id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0708.4409
Amy Glen
Amy Glen, Jacques Justin, Giuseppe Pirillo
Characterizations of finite and infinite episturmian words via lexicographic orderings
18 pages; to appear in the European Journal of Combinatorics
European Journal of Combinatorics 29 (2008) 45-58
10.1016/j.ejc.2007.01.002
null
math.CO cs.DM
null
In this paper, we characterize by lexicographic order all finite Sturmian and episturmian words, i.e., all (finite) factors of such infinite words. Consequently, we obtain a characterization of infinite episturmian words in a "wide sense" (episturmian and episkew infinite words). That is, we characterize the set of all infinite words whose factors are (finite) episturmian. Similarly, we characterize by lexicographic order all balanced infinite words over a 2-letter alphabet; in other words, all Sturmian and skew infinite words, the factors of which are (finite) Sturmian.
[ { "version": "v1", "created": "Fri, 31 Aug 2007 18:51:41 GMT" } ]
2010-03-16T00:00:00
[ [ "Glen", "Amy", "" ], [ "Justin", "Jacques", "" ], [ "Pirillo", "Giuseppe", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.0035
Mahmoud Taherzadeh
Mahmoud Taherzadeh and Amir K. Khandani
On The Limitations of The Naive Lattice Decoding
15 pages, 3 figures
null
null
null
cs.IT math.IT
null
In this paper, the inherent drawbacks of the naive lattice decoding for MIMO fading systems is investigated. We show that using the naive lattice decoding for MIMO systems has considerable deficiencies in terms of the rate-diversity trade-off. Unlike the case of maximum-likelihood decoding, in this case, even the perfect lattice space-time codes which have the non-vanishing determinant property can not achieve the optimal rate-diversity trade-off. Indeed, we show that in the case of naive lattice decoding, when we fix the underlying lattice, all the codes based on full-rate lattices have the same rate-diversity trade-off as V-BLAST. Also, we drive a lower bound on the symbol error probability of the naive lattice decoding for the fixed-rate MIMO systems (with equal numbers of receive and transmit antennas). This bound shows that asymptotically, the naive lattice decoding has an unbounded loss in terms of the required SNR, compared to the maximum likelihood decoding.
[ { "version": "v1", "created": "Sat, 1 Sep 2007 06:08:13 GMT" } ]
2007-09-04T00:00:00
[ [ "Taherzadeh", "Mahmoud", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0099
Avraham Trahtman N
A. N. Trahtman
The road coloring problem
9 pages, correct typos
null
null
null
cs.DM
null
The synchronizing word of deterministic automaton is a word in the alphabet of colors (considered as letters) of its edges that maps the automaton to a single state. A coloring of edges of a directed graph is synchronizing if the coloring turns the graph into deterministic finite automaton possessing a synchronizing word. The road coloring problem is a problem of synchronizing coloring of directed finite strongly connected graph with constant outdegree of all its vertices if the greatest common divisor of lengths of all its cycles is one. The problem was posed by Adler, Goodwyn and Weiss over 30 years ago and evoked a noticeable interest among the specialists in theory of graphs, deterministic automata and symbolic dynamics. The problem is described even in "Wikipedia" - the popular Internet Encyclopedia. The positive solution of the road coloring problem is presented.
[ { "version": "v1", "created": "Sun, 2 Sep 2007 10:08:46 GMT" }, { "version": "v2", "created": "Sun, 16 Sep 2007 16:15:52 GMT" }, { "version": "v3", "created": "Wed, 24 Oct 2007 16:52:54 GMT" }, { "version": "v4", "created": "Fri, 21 Dec 2007 08:07:18 GMT" } ]
2011-11-10T00:00:00
[ [ "Trahtman", "A. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.0116
Fionn Murtagh
Fionn Murtagh
On Ultrametric Algorithmic Information
Forthcoming, Computer Journal. Minor corrections 29 Oct. 2007
Computer Journal, 53, 405-416, 2010
10.1093/comjnl/bxm084
null
cs.AI cs.CL
null
How best to quantify the information of an object, whether natural or artifact, is a problem of wide interest. A related problem is the computability of an object. We present practical examples of a new way to address this problem. By giving an appropriate representation to our objects, based on a hierarchical coding of information, we exemplify how it is remarkably easy to compute complex objects. Our algorithmic complexity is related to the length of the class of objects, rather than to the length of the object.
[ { "version": "v1", "created": "Sun, 2 Sep 2007 17:00:40 GMT" }, { "version": "v2", "created": "Sat, 29 Sep 2007 11:21:51 GMT" } ]
2011-06-14T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0709.0124
B.Sundar Rajan
Harshan J. and B. Sundar Rajan
High Rate Single-Symbol ML Decodable Precoded DSTBCs for Cooperative Networks
Submitted to IEEE Transactions on Information Theory as "Correspondence"
null
null
null
cs.IT math.IT
null
Distributed Orthogonal Space-Time Block Codes (DOSTBCs) achieving full diversity order and single-symbol ML decodability have been introduced recently by Yi and Kim for cooperative networks and an upperbound on the maximal rate of such codes along with code constructions has been presented. In this paper, we introduce a new class of Distributed STBCs called Semi-orthogonal Precoded Distributed Single-Symbol Decodable STBCs (S-PDSSDC) wherein, the source performs co-ordinate interleaving of information symbols appropriately before transmitting it to all the relays. It is shown that DOSTBCs are a special case of S-PDSSDCs. A special class of S-PDSSDCs having diagonal covariance matrix at the destination is studied and an upperbound on the maximal rate of such codes is derived. The bounds obtained are approximately twice larger than that of the DOSTBCs. A systematic construction of S-PDSSDCs is presented when the number of relays $K \geq 4$. The constructed codes are shown to achieve the upperbound on the rate when $K$ is of the form 0 or 3 modulo 4. For the rest of the values of $K$, the constructed codes are shown to have rates higher than that of DOSTBCs. It is shown that S-PDSSDCs cannot be constructed with any form of linear processing at the relays when the source doesn't perform co-ordinate interleaving of the information symbols. Simulation result shows that S-PDSSDCs have better probability of error performance than that of DOSTBCs.
