning. In this paper, we first proposed a new multi-manifolds learning algorithm (M-Isomap) with help of a general procedure. The new algorithm preserves intra-manifold geodesics and multiple inter-manifolds edges precisely. Compared with previous methods, this algorithm can isometrically learn data distributed on several manifolds. Secondly, the original multi-cluster manifold learning algorithm first proposed in \cite{DCIsomap} and called D-C Isomap has been revised so that the revised D-C Isomap can learn multi-manifolds data. Finally, the features and effectiveness of the proposed multi-manifolds learning algorithms are demonstrated and compared through experiments.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 03:05:59 GMT" } ]
2009-12-04T00:00:00
[ [ "Fan", "Mingyu", "" ], [ "Qiao", "Hong", "" ], [ "Zhang", "Bo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0578
Rdv Ijcsis
Li Fang, Maylor K.H. Leung, Cheng Shao Chian
Making Palm Print Matching Mobile
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 001-009, November 2009, USA
null
ISSN 19475500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growing importance of personal identification and authentication in todays highly advanced world where most business and personal tasks are being replaced by electronic means, the need for a technology that is able to uniquely identify an individual and has high fraud resistance see the rise of biometric technologies. Making biometric based solution mobile is a promising trend. A new RST invariant square based palm print ROI extraction method was successfully implemented and integrated into the current application suite. A new set of palm print image database captured using embedded cameras in mobile phone was created to test its robustness. Comparing to those extraction methods that are based on boundary tracking of the overall hand shape that has limitation of being unable to process palm print images that has one or more fingers closed, the system can now effectively handle the segmentation of palm print images with varying finger positioning. The high flexibility makes palm print matching mobile possible.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 05:23:13 GMT" } ]
2009-12-04T00:00:00
[ [ "Fang", "Li", "" ], [ "Leung", "Maylor K. H.", "" ], [ "Chian", "Cheng Shao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0579
Rdv Ijcsis
Mohammad Ghulam Ali
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 010-014, November 2009, USA
null
ISSN 19475500
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a multidatabase system as 4tiered Client-Server DBMS architectures. We discuss their functional components and provide an overview of their performance characteristics. The first component of this proposed system is a web based interface or Graphical User Interface, which resides on top of the Client Application Program, the second component of the system is a client Application program running in an application server, which resides on top of the Global Database Management System, the third component of the system is a Global Database Management System and global schema of the multidatabase system server, which resides on top of the distributed heterogeneous local component database system servers, and the fourth component is remote heterogeneous local component database system servers. Transaction submitted from client interface to a multidatabase system server through an application server will be decomposed into a set of sub queries and will be executed at various remote heterogeneous local component database servers and also in case of information retrieval all sub queries will be composed and will get back results to the end users.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 05:34:56 GMT" } ]
2009-12-04T00:00:00
[ [ "Ali", "Mohammad Ghulam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.0580
Rdv Ijcsis
Yunho Lee, Soojin Lee
A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 015-022, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on sensor networks has become much more active and is currently being applied to many different fields. However since sensor networks are limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an event or situation immediately and proactively. To overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs) with immediate-response actor nodes have been proposed which adds greater mobility and activity to the existing sensor networks. Although WSANs share many common grounds with sensor networks, it is difficult to apply existing security technologies due to the fact that WSANs contain actor nodes that are resource-independent and mobile. Therefore, this research seeks to demonstrate ways to provide security, integrity, and authentication services for WSANs secure operation, by separating networks into hierarchical structure by each node's abilities and provides different encryption key based secure protocols for each level of hierarchy, Pairwise key, node key, and region key for sensor levels, and public key for actor
[ { "version": "v1", "created": "Thu, 3 Dec 2009 05:39:22 GMT" } ]
2009-12-04T00:00:00
[ [ "Lee", "Yunho", "" ], [ "Lee", "Soojin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0581
Mokshay Madiman
Oliver Johnson, Ioannis Kontoyiannis, Mokshay Madiman
Log-concavity, ultra-log-concavity, and a maximum entropy property of discrete compound Poisson measures
30 pages. This submission supersedes arXiv:0805.4112v1. Changes in v2: Updated references, typos corrected
Discrete Applied Mathematics, vol 161/9, pages 1232-1250, 2013
10.1016/j.dam.2011.08.025
null
math.CO cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sufficient conditions are developed, under which the compound Poisson distribution has maximal entropy within a natural class of probability measures on the nonnegative integers. Recently, one of the authors [O. Johnson, {\em Stoch. Proc. Appl.}, 2007] used a semigroup approach to show that the Poisson has maximal entropy among all ultra-log-concave distributions with fixed mean. We show via a non-trivial extension of this semigroup approach that the natural analog of the Poisson maximum entropy property remains valid if the compound Poisson distributions under consideration are log-concave, but that it fails in general. A parallel maximum entropy result is established for the family of compound binomial measures. Sufficient conditions for compound distributions to be log-concave are discussed and applications to combinatorics are examined; new bounds are derived on the entropy of the cardinality of a random independent set in a claw-free graph, and a connection is drawn to Mason's conjecture for matroids. The present results are primarily motivated by the desire to provide an information-theoretic foundation for compound Poisson approximation and associated limit theorems, analogous to the corresponding developments for the central limit theorem and for Poisson approximation. Our results also demonstrate new links between some probabilistic methods and the combinatorial notions of log-concavity and ultra-log-concavity, and they add to the growing body of work exploring the applications of maximum entropy characterizations to problems in discrete mathematics.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 05:41:46 GMT" }, { "version": "v2", "created": "Tue, 27 Sep 2011 04:58:57 GMT" } ]
2013-03-20T00:00:00
[ [ "Johnson", "Oliver", "" ], [ "Kontoyiannis", "Ioannis", "" ], [ "Madiman", "Mokshay", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0912.0583
David Meyer
David A. Meyer, James Pommersheim
Single query learning from abelian and non-abelian Hamming distance oracles
14 pages
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of identifying an n-bit string using a single quantum query to an oracle that computes the Hamming distance between the query and hidden strings. The standard action of the oracle on a response register of dimension r is by powers of the cycle (1...r), all of which, of course, commute. We introduce a new model for the action of an oracle--by general permutations in S_r--and explore how the success probability depends on r and on the map from Hamming distances to permutations. In particular, we prove that when r = 2, for even n the success probability is 1 with the right choice of the map, while for odd n the success probability cannot be 1 for any choice. Furthermore, for small odd n and r = 3, we demonstrate numerically that the image of the optimal map generates a non-abelian group of permutations.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 06:02:06 GMT" } ]
2009-12-04T00:00:00
[ [ "Meyer", "David A.", "" ], [ "Pommersheim", "James", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0597
Michael Huber
Michael Huber
Constructing Optimal Authentication Codes with Perfect Multi-fold Secrecy
4 pages (double-column); to appear in Proc. 2010 International Zurich Seminar on Communications (IZS 2010, Zurich)
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a construction of optimal authentication codes achieving perfect multi-fold secrecy by means of combinatorial designs. This continues the author's work (ISIT 2009) and answers an open question posed therein. As an application, we present the first infinite class of optimal codes that provide two-fold security against spoofing attacks and at the same time perfect two- fold secrecy.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 08:40:51 GMT" } ]
2009-12-04T00:00:00
[ [ "Huber", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0599
Rdv Ijcsis
Sabah Al Fedaghi, Alaa Alsaqa, Zahraa Fadel
Conceptual Model for Communication
13 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 029-041, November 2009, USA
null
ISSN 1947 5500
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A variety of idealized models of communication systems exist, and all may have something in common. Starting with Shannons communication model and ending with the OSI model, this paper presents progressively more advanced forms of modeling of communication systems by tying communication models together based on the notion of flow. The basic communication process is divided into different spheres (sources, channels, and destinations), each with its own five interior stages, receiving, processing, creating, releasing, and transferring of information. The flow of information is ontologically distinguished from the flow of physical signals, accordingly, Shannons model, network based OSI models, and TCP IP are redesigned.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 08:50:51 GMT" } ]
2009-12-04T00:00:00
[ [ "Fedaghi", "Sabah Al", "" ], [ "Alsaqa", "Alaa", "" ], [ "Fadel", "Zahraa", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0600
Rdv Ijcsis
Alireza Ghahari, Reza Aghaeizadeh Zoroofi
Sequential Clustering based Facial Feature Extraction Method for Automatic Creation of Facial Models from Orthogonal Views
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 042-047, November 2009, USA
null
ISSN 1947 5500
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiview 3D face modeling has attracted increasing attention recently and has become one of the potential avenues in future video systems. We aim to make more reliable and robust automatic feature extraction and natural 3D feature construction from 2D features detected on a pair of frontal and profile view face images. We propose several heuristic algorithms to minimize possible errors introduced by prevalent nonperfect orthogonal condition and noncoherent luminance. In our approach, we first extract the 2D features that are visible to both cameras in both views. Then, we estimate the coordinates of the features in the hidden profile view based on the visible features extracted in the two orthogonal views. Finally, based on the coordinates of the extracted features, we deform a 3D generic model to perform the desired 3D clone modeling. Present study proves the scope of resulted facial models for practical applications like face recognition and facial animation.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 08:54:24 GMT" } ]
2009-12-04T00:00:00
[ [ "Ghahari", "Alireza", "" ], [ "Zoroofi", "Reza Aghaeizadeh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0602
Rdv Ijcsis
G.Ramesh, S.SundaraVadivelu
A Reliable and Fault Tolerant Routing for Optical WDM Networks
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 048-054, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In optical WDM networks, since each lightpath can carry a huge mount of traffic, failures may seriously damage the end user applications. Hence fault tolerance becomes an important issue on these networks. The light path which carries traffic during normal operation is called as primary path. The traffic is rerouted on a backup path in case of a failure. In this paper we propose to design a reliable and fault tolerant routing algorithm for establishing primary and backup paths. In order to establish the primary path, this algorithm uses load balancing in which link cost metrics are estimated based on the current load of the links. In backup path setup, the source calculates the blocking probability through the received feedback from the destination by sending a small fraction of probe packets along the existing paths. It then selects the optimal light path with the lowest blocking probability. Based on the simulation results, we show that the reliable and fault tolerant routing algorithm reduces the blocking probability and latency while increasing the throughput and channel utilization.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 08:58:34 GMT" } ]
2009-12-04T00:00:00
[ [ "Ramesh", "G.", "" ], [ "SundaraVadivelu", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0603
Rdv Ijcsis
Mohammad Ghulam Ali
Object Oriented Approach for Integration of Heterogeneous Databases in a Multidatabase System and Local Schemas Modifications Propagation
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 055-060, November 2009, USA
null
ISSN 1947 5500
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the challenging problems in the multidatabase systems is to find the most viable solution to the problem of interoperability of distributed heterogeneous autonomous local component databases. This has resulted in the creation of a global schema over set of these local component database schemas to provide a uniform representation of local schemas. The aim of this paper is to use object oriented approach to integrate schemas of distributed heterogeneous autonomous local component database schemas into a global schema. The resulting global schema provides a uniform interface and high level of location transparency for retrieval of data from the local component databases. A set of integration operators are defined to integrate local schemas based on the semantic relevance of their classes and to provide a model independent representation of virtual classes of the global schema. The schematic representation and heterogeneity is also taken into account in the integration process. Justifications about Object Oriented Modal are also discussed. Bottom up local schema modifications propagation in Global schema is also considered to maintain Global schema as local schemas are autonomous and evolve over time. An example illustrates the applicability of the integration operator defined.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 09:01:39 GMT" } ]
2009-12-04T00:00:00
[ [ "Ali", "Mohammad Ghulam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.0606
Rdv Ijcsis
C. Yaashuwanth, Dr. R. Ramesh
A New Scheduling Algorithms For Real Time Tasks
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 061-066, November 2009, USA
null
ISSN 1947 5500
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objective of this paper is to develop the two different ways in which round robin architecture is modified and made suitable to be implemented in real time and embedded systems. The scheduling algorithm plays a significant role in the design of real time embedded systems. Simple round robin architecture is not efficient to be implemented in embedded systems because of higher context switch rate, larger waiting time and larger response time. Missing of deadlines will degrade the system performance in soft real time systems. The main objective of this paper is to develop the scheduling algorithm which removes the drawbacks in simple round robin architecture. A comparison with round robin architecture to the proposed architectures has been made. It is observed that the proposed architectures solves the problems encountered in round robin architecture in soft real time by decreasing the number of context switches waiting time and response time thereby increasing the system throughput.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 09:06:59 GMT" } ]
2009-12-04T00:00:00
[ [ "Yaashuwanth", "C.", "" ], [ "Ramesh", "Dr. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0912.0607
Rdv Ijcsis
P. Meenakshi Devi, M.Venkatesan, K.Duraiswamy
Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 067-074, November 2009, USA
null
ISSN 1947 5500
cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 09:11:19 GMT" } ]
2009-12-04T00:00:00
[ [ "Devi", "P. Meenakshi", "" ], [ "Venkatesan", "M.", "" ], [ "Duraiswamy", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0625
Sebastian Kaune
Sebastian Kaune, Ruben Cuevas Rumin, Gareth Tyson, Andreas Mauthe, Carmen Guerrero, and Ralf Steinmetz
Unraveling BitTorrent's File Unavailability: Measurements, Analysis and Solution Exploration
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BitTorrent suffers from one fundamental problem: the long-term availability of content. This occurs on a massive-scale with 38% of torrents becoming unavailable within the first month. In this paper we explore this problem by performing two large-scale measurement studies including 46K torrents and 29M users. The studies go significantly beyond any previous work by combining per-node, per-torrent and system-wide observations to ascertain the causes, characteristics and repercussions of file unavailability. The study confirms the conclusion from previous works that seeders have a significant impact on both performance and availability. However, we also present some crucial new findings: (i) the presence of seeders is not the sole factor involved in file availability, (ii) 23.5% of nodes that operate in seedless torrents can finish their downloads, and (iii) BitTorrent availability is discontinuous, operating in cycles of temporary unavailability. Due to our new findings, we consider it is important to revisit the solution space; to this end, we perform large-scale trace-based simulations to explore the potential of two abstract approaches.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 11:02:33 GMT" } ]
2009-12-04T00:00:00
[ [ "Kaune", "Sebastian", "" ], [ "Rumin", "Ruben Cuevas", "" ], [ "Tyson", "Gareth", "" ], [ "Mauthe", "Andreas", "" ], [ "Guerrero", "Carmen", "" ], [ "Steinmetz", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0670
Richard Weber
Richard Weber
The Anderson-Weber strategy is not optimal for symmetric rendezvous search on K4
6 pages
null
null
null
math.OC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the symmetric rendezvous search game on a complete graph of n locations. In 1990, Anderson and Weber proposed a strategy in which, over successive blocks of n-1 steps, the players independently choose either to stay at their initial location or to tour the other n-1 locations, with probabilities p and 1-p, respectively. Their strategy has been proved optimal for n=2 with p=1/2, and for n=3 with p=1/3. The proof for n=3 is very complicated and it has been difficult to guess what might be true for n>3. Anderson and Weber suspected that their strategy might not be optimal for n>3, but they had no particular reason to believe this and no one has been able to find anything better. This paper describes a strategy that is better than Anderson--Weber for n=4. However, it is better by only a tiny fraction of a percent.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 15:03:32 GMT" } ]
2009-12-04T00:00:00
[ [ "Weber", "Richard", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0912.0681
Michael Mahoney
Michael W. Mahoney, Lorenzo Orecchia, Nisheeth K. Vishnoi
A Local Spectral Method for Graphs: with Applications to Improving Graph Partitions and Exploring Data Graphs Locally
24 pages. Completely rewritten; substance is still the same, but the presentation is reworked
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The second eigenvalue of the Laplacian matrix and its associated eigenvector are fundamental features of an undirected graph, and as such they have found widespread use in scientific computing, machine learning, and data analysis. In many applications, however, graphs that arise have several \emph{local} regions of interest, and the second eigenvector will typically fail to provide information fine-tuned to each local region. In this paper, we introduce a locally-biased analogue of the second eigenvector, and we demonstrate its usefulness at highlighting local properties of data graphs in a semi-supervised manner. To do so, we first view the second eigenvector as the solution to a constrained optimization problem, and we incorporate the local information as an additional constraint; we then characterize the optimal solution to this new problem and show that it can be interpreted as a generalization of a Personalized PageRank vector; and finally, as a consequence, we show that the solution can be computed in nearly-linear time. In addition, we show that this locally-biased vector can be used to compute an approximation to the best partition \emph{near} an input seed set in a manner analogous to the way in which the second eigenvector of the Laplacian can be used to obtain an approximation to the best partition in the entire input graph. Such a primitive is useful for identifying and refining clusters locally, as it allows us to focus on a local region of interest in a semi-supervised manner. Finally, we provide a detailed empirical evaluation of our method by showing how it can applied to finding locally-biased sparse cuts around an input vertex seed set in social and information networks.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 15:20:59 GMT" }, { "version": "v2", "created": "Wed, 20 Apr 2011 14:30:57 GMT" }, { "version": "v3", "created": "Fri, 21 Oct 2011 03:18:01 GMT" } ]
2011-10-24T00:00:00
[ [ "Mahoney", "Michael W.", "" ], [ "Orecchia", "Lorenzo", "" ], [ "Vishnoi", "Nisheeth K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0685
Matthias M\"uller-Hannemann
Annabell Berger and Matthias M\"uller-Hannemann
Uniform sampling of undirected and directed graphs with a fixed degree sequence
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many applications in network analysis require algorithms to sample uniformly at random from the set of all graphs with a prescribed degree sequence. We present a Markov chain based approach which converges to the uniform distribution of all realizations for both the directed and undirected case. It remains an open challenge whether these Markov chains are rapidly mixing. For the case of directed graphs, we also explain in this paper that a popular switching algorithm fails in general to sample uniformly at random because the state graph of the Markov chain decomposes into different isomorphic components. We call degree sequences for which the state graph is strongly connected arc swap sequences. To handle arbitrary degree sequences, we develop two different solutions. The first uses an additional operation (a reorientation of induced directed 3-cycles) which makes the state graph strongly connected, the second selects randomly one of the isomorphic components and samples inside it. Our main contribution is a precise characterization of arc swap sequences, leading to an efficient recognition algorithm. Finally, we point out some interesting consequences for network analysis.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 15:46:31 GMT" }, { "version": "v2", "created": "Mon, 21 Dec 2009 16:39:13 GMT" }, { "version": "v3", "created": "Fri, 5 Mar 2010 15:38:10 GMT" } ]
2010-03-05T00:00:00
[ [ "Berger", "Annabell", "" ], [ "Müller-Hannemann", "Matthias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0717
Karol Gregor
Karol Gregor, Gregory Griffin
Behavior and performance of the deep belief networks on image classification
8 pages, 9 figures
null
null
null
cs.NE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply deep belief networks of restricted Boltzmann machines to bags of words of sift features obtained from databases of 13 Scenes, 15 Scenes and Caltech 256 and study experimentally their behavior and performance. We find that the final performance in the supervised phase is reached much faster if the system is pre-trained. Pre-training the system on a larger dataset keeping the supervised dataset fixed improves the performance (for the 13 Scenes case). After the unsupervised pre-training, neurons arise that form approximate explicit representations for several categories (meaning they are mostly active for this category). The last three facts suggest that unsupervised training really discovers structure in these data. Pre-training can be done on a completely different dataset (we use Corel dataset) and we find that the supervised phase performs just as good (on the 15 Scenes dataset). This leads us to conjecture that one can pre-train the system once (e.g. in a factory) and subsequently apply it to many supervised problems which then learn much faster. The best performance is obtained with single hidden layer system suggesting that the histogram of sift features doesn't have much high level structure. The overall performance is almost equal, but slightly worse then that of the support vector machine and the spatial pyramidal matching.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 19:20:14 GMT" } ]
2009-12-04T00:00:00
[ [ "Gregor", "Karol", "" ], [ "Griffin", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0741
Turlough Neary
Turlough Neary
A boundary between universality and non-universality in spiking neural P systems
Version 1 (arXiv:0912.0741v1) of this paper contained some technical errors that were mainly due to the restriction of counter machines used. Definition 3 given in this version differs from the definition given in version 1. This new definition necessitated some minor adjustments in proofs of Theorems 1, 2 and 3.
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we offer a significant improvement on the previous smallest spiking neural P systems and solve the problem of finding the smallest possible extended spiking neural P system. Paun and Paun gave a universal spiking neural P system with 84 neurons and another that has extended rules with 49 neurons. Subsequently, Zhang et al. reduced the number of neurons used to give universality to 67 for spiking neural P systems and to 41 for the extended model. Here we give a small universal spiking neural P system that has only 17 neurons and another that has extended rules with 5 neurons. All of the above mentioned spiking neural P systems suffer from an exponential slow down when simulating Turing machines. Using a more relaxed encoding technique we get a universal spiking neural P system that has extended rules with only 4 neurons. This latter spiking neural P system simulates 2-counter machines in linear time and thus suffer from a double exponential time overhead when simulating Turing machines. We show that extended spiking neural P systems with 3 neurons are simulated by log-space bounded Turing machines, and so there exists no such universal system with 3 neurons. It immediately follows that our 4-neuron system is the smallest possible extended spiking neural P system that is universal. Finally, we show that if we generalise the output technique we can give a universal spiking neural P system with extended rules that has only 3 neurons. This system is also the smallest of its kind as a universal spiking neural P system with extended rules and generalised output is not possible with 2 neurons.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:36:55 GMT" }, { "version": "v2", "created": "Sun, 16 May 2010 14:33:32 GMT" } ]
2015-03-13T00:00:00
[ [ "Neary", "Turlough", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0745
Rdv Ijcsis
Mary Lourde R., Anjali Kuppayil Saji
A Digital Guitar Tuner
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 082-088, November 2009, USA
null
ISSN 1947 5500
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of this paper is to understand the critical parameters that need to be addressed while designing a guitar tuner. The focus of the design lies in developing a suitable algorithm to accurately detect the fundamental frequency of a plucked guitar string from its frequency spectrum. A userfriendly graphical interface is developed using Matlab to allow any user to easily tune his guitar using the developed program.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:27:14 GMT" } ]
2009-12-07T00:00:00
[ [ "R.", "Mary Lourde", "" ], [ "Saji", "Anjali Kuppayil", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0912.0746
J\'er\'emie Roland
Boris Altshuler, Hari Krovi and Jeremie Roland
Anderson localization casts clouds over adiabatic quantum optimization
14 pages, 4 figures
Proceedings of the National Academy of Sciences of the United States of America, 107(28):12446-12450, 2010
10.1073/pnas.1002116107
null
quant-ph cond-mat.mes-hall cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding NP-complete problems is a central topic in computer science. This is why adiabatic quantum optimization has attracted so much attention, as it provided a new approach to tackle NP-complete problems using a quantum computer. The efficiency of this approach is limited by small spectral gaps between the ground and excited states of the quantum computer's Hamiltonian. We show that the statistics of the gaps can be analyzed in a novel way, borrowed from the study of quantum disordered systems in statistical mechanics. It turns out that due to a phenomenon similar to Anderson localization, exponentially small gaps appear close to the end of the adiabatic algorithm for large random instances of NP-complete problems. This implies that unfortunately, adiabatic quantum optimization fails: the system gets trapped in one of the numerous local minima.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 22:31:36 GMT" } ]
2010-12-13T00:00:00
[ [ "Altshuler", "Boris", "" ], [ "Krovi", "Hari", "" ], [ "Roland", "Jeremie", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.mes-hall", "description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures", "span": "(Mesoscale and Nanoscale Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0912.0750
Aran Nayebi
Aran Nayebi
Fast matrix multiplication techniques based on the Adleman-Lipton model
To appear in the International Journal of Computer Engineering Research. Minor changes made to make the preprint as similar as possible to the published version
International Journal of Computer Engineering Research, 3(1):10-19, January 2012
10.5897/IJCER10.016
null
q-bio.QM cs.DS cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On distributed memory electronic computers, the implementation and association of fast parallel matrix multiplication algorithms has yielded astounding results and insights. In this discourse, we use the tools of molecular biology to demonstrate the theoretical encoding of Strassen's fast matrix multiplication algorithm with DNA based on an $n$-moduli set in the residue number system, thereby demonstrating the viability of computational mathematics with DNA. As a result, a general scalable implementation of this model in the DNA computing paradigm is presented and can be generalized to the application of \emph{all} fast matrix multiplication algorithms on a DNA computer. We also discuss the practical capabilities and issues of this scalable implementation. Fast methods of matrix computations with DNA are important because they also allow for the efficient implementation of other algorithms (i.e. inversion, computing determinants, and graph theory) with DNA.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 23:04:18 GMT" }, { "version": "v2", "created": "Sun, 5 Sep 2010 16:43:23 GMT" }, { "version": "v3", "created": "Wed, 16 Feb 2011 15:44:55 GMT" }, { "version": "v4", "created": "Sat, 28 May 2011 16:25:32 GMT" }, { "version": "v5", "created": "Mon, 19 Dec 2011 04:17:30 GMT" } ]
2012-02-10T00:00:00
[ [ "Nayebi", "Aran", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
0912.0756
Melissa Duarte
Melissa Duarte, Ashutosh Sabharwal, Chris Dick and Raghu Rao
Beamforming in MISO Systems: Empirical Results and EVM-based Analysis
Submitted to IEEE Transactions on Wireless Communications, November 2009
null
10.1109/TWC.2010.072610.091720
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an analytical, simulation, and experimental-based study of beamforming Multiple Input Single Output (MISO) systems. We analyze the performance of beamforming MISO systems taking into account implementation complexity and effects of imperfect channel estimate, delayed feedback, real Radio Frequency (RF) hardware, and imperfect timing synchronization. Our results show that efficient implementation of codebook-based beamforming MISO systems with good performance is feasible in the presence of channel and implementation-induced imperfections. As part of our study we develop a framework for Average Error Vector Magnitude Squared (AEVMS)-based analysis of beamforming MISO systems which facilitates comparison of analytical, simulation, and experimental results on the same scale. In addition, AEVMS allows fair comparison of experimental results obtained from different wireless testbeds. We derive novel expressions for the AEVMS of beamforming MISO systems and show how the AEVMS relates to important system characteristics like the diversity gain, coding gain, and error floor.