[ { "version": "v1", "created": "Sun, 2 Sep 2007 20:23:09 GMT" } ]
2007-09-04T00:00:00
[ [ "J.", "Harshan", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0145
Andrea Montanari
Andrea Montanari
Estimating Random Variables from Random Sparse Observations
22 pages, 1 eps figures, invited paper for European Transactions on Telecommunications
null
null
null
cs.IT math.IT math.PR
null
Let X_1,...., X_n be a collection of iid discrete random variables, and Y_1,..., Y_m a set of noisy observations of such variables. Assume each observation Y_a to be a random function of some a random subset of the X_i's, and consider the conditional distribution of X_i given the observations, namely \mu_i(x_i)\equiv\prob\{X_i=x_i|Y\} (a posteriori probability). We establish a general relation between the distribution of \mu_i, and the fixed points of the associated density evolution operator. Such relation holds asymptotically in the large system limit, provided the average number of variables an observation depends on is bounded. We discuss the relevance of our result to a number of applications, ranging from sparse graph codes, to multi-user detection, to group testing.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 02:57:58 GMT" } ]
2007-09-04T00:00:00
[ [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0709.0170
Alexander Wolff
Xavier Goaoc and Jan Kratochvil and Yoshio Okamoto and Chan-Su Shin and Andreas Spillner and Alexander Wolff
Untangling a Planar Graph
(v5) Minor, mostly linguistic changes
null
10.1007/s00454-008-9130-6
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A straight-line drawing $\delta$ of a planar graph $G$ need not be plane, but can be made so by \emph{untangling} it, that is, by moving some of the vertices of $G$. Let shift$(G,\delta)$ denote the minimum number of vertices that need to be moved to untangle $\delta$. We show that shift$(G,\delta)$ is NP-hard to compute and to approximate. Our hardness results extend to a version of \textsc{1BendPointSetEmbeddability}, a well-known graph-drawing problem. Further we define fix$(G,\delta)=n-shift(G,\delta)$ to be the maximum number of vertices of a planar $n$-vertex graph $G$ that can be fixed when untangling $\delta$. We give an algorithm that fixes at least $\sqrt{((\log n)-1)/\log \log n}$ vertices when untangling a drawing of an $n$-vertex graph $G$. If $G$ is outerplanar, the same algorithm fixes at least $\sqrt{n/2}$ vertices. On the other hand we construct, for arbitrarily large $n$, an $n$-vertex planar graph $G$ and a drawing $\delta_G$ of $G$ with fix$(G,\delta_G) \le \sqrt{n-2}+1$ and an $n$-vertex outerplanar graph $H$ and a drawing $\delta_H$ of $H$ with fix$(H,\delta_H) \le 2 \sqrt{n-1}+1$. Thus our algorithm is asymptotically worst-case optimal for outerplanar graphs.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 08:59:34 GMT" }, { "version": "v2", "created": "Tue, 12 Feb 2008 08:46:19 GMT" }, { "version": "v3", "created": "Thu, 6 Nov 2008 21:53:18 GMT" }, { "version": "v4", "created": "Wed, 12 Nov 2008 13:15:12 GMT" }, { "version": "v5", "created": "Tue, 27 Jan 2009 21:38:25 GMT" } ]
2009-01-27T00:00:00
[ [ "Goaoc", "Xavier", "" ], [ "Kratochvil", "Jan", "" ], [ "Okamoto", "Yoshio", "" ], [ "Shin", "Chan-Su", "" ], [ "Spillner", "Andreas", "" ], [ "Wolff", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.0178
Yasmine B. Sanderson
Yasmine B. Sanderson
Effective Generation of Subjectively Random Binary Sequences
Introduction and Section 6 revised
null
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for effectively generating binary sequences which would be rated by people as highly likely to have been generated by a random process, such as flipping a fair coin.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 09:32:28 GMT" }, { "version": "v2", "created": "Sun, 5 Oct 2008 10:19:14 GMT" } ]
2008-10-05T00:00:00
[ [ "Sanderson", "Yasmine B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.0204
Sudhir Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei
Capacity constraints and the inevitability of mediators in adword auctions
6 pages
null
null
null
cs.GT
null
One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well as, new for-profit agents are likely to emerge to combat or to make profit from the opportunities created by shortages in ad-space inventory. We propose a model where the additional capacity is provided by for-profit agents (or, mediators), who compete for slots in the original auction, draw traffic, and run their own sub-auctions. The quality of the additional capacity provided by a mediator is measured by its {\it fitness} factor. We compute revenues and payoffs for all the different parties at a {\it symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by a mechanism currently being used by Google and Yahoo!, and then compare these numbers with those obtained at a corresponding SNE for the same mechanism, but without any mediators involved in the auctions. Such calculations allow us to determine the value of the additional capacity. Our results show that the revenue of the auctioneer, as well as the social value (i.e. efficiency), always increase when mediators are involved; moreover even the payoffs of {\em all} the bidders will increase if the mediator has a high enough fitness. Thus, our analysis indicates that there are significant opportunities for diversification in the internet economy and we should expect it to continue to develop richer structure, with room for different types of agents and mechanisms to coexist.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 12:09:56 GMT" } ]
2007-09-04T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ], [ "Gunadhi", "Himawan", "" ], [ "Rezaei", "Behnam A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0709.0218
Debprakash Patnaik
Debprakash Patnaik (Electrical Engg. Dept., Indian Institute of Science), P. S. Sastry (Electrical Engg. Dept., Indian Institute of Science), K. P. Unnikrishnan (General Motors R&D)
Inferring Neuronal Network Connectivity using Time-constrained Episodes
9 pages. See also http://neural-code.cs.vt.edu/
null
null
null
cs.DB q-bio.NC
null
Discovering frequent episodes in event sequences is an interesting data mining task. In this paper, we argue that this framework is very effective for analyzing multi-neuronal spike train data. Analyzing spike train data is an important problem in neuroscience though there are no data mining approaches reported for this. Motivated by this application, we introduce different temporal constraints on the occurrences of episodes. We present algorithms for discovering frequent episodes under temporal constraints. Through simulations, we show that our method is very effective for analyzing spike train data for unearthing underlying connectivity patterns.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 13:23:33 GMT" }, { "version": "v2", "created": "Wed, 26 Sep 2007 06:49:01 GMT" } ]
2008-03-10T00:00:00
[ [ "Patnaik", "Debprakash", "", "Electrical Engg. Dept., Indian Institute of\n Science" ], [ "Sastry", "P. S.", "", "Electrical Engg. Dept., Indian Institute of Science" ], [ "Unnikrishnan", "K. P.", "", "General Motors R&D" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0709.0223
Vassilis Kostakos
Vassilis Kostakos, Eamonn O'Neill, Alan Penn
Brief encounter networks
8 pages, 6 figures
ACM Transactions on Computer Human Interaction, 17(1):1-38, 2010
10.1145/1721831.1721833
null
cs.CY
null
Many complex human and natural phenomena can usefully be represented as networks describing the relationships between individuals. While these relationships are typically intermittent, previous research has used network representations that aggregate the relationships at discrete intervals. However, such an aggregation discards important temporal information, thus inhibiting our understanding of the networks dynamic behaviour and evolution. We have recorded patterns of human urban encounter using Bluetooth technology thus retaining the temporal properties of this network. Here we show how this temporal information influences the structural properties of the network. We show that the temporal properties of human urban encounter are scale-free, leading to an overwhelming proportion of brief encounters between individuals. While previous research has shown preferential attachment to result in scale-free connectivity in aggregated network data, we found that scale-free connectivity results from the temporal properties of the network. In addition, we show that brief encounters act as weak social ties in the diffusion of non-expiring information, yet persistent encounters provide the means for sustaining time-expiring information through a network.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 13:14:30 GMT" } ]
2013-06-06T00:00:00
[ [ "Kostakos", "Vassilis", "" ], [ "O'Neill", "Eamonn", "" ], [ "Penn", "Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0709.0259
Chien-Hwa Hwang
Chien-Hwa Hwang and Shih-Chang Chen
Spectrum Sensing in Wideband OFDM Cognitive Radios
30 pages, 7 figures, submitted to IEEE Transactions on Signal Processing, Aug. 2007
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, detection of the primary user (PU) signal in an orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) system is addressed. According to the prior knowledge of the PU signal known to the detector, three detection algorithms based on the Neyman-Pearson philosophy are proposed. In the first case, a Gaussian PU signal with completely known probability density function (PDF) except for its received power is considered. The frequency band that the PU signal resides is also assumed known. Detection is performed individually at each OFDM sub-carrier possibly interfered by the PU signal, and the results are then combined to form a final decision. In the second case, the sub-carriers that the PU signal resides are known. Observations from all possibly interfered sub-carriers are considered jointly to exploit the fact that the presence of a PU signal interferers all of them simultaneously. In the last case, it is assumed no PU signal prior knowledge is available. The detection is involved with a search of the interfered band. The proposed detector is able to detect an abrupt power change when tracing along the frequency axis.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 15:16:20 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2008 05:04:22 GMT" } ]
2008-10-06T00:00:00
[ [ "Hwang", "Chien-Hwa", "" ], [ "Chen", "Shih-Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0289
Christian Schaffner
Christian Schaffner
Cryptography in the Bounded-Quantum-Storage Model
PhD Thesis, BRICS, University of Aarhus, Denmark, 128 pages
null
null
null
quant-ph cs.CR
null
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 19:28:46 GMT" } ]
2007-09-04T00:00:00
[ [ "Schaffner", "Christian", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.0303
Marian Boguna
Marian Boguna, Dmitri Krioukov, kc claffy
Navigability of Complex Networks
null
Nature Physics 5, 74-80 (2009)
10.1038/NPHYS1130
null
physics.soc-ph cond-mat.dis-nn cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Routing information through networks is a universal phenomenon in both natural and manmade complex systems. When each node has full knowledge of the global network connectivity, finding short communication paths is merely a matter of distributed computation. However, in many real networks nodes communicate efficiently even without such global intelligence. Here we show that the peculiar structural characteristics of many complex networks support efficient communication without global knowledge. We also describe a general mechanism that explains this connection between network structure and function. This mechanism relies on the presence of a metric space hidden behind an observable network. Our findings suggest that real networks in nature have underlying metric spaces that remain undiscovered. Their discovery would have practical applications ranging from routing in the Internet and searching social networks, to studying information flows in neural, gene regulatory networks, or signaling pathways.
[ { "version": "v1", "created": "Mon, 3 Sep 2007 18:57:26 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2008 22:26:42 GMT" }, { "version": "v3", "created": "Wed, 20 May 2009 13:00:20 GMT" } ]
2009-05-20T00:00:00
[ [ "Boguna", "Marian", "" ], [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.0355
Roland Bouffanais
Nicolas Bodard, Roland Bouffanais, Michel O. Deville
Solution of moving-boundary problems by the spectral element method
Applied Numerical Mathematics, In Press, 2008
Applied Numerial Mathematics 58 (2008) 968-984
10.1016/j.apnum.2007.04.009
null
cs.CE cs.NA
null
This paper describes a novel numerical model aiming at solving moving-boundary problems such as free-surface flows or fluid-structure interaction. This model uses a moving-grid technique to solve the Navier--Stokes equations expressed in the arbitrary Lagrangian--Eulerian kinematics. The discretization in space is based on the spectral element method. The coupling of the fluid equations and the moving-grid equations is essentially done through the conditions on the moving boundaries. Two- and three-dimensional simulations are presented: translation and rotation of a cylinder in a fluid, and large-amplitude sloshing in a rectangular tank. The accuracy and robustness of the present numerical model is studied and discussed.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 14:51:56 GMT" } ]
2022-09-29T00:00:00
[ [ "Bodard", "Nicolas", "" ], [ "Bouffanais", "Roland", "" ], [ "Deville", "Michel O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0709.0367
Francesco Zamponi
Fabrizio Altarelli, Remi Monasson and Francesco Zamponi
Relationship between clustering and algorithmic phase transitions in the random k-XORSAT model and its NP-complete extensions
15 pages, 4 figures, Proceedings of the International Workshop on Statistical-Mechanical Informatics, September 16-19, 2007, Kyoto, Japan; some imprecisions in the previous version have been corrected
Journal of Physics: Conference Series 95 (2008) 012013
10.1088/1742-6596/95/1/012013
null
cs.CC
null
We study the performances of stochastic heuristic search algorithms on Uniquely Extendible Constraint Satisfaction Problems with random inputs. We show that, for any heuristic preserving the Poissonian nature of the underlying instance, the (heuristic-dependent) largest ratio $\alpha_a$ of constraints per variables for which a search algorithm is likely to find solutions is smaller than the critical ratio $\alpha_d$ above which solutions are clustered and highly correlated. In addition we show that the clustering ratio can be reached when the number k of variables per constraints goes to infinity by the so-called Generalized Unit Clause heuristic.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 08:56:27 GMT" }, { "version": "v2", "created": "Thu, 18 Oct 2007 11:35:29 GMT" } ]
2009-11-13T00:00:00
[ [ "Altarelli", "Fabrizio", "" ], [ "Monasson", "Remi", "" ], [ "Zamponi", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.0370
Damien Chablat
Ying Wang (DIE), Wei Zhang (DIE), Fouad Bennis (IRCCyN), Damien Chablat (IRCCyN)
An Integrated Simulation System for Human Factors Study
null
Dans The Institute of Industrial Engineers Annual Conference - The Institute of Industrial Engineers Annual Conference, Orlando : \'Etats-Unis d'Am\'erique (2006)
null
null
cs.HC
null
It has been reported that virtual reality can be a useful tool for ergonomics study. The proposed integrated simulation system aims at measuring operator's performance in an interactive way for 2D control panel design. By incorporating some sophisticated virtual reality hardware/software, the system allows natural human-system and/or human-human interaction in a simulated virtual environment; enables dynamic objective measurement of human performance; and evaluates the quality of the system design in human factors perspective based on the measurement. It can also be for operation training for some 2D control panels.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 09:20:03 GMT" } ]
2007-09-05T00:00:00
[ [ "Wang", "Ying", "", "DIE" ], [ "Zhang", "Wei", "", "DIE" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0709.0409
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Maher Baili (IRCCyN)
A DH-parameter based condition for 3R orthogonal manipulators to have 4 distinct inverse kinematic solutions
null
Journal of Mechanical Design 127 (2005) 150-155
null
null
cs.RO
null
Positioning 3R manipulators may have two or four inverse kinematic solutions (IKS). This paper derives a necessary and sufficient condition for 3R positioning manipulators with orthogonal joint axes to have four distinct IKS. We show that the transition between manipulators with 2 and 4 IKS is defined by the set of manipulators with a quadruple root of their inverse kinematics. The resulting condition is explicit and states that the last link length of the manipulator must be greater than a quantity that depends on three of its remaining DH-parameters. This result is of interest for the design of new manipulators.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 12:27:14 GMT" } ]
2007-09-05T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Baili", "Maher", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0709.0426
Noelle Carbonell
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA), Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA)
Do oral messages help visual search?
26 pages
Advances in Natural Multimodal Dialogue Systems, Dordrecht (NL) Springer (Ed.) (2005) pp. 131-157
null
null
cs.HC
null
A preliminary experimental study is presented, that aims at eliciting the contribution of oral messages to facilitating visual search tasks on crowded visual displays. Results of quantitative and qualitative analyses suggest that appropriate verbal messages can improve both target selection time and accuracy. In particular, multimodal messages including a visual presentation of the isolated target together with absolute spatial oral information on its location in the displayed scene seem most effective. These messages also got top-ranking ratings from most subjects.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 13:23:40 GMT" } ]
2007-09-05T00:00:00
[ [ "Carbonell", "Noëlle", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ], [ "Kieffer", "Suzanne", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0709.0428
Noelle Carbonell
Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA)
Oral messages improve visual search
4 pages
Dans Proceedings of ACM Working Conference on Advanced Visual Interfaces - ACM Working Conference on Advanced Visual Interfaces (AVI 2006), Venezia : Italie (2006)
null
null
cs.HC
null
Input multimodality combining speech and hand gestures has motivated numerous usability studies. Contrastingly, issues relating to the design and ergonomic evaluation of multimodal output messages combining speech with visual modalities have not yet been addressed extensively. The experimental study presented here addresses one of these issues. Its aim is to assess the actual efficiency and usability of oral system messages including brief spatial information for helping users to locate objects on crowded displays rapidly. Target presentation mode, scene spatial structure and task difficulty were chosen as independent variables. Two conditions were defined: the visual target presentation mode (VP condition) and the multimodal target presentation mode (MP condition). Each participant carried out two blocks of visual search tasks (120 tasks per block, and one block per condition). Scene target presentation mode, scene structure and task difficulty were found to be significant factors. Multimodal target presentation proved to be more efficient than visual target presentation. In addition, participants expressed very positive judgments on multimodal target presentations which were preferred to visual presentations by a majority of participants. Besides, the contribution of spatial messages to visual search speed and accuracy was influenced by scene spatial structure and task difficulty: (i) messages improved search efficiency to a lesser extent for 2D array layouts than for some other symmetrical layouts, although the use of 2D arrays for displaying pictures is currently prevailing; (ii) message usefulness increased with task difficulty. Most of these results are statistically significant.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 13:27:33 GMT" } ]
2007-09-05T00:00:00
[ [ "Kieffer", "Suzanne", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ], [ "Carbonell", "Noëlle", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0709.0435
Andreas Witzel
Krzysztof R. Apt and Andreas Witzel
A Generic Approach to Coalition Formation
21 pages. To appear in International Game Theory Review (IGTR)