[ { "version": "v1", "created": "Thu, 3 Dec 2009 23:27:07 GMT" } ]
2016-11-15T00:00:00
[ [ "Duarte", "Melissa", "" ], [ "Sabharwal", "Ashutosh", "" ], [ "Dick", "Chris", "" ], [ "Rao", "Raghu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0758
Rdv Ijcsis
Sudipta Chattopadhyay, Salil Kumar Sanyal
Comparison of Performance Metrics for QPSK and OQPSK Transmission Using Root Raised Cosine and Raised Cosine Pulse shaping Filters for Applications in Mobile Communication
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 106-112, November 2009, USA
null
ISSN 1947 5500
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quadrature Phase Shift Keying (QPSK) and Offset Quadrature Phase Shift Keying (OQPSK) are two well accepted modulation techniques used in Code Division Multiple Access (CDMA) system. The Pulse Shaping Filters play an important role in digital transmission. The type of Pulse Shaping Filter used, and its behavior would influence the performance of the communication system. This in turn, would have an effect on the performance of the Mobile Communication system, in which the digital communication technique has been employed. In this paper we have presented comparative study of some performance parameters or performance metrics of a digital communication system like, Error Vector Magnitude (EVM), Magnitude Error, Phase Error and Bandwidth Efficiency for a QPSK transmission system. Root Raised Cosine (RRC) and Raised Cosine (RC) Pulse shaping filters have been used for comparison. The measurement results serve as a guideline to the system designer to select the proper pulse shaping filter with the appropriate value of filter roll off factor (a) in a QPSK modulated mobile communication system for optimal values of its different performance metrics.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:44:11 GMT" } ]
2009-12-07T00:00:00
[ [ "Chattopadhyay", "Sudipta", "" ], [ "Sanyal", "Salil Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0759
EPTCS
Filippo Bonchi (CWI, Netherland), Davide Grohmann (University of Udine, Italy), Paola Spoletini (University of Insubria - Como, Italy), Emilio Tuosto (University of Leicester, UK)
Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions
null
EPTCS 12, 2009
10.4204/EPTCS.12
null
cs.LO cs.CR cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the 2nd Workshop on Interaction and Concurrency Experience (ICE'09). The workshop was held in Bologna, Italy on 31th of August 2009, as a satellite workshop of CONCUR'09. The previous edition of ICE has been organized in Reykjavik (2008). The ICE workshop is intended as a series of international scientific meetings oriented to researchers in various fields of theoretical computer science and, each year, the workshop focuses on a specific topic: ICE 2009 focused on structured interactions meant as the class of synchronisations that go beyond the "simple" point-to-point synchronisations (e.g., multicast or broadcast synchronisations, even-notification based interactions, time dependent interactions, distributed transactions,...).
[ { "version": "v1", "created": "Thu, 3 Dec 2009 23:55:44 GMT" } ]
2009-12-07T00:00:00
[ [ "Bonchi", "Filippo", "", "CWI, Netherland" ], [ "Grohmann", "Davide", "", "University of\n Udine, Italy" ], [ "Spoletini", "Paola", "", "University of Insubria - Como, Italy" ], [ "Tuosto", "Emilio", "", "University of Leicester, UK" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0912.0765
Jamshid Abouei
Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, and Subbarayan Pasupathy
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks
submitted to IEEE Transactions on Wireless Communications (25 pages)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the first in-depth analysis on the energy efficiency of LT codes with Non Coherent M-ary Frequency Shift Keying (NC-MFSK), known as green modulation [1], in a proactive Wireless Sensor Network (WSN) over Rayleigh flat-fading channels with path-loss. We describe the proactive system model according to a pre-determined time-based process utilized in practical sensor nodes. The present analysis is based on realistic parameters including the effect of channel bandwidth used in the IEEE 802.15.4 standard, and the active mode duration. A comprehensive analysis, supported by some simulation studies on the probability mass function of the LT code rate and coding gain, shows that among uncoded NC-MFSK and various classical channel coding schemes, the optimized LT coded NC-MFSK is the most energy-efficient scheme for distance $d$ greater than the pre-determined threshold level $d_T$, where the optimization is performed over coding and modulation parameters. In addition, although uncoded NC-MFSK outperforms coded schemes for $d < d_T$, the energy gap between LT coded and uncoded NC-MFSK is negligible for $d < d_T$ compared to the other coded schemes. These results come from the flexibility of the LT code to adjust its rate to suit instantaneous channel conditions, and suggest that LT codes are beneficial in practical low-power WSNs with dynamic position sensor nodes.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 02:14:05 GMT" } ]
2009-12-07T00:00:00
[ [ "Abouei", "Jamshid", "" ], [ "Brown", "J. David", "" ], [ "Plataniotis", "Konstantinos N.", "" ], [ "Pasupathy", "Subbarayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0779
Hartmut Neven
Hartmut Neven, Vasil S. Denchev, Geordie Rose, William G. Macready
Training a Large Scale Classifier with the Quantum Adiabatic Algorithm
14 pages, 5 figures
null
null
null
quant-ph cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous publication we proposed discrete global optimization as a method to train a strong binary classifier constructed as a thresholded sum over weak classifiers. Our motivation was to cast the training of a classifier into a format amenable to solution by the quantum adiabatic algorithm. Applying adiabatic quantum computing (AQC) promises to yield solutions that are superior to those which can be achieved with classical heuristic solvers. Interestingly we found that by using heuristic solvers to obtain approximate solutions we could already gain an advantage over the standard method AdaBoost. In this communication we generalize the baseline method to large scale classifier training. By large scale we mean that either the cardinality of the dictionary of candidate weak classifiers or the number of weak learners used in the strong classifier exceed the number of variables that can be handled effectively in a single global optimization. For such situations we propose an iterative and piecewise approach in which a subset of weak classifiers is selected in each iteration via global optimization. The strong classifier is then constructed by concatenating the subsets of weak classifiers. We show in numerical studies that the generalized method again successfully competes with AdaBoost. We also provide theoretical arguments as to why the proposed optimization method, which does not only minimize the empirical loss but also adds L0-norm regularization, is superior to versions of boosting that only minimize the empirical loss. By conducting a Quantum Monte Carlo simulation we gather evidence that the quantum adiabatic algorithm is able to handle a generic training problem efficiently.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 06:30:27 GMT" } ]
2009-12-07T00:00:00
[ [ "Neven", "Hartmut", "" ], [ "Denchev", "Vasil S.", "" ], [ "Rose", "Geordie", "" ], [ "Macready", "William G.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0912.0797
Lorenzo Cappellari
Lorenzo Cappellari
On Syndrome Decoding for Slepian-Wolf Coding Based on Convolutional and Turbo Codes
3 pages, 1 figure (2 graphic files arranged with subfigure); a note was added; to appear on IEEE Comm. Letters
IEEE Comm. Letters, vol. 14, no. 6, pp. 554-556, Jun. 2010
10.1109/LCOMM.2010.06.100283
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In source coding, either with or without side information at the decoder, the ultimate performance can be achieved by means of random binning. Structured binning into cosets of performing channel codes has been successfully employed in practical applications. In this letter it is formally shown that various convolutional- and turbo-syndrome decoding algorithms proposed in literature lead in fact to the same estimate. An equivalent implementation is also delineated by directly tackling syndrome decoding as a maximum a posteriori probability problem and solving it by means of iterative message-passing. This solution takes advantage of the exact same structures and algorithms used by the conventional channel decoder for the code according to which the syndrome is formed.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 09:09:51 GMT" }, { "version": "v2", "created": "Wed, 3 Mar 2010 08:51:54 GMT" }, { "version": "v3", "created": "Thu, 15 Apr 2010 13:36:04 GMT" } ]
2010-08-03T00:00:00
[ [ "Cappellari", "Lorenzo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0803
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Nicolae Tapus
New Algorithmic Approaches for Computing Optimal Network Paths with Several Types of QoS Constraints
null
Proceedings of the 8th RoEduNet International Conference, pp. 7-12, Galati, Romania, 3-4 December, 2009. (ISBN: 978-606-8085-15-9)
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of efficiently delivering data within networks is very important nowadays, especially in the context of the large volumes of data which are being produced each year and of the increased data access needs of the users. Efficient data delivery strategies must satisfy several types of Quality of Service (QoS) constraints which are imposed by the data consumers. One possibility of achieving this goal (particularly in the case of in-order data transfers) is to choose a satisfactory network delivery path. In this paper we present novel algorithmic approaches for computing optimal network paths which satisfy several types of (QoS) constraints.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 09:53:40 GMT" } ]
2009-12-07T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tapus", "Nicolae", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0807
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Nicolae Tapus
Practical Algorithmic Techniques for Several String Processing Problems
null
Proceedings of the 8th RoEduNet International Conference, pp. 136-141, Galati, Romania, 3-4 December, 2009. (ISBN: 978-606-8085-15-9)
null
null
cs.DS cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The domains of data mining and knowledge discovery make use of large amounts of textual data, which need to be handled efficiently. Specific problems, like finding the maximum weight ordered common subset of a set of ordered sets or searching for specific patterns within texts, occur frequently in this context. In this paper we present several novel and practical algorithmic techniques for processing textual data (strings) in order to efficiently solve multiple problems. Our techniques make use of efficient string algorithms and data structures, like KMP, suffix arrays, tries and deterministic finite automata.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 10:04:16 GMT" } ]
2009-12-07T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tapus", "Nicolae", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0912.0821
Filippo Petroni
Filippo Petroni and Maurizio Serva
Lexical evolution rates by automated stability measure
null
null
10.1088/1742-5468/2010/03/P03015
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Phylogenetic trees can be reconstructed from the matrix which contains the distances between all pairs of languages in a family. Recently, we proposed a new method which uses normalized Levenshtein distances among words with same meaning and averages on all the items of a given list. Decisions about the number of items in the input lists for language comparison have been debated since the beginning of glottochronology. The point is that words associated to some of the meanings have a rapid lexical evolution. Therefore, a large vocabulary comparison is only apparently more accurate then a smaller one since many of the words do not carry any useful information. In principle, one should find the optimal length of the input lists studying the stability of the different items. In this paper we tackle the problem with an automated methodology only based on our normalized Levenshtein distance. With this approach, the program of an automated reconstruction of languages relationships is completed.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 11:33:54 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2009 07:54:25 GMT" } ]
2015-05-14T00:00:00
[ [ "Petroni", "Filippo", "" ], [ "Serva", "Maurizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0912.0840
Benjamin Nguyen
Benjamin Nguyen, Antoine Vion, Francois-Xavier Dudouet, Loic Saint-Ghislain
Applying an XML Warehouse to Social Network Analysis, Lessons from the WebStand Project
W3C Workshop on the Future of Social Networking
W3C Workshop on the Future of Social Networking, electronic proceedings available at http://www.w3.org/2008/09/msnws/ Barcelona, Spain, 2009
null
null
cs.DB cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the state of advancement of the French ANR WebStand project. The objective of this project is to construct a customizable XML based warehouse platform to acquire, transform, analyze, store, query and export data from the web, in particular mailing lists, with the final intension of using this data to perform sociological studies focused on social groups of World Wide Web, with a specific emphasis on the temporal aspects of this data. We are currently using this system to analyze the standardization process of the W3C, through its social network of standard setters.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 13:04:44 GMT" } ]
2009-12-07T00:00:00
[ [ "Nguyen", "Benjamin", "" ], [ "Vion", "Antoine", "" ], [ "Dudouet", "Francois-Xavier", "" ], [ "Saint-Ghislain", "Loic", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0912.0850
Travis Gagie
Travis Gagie and Pawel Gawrychowski
Grammar-Based Compression in a Streaming Model
Section on recent work added, sketching how to improve bounds and support random access