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an abstract approach to coalition formation that focuses on simple merge and split rules transforming partitions of a group of players. We identify conditions under which every iteration of these rules yields a unique partition. The main conceptual tool is a specific notion of a stable partition. The results are parametrized by a preference relation between partitions of a group of players and naturally apply to coalitional TU-games, hedonic games and exchange economy games.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 14:15:28 GMT" }, { "version": "v2", "created": "Thu, 22 Jan 2009 20:17:22 GMT" }, { "version": "v3", "created": "Tue, 3 Mar 2009 09:28:28 GMT" } ]
2009-03-03T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Witzel", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0709.0446
Riccardo Pucella
Alessio Lomuscio and Wojciech Penczek
Logic Column 19: Symbolic Model Checking for Temporal-Epistemic Logics
23 pages
null
null
null
cs.LO
null
This article surveys some of the recent work in verification of temporal epistemic logic via symbolic model checking, focusing on OBDD-based and SAT-based approaches for epistemic logics built on discrete and real-time branching time temporal logics.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 14:38:10 GMT" } ]
2007-09-05T00:00:00
[ [ "Lomuscio", "Alessio", "" ], [ "Penczek", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.0492
Stephanie Wehner
Stephanie Wehner, J\"urg Wullschleger
Composable Security in the Bounded-Quantum-Storage Model
21 pages
Proceedings of ICALP 2008, pages 604--615
null
null
quant-ph cs.CR
null
We present a simplified framework for proving sequential composability in the quantum setting. In particular, we give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damgard et al. (FOCS '05, CRYPTO '07) showed how to securely implement bit commitment and oblivious transfer in the bounded-quantum-storage model, where the adversary is only allowed to store a limited number of qubits. However, their security definitions did only apply to the standalone setting, and it was not clear if their protocols could be composed. Indeed, we first give a simple attack that shows that these protocols are not composable without a small refinement of the model. Finally, we prove the security of their randomized oblivious transfer protocol in our refined model. Secure implementations of oblivious transfer and bit commitment then follow easily by a (classical) reduction to randomized oblivious transfer.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 18:15:13 GMT" } ]
2009-01-20T00:00:00
[ [ "Wehner", "Stephanie", "" ], [ "Wullschleger", "Jürg", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.0509
Enrique ter Horst Dr
Henryk Gzyl and Enrique ter Horst
Filtering Additive Measurement Noise with Maximum Entropy in the Mean
null
null
null
null
cs.LG
null
The purpose of this note is to show how the method of maximum entropy in the mean (MEM) may be used to improve parametric estimation when the measurements are corrupted by large level of noise. The method is developed in the context on a concrete example: that of estimation of the parameter in an exponential distribution. We compare the performance of our method with the bayesian and maximum likelihood approaches.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 19:36:22 GMT" } ]
2021-08-23T00:00:00
[ [ "Gzyl", "Henryk", "" ], [ "ter Horst", "Enrique", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0709.0511
Oskar Sandberg
Oskar Sandberg
Double Clustering and Graph Navigability
null
null
null
null
math.PR cs.DS math.CO
null
Graphs are called navigable if one can find short paths through them using only local knowledge. It has been shown that for a graph to be navigable, its construction needs to meet strict criteria. Since such graphs nevertheless seem to appear in nature, it is of interest to understand why these criteria should be fulfilled. In this paper we present a simple method for constructing graphs based on a model where nodes vertices are ``similar'' in two different ways, and tend to connect to those most similar to them - or cluster - with respect to both. We prove that this leads to navigable networks for several cases, and hypothesize that it also holds in great generality. Enough generality, perhaps, to explain the occurrence of navigable networks in nature.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 19:38:14 GMT" } ]
2007-09-05T00:00:00
[ [ "Sandberg", "Oskar", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0709.0516
Sachin Adlakha
Sachin Adlakha, Ramesh Johari and Andrea Goldsmith
Competition in Wireless Systems via Bayesian Interference Games
30 pages, 3 figures
null
null
null
cs.GT
null
We study competition between wireless devices with incomplete information about their opponents. We model such interactions as Bayesian interference games. Each wireless device selects a power profile over the entire available bandwidth to maximize its data rate. Such competitive models represent situations in which several wireless devices share spectrum without any central authority or coordinated protocol. In contrast to games where devices have complete information about their opponents, we consider scenarios where the devices are unaware of the interference they cause to other devices. Such games, which are modeled as Bayesian games, can exhibit significantly different equilibria. We first consider a simple scenario of simultaneous move games, where we show that the unique Bayes-Nash equilibrium is where both devices spread their power equally across the entire bandwidth. We then extend this model to a two-tiered spectrum sharing case where users act sequentially. Here one of the devices, called the primary user, is the owner of the spectrum and it selects its power profile first. The second device (called the secondary user) then responds by choosing a power profile to maximize its Shannon capacity. In such sequential move games, we show that there exist equilibria in which the primary user obtains a higher data rate by using only a part of the bandwidth. In a repeated Bayesian interference game, we show the existence of reputation effects: an informed primary user can bluff to prevent spectrum usage by a secondary user who suffers from lack of information about the channel gains. The resulting equilibrium can be highly inefficient, suggesting that competitive spectrum sharing is highly suboptimal.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 19:45:00 GMT" } ]
2007-09-05T00:00:00
[ [ "Adlakha", "Sachin", "" ], [ "Johari", "Ramesh", "" ], [ "Goldsmith", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0709.0518
Abdellatif Zaidi
A. Zaidi and L. Vandendorpe
Rate Regions for the Partially-Cooperative Relay Broadcast Channel with Non-causal Side Information
7 pages, Proc. of IEEE International Symposium on Information theory, ISIT 2007, Nice, France
null
null
null
cs.IT math.IT
null
In this work, we consider a partially cooperative relay broadcast channel (PC-RBC) controlled by random parameters. We provide rate regions for two different situations: 1) when side information (SI) S^n on the random parameters is non-causally known at both the source and the relay and, 2) when side information S^n is non-causally known at the source only. These achievable regions are derived for the general discrete memoryless case first and then extended to the case when the channel is degraded Gaussian and the SI is additive i.i.d. Gaussian. In this case, the source uses generalized dirty paper coding (GDPC), i.e., DPC combined with partial state cancellation, when only the source is informed, and DPC alone when both the source and the relay are informed. It appears that, even though it can not completely eliminate the effect of the SI (in contrast to the case of source and relay being informed), GDPC is particularly useful when only the source is informed.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 02:14:34 GMT" } ]
2007-09-06T00:00:00
[ [ "Zaidi", "A.", "" ], [ "Vandendorpe", "L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0522
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Qualitative Belief Conditioning Rules (QBCR)
13 pages. Presented at Fusion 2007 International Conference, Quebec City, Canada, July 2007
Proceedings of Fusion 2007 International Conference, Quebec City, Canada, July 2007
null
null
cs.AI
null
In this paper we extend the new family of (quantitative) Belief Conditioning Rules (BCR) recently developed in the Dezert-Smarandache Theory (DSmT) to their qualitative counterpart for belief revision. Since the revision of quantitative as well as qualitative belief assignment given the occurrence of a new event (the conditioning constraint) can be done in many possible ways, we present here only what we consider as the most appealing Qualitative Belief Conditioning Rules (QBCR) which allow to revise the belief directly with words and linguistic labels and thus avoids the introduction of ad-hoc translations of quantitative beliefs into quantitative ones for solving the problem.
[ { "version": "v1", "created": "Tue, 4 Sep 2007 20:03:04 GMT" } ]
2007-09-06T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.0566
Debprakash Patnaik
K.P.Unnikrishnan (General Motors R&D Center, Warren, MI), Debprakash Patnaik (Dept. Elecetrical Engineering, Indian Institute of Science, Bangalore), P.S.Sastry (Dept. Elecetrical Engineering, Indian Institute of Science, Bangalore)
Discovering Patterns in Multi-neuronal Spike Trains using the Frequent Episode Method
Also see http://neural-code.cs.vt.edu/
null
null
null
cs.DB q-bio.NC
null
Discovering the 'Neural Code' from multi-neuronal spike trains is an important task in neuroscience. For such an analysis, it is important to unearth interesting regularities in the spiking patterns. In this report, we present an efficient method for automatically discovering synchrony, synfire chains, and more general sequences of neuronal firings. We use the Frequent Episode Discovery framework of Laxman, Sastry, and Unnikrishnan (2005), in which the episodes are represented and recognized using finite-state automata. Many aspects of functional connectivity between neuronal populations can be inferred from the episodes. We demonstrate these using simulated multi-neuronal data from a Poisson model. We also present a method to assess the statistical significance of the discovered episodes. Since the Temporal Data Mining (TDM) methods used in this report can analyze data from hundreds and potentially thousands of neurons, we argue that this framework is appropriate for discovering the `Neural Code'.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 14:46:59 GMT" }, { "version": "v2", "created": "Wed, 26 Sep 2007 06:51:41 GMT" } ]
2008-03-10T00:00:00
[ [ "Unnikrishnan", "K. P.", "", "General Motors R&D Center, Warren, MI" ], [ "Patnaik", "Debprakash", "", "Dept. Elecetrical Engineering, Indian Institute of Science,\n Bangalore" ], [ "Sastry", "P. S.", "", "Dept. Elecetrical Engineering, Indian Institute of\n Science, Bangalore" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0709.0599
Igal Sason
Igal Sason
On Universal Properties of Capacity-Approaching LDPC Ensembles
Published in the IEEE Trans. on Information Theory, vol. 55, no. 7, pp. 2956 - 2990, July 2009
null
10.1109/TIT.2009.2021305
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is focused on the derivation of some universal properties of capacity-approaching low-density parity-check (LDPC) code ensembles whose transmission takes place over memoryless binary-input output-symmetric (MBIOS) channels. Properties of the degree distributions, graphical complexity and the number of fundamental cycles in the bipartite graphs are considered via the derivation of information-theoretic bounds. These bounds are expressed in terms of the target block/ bit error probability and the gap (in rate) to capacity. Most of the bounds are general for any decoding algorithm, and some others are proved under belief propagation (BP) decoding. Proving these bounds under a certain decoding algorithm, validates them automatically also under any sub-optimal decoding algorithm. A proper modification of these bounds makes them universal for the set of all MBIOS channels which exhibit a given capacity. Bounds on the degree distributions and graphical complexity apply to finite-length LDPC codes and to the asymptotic case of an infinite block length. The bounds are compared with capacity-approaching LDPC code ensembles under BP decoding, and they are shown to be informative and are easy to calculate. Finally, some interesting open problems are considered.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 12:25:58 GMT" }, { "version": "v2", "created": "Sun, 9 Sep 2007 14:10:41 GMT" }, { "version": "v3", "created": "Tue, 18 Sep 2007 07:49:42 GMT" }, { "version": "v4", "created": "Sun, 21 Oct 2007 11:52:19 GMT" }, { "version": "v5", "created": "Thu, 26 Feb 2015 07:40:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Sason", "Igal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0624
Martin Ziegler
Katharina L\"urwer-Br\"uggemeier and Martin Ziegler
On Faster Integer Calculations using Non-Arithmetic Primitives
null
null
null
null
cs.DS
null
The unit cost model is both convenient and largely realistic for describing integer decision algorithms over (+,*). Additional operations like division with remainder or bitwise conjunction, although equally supported by computing hardware, may lead to a considerable drop in complexity. We show a variety of concrete problems to benefit from such NON-arithmetic primitives by presenting and analyzing corresponding fast algorithms.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 11:34:54 GMT" } ]
2007-09-06T00:00:00
[ [ "Lürwer-Brüggemeier", "Katharina", "" ], [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0709.0670
Daniil Ryabko
Daniil Ryabko, Juergen Schmidhuber
Using Data Compressors to Construct Rank Tests
null
Applied Mathematics Letters, 22:7, 1029-1032, 2009
null
null
cs.DS cs.IT math.IT
null
Nonparametric rank tests for homogeneity and component independence are proposed, which are based on data compressors. For homogeneity testing the idea is to compress the binary string obtained by ordering the two joint samples and writing 0 if the element is from the first sample and 1 if it is from the second sample and breaking ties by randomization (extension to the case of multiple samples is straightforward). $H_0$ should be rejected if the string is compressed (to a certain degree) and accepted otherwise. We show that such a test obtained from an ideal data compressor is valid against all alternatives. Component independence is reduced to homogeneity testing by constructing two samples, one of which is the first half of the original and the other is the second half with one of the components randomly permuted.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 15:06:04 GMT" } ]
2012-02-28T00:00:00
[ [ "Ryabko", "Daniil", "" ], [ "Schmidhuber", "Juergen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0674
Juergen Schmidhuber
Juergen Schmidhuber
Simple Algorithmic Principles of Discovery, Subjective Beauty, Selective Attention, Curiosity & Creativity
15 pages, 3 highly compressible low-complexity drawings. Joint Invited Lecture for Algorithmic Learning Theory (ALT 2007) and Discovery Science (DS 2007), Sendai, Japan, 2007
null
null
null
cs.AI cs.GR
null
I postulate that human or other intelligent agents function or should function as follows. They store all sensory observations as they come - the data is holy. At any time, given some agent's current coding capabilities, part of the data is compressible by a short and hopefully fast program / description / explanation / world model. In the agent's subjective eyes, such data is more regular and more "beautiful" than other data. It is well-known that knowledge of regularity and repeatability may improve the agent's ability to plan actions leading to external rewards. In absence of such rewards, however, known beauty is boring. Then "interestingness" becomes the first derivative of subjective beauty: as the learning agent improves its compression algorithm, formerly apparently random data parts become subjectively more regular and beautiful. Such progress in compressibility is measured and maximized by the curiosity drive: create action sequences that extend the observation history and yield previously unknown / unpredictable but quickly learnable algorithmic regularity. We discuss how all of the above can be naturally implemented on computers, through an extension of passive unsupervised learning to the case of active data selection: we reward a general reinforcement learner (with access to the adaptive compressor) for actions that improve the subjective compressibility of the growing data. An unusually large breakthrough in compressibility deserves the name "discovery". The "creativity" of artists, dancers, musicians, pure mathematicians can be viewed as a by-product of this principle. Several qualitative examples support this hypothesis.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 15:20:59 GMT" } ]
2007-09-06T00:00:00
[ [ "Schmidhuber", "Juergen", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0709.0677
Binhai Zhu
Binhai Zhu
On the Complexity of Protein Local Structure Alignment Under the Discrete Fr\'echet Distance
11 pages, 2 figures
null
null
null
cs.CC cs.DS
null
We show that given $m$ proteins (or protein backbones, which are modeled as 3D polygonal chains each of length O(n)) the problem of protein local structure alignment under the discrete Fr\'{e}chet distance is as hard as Independent Set. So the problem does not admit any approximation of factor $n^{1-\epsilon}$. This is the strongest negative result regarding the protein local structure alignment problem. On the other hand, if $m$ is a constant, then the problem can be solved in polygnomial time.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 15:30:54 GMT" } ]
2007-09-06T00:00:00
[ [ "Zhu", "Binhai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0709.0680
Damien Chablat
Antoine Rennuit (IRCCyN), Alain Micaelli (LIST), Claude Andriot (LIST), Fran\c{c}ois Guillaume, Nicolas Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN)
Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping
null
Dans Laval Virtual - Laval Virtual, Laval : France (2004)
null
null
cs.RO
null