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that, given a string $s$ of length $n$, with constant memory and logarithmic passes over a constant number of streams we can build a context-free grammar that generates $s$ and only $s$ and whose size is within an $\Oh{\min (g \log g, \sqrt{n \log g})}$-factor of the minimum $g$. This stands in contrast to our previous result that, with polylogarithmic memory and polylogarithmic passes over a single stream, we cannot build such a grammar whose size is within any polynomial of $g$.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 13:17:22 GMT" }, { "version": "v2", "created": "Sat, 23 Jan 2010 20:33:55 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 20:05:17 GMT" }, { "version": "v4", "created": "Sat, 6 Feb 2010 02:09:00 GMT" } ]
2010-02-06T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Gawrychowski", "Pawel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0868
Urs Niesen
Urs Niesen
Interference Alignment in Dense Wireless Networks
21 pages
IEEE Transactions on Information Theory, vol. 57, pp. 2889-2901, May 2011
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider arbitrary dense wireless networks, in which $n$ nodes are placed in an arbitrary (deterministic) manner on a square region of unit area and communicate with each other over Gaussian fading channels. We provide inner and outer bounds for the $n\times n$-dimensional unicast and the $n\times 2^n$-dimensional multicast capacity regions of such a wireless network. These inner and outer bounds differ only by a factor $O(\log(n))$, yielding a fairly tight scaling characterization of the entire regions. The communication schemes achieving the inner bounds use interference alignment as a central technique and are, at least conceptually, surprisingly simple.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 14:42:18 GMT" }, { "version": "v2", "created": "Mon, 20 Sep 2010 12:57:22 GMT" }, { "version": "v3", "created": "Wed, 19 Jan 2011 15:21:00 GMT" } ]
2011-08-09T00:00:00
[ [ "Niesen", "Urs", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0878
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom
Nullity Invariance for Pivot and the Interlace Polynomial
small revision of Section 8 w.r.t. v2, 14 pages, 6 figures
Linear Algebra and its Applications, v. 435, 277-288, 2011
10.1016/j.laa.2011.01.024
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the effect of principal pivot transform on the nullity values of the principal submatrices of a given (square) matrix is described by the symmetric difference operator (for sets). We consider its consequences for graphs, and in particular generalize the recursive relation of the interlace polynomial and simplify its proof.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 15:25:18 GMT" }, { "version": "v2", "created": "Thu, 18 Feb 2010 12:15:48 GMT" }, { "version": "v3", "created": "Wed, 4 Aug 2010 15:20:16 GMT" } ]
2014-03-26T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0912.0884
Filippo Petroni
Filippo Petroni and Maurizio Serva
Measures of lexical distance between languages
null
null
10.1016/j.physa.2010.02.004
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea of measuring distance between languages seems to have its roots in the work of the French explorer Dumont D'Urville \cite{Urv}. He collected comparative words lists of various languages during his voyages aboard the Astrolabe from 1826 to 1829 and, in his work about the geographical division of the Pacific, he proposed a method to measure the degree of relation among languages. The method used by modern glottochronology, developed by Morris Swadesh in the 1950s, measures distances from the percentage of shared cognates, which are words with a common historical origin. Recently, we proposed a new automated method which uses normalized Levenshtein distance among words with the same meaning and averages on the words contained in a list. Recently another group of scholars \cite{Bak, Hol} proposed a refined of our definition including a second normalization. In this paper we compare the information content of our definition with the refined version in order to decide which of the two can be applied with greater success to resolve relationships among languages.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 15:53:24 GMT" }, { "version": "v2", "created": "Mon, 7 Dec 2009 07:38:55 GMT" }, { "version": "v3", "created": "Wed, 9 Dec 2009 11:27:47 GMT" } ]
2015-05-14T00:00:00
[ [ "Petroni", "Filippo", "" ], [ "Serva", "Maurizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0912.0893
Achmad Benny Mutiara
A.D.Astuti and A.B. Mutiara
Performance Analysis on Molecular Dynamics Simulation of Protein Using GROMACS
8 pages, 4 figures
null
null
null
cs.CE q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Development of computer technology in chemistry, bring many application of chemistry. Not only the application to visualize the structure of molecule but also to molecular dynamics simulation. One of them is Gromacs. Gromacs is an example of molecular dynamics application developed by Groningen University. This application is a non-commercial and able to work in the operating system Linux. The main ability of Gromacs is to perform molecular dynamics simulation and minimization energy. In this paper, the author discusses about how to work Gromacs in molecular dynamics simulation of some protein. In the molecular dynamics simulation, Gromacs does not work alone. Gromacs interact with pymol and Grace. Pymol is an application to visualize molecule structure and Grace is an application in Linux to display graphs. Both applications will support analysis of molecular dynamics simulation.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 16:47:24 GMT" } ]
2009-12-07T00:00:00
[ [ "Astuti", "A. D.", "" ], [ "Mutiara", "A. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" } ]
0912.0898
Benjamin Nguyen
Pablo Andres Diaz, Francois-Xavier Dudouet, Jean-Christophe Graz, Benjamin Nguyen, Antoine Vion
Gouverner la standardisation par les changements d'arene. Le cas du XML
Communication in the Economy of Politics and Politics of Economy session of the French Political Sciences Association Congress (AFSP), Grenoble, France 2009
Congres de l'Association Francaise de Sciences Politiques, Grenoble, France, 2009
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss the available approches of the new governance structures of standardization, in order to propose new hypothesis on the way computer sciences languages are dealt with. We consider the example of the XML language and its applications in order to propose a dynamic analysis of this governance, focusing on the coordination that is done by companies, and the strategic usage they have of these arenas to further their goals. We advocate the development of more of such empirical analysis in order to cover all the perspectives of possible international policies in this area.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 17:01:52 GMT" } ]
2009-12-07T00:00:00
[ [ "Diaz", "Pablo Andres", "" ], [ "Dudouet", "Francois-Xavier", "" ], [ "Graz", "Jean-Christophe", "" ], [ "Nguyen", "Benjamin", "" ], [ "Vion", "Antoine", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0912.0913
Rdv Ijcsis
Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni
Search for overlapped communities by parallel genetic algorithms
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 113-118, November 2009, USA
null
ISSN 1947 5500
cs.IR cs.GL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last decade the broad scope of complex networks has led to a rapid progress. In this area a particular interest has the study of community structures. The analysis of this type of structure requires the formalization of the intuitive concept of community and the definition of indices of goodness for the obtained results. A lot of algorithms has been presented to reach this goal. In particular, an interesting problem is the search of overlapped communities and it is field seems very interesting a solution based on the use of genetic algorithms. The approach discusses in this paper is based on a parallel implementation of a genetic algorithm and shows the performance benefits of this solution.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:54:07 GMT" }, { "version": "v2", "created": "Mon, 7 Dec 2009 11:09:29 GMT" } ]
2009-12-07T00:00:00
[ [ "Carchiolo", "Vincenza", "" ], [ "Longheu", "Alessandro", "" ], [ "Malgeri", "Michele", "" ], [ "Mangioni", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0912.0921
Bryan Ford
Janardhan Iyengar (Franklin and Marshall College), Bryan Ford (Yale University)
Flow Splitting with Fate Sharing in a Next Generation Transport Services Architecture
12 pages, 11 figures, 1 table
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The challenges of optimizing end-to-end performance over diverse Internet paths has driven widespread adoption of in-path optimizers, which can destructively interfere with TCP's end-to-end semantics and with each other, and are incompatible with end-to-end IPsec. We identify the architectural cause of these conflicts and resolve them in Tng, an experimental next-generation transport services architecture, by factoring congestion control from end-to-end semantic functions. Through a technique we call "queue sharing", Tng enables in-path devices to interpose on, split, and optimize congestion controlled flows without affecting or seeing the end-to-end content riding these flows. Simulations show that Tng's decoupling cleanly addresses several common performance problems, such as communication over lossy wireless links and reduction of buffering-induced latency on residential links. A working prototype and several incremental deployment paths suggest Tng's practicality.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 19:36:43 GMT" } ]
2009-12-07T00:00:00
[ [ "Iyengar", "Janardhan", "", "Franklin and Marshall College" ], [ "Ford", "Bryan", "", "Yale\n University" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0926
Bryan Ford
Amittai Aviram and Bryan Ford (Yale University)
Deterministic Consistency: A Programming Model for Shared Memory Parallelism
7 pages, 3 figures
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The difficulty of developing reliable parallel software is generating interest in deterministic environments, where a given program and input can yield only one possible result. Languages or type systems can enforce determinism in new code, and runtime systems can impose synthetic schedules on legacy parallel code. To parallelize existing serial code, however, we would like a programming model that is naturally deterministic without language restrictions or artificial scheduling. We propose "deterministic consistency", a parallel programming model as easy to understand as the "parallel assignment" construct in sequential languages such as Perl and JavaScript, where concurrent threads always read their inputs before writing shared outputs. DC supports common data- and task-parallel synchronization abstractions such as fork/join and barriers, as well as non-hierarchical structures such as producer/consumer pipelines and futures. A preliminary prototype suggests that software-only implementations of DC can run applications written for popular parallel environments such as OpenMP with low (<10%) overhead for some applications.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:10:12 GMT" }, { "version": "v2", "created": "Mon, 1 Feb 2010 16:27:48 GMT" } ]
2010-02-01T00:00:00
[ [ "Aviram", "Amittai", "", "Yale University" ], [ "Ford", "Bryan", "", "Yale University" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0912.0928
Turlough Neary
Turlough Neary
On the computational complexity of spiking neural P systems
null
null
null
null
cs.CC q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that there is no standard spiking neural P system that simulates Turing machines with less than exponential time and space overheads. The spiking neural P systems considered here have a constant number of neurons that is independent of the input length. Following this we construct a universal spiking neural P system with exhaustive use of rules that simulates Turing machines in linear time and has only 10 neurons.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:15:28 GMT" } ]
2009-12-07T00:00:00
[ [ "Neary", "Turlough", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0912.0930
Rdv Ijcsis
C. Kalyana Chakravarthy, P.V.G.D. Prasad Reddy
Modified Opportunistic Deficit Round Robin Scheduling for improved QOS in IEEE 802.16 WBA networks
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 075-081, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In our work, we propose two credit based scheduling schemes one in which completed flows distributes the left over credits equally to all higher priority uncompleted flows(ODRREDC) and another in which completed flows give away all the excess credits to the highest priority uncompleted flow(ODRRSDC). Both the schemes are compatible with 802.16 MAC protocol and can efficiently serve real time bursty traffic with reduced latency and hence improved QOS for real time flows. We compare the two proposed schemes for their latency, bandwidth utilization and throughput for real time burst flows with the opportunity based Deficit Round Robin scheduling scheme. While the ODRR scheduler focuses on reducing the credits for the flows with errors, our approach also distributes these remaining credits together with the credits from completed flows equally among the higher priority uncompleted flows or totally to the highest priority uncompleted flow.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:20:54 GMT" } ]
2009-12-07T00:00:00
[ [ "Chakravarthy", "C. Kalyana", "" ], [ "Reddy", "P. V. G. D. Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0931
Bart Jacobs
Bart Jacobs
Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories
null
Logical Methods in Computer Science, Volume 6, Issue 2 (June 18, 2010) lmcs:1083
10.2168/LMCS-6(2:1)2010
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a sequel to arXiv:0902.2355 and continues the study of quantum logic via dagger kernel categories. It develops the relation between these categories and both orthomodular lattices and Foulis semigroups. The relation between the latter two notions has been uncovered in the 1960s. The current categorical perspective gives a broader context and reconstructs this relationship between orthomodular lattices and Foulis semigroups as special instance.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:36:49 GMT" }, { "version": "v2", "created": "Mon, 14 Jun 2010 08:39:53 GMT" }, { "version": "v3", "created": "Fri, 18 Jun 2010 11:53:26 GMT" } ]
2015-07-01T00:00:00
[ [ "Jacobs", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0912.0932
Rdv Ijcsis
Yasser .H. Elawady, A.S. Tolba
Educational Objectives Of Different Laboratory Types: A Comparative Study
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 089-096, November 2009, USA