In the industry, numerous commercial packages provide tools to introduce, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks to Virtual Humans. We will focus on control. Thanks to algorithms newly introduced in recent research papers, we think we can provide an implementation, which even widens, and simplifies the animation capacities of virtual manikins. In order to do so, we are going to express the industrial expectations as for Virtual Humans, without considering feasibility (not to bias the issue). The second part will show that no commercial application provides the tools that perfectly meet the needs. Thus we propose a new animation framework that better answers the problem. Our contribution is the integration - driven by need ~ of available new scientific techniques to animate Virtual Humans, in a new control scheme that better answers industrial expectations.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 15:52:53 GMT" } ]
2007-09-06T00:00:00
[ [ "Rennuit", "Antoine", "", "IRCCyN" ], [ "Micaelli", "Alain", "", "LIST" ], [ "Andriot", "Claude", "", "LIST" ], [ "Guillaume", "François", "", "IRCCyN" ], [ "Chevassus", "Nicolas", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Chedmail", "Patrick", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0709.0746
Ketan Mulmuley D
Ketan D. Mulmuley, Milind Sohoni
Geometric Complexity Theory: Introduction
161 pages
null
null
TR-2007-16, comp. sci. dept., The University Of Chicago
cs.CC
null
These are lectures notes for the introductory graduate courses on geometric complexity theory (GCT) in the computer science department, the university of Chicago. Part I consists of the lecture notes for the course given by the first author in the spring quarter, 2007. It gives introduction to the basic structure of GCT. Part II consists of the lecture notes for the course given by the second author in the spring quarter, 2003. It gives introduction to invariant theory with a view towards GCT. No background in algebraic geometry or representation theory is assumed. These lecture notes in conjunction with the article \cite{GCTflip1}, which describes in detail the basic plan of GCT based on the principle called the flip, should provide a high level picture of GCT assuming familiarity with only basic notions of algebra, such as groups, rings, fields etc.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 21:54:52 GMT" } ]
2014-08-02T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ], [ "Sohoni", "Milind", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.0748
Ketan Mulmuley D
Ketan D. Mulmuley
On P vs. NP, Geometric Complexity Theory, and the Flip I: a high level view
103 pages
null
null
TR-2007-13, comp. sci. dept., The University of Chicago
cs.CC
null
Geometric complexity theory (GCT) is an approach to the $P$ vs. $NP$ and related problems through algebraic geometry and representation theory. This article gives a high-level exposition of the basic plan of GCT based on the principle, called the flip, without assuming any background in algebraic geometry or representation theory.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 22:10:31 GMT" } ]
2007-09-07T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.0749
Ketan Mulmuley D
Ketan D. Mulmuley
Geometric Complexity Theory VII: Nonstandard quantum group for the plethysm problem
59 pages, changed content
null
null
TR-2007-14, comp. sci. dept., The University Of Chicago
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes a {\em nonstandard} quantum group that may be used to derive a positive formula for the plethysm problem, just as the standard (Drinfeld-Jimbo) quantum group can be used to derive the positive Littlewood-Richardson rule for arbitrary complex semisimple Lie groups. The sequel \cite{GCT8} gives conjecturally correct algorithms to construct canonical bases of the coordinate rings of these nonstandard quantum groups and canonical bases of the dually paired nonstandard deformations of the symmetric group algebra. A positive $#P$-formula for the plethysm constant follows from the conjectural properties of these canonical bases and the duality and reciprocity conjectures herein.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 22:23:15 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2008 17:06:03 GMT" } ]
2008-09-01T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.0751
Ketan Mulmuley D
Ketan D. Mulmuley
Geometric Complexity Theory VIII: On canonical bases for the nonstandard quantum groups
71 pages, changed content
null
null
TR-2007-15, comp. sci. dept., The University Of Chicago
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article gives conjecturally correct algorithms to construct canonical bases of the irreducible polynomial representations and the matrix coordinate rings of the nonstandard quantum groups in GCT4 and GCT7, and canonical bases of the dually paired nonstandard deformations of the symmetric group algebra therein. These are generalizations of the canonical bases of the irreducible polynomial representations and the matrix coordinate ring of the standard quantum group, as constructed by Kashiwara and Lusztig, and the Kazhdan-Lusztig basis of the Hecke algebra. A positive ($#P$-) formula for the well-known plethysm constants follows from their conjectural properties and the duality and reciprocity conjectures in \cite{GCT7}.
[ { "version": "v1", "created": "Wed, 5 Sep 2007 22:30:50 GMT" }, { "version": "v2", "created": "Mon, 1 Sep 2008 17:11:21 GMT" } ]
2008-09-01T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.0787
Toshiya Takami
Taizo Kobayashi, Toshiya Takami, Kin'ya Takahashi, Ryota Mibu, Mutsumi Aoyagi
Sound Generation by a Turbulent Flow in Musical Instruments - Multiphysics Simulation Approach -
6 pages, 10 figure files, to appear in the proceedings of HPCAsia07
null
null
null
physics.comp-ph cs.CE physics.flu-dyn
null
Total computational costs of scientific simulations are analyzed between direct numerical simulations (DNS) and multiphysics simulations (MPS) for sound generation in musical instruments. In order to produce acoustic sound by a turbulent flow in a simple recorder-like instrument, compressible fluid dynamic calculations with a low Mach number are required around the edges and the resonator of the instrument in DNS, while incompressible fluid dynamic calculations coupled with dynamics of sound propagation based on the Lighthill's acoustic analogy are used in MPS. These strategies are evaluated not only from the viewpoint of computational performances but also from the theoretical points of view as tools for scientific simulations of complicated systems.
[ { "version": "v1", "created": "Thu, 6 Sep 2007 13:47:31 GMT" } ]
2007-09-07T00:00:00
[ [ "Kobayashi", "Taizo", "" ], [ "Takami", "Toshiya", "" ], [ "Takahashi", "Kin'ya", "" ], [ "Mibu", "Ryota", "" ], [ "Aoyagi", "Mutsumi", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" } ]
0709.0883
Joshua Herman J
Joshua Jay Herman
Liquid State Machines in Adbiatic Quantum Computers for General Computation
Totally wrong
null
null
null
cs.CC cs.NE
null
Major mistakes do not read
[ { "version": "v1", "created": "Thu, 6 Sep 2007 16:04:42 GMT" }, { "version": "v2", "created": "Fri, 7 Sep 2007 19:34:51 GMT" }, { "version": "v3", "created": "Sun, 9 Sep 2007 14:29:14 GMT" }, { "version": "v4", "created": "Fri, 21 Sep 2007 13:09:13 GMT" }, { "version": "v5", "created": "Fri, 8 Jul 2011 01:54:35 GMT" } ]
2011-07-11T00:00:00
[ [ "Herman", "Joshua Jay", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0709.0896
Michael J. Kurtz
Michael J. Kurtz, Edwin A. Henneken
Open Access does not increase citations for research articles from The Astrophysical Journal
null
null
null
null
cs.DL cs.CY
null
We demonstrate conclusively that there is no "Open Access Advantage" for papers from the Astrophysical Journal. The two to one citation advantage enjoyed by papers deposited in the arXiv e-print server is due entirely to the nature and timing of the deposited papers. This may have implications for other disciplines.
[ { "version": "v1", "created": "Thu, 6 Sep 2007 16:00:43 GMT" } ]
2007-09-07T00:00:00
[ [ "Kurtz", "Michael J.", "" ], [ "Henneken", "Edwin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0709.0906
Sylvain Boussier
Sylvain Boussier (LGI2P), Hideki Hashimoto, Michel Vasquez (LGI2P)
A Greedy Randomized Adaptive Search Procedure for Technicians and Interventions Scheduling for Telecommunications
3 pages
null
null
null
cs.DM
null
The subject of the 5th challenge proposed by the French Society of Operations Research and Decision Analysis (ROADEF) consists in scheduling technicians and interventions for telecommunications (http://www.g-scop.inpg.fr/ChallengeROADEF2007/ or http://www.roadef.org/). We detail the algorithm we proposed for this challenge which is a Greedy Randomized Adaptative Search Procedure (GRASP). Computational results led us to the 1st position in the Junior category and to the 4th position in All category of the Challenge ROADEF 2007.
[ { "version": "v1", "created": "Thu, 6 Sep 2007 16:12:06 GMT" } ]
2007-09-07T00:00:00
[ [ "Boussier", "Sylvain", "", "LGI2P" ], [ "Hashimoto", "Hideki", "", "LGI2P" ], [ "Vasquez", "Michel", "", "LGI2P" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.0907
Cristobal Rojas
Mathieu Hoyrup and Cristobal Rojas
Computability of probability measures and Martin-Lof randomness over metric spaces
29 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate algorithmic randomness on more general spaces than the Cantor space, namely computable metric spaces. To do this, we first develop a unified framework allowing computations with probability measures. We show that any computable metric space with a computable probability measure is isomorphic to the Cantor space in a computable and measure-theoretic sense. We show that any computable metric space admits a universal uniform randomness test (without further assumption).