null
ISSN 1947 5500
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Laboratory based courses play a critical role in scientific education. Automation is changing the nature of the laboratories, and there is a long running debate about the value of hands on versus simulated and remote laboratories. The remote lab technology has brought a significant improvement in communication within the Academic community and has improved students learning experiences. There are different educational objectives as criteria for judging the laboratories: Hands on advocates emphasize design skills, while remote lab advocates focus on conceptual understanding. Remote laboratories offer all the advantages of the new technology, but are often a poor replacement for real laboratory work. Remote laboratories are similar to simulation techniques in that they require minimal space and time, because the experiments can be rapidly configured and run over the Internet [Web]. But unlike simulations, they provide real data. This paper presents a comparative analysis for the educational objectives of the three laboratory techniques, hands on, simulated, and remote laboratories. In addition, it proposes enhancements for the remote lab activities leading to improving its performance.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 20:32:19 GMT" } ]
2009-12-07T00:00:00
[ [ "Elawady", "Yasser . H.", "" ], [ "Tolba", "A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0912.0936
Haroldo Campos Velho
F. F. Paes, H. F. Campos Velho
Neural-estimator for the surface emission rate of atmospheric gases
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emission rate of minority atmospheric gases is inferred by a new approach based on neural networks. The neural network applied is the multi-layer perceptron with backpropagation algorithm for learning. The identification of these surface fluxes is an inverse problem. A comparison between the new neural-inversion and regularized inverse solution id performed. The results obtained from the neural networks are significantly better. In addition, the inversion with the neural netwroks is fster than regularized approaches, after training.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:33:10 GMT" } ]
2009-12-08T00:00:00
[ [ "Paes", "F. F.", "" ], [ "Velho", "H. F. Campos", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0912.0942
Rdv Ijcsis
Farnaz Towhidi, Maslin Masrom
A Survey on Recognition Based Graphical User Authentication Algorithms
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 119-127, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, user authentication is one of the important topics in information security. Strong textbased password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution to textbased authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet based environments try used graphical authentication technique for their users authentication. All of graphical passwords have two different aspects which are usability and security. Unfortunately none of these algorithms were being able to cover both of these aspects at the same time. In this paper, we described eight recognition based authentication algorithms in terms of their drawbacks and attacks. In the next section, the usability standards from ISO and the related attributes for graphical user authentication usability are discussed. The related attack patterns for graphical user authentication security part are also discussed. Finally, a comparison table of all recognition based algorithms is presented based on ISO and attack patterns standards.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:02:26 GMT" } ]
2009-12-08T00:00:00
[ [ "Towhidi", "Farnaz", "" ], [ "Masrom", "Maslin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0946
Rdv Ijcsis
Md. Zahid Hasan, Mohammad Reaz Hossain, Md. Ashraful Islam, Riaz Hossain
Comparative Study of Different Guard Time Intervals to Improve the BER Performance of Wimax Systems to Minimize the Effects of ISI and ICI under Adaptive Modulation Techniques over SUI1 and AWGN Communication Channels
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 128-132, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The WIMAX technology based on air interface standard 802.16 wireless MAN is configured in the same way as a traditional cellular network with base stations using point to multipoint architecture to drive a service over a radius up to several kilometers. The range and the Non Line of Sight (NLOS) ability of WIMAX make the system very attractive for users, but there will be slightly higher BER at low SNR. The aim of this paper is the comparative study of different guard time intervals effect for improving BER at different SNR under digital modulation (QPSK, 16QAM and 64QAM) techniques and different communication channels AWGN and fading channels Stanford University Interim (SUI 1) of an WIMAX system. The comparison between these effects with Reed-Solomon (RS) encoder with Convolutional encoder (half) rated codes in FEC channel coding will be investigated. The simulation results of estimated Bit Error Rate (BER) displays that the implementation of interleaved RS code (255,239,8) with (half) rated Convolutional code of 0.25 guard time intervals under QPSK modulation technique over AWGN channel is highly effective to combat in the Wimax communication system. To complete this performance analysis in Wimax based systems, a segment of audio signal is used for analysis. The transmitted audio message is found to have retrieved effectively under noisy situation.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:07:38 GMT" } ]
2009-12-08T00:00:00
[ [ "Hasan", "Md. Zahid", "" ], [ "Hossain", "Mohammad Reaz", "" ], [ "Islam", "Md. Ashraful", "" ], [ "Hossain", "Riaz", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0947
Rdv Ijcsis
Samir B. Patel, Shrikant N. Pradhan, Saumitra U. Ambegaokar
A novel approach for implementing Steganography with computing power obtained by combining Cuda and Matlab
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 133-137, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the current development of multiprocessor systems, strive for computing data on such processor have also increased exponentially. If the multi core processors are not fully utilized, then even though we have the computing power the speed is not available to the end users for their respective applications. In accordance to this, the users or application designers also have to design newer applications taking care of the computing infrastructure available within. Our approach is to use the CUDA (Compute Unified Device Architecture) as backend and MATLAB as the front end to design an application for implementing steganography. Steganography is the term used for hiding information in the cover object like Image, Audio or Video data. As the computing required for multimedia data is much more than the text information, we have been successful in implementing image Steganography with the help of technology for the next generation.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:12:22 GMT" } ]
2009-12-08T00:00:00
[ [ "Patel", "Samir B.", "" ], [ "Pradhan", "Shrikant N.", "" ], [ "Ambegaokar", "Saumitra U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0950
Rdv Ijcsis
B N Lavanya, K B Raja and K R Venugopal
Fingerprint Verification based on Gabor Filter Enhancement
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 138-144, November 2009, USA
null
ISSN 1947 5500
cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human fingerprints are reliable characteristics for personnel identification as it is unique and persistence. A fingerprint pattern consists of ridges, valleys and minutiae. In this paper we propose Fingerprint Verification based on Gabor Filter Enhancement (FVGFE) algorithm for minutiae feature extraction and post processing based on 9 pixel neighborhood. A global feature extraction and fingerprints enhancement are based on Hong enhancement method which is simultaneously able to extract local ridge orientation and ridge frequency. It is observed that the Sensitivity and Specificity values are better compared to the existing algorithms.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:17:20 GMT" } ]
2009-12-08T00:00:00
[ [ "Lavanya", "B N", "" ], [ "Raja", "K B", "" ], [ "Venugopal", "K R", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0951
Rdv Ijcsis
Arash Habibi Lashkari, Samaneh Farmand, Dr. Omar Bin Zakaria, Dr. Rosli Saleh
Shoulder Surfing attack in graphical password authentication
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 145-154, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords. When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by recording the individuals authentication session. This is referred to as shouldersurfing and is a known risk, of special concern when authenticating in public places. In this paper we will present a survey on graphical password schemes from 2005 till 2009 which are proposed to be resistant against shoulder surfing attacks.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:24:18 GMT" } ]
2009-12-08T00:00:00
[ [ "Lashkari", "Arash Habibi", "" ], [ "Farmand", "Samaneh", "" ], [ "Zakaria", "Dr. Omar Bin", "" ], [ "Saleh", "Dr. Rosli", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0954
Rdv Ijcsis
Samir B. Patel and Shrikant N. Pradhan
An approach to secure highly confidential documents of any size in the corporate or institutes having unsecured networks
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 155-163, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the tremendous amount of computing because of the wide usage of internet it is observed that some user(s) are not able to manage their desktop with antivirus software properly installed. It is happening few times, that we allow our friends, students and colleagues to sit on our networked PC. Sometimes the user is unaware of the situation that there workstations are unsecured and so some one else could also be monitoring your flow of information and your most important data could go haywire, resulting into leakage of most confidential data to unwanted or malicious user(s). Example of some such documents could be question papers designed by the faculty member by various universities. Now a day most of the universities are having the biggest threat about the question papers and many other confidential documents designed by their faculty members. We in this paper present the solution to over come such a situation using the concept of Steganography. Steganography is a technique through which one can hide information into some cover object. This technique, if used, in positive direction could be of great help to solve such a problem and even other.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:46:32 GMT" } ]
2009-12-08T00:00:00
[ [ "Patel", "Samir B.", "" ], [ "Pradhan", "Shrikant N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0955
Rdv Ijcsis
Nazmeen Bibi Boodoo, and R. K. Subramanian
Robust Multi biometric Recognition Using Face and Ear Images
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 164-169, November 2009, USA
null
ISSN 1947 5500
cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study investigates the use of ear as a biometric for authentication and shows experimental results obtained on a newly created dataset of 420 images. Images are passed to a quality module in order to reduce False Rejection Rate. The Principal Component Analysis (eigen ear) approach was used, obtaining 90.7 percent recognition rate. Improvement in recognition results is obtained when ear biometric is fused with face biometric. The fusion is done at decision level, achieving a recognition rate of 96 percent.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:51:03 GMT" } ]
2009-12-08T00:00:00
[ [ "Boodoo", "Nazmeen Bibi", "" ], [ "Subramanian", "R. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0912.0956
Rdv Ijcsis
Rashid Sheikh, and Beerendra Kumar, Durgesh Kumar Mishra
Privacy Preserving k Secure Sum Protocol
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 184-188, November 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure Multiparty Computation (SMC) allows parties to know the result of cooperative computation while preserving privacy of individual data. Secure sum computation is an important application of SMC. In our proposed protocols parties are allowed to compute the sum while keeping their individual data secret with increased computation complexity for hacking individual data. In this paper the data of individual party is broken into a fixed number of segments. For increasing the complexity we have used the randomization technique with segmentation
[ { "version": "v1", "created": "Fri, 4 Dec 2009 21:54:51 GMT" } ]
2009-12-08T00:00:00
[ [ "Sheikh", "Rashid", "" ], [ "Kumar", "Beerendra", "" ], [ "Mishra", "Durgesh Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0912.0962
Ramya Bhagavatula
Ramya Bhagavatula and Robert W. Heath Jr.
Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in Cooperative Multicell Systems
28 pages, submitted to IEEE Transactions on Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Base station cooperation improves the sum-rates that can be achieved in cellular systems. Conventional cooperation techniques require sharing large amounts of information over finite-capacity backhaul links and assume that base stations have full channel state information (CSI) of all the active users in the system. In this paper, a new limited feedback strategy is proposed for multicell beamforming where cooperation is restricted to sharing only the CSI of active users among base stations. The system setup considered is a linear array of cells based on the Wyner model. Each cell contains single-antenna users and multi-antenna base stations. Closed-form expressions for the beamforming vectors that approximately maximize the sum-rates in a multicell system are first presented, assuming full CSI at the transmitter. For the more practical case of a finite-bandwidth feedback link, CSI of the desired and interfering channels is quantized at the receiver before being fed back to the base station. An upper bound on the mean loss in sum rate due to random vector quantization is derived. A new feedback-bit allocation strategy, to partition the available bits between the desired and interfering channels, is developed to approximately minimize the mean loss in sum-rate due to quantization. The proposed feedback-bit partitioning algorithm is shown, using simulations, to yield sum-rates close to the those obtained using full CSI at base stations.