[ { "version": "v1", "created": "Thu, 6 Sep 2007 16:16:23 GMT" }, { "version": "v2", "created": "Wed, 23 Jul 2008 15:19:47 GMT" } ]
2008-07-23T00:00:00
[ [ "Hoyrup", "Mathieu", "" ], [ "Rojas", "Cristobal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.0929
Vladimir Gudkov
V. Gudkov and V. Montealegre
Analysis of network by generalized mutual entropies
null
null
10.1016/j.physa.2008.01.005
null
cond-mat.dis-nn cs.NI physics.comp-ph
null
Generalized mutual entropy is defined for networks and applied for analysis of complex network structures. The method is tested for the case of computer simulated scale free networks, random networks, and their mixtures. The possible applications for real network analysis are discussed.
[ { "version": "v1", "created": "Thu, 6 Sep 2007 18:00:15 GMT" } ]
2009-11-13T00:00:00
[ [ "Gudkov", "V.", "" ], [ "Montealegre", "V.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0709.0961
Harish Sethu
Harish Sethu and Thomas Gerety
A New Distributed Topology Control Algorithm for Wireless Environments with Non-Uniform Path Loss and Multipath Propagation
To appear in Ad Hoc Networks
Ad Hoc Networks, May 2010, volume 8, issue 3, pages 280-294.
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors with which it directly communicates. Many previous algorithms for distributed topology control have assumed an ability at each node to deduce some location-based information such as the direction and the distance of its neighbor nodes with respect to itself. Such a deduction of location-based information, however, cannot be relied upon in real environments where the path loss exponents vary greatly leading to significant errors in distance estimates. Also, multipath effects may result in different signal paths with different loss characteristics, and none of these paths may be line-of-sight, making it difficult to estimate the direction of a neighboring node. In this paper, we present Step Topology Control (STC), a simple distributed topology control algorithm which reduces energy consumption while preserving the connectivity of a heterogeneous sensor network without use of any location-based information. We show that the STC algorithm achieves the same or better order of communication and computational complexity when compared to other known algorithms that also preserve connectivity without the use of location-based information. We also present a detailed simulation-based comparative analysis of the energy savings and interference reduction achieved by the algorithms. The results show that, in spite of not incurring a higher communication or computational complexity, the STC algorithm performs better than other algorithms in uniform wireless environments and especially better when path loss characteristics are non-uniform.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 15:13:34 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 22:36:40 GMT" } ]
2010-03-26T00:00:00
[ [ "Sethu", "Harish", "" ], [ "Gerety", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.0965
Harish Sethu
Harish Sethu
The Induced Bounded-Degree Subgraph Problem and Stream Control in MIMO Networks
null
null
null
null
cs.NI
null
In this report, we consider maximal solutions to the induced bounded-degree subgraph problem and relate it to issues concerning stream control in multiple-input multiple-output (MIMO) networks. We present a new distributed algorithm that completes in logarithmic time with high probability and is guaranteed to complete in linear time. We conclude the report with simulation results that address the effectiveness of stream control and the relative impact of receiver overloading and flexible interference suppression.
[ { "version": "v1", "created": "Thu, 6 Sep 2007 22:40:22 GMT" } ]
2007-09-10T00:00:00
[ [ "Sethu", "Harish", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.0974
Sergey Gubin
Sergey Gubin
Finding Paths and Cycles in Graphs
11 pages
null
null
null
cs.DM cs.CC cs.DS math.CO
null
A polynomial time algorithm which detects all paths and cycles of all lengths in form of vertex pairs (start, finish).
[ { "version": "v1", "created": "Fri, 7 Sep 2007 00:04:20 GMT" } ]
2007-09-10T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0709.0993
Oleg Shro
O. I. Shro
The Description of Information in 4-Dimensional Pseudo-Euclidean Information Space
40 pages. This is conceptual article from information theory. This article contains original results received by the author
null
null
null
cs.IT math.IT nlin.AO physics.soc-ph
null
This article is presented new method of description information systems in abstract 4-dimensional pseudo-Euclidean information space (4-DPIES) with using special relativity (SR) methods. This purpose core postulates of existence 4-DPIES are formulated. The theorem setting existence criteria of the invariant velocity of the information transference is formulated and proved. One more theorem allowed relating discrete parameters of information and continuous space-time treating and also row of supplementary theorems is formulated and proved. For description of dynamics and interaction of information, in article is introduced general parameter of information - generalized information emotion (GIE), reminding simultaneously on properties the mass and the charge. At performing calculation of information observable parameters in the information space is introduced continual integration methods of Feynman. The applying idea about existence of GIE as measures of the information inertness and the interaction carrier, and using continual integration methods of Feynman can be calculated probability of information process in 4-DPIES. In this frame presented approach has allowed considering information systems when interest is presented with information processes, their related with concrete definition without necessity. The relation between 4-DPIES and real systems parameters is set at modelling of matching between observable processes and real phenomena from information interpretation.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 05:24:02 GMT" } ]
2011-11-10T00:00:00
[ [ "Shro", "O. I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0709.1023
Jorge Kurchan
Florent Krzakala and Jorge Kurchan
Constraint optimization and landscapes
Contribution to STATPHYS23
Eur. Phys. J. B 64, 563-565 (2008)
10.1140/epjb/e2008-00052-x
null
quant-ph cond-mat.stat-mech cs.CC nlin.AO
null
We describe an effective landscape introduced in [1] for the analysis of Constraint Satisfaction problems, such as Sphere Packing, K-SAT and Graph Coloring. This geometric construction reexpresses these problems in the more familiar terms of optimization in rugged energy landscapes. In particular, it allows one to understand the puzzling fact that unsophisticated programs are successful well beyond what was considered to be the `hard' transition, and suggests an algorithm defining a new, higher, easy-hard frontier.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 08:49:38 GMT" } ]
2008-09-25T00:00:00
[ [ "Krzakala", "Florent", "" ], [ "Kurchan", "Jorge", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0709.1024
Roland Bouffanais
Roland Bouffanais, Vincent Keller, Ralf Gruber, Michel O. Deville
Computational performance of a parallelized high-order spectral and mortar element toolbox
Preprint submitted for publication to Parallel Computing
null
null
null
cs.DC cs.PF
null
In this paper, a comprehensive performance review of a MPI-based high-order spectral and mortar element method C++ toolbox is presented. The focus is put on the performance evaluation of several aspects with a particular emphasis on the parallel efficiency. The performance evaluation is analyzed and compared to predictions given by a heuristic model, the so-called Gamma model. A tailor-made CFD computation benchmark case is introduced and used to carry out this review, stressing the particular interest for commodity clusters. Conclusions are drawn from this extensive series of analyses and modeling leading to specific recommendations concerning such toolbox development and parallel implementation.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 08:52:32 GMT" } ]
2007-09-10T00:00:00
[ [ "Bouffanais", "Roland", "" ], [ "Keller", "Vincent", "" ], [ "Gruber", "Ralf", "" ], [ "Deville", "Michel O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0709.1056
Stephane Norte
Stephane Norte
A Sudoku Game for People with Motor Impairments
7 pages, 5 figures
null
null
null
cs.HC cs.CY
null
Computer games are motivating and beneficial in learning different educational skills. Most people use their fingers, hands, and arms when using a computer game. However, for people with motor disabilities this task can be a barrier. We present a new Sudoku game for people whose motion is impaired, called Sudoku 4ALL. With this special interface a person can control the game with the voice or with a single switch. Our research aims to cautiously search for issues that might be appropriate for computational support and to build enabling technologies that increase individuals' functional independence in a game environment.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 11:59:22 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2007 13:26:17 GMT" }, { "version": "v3", "created": "Mon, 17 Sep 2007 21:08:35 GMT" } ]