[ { "version": "v1", "created": "Fri, 4 Dec 2009 23:57:32 GMT" } ]
2009-12-08T00:00:00
[ [ "Bhagavatula", "Ramya", "" ], [ "Heath", "Robert W.", "Jr." ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0965
Adam Smith
Venkatesan Guruswami and Adam Smith
Explicit Capacity-achieving Codes for Worst-Case Additive Errors
This preprint has been withdrawn since it is superseded by arXiv:1004.4017 [cs.IT] (same authors), which contains significantly more general results. This preprint will no longer be updated by the authors.
null
null
null
cs.IT cs.CC math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For every p in (0,1/2), we give an explicit construction of binary codes of rate approaching "capacity" 1-H(p) that enable reliable communication in the presence of worst-case additive errors}, caused by a channel oblivious to the codeword (but not necessarily the message). Formally, we give an efficient "stochastic" encoding E(\cdot,\cdot) of messages combined with a small number of auxiliary random bits, such that for every message m and every error vector e (that could depend on m) that contains at most a fraction p of ones, w.h.p over the random bits r chosen by the encoder, m can be efficiently recovered from the corrupted codeword E(m,r) + e by a decoder without knowledge of the encoder's randomness r. Our construction for additive errors also yields explicit deterministic codes of rate approaching 1-H(p) for the "average error" criterion: for every error vector e of at most p fraction 1's, most messages m can be efficiently (uniquely) decoded from the corrupted codeword C(m)+e. Note that such codes cannot be linear, as the bad error patterns for all messages are the same in a linear code. We also give a new proof of the existence of such codes based on list decoding and certain algebraic manipulation detection codes. Our proof is simpler than the previous proofs from the literature on arbitrarily varying channels.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 00:31:48 GMT" }, { "version": "v2", "created": "Sat, 1 May 2010 03:04:23 GMT" } ]
2010-05-04T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Smith", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.0970
Victor Bushkov
Victor Bushkov, Nina Yevtushenko, Tiziano Villa
Discussion on Supervisory Control by Solving Automata Equation
4 pages
IEEE Proc. EWDTS'09 (2009) 77-80
null
null
cs.OH math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the supervisory control problem through language equation solving. The equation solving approach allows to deal with more general topologies and to find a largest supervisor which can be used as a reservoir for deriving an optimal controller. We introduce the notions of solutions under partial controllability and partial observability, and we show how supervisory control problems with partial controllability and partial observability can be solved by employing equation solving methods.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 01:56:41 GMT" } ]
2009-12-08T00:00:00
[ [ "Bushkov", "Victor", "" ], [ "Yevtushenko", "Nina", "" ], [ "Villa", "Tiziano", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0912.0975
Julian McAuley
Julian J. McAuley, Tib\'erio S. Caetano
An expected-case sub-cubic solution to the all-pairs shortest path problem in R
9 pages, 5 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It has been shown by Alon et al. that the so-called 'all-pairs shortest-path' problem can be solved in O((MV)^2.688 * log^3(V)) for graphs with V vertices, with integer distances bounded by M. We solve the more general problem for graphs in R (assuming no negative cycles), with expected-case running time O(V^2.5 * log(V)). While our result appears to violate the Omega(V^3) requirement of "Funny Matrix Multiplication" (due to Kerr), we find that it has a sub-cubic expected time solution subject to reasonable conditions on the data distribution. The expected time solution arises when certain sub-problems are uncorrelated, though we can do better/worse than the expected-case under positive/negative correlation (respectively). Whether we observe positive/negative correlation depends on the statistics of the graph in question. In practice, our algorithm is significantly faster than Floyd-Warshall, even for dense graphs.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 03:31:07 GMT" } ]
2009-12-08T00:00:00
[ [ "McAuley", "Julian J.", "" ], [ "Caetano", "Tibério S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.0982
Rdv Ijcsis
G. Singaravel, Dr. V. Palanisamy, Dr. A. Krishnan
Ethics Understanding of Software Professional In Risk Reducing Reusability Coding Using Inclusion Set Theory
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 189-193, November 2009, USA
null
ISSN 1947 5500
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The technical skill or ability of an individual is different to person in software developments of projects. So, it is necessary to identify the talent and attitude of an individual contribution can be uniformly distributed to the different phases of software development cycle. The line of code analysis metrics to understanding the various skills of the programmers in code development. By using the inclusion set theory of n (AUB) refer to strength and risk free code developed from union of software professionals and system must comprise of achievement of the system goal, effective memory utilization and intime delivery of the product.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 05:49:57 GMT" } ]
2009-12-08T00:00:00
[ [ "Singaravel", "G.", "" ], [ "Palanisamy", "Dr. V.", "" ], [ "Krishnan", "Dr. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0912.0983
Rdv Ijcsis
Lena Khaled
Architectural Design Activities for JAS
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 194-198, November 2009, USA
null
ISSN 1947 5500
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The critical part for building any software system is its architecture. Architectural design is a design at a higher level of abstraction. A good architecture ensures that software will satisfy its requirement. This paper defines the most important activities of architectural design that used through building any software; also it applies these activities on one type of Electronic Commerce (EC) applications that is Job Agency System(JAS) to show how these activities can work through these types of applications.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 05:52:20 GMT" } ]
2009-12-08T00:00:00
[ [ "Khaled", "Lena", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0912.0984
Rdv Ijcsis
A. Sabari, K. Duraiswamy,
Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc Networks
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 199-207, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicasting is effective when its group members are sparse and the speed is low. On the other hand, broadcasting is effective when the group members dense and the speed are high. Since mobile ad hoc networks are highly dynamic in nature, either of the above two strategies can be adopted at different scenarios. In this paper, we propose an ant agent based adaptive, multicast protocol that exploits group members desire to simplify multicast routing and invoke broadcast operations in appropriate localized regimes. By reducing the number of group members that participate in the construction of the multicast structure and by providing robustness to mobility by performing broadcasts in densely clustered local regions, the proposed protocol achieves packet delivery statistics that are comparable to that with a pure multicast protocol but with significantly lower overheads. By our simulation results, we show that our proposed protocol achieves increased Packet Delivery Fraction (PDF) with reduced overhead and routing load.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 05:55:16 GMT" } ]
2009-12-08T00:00:00
[ [ "Sabari", "A.", "" ], [ "Duraiswamy", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0985
Rdv Ijcsis
Ehsan Hosseini, Mohammad Ali Nematbakhsh
A New Approach to Cold Start in Peer to Peer File Sharing Networks
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 208-214, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Solving free riding and selecting a reliable service provider in P2P networks has been separately investigated in last few years. Using trust has shown to be one of the best ways of solving these problems. But using this approach to simultaneously deal with both problems makes it impossible for newcomers to join the network and the expansion of network is prevented. In this paper we used the game theory to model the behavior of peers and developed a mechanism in which free riding and providing bad service are dominated strategies for peers. At the same time newcomers can participate and are encouraged to be active in the network. The proposed model has been simulated and the results showed that the trust value of free riders and bad service providers converge to a finite value and trust of peers who provide good service is monotonically increased despite the time they join the network.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 05:57:51 GMT" } ]
2009-12-08T00:00:00
[ [ "Hosseini", "Ehsan", "" ], [ "Nematbakhsh", "Mohammad Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.0986
Rdv Ijcsis
Mutasem Khalil Sari Alsmadi, Khairuddin Bin Omar, Shahrul Azman Noah and Ibrahim Almarashdah
Fish recognition based on the combination between robust feature selection, image segmentation and geometrical parameter techniques using Artificial Neural Network and Decision Tree
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 215-221, November 2009, USA
null
ISSN 1947 5500
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We presents in this paper a novel fish classification methodology based on a combination between robust feature selection, image segmentation and geometrical parameter techniques using Artificial Neural Network and Decision Tree. Unlike existing works for fish classification, which propose descriptors and do not analyze their individual impacts in the whole classification task and do not make the combination between the feature selection, image segmentation and geometrical parameter, we propose a general set of features extraction using robust feature selection, image segmentation and geometrical parameter and their correspondent weights that should be used as a priori information by the classifier. In this sense, instead of studying techniques for improving the classifiers structure itself, we consider it as a black box and focus our research in the determination of which input information must bring a robust fish discrimination.The main contribution of this paper is enhancement recognize and classify fishes based on digital image and To develop and implement a novel fish recognition prototype using global feature extraction, image segmentation and geometrical parameters, it have the ability to Categorize the given fish into its cluster and Categorize the clustered fish into poison or non-poison fish, and categorizes the non-poison fish into its family .
[ { "version": "v1", "created": "Sat, 5 Dec 2009 06:04:03 GMT" } ]
2009-12-08T00:00:00
[ [ "Alsmadi", "Mutasem Khalil Sari", "" ], [ "Omar", "Khairuddin Bin", "" ], [ "Noah", "Shahrul Azman", "" ], [ "Almarashdah", "Ibrahim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0912.1004
Rdv Ijcsis
Shakeel Ahmad, Adli Mustafa, Bashir Ahmad, Arjamand Bano, Al-Sammarraie Hosam
Comparative Study Of Congestion Control Techniques In High Speed Networks
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 222-231, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Congestion in network occurs due to exceed in aggregate demand as compared to the accessible capacity of the resources. Network congestion will increase as network speed increases and new effective congestion control methods are needed, especially to handle bursty traffic of todays very high speed networks. Since late 90s numerous schemes i.e. [1]...[10] etc. have been proposed. This paper concentrates on comparative study of the different congestion control schemes based on some key performance metrics. An effort has been made to judge the performance of Maximum Entropy (ME) based solution for a steady state GE/GE/1/N censored queues with partial buffer sharing scheme against these key performance metrics.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:28:55 GMT" } ]
2009-12-08T00:00:00
[ [ "Ahmad", "Shakeel", "" ], [ "Mustafa", "Adli", "" ], [ "Ahmad", "Bashir", "" ], [ "Bano", "Arjamand", "" ], [ "Hosam", "Al-Sammarraie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.1005
Rdv Ijcsis
Dr. G. Padmavathi, Dr. P. Subashini, Mr. M. Muthu Kumar and Suresh Kumar Thakur
Performance analysis of Non Linear Filtering Algorithms for underwater images
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 232-238, November 2009, USA
null
ISSN 1947 5500
cs.MM cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image filtering algorithms are applied on images to remove the different types of noise that are either present in the image during capturing or injected in to the image during transmission. Underwater images when captured usually have Gaussian noise, speckle noise and salt and pepper noise. In this work, five different image filtering algorithms are compared for the three different noise types. The performances of the filters are compared using the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE). The modified spatial median filter gives desirable results in terms of the above two parameters for the three different noise. Forty underwater images are taken for study.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:33:09 GMT" } ]
2009-12-08T00:00:00
[ [ "Padmavathi", "Dr. G.", "" ], [ "Subashini", "Dr. P.", "" ], [ "Kumar", "Mr. M. Muthu", "" ], [ "Thakur", "Suresh Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0912.1007
Rdv Ijcsis
Mehdi Salkhordeh Haghighi, Hadi Sadoghi Yazdi, Abedin Vahedian, Hamed Modaghegh
Designing Kernel Scheme for Classifiers Fusion
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 239-248, November 2009, USA
null
ISSN 1947 5500
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a special fusion method for combining ensembles of base classifiers utilizing new neural networks in order to improve overall efficiency of classification. While ensembles are designed such that each classifier is trained independently while the decision fusion is performed as a final procedure, in this method, we would be interested in making the fusion process more adaptive and efficient. This new combiner, called Neural Network Kernel Least Mean Square1, attempts to fuse outputs of the ensembles of classifiers. The proposed Neural Network has some special properties such as Kernel abilities,Least Mean Square features, easy learning over variants of patterns and traditional neuron capabilities. Neural Network Kernel Least Mean Square is a special neuron which is trained with Kernel Least Mean Square properties. This new neuron is used as a classifiers combiner to fuse outputs of base neural network classifiers. Performance of this method is analyzed and compared with other fusion methods. The analysis represents higher performance of our new method as opposed to others.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:41:40 GMT" } ]
2009-12-08T00:00:00
[ [ "Haghighi", "Mehdi Salkhordeh", "" ], [ "Yazdi", "Hadi Sadoghi", "" ], [ "Vahedian", "Abedin", "" ], [ "Modaghegh", "Hamed", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0912.1008
Rdv Ijcsis
Rajni Ranjan Singh, and Deepak Singh Tomar
Approaches for user profile Investigation in Orkut Social Network
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 259-268, November 2009, USA
null
ISSN 1947 5500
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet becomes a large and rich repository of information about us as individually. Any thing form user profile information to friends links the user subscribes to are reflection of social interactions as user has in real worlds. Social networking has created new ways to communicate and share information. Social networking websites are being used regularly by millions of people, and it now seems that social networking will be an enduring part of everyday life. Social networks such as Orkut, Bebo, MySpace, Flickr, Facebook, Friendster and LinkedIn, have attracted millions of internet user who are involved in bogging, participatory book reviewing, personal networking and photo sharing. Social network services are increasingly being used in legal and criminal investigations. Information posted on sites such as Orkut and Facebook has been used by police, probation, and university officials to prosecute users of said sites. In some situations, content posted on web social network has been used in court. In the proposed work degree of closeness is identified by link weight approaches and information matrices are generated and matched on the basis of similarity in user profile information. The proposed technique is useful to investigate a user profile and calculate closeness or interaction between users.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:49:53 GMT" } ]
2009-12-08T00:00:00
[ [ "Singh", "Rajni Ranjan", "" ], [ "Tomar", "Deepak Singh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0912.1009
Rdv Ijcsis
V.K.Panchal, Parminder Singh, Navdeep Kaur, Harish Kundra
Biogeography based Satellite Image Classification
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 269-274, November 2009, USA
null
ISSN 1947 5500
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biogeography is the study of the geographical distribution of biological organisms. The mindset of the engineer is that we can learn from nature. Biogeography Based Optimization is a burgeoning nature inspired technique to find the optimal solution of the problem. Satellite image classification is an important task because it is the only way we can know about the land cover map of inaccessible areas. Though satellite images have been classified in past by using various techniques, the researchers are always finding alternative strategies for satellite image classification so that they may be prepared to select the most appropriate technique for the feature extraction task in hand. This paper is focused on classification of the satellite image of a particular land cover using the theory of Biogeography based Optimization. The original BBO algorithm does not have the inbuilt property of clustering which is required during image classification. Hence modifications have been proposed to the original algorithm and the modified algorithm is used to classify the satellite image of a given region. The results indicate that highly accurate land cover features can be extracted effectively when the proposed algorithm is used.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:54:24 GMT" } ]
2009-12-08T00:00:00
[ [ "Panchal", "V. K.", "" ], [ "Singh", "Parminder", "" ], [ "Kaur", "Navdeep", "" ], [ "Kundra", "Harish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0912.1010
Rdv Ijcsis
Mohd Shahizan Othman, Lizawati Mi Yusuf, Juhana Salim
Web Document Analysis for Companies Listed in Bursa Malaysia
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 275-280, November 2009, USA
null
ISSN 1947 5500
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a research on web document analysis for companies listed on Bursa Malaysia which is the forerunner of financial and investment center in Malaysia. Data set used in this research are from the company web documents listed in the Main Board and Second Board on Bursa Malaysia. This research has used the Web Resources Extraction System which was developed by the research group mainly to extract information for the web documents involved. Our research findings have shown that the level of website usage among the companies on Bursa Malaysia is still minimal. Furthermore, research has also found that 60.02 percent of the image files are utilized making it the most used type of file in creating websites.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 12:58:43 GMT" } ]
2009-12-08T00:00:00
[ [ "Othman", "Mohd Shahizan", "" ], [ "Yusuf", "Lizawati Mi", "" ], [ "Salim", "Juhana", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0912.1011
Rdv Ijcsis
R. Ashok Kumar, K. Ganesan
A Reliable Replication Strategy for VoD System using Markov Chain
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 281-290, November 2009, USA
null
ISSN 1947 5500
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have investigated on the reliability of streams for a VoD system. The objective of the paper is to maximize the availability of streams for the peers in the VoD system. We have achieved this by using data replication technique in the peers. Hence, we proposed a new data replication technique to optimally store the videos in the peers. The new data replication technique generates more number of replicas than the existing techniques such as random, minimum request and maximize hit. We have also investigated by applying the CTMC model for the reliability of replications during the peer failures. Our result shows that the mean lifetime of replicas are more under various circumstances. We have addressed the practical issues of efficient utilization of overall bandwidth and buffer in the VoD system. We achieved greater success playback probability of videos than the existing techniques.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:03:17 GMT" } ]
2009-12-08T00:00:00
[ [ "Kumar", "R. Ashok", "" ], [ "Ganesan", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.1013
Rdv Ijcsis
Prof P. Harini, Dr. O.B.V.Ramanaiah
An Efficient Admission Control Algorithm for Load Balancing In Hierarchical Mobile IPv6 Networks
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 291-296, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In hierarchical Mobile IPv6 networks, Mobility Anchor Point (MAP) may become a single point of bottleneck as it handles more and more mobile nodes (MNs). A number of schemes have been proposed to achieve load balancing among different MAPs. However, signaling reduction is still imperfect because these schemes also avoid the effect of the number of CNs. Also only the balancing of MN is performed, but not the balancing of the actual traffic load, since CN of each MN may be different. This paper proposes an efficient admission control algorithm along with a replacement mechanism for HMIPv6 networks. The admission control algorithm is based on the number of serving CNs and achieves actual load balancing among MAPs. Moreover, a replacement mechanism is introduced to decrease the new MN blocking probability and the handoff MN dropping probability. By simulation results, we show that, the handoff delay and packet loss are reduced in our scheme, when compared with the standard HMIPv6 based handoff.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:11:20 GMT" } ]
2009-12-08T00:00:00
[ [ "Harini", "Prof P.", "" ], [ "Ramanaiah", "Dr. O. B. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.1014
Rdv Ijcsis
Shailendra Singh, Sanjay Silakari
An ensemble approach for feature selection of Cyber Attack Dataset
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 297-302, November 2009, USA
null
ISSN 1947 5500
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature selection is an indispensable preprocessing step when mining huge datasets that can significantly improve the overall system performance. Therefore in this paper we focus on a hybrid approach of feature selection. This method falls into two phases. The filter phase select the features with highest information gain and guides the initialization of search process for wrapper phase whose output the final feature subset. The final feature subsets are passed through the Knearest neighbor classifier for classification of attacks. The effectiveness of this algorithm is demonstrated on DARPA KDDCUP99 cyber attack dataset.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:15:08 GMT" } ]
2009-12-08T00:00:00
[ [ "Singh", "Shailendra", "" ], [ "Silakari", "Sanjay", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0912.1015
Rdv Ijcsis
Mrs. J. P. Rothe, Dr. A. K. Wadhwani, Dr. Mrs. S. Wadhwani
Short Term Load Forecasting Using Multi Parameter Regression
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 303-306, November 2009, USA
null
ISSN 1947 5500
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Short Term Load forecasting in this paper uses input data dependent on parameters such as load for current hour and previous two hours, temperature for current hour and previous two hours, wind for current hour and previous two hours, cloud for current hour and previous two hours. Forecasting will be of load demand for coming hour based on input parameters at that hour. In this paper we are using multiparameter regression method for forecasting which has error within tolerable range. Algorithms implementing these forecasting techniques have been programmed using MATLAB and applied to the case study. Other methodologies in this area are ANN, Fuzzy and Evolutionary Algorithms for which investigations are under process. Adaptive multiparameter regression for load forecasting, in near future will be possible.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:18:35 GMT" } ]
2009-12-08T00:00:00
[ [ "Rothe", "Mrs. J. P.", "" ], [ "Wadhwani", "Dr. A. K.", "" ], [ "Wadhwani", "Dr. Mrs. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0912.1016
Rdv Ijcsis
Ayeesha Dsousa, Shalini Bhatia
Refactoring of a Database
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 307-315, November 2009, USA
null
ISSN 1947 5500
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The technique of database refactoring is all about applying disciplined and controlled techniques to change an existing database schema. The problem is to successfully create a Database Refactoring Framework for databases. This paper concentrates on the feasibility of adapting this concept to work as a generic template. To retain the constraints regardless of the modifications to the metadata, the paper proposes a MetaData Manipulation Tool to facilitate change. The tool adopts a Template Design Pattern to make it database independent. The paper presents a drawback of using java for constraint extraction and proposes an alternative.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:21:57 GMT" } ]
2009-12-08T00:00:00
[ [ "Dsousa", "Ayeesha", "" ], [ "Bhatia", "Shalini", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.1017
Rdv Ijcsis
Ismail A. Ismail, Nabawia A. ElRamly, Mohammed A. Abd-ElWahid, Passent M. ElKafrawy and Mohammed M. Nasef
Genetic Programming Framework for Fingerprint Matching
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 316-321, November 2009, USA
null
ISSN 1947 5500
cs.CR cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fingerprint matching is a very difficult problem. Minutiae based matching is the most popular and widely used technique for fingerprint matching. The minutiae points considered in automatic identification systems are based normally on termination and bifurcation points. In this paper we propose a new technique for fingerprint matching using minutiae points and genetic programming. The goal of this paper is extracting the mathematical formula that defines the minutiae points.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:27:10 GMT" } ]
2009-12-08T00:00:00
[ [ "Ismail", "Ismail A.", "" ], [ "ElRamly", "Nabawia A.", "" ], [ "Abd-ElWahid", "Mohammed A.", "" ], [ "ElKafrawy", "Passent M.", "" ], [ "Nasef", "Mohammed M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0912.1019
Rdv Ijcsis
B. Amutha, M.Ponnavaikko
Location Update Accuracy in Human Tracking system using Zigbee modules
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 322-331, November 2009, USA
null
ISSN 1947 5500
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A location and tracking system becomes very important to our future world of pervasive computing. An algorithm for accurate location information is being incorporated in the human walking model and in the blind human walking model. We want to implement an accurate location tracking mechanism using Zigbee along with GPS, we have incorporated Markov chain algorithm for establishing accuracy. Normal Human and blind human walking steps were actually taken in the known environment within our campus and the Markov chain algorithm was used for smoothening the stepwise variation in location updates. A comparison module is also implemented to show the difference between normal human and blind human walking step variations. This accuracy is used for designing a blind tracking device so that the device can be used by the blind for finding the path without obstacles. We present a system level approach to localizing and tracking Human and blind users on a basis of different sources of location information [GPS plus Zigbee]. The system can be applied outdoors especially for avoiding accidents, GPS as the source of location data. Performance evaluation shows that the system is accurate and it is a future path finding device with service for the blind.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:32:46 GMT" } ]
2009-12-08T00:00:00
[ [ "Amutha", "B.", "" ], [ "Ponnavaikko", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0912.1020
Rdv Ijcsis
Waqar Asif, Muhammad Bilal Qasim, Syed Musa Raza Tirmzi, Usman Muhammad Khan
Performance Evaluation of WiMAX (802.16) Using Different Encoding Schemes
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 332-336, November 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the performance of Worldwide Interoperability for Microwave Access (WiMAX), when we enhance its physical layer attributes with help of different encoding techniques. For this evaluation Space Time Block Codes (STBC) and Turbo codes are separately introduced into the architecture of WiMAX that works on adaptive modulation technique.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:35:42 GMT" } ]
2009-12-08T00:00:00
[ [ "Asif", "Waqar", "" ], [ "Qasim", "Muhammad Bilal", "" ], [ "Tirmzi", "Syed Musa Raza", "" ], [ "Khan", "Usman Muhammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.1023
Yu Zhang
Yu Zhang, Hanwen Luo, Wen Chen
Efficient Relay Beamforming Design with SIC Detection for Dual-Hop MIMO Relay Networks
18 pages, 6 figures
IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 4192-4197, Oct. 2010
10.1109/TVT.2010.2065249
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a dual-hop Multiple Input Multiple Output (MIMO) relay wireless network, in which a source-destination pair both equipped with multiple antennas communicates through a large number of half-duplex amplify-and-forward (AF) relay terminals. Two novel linear beamforming schemes based on the matched filter (MF) and regularized zero-forcing (RZF) precoding techniques are proposed for the MIMO relay system. We focus on the linear process at the relay nodes and design the new relay beamformers by utilizing the channel state information (CSI) of both backward channel and forward channel. The proposed beamforming designs are based on the QR decomposition (QRD) filter at the destination node which performs successive interference cancellation (SIC) to achieve the maximum spatial multiplexing gain. Simulation results demonstrate that the proposed beamformers that fulfil both the intranode array gain and distributed array gain outperform other relaying schemes under different system parameters in terms of the ergodic capacity.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 13:58:52 GMT" }, { "version": "v2", "created": "Tue, 22 Jun 2010 13:39:16 GMT" } ]
2013-02-07T00:00:00
[ [ "Zhang", "Yu", "" ], [ "Luo", "Hanwen", "" ], [ "Chen", "Wen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.1034
Janusz Brzozowski
J. Brzozowski, G. Jir\'askov\'a, C. Zou
Quotient Complexity of Closed Languages
12 pages, 5 eps figures, uses llncs
null
10.1007/978-3-642-13182-0_8
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A language L is prefix-closed if, whenever a word w is in L, then every prefix of w is also in L. We define suffix-, factor-, and subword-closed languages in the same way, where by subword we mean subsequence. We study the quotient complexity (usually called state complexity) of operations on prefix-, suffix-, factor-, and subword-closed languages. We find tight upper bounds on the complexity of the prefix-, suffix-, factor-, and subword-closure of arbitrary languages, and on the complexity of boolean operations, concatenation, star and reversal in each of the four classes of closed languages. We show that repeated application of positive closure and complement to a closed language results in at most four distinct languages, while Kleene closure and complement gives at most eight languages.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 16:08:39 GMT" } ]
2015-05-14T00:00:00
[ [ "Brzozowski", "J.", "" ], [ "Jirásková", "G.", "" ], [ "Zou", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0912.1045
Viswanath Nagarajan
Anupam Gupta, Viswanath Nagarajan, R. Ravi
Thresholded Covering Algorithms for Robust and Max-Min Optimization
24 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The general problem of robust optimization is this: one of several possible scenarios will appear tomorrow, but things are more expensive tomorrow than they are today. What should you anticipatorily buy today, so that the worst-case cost (summed over both days) is minimized? Feige et al. and Khandekar et al. considered the k-robust model where the possible outcomes tomorrow are given by all demand-subsets of size k, and gave algorithms for the set cover problem, and the Steiner tree and facility location problems in this model, respectively. In this paper, we give the following simple and intuitive template for k-robust problems: "having built some anticipatory solution, if there exists a single demand whose augmentation cost is larger than some threshold, augment the anticipatory solution to cover this demand as well, and repeat". In this paper we show that this template gives us improved approximation algorithms for k-robust Steiner tree and set cover, and the first approximation algorithms for k-robust Steiner forest, minimum-cut and multicut. All our approximation ratios (except for multicut) are almost best possible. As a by-product of our techniques, we also get algorithms for max-min problems of the form: "given a covering problem instance, which k of the elements are costliest to cover?".
[ { "version": "v1", "created": "Sat, 5 Dec 2009 19:04:49 GMT" }, { "version": "v2", "created": "Tue, 21 Dec 2010 19:11:39 GMT" }, { "version": "v3", "created": "Thu, 24 Feb 2011 19:39:07 GMT" } ]
2011-02-25T00:00:00
[ [ "Gupta", "Anupam", "" ], [ "Nagarajan", "Viswanath", "" ], [ "Ravi", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0912.1050
Panos Giannopoulos
M. Fellows, P. Giannopoulos, C. Knauer, C. Paul, F. Rosamond, S. Whitesides, N. Yu
Abstract Milling with Turn Costs
18 pages, 2 figures
null
null
null
cs.CC cs.CG cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Abstract Milling problem is a natural and quite general graph-theoretic model for geometric milling problems. Given a graph, one asks for a walk that covers all its vertices with a minimum number of turns, as specified in the graph model by a 0/1 turncost function fx at each vertex x giving, for each ordered pair of edges (e,f) incident at x, the turn cost at x of a walk that enters the vertex on edge e and departs on edge f. We describe an initial study of the parameterized complexity of the problem. Our main positive result shows that Abstract Milling, parameterized by: number of turns, treewidth and maximum degree, is fixed-parameter tractable, We also show that Abstract Milling parameterized by (only) the number of turns and the pathwidth, is hard for W[1] -- one of the few parameterized intractability results for bounded pathwidth.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 20:15:21 GMT" } ]
2009-12-08T00:00:00
[ [ "Fellows", "M.", "" ], [ "Giannopoulos", "P.", "" ], [ "Knauer", "C.", "" ], [ "Paul", "C.", "" ], [ "Rosamond", "F.", "" ], [ "Whitesides", "S.", "" ], [ "Yu", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0912.1059
Yao Yu
Yao Yu, Athina P. Petropulu and H. Vincent Poor
Reduced Complexity Angle-Doppler-Range Estimation for MIMO Radar That Employs Compressive Sensing
5 pages, 3 figures, Asilomar 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The authors recently proposed a MIMO radar system that is implemented by a small wireless network. By applying compressive sensing (CS) at the receive nodes, the MIMO radar super-resolution can be achieved with far fewer observations than conventional approaches. This previous work considered the estimation of direction of arrival and Doppler. Since the targets are sparse in the angle-velocity space, target information can be extracted by solving an l1 minimization problem. In this paper, the range information is exploited by introducing step frequency to MIMO radar with CS. The proposed approach is able to achieve high range resolution and also improve the ambiguous velocity. However, joint angle-Doppler-range estimation requires discretization of the angle-Doppler-range space which causes a sharp rise in the computational burden of the l1 minimization problem. To maintain an acceptable complexity, a technique is proposed to successively estimate angle, Doppler and range in a decoupled fashion. The proposed approach can significantly reduce the complexity without sacrificing performance.
[ { "version": "v1", "created": "Sat, 5 Dec 2009 22:40:12 GMT" } ]
2009-12-08T00:00:00
[ [ "Yu", "Yao", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0912.1072
Cameron Freer
Cameron E. Freer, Daniel M. Roy
Computable de Finetti measures
32 pages. Final journal version; expanded somewhat, with minor corrections. To appear in Annals of Pure and Applied Logic. Extended abstract appeared in Proceedings of CiE '09, LNCS 5635, pp. 218-231
Annals of Pure and Applied Logic 163 (2012) pp. 530-546
10.1016/j.apal.2011.06.011
null
math.LO cs.LO cs.PL math.PR math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a computable version of de Finetti's theorem on exchangeable sequences of real random variables. As a consequence, exchangeable stochastic processes expressed in probabilistic functional programming languages can be automatically rewritten as procedures that do not modify non-local state. Along the way, we prove that a distribution on the unit interval is computable if and only if its moments are uniformly computable.
[ { "version": "v1", "created": "Sun, 6 Dec 2009 02:50:35 GMT" }, { "version": "v2", "created": "Mon, 19 Dec 2011 09:28:50 GMT" } ]
2012-02-03T00:00:00
[ [ "Freer", "Cameron E.", "" ], [ "Roy", "Daniel M.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0912.1092
Amin Daneshmand Malayeri
Amin Daneshmand Malayeri, Jalal Abdollahi
Modern Symmetric Cryptography methodologies and its applications
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has been intro-duced by using Symmetric Cryptography is the main base of discussion in this paper. Designing an unique protocol for Symmetric Cryptography in security networks elements is our focus. Reviewing benefits of using these methodologies has been pre-sented and discussed in this paper.
[ { "version": "v1", "created": "Sun, 6 Dec 2009 11:07:40 GMT" } ]
2009-12-08T00:00:00
[ [ "Malayeri", "Amin Daneshmand", "" ], [ "Abdollahi", "Jalal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0912.1110
Boris Verhaegen
Serge Boucher, Boris Verhaegen, Esteban Zim\'anyi
XML Multidimensional Modelling and Querying
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As XML becomes ubiquitous and XML storage and processing becomes more efficient, the range of use cases for these technologies widens daily. One promising area is the integration of XML and data warehouses, where an XML-native database stores multidimensional data and processes OLAP queries written in the XQuery interrogation language. This paper explores issues arising in the implementation of such a data warehouse. We first compare approaches for multidimensional data modelling in XML, then describe how typical OLAP queries on these models can be expressed in XQuery. We then show how, regardless of the model, the grouping features of XQuery 1.1 improve performance and readability of these queries. Finally, we evaluate the performance of query evaluation in each modelling choice using the eXist database, which we extended with a grouping clause implementation.
[ { "version": "v1", "created": "Sun, 6 Dec 2009 15:26:43 GMT" } ]
2009-12-08T00:00:00
[ [ "Boucher", "Serge", "" ], [ "Verhaegen", "Boris", "" ], [ "Zimányi", "Esteban", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0912.1128
Timon Schroeter
David Baehrens, Timon Schroeter, Stefan Harmeling, Motoaki Kawanabe, Katja Hansen, Klaus-Robert Mueller
How to Explain Individual Classification Decisions
31 pages, 14 figures
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After building a classifier with modern tools of machine learning we typically have a black box at hand that is able to predict well for unseen data. Thus, we get an answer to the question what is the most likely label of a given unseen data point. However, most methods will provide no answer why the model predicted the particular label for a single instance and what features were most influential for that particular instance. The only method that is currently able to provide such explanations are decision trees. This paper proposes a procedure which (based on a set of assumptions) allows to explain the decisions of any classification method.
[ { "version": "v1", "created": "Sun, 6 Dec 2009 19:29:04 GMT" } ]
2009-12-08T00:00:00
[ [ "Baehrens", "David", "" ], [ "Schroeter", "Timon", "" ], [ "Harmeling", "Stefan", "" ], [ "Kawanabe", "Motoaki", "" ], [ "Hansen", "Katja", "" ], [ "Mueller", "Klaus-Robert", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0912.1135
Mark Tygert
Vladimir Rokhlin and Mark Tygert
A fast randomized algorithm for orthogonal projection
13 pages, 6 tables
SIAM Journal on Scientific Computing, 33 (2): 849-868, 2011
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm that, given any full-rank matrix A having fewer rows than columns, can rapidly compute the orthogonal projection of any vector onto the null space of A, as well as the orthogonal projection onto the row space of A, provided that both A and its adjoint can be applied rapidly to arbitrary vectors. As an intermediate step, the algorithm solves the overdetermined linear least-squares regression involving the adjoint of A (and so can be used for this, too). The basis of the algorithm is an obvious but numerically unstable scheme; suitable use of a preconditioner yields numerical stability. We generate the preconditioner rapidly via a randomized procedure that succeeds with extremely high probability. In many circumstances, the method can accelerate interior-point methods for convex optimization, such as linear programming (Ming Gu, personal communication).
[ { "version": "v1", "created": "Sun, 6 Dec 2009 21:02:14 GMT" }, { "version": "v2", "created": "Thu, 10 Dec 2009 17:56:12 GMT" } ]
2011-05-26T00:00:00
[ [ "Rokhlin", "Vladimir", "" ], [ "Tygert", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0912.1137
MohammadHossein Bateni
MohammadHossein Bateni and MohammadTaghi Hajiaghayi
Euclidean Prize-collecting Steiner Forest
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider Steiner forest and its generalizations, prize-collecting Steiner forest and k-Steiner forest, when the vertices of the input graph are points in the Euclidean plane and the lengths are Euclidean distances. First, we present a simpler analysis of the polynomial-time approximation scheme (PTAS) of Borradaile et al. [12] for the Euclidean Steiner forest problem. This is done by proving a new structural property and modifying the dynamic programming by adding a new piece of information to each dynamic programming state. Next we develop a PTAS for a well-motivated case, i.e., the multiplicative case, of prize-collecting and budgeted Steiner forest. The ideas used in the algorithm may have applications in design of a broad class of bicriteria PTASs. At the end, we demonstrate why PTASs for these problems can be hard in the general Euclidean case (and thus for PTASs we cannot go beyond the multiplicative case).
[ { "version": "v1", "created": "Sun, 6 Dec 2009 21:15:49 GMT" } ]
2009-12-08T00:00:00
[ [ "Bateni", "MohammadHossein", "" ], [ "Hajiaghayi", "MohammadTaghi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]