2007-09-18T00:00:00
[ [ "Norte", "Stephane", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0709.1074
Shu-Tao Xia
Shu-Tao Xia and Fang-Wei Fu
Johnson Type Bounds on Constant Dimension Codes
12 pages, submitted to Designs, Codes and Cryptography
null
null
null
cs.IT math.IT
null
Very recently, an operator channel was defined by Koetter and Kschischang when they studied random network coding. They also introduced constant dimension codes and demonstrated that these codes can be employed to correct errors and/or erasures over the operator channel. Constant dimension codes are equivalent to the so-called linear authentication codes introduced by Wang, Xing and Safavi-Naini when constructing distributed authentication systems in 2003. In this paper, we study constant dimension codes. It is shown that Steiner structures are optimal constant dimension codes achieving the Wang-Xing-Safavi-Naini bound. Furthermore, we show that constant dimension codes achieve the Wang-Xing-Safavi-Naini bound if and only if they are certain Steiner structures. Then, we derive two Johnson type upper bounds, say I and II, on constant dimension codes. The Johnson type bound II slightly improves on the Wang-Xing-Safavi-Naini bound. Finally, we point out that a family of known Steiner structures is actually a family of optimal constant dimension codes achieving both the Johnson type bounds I and II.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 13:07:31 GMT" } ]
2007-09-10T00:00:00
[ [ "Xia", "Shu-Tao", "" ], [ "Fu", "Fang-Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.1080
Cas Cremers
Cas Cremers
On the Protocol Composition Logic PCL
null
null
null
null
cs.CR cs.LO
null
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of the logic, as defined in [DDMP05,HSD+05,He05,Dat05,Der06,DDMR07]. The identified problems imply strong restrictions on the scope of PCL, and imply that some currently claimed PCL proofs cannot be proven within the logic, or make use of unsound axioms. Where possible, we propose solutions for these problems.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 13:32:06 GMT" }, { "version": "v2", "created": "Sun, 9 Sep 2007 12:14:41 GMT" }, { "version": "v3", "created": "Thu, 20 Sep 2007 21:51:00 GMT" }, { "version": "v4", "created": "Mon, 1 Oct 2007 13:28:21 GMT" }, { "version": "v5", "created": "Fri, 2 Nov 2007 11:10:19 GMT" }, { "version": "v6", "created": "Wed, 19 Dec 2007 15:58:11 GMT" }, { "version": "v7", "created": "Fri, 22 Feb 2008 16:12:11 GMT" } ]
2008-02-22T00:00:00
[ [ "Cremers", "Cas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.1099
Cherif Smaili
Cherif Smaili (INRIA Lorraine - LORIA), Maan El Badaoui El Najjar (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Multi-Sensor Fusion Method using Dynamic Bayesian Network for Precise Vehicle Localization and Road Matching
null
null
null
null
cs.AI cs.RO
null
This paper presents a multi-sensor fusion strategy for a novel road-matching method designed to support real-time navigational features within advanced driving-assistance systems. Managing multihypotheses is a useful strategy for the road-matching problem. The multi-sensor fusion and multi-modal estimation are realized using Dynamical Bayesian Network. Experimental results, using data from Antilock Braking System (ABS) sensors, a differential Global Positioning System (GPS) receiver and an accurate digital roadmap, illustrate the performances of this approach, especially in ambiguous situations.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 15:03:37 GMT" } ]
2007-09-10T00:00:00
[ [ "Smaili", "Cherif", "", "INRIA Lorraine - LORIA" ], [ "Najjar", "Maan El Badaoui El", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0709.1166
Daniel Lemire
Daniel Lemire, Martin Brooks, Yuhong Yan
An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation
This is the extended version of our ICDM'05 paper (arXiv:cs/0702142)
Daniel Lemire, Martin Brooks and Yuhong Yan, An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation. International Journal of Computer Mathematics 86 (7), 2009.
10.1080/00207160701694153
NRC-00156
cs.DB
null
Monotonicity is a simple yet significant qualitative characteristic. We consider the problem of segmenting a sequence in up to K segments. We want segments to be as monotonic as possible and to alternate signs. We propose a quality metric for this problem using the l_inf norm, and we present an optimal linear time algorithm based on novel formalism. Moreover, given a precomputation in time O(n log n) consisting of a labeling of all extrema, we compute any optimal segmentation in constant time. We compare experimentally its performance to two piecewise linear segmentation heuristics (top-down and bottom-up). We show that our algorithm is faster and more accurate. Applications include pattern recognition and qualitative modeling.
[ { "version": "v1", "created": "Fri, 7 Sep 2007 21:18:57 GMT" } ]
2009-09-01T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Brooks", "Martin", "" ], [ "Yan", "Yuhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0709.1167
Marko Antonio Rodriguez
Marko A. Rodriguez, Jennifer H. Watkins, Johan Bollen, Carlos Gershenson
Using RDF to Model the Structure and Process of Systems
International Conference on Complex Systems, Boston MA, October 2007
InterJournal of Complex Systems, 2131, ISSN: 1081-0625, February 2008
null
LAUR-07-5720
cs.AI
null
Many systems can be described in terms of networks of discrete elements and their various relationships to one another. A semantic network, or multi-relational network, is a directed labeled graph consisting of a heterogeneous set of entities connected by a heterogeneous set of relationships. Semantic networks serve as a promising general-purpose modeling substrate for complex systems. Various standardized formats and tools are now available to support practical, large-scale semantic network models. First, the Resource Description Framework (RDF) offers a standardized semantic network data model that can be further formalized by ontology modeling languages such as RDF Schema (RDFS) and the Web Ontology Language (OWL). Second, the recent introduction of highly performant triple-stores (i.e. semantic network databases) allows semantic network models on the order of $10^9$ edges to be efficiently stored and manipulated. RDF and its related technologies are currently used extensively in the domains of computer science, digital library science, and the biological sciences. This article will provide an introduction to RDF/RDFS/OWL and an examination of its suitability to model discrete element complex systems.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 01:18:18 GMT" }, { "version": "v2", "created": "Mon, 15 Oct 2007 16:00:19 GMT" } ]
2008-11-03T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Watkins", "Jennifer H.", "" ], [ "Bollen", "Johan", "" ], [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.1190
Mohsen Bayati
Mohsen Bayati, Christian Borgs, Jennifer Chayes, Riccardo Zecchina
Belief-Propagation for Weighted b-Matchings on Arbitrary Graphs and its Relation to Linear Programs with Integer Solutions
28 pages, 2 figures. Submitted to SIAM journal on Discrete Mathematics on March 19, 2009; accepted for publication (in revised form) August 30, 2010; published electronically July 1, 2011
SIAM J. Discrete Math. 2011, Vol 25, Issue 2, pp. 989-1011
10.1137/090753115
null
cs.IT cs.AI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the general problem of finding the minimum weight $\bm$-matching on arbitrary graphs. We prove that, whenever the linear programming (LP) relaxation of the problem has no fractional solutions, then the belief propagation (BP) algorithm converges to the correct solution. We also show that when the LP relaxation has a fractional solution then the BP algorithm can be used to solve the LP relaxation. Our proof is based on the notion of graph covers and extends the analysis of (Bayati-Shah-Sharma 2005 and Huang-Jebara 2007}. These results are notable in the following regards: (1) It is one of a very small number of proofs showing correctness of BP without any constraint on the graph structure. (2) Variants of the proof work for both synchronous and asynchronous BP; it is the first proof of convergence and correctness of an asynchronous BP algorithm for a combinatorial optimization problem.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 08:21:34 GMT" }, { "version": "v2", "created": "Sat, 9 Feb 2008 02:56:38 GMT" }, { "version": "v3", "created": "Thu, 4 Aug 2011 21:43:21 GMT" } ]
2015-03-13T00:00:00
[ [ "Bayati", "Mohsen", "" ], [ "Borgs", "Christian", "" ], [ "Chayes", "Jennifer", "" ], [ "Zecchina", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.1197
Avraham Trahtman N
A.N. Trahtman
An efficient algorithm finds noticeable trends and examples concerning the \v{C}erny conjecture
MFCS06. LNCS 4162, 10 pages
Lectures Notes in Computer Science, 4162(2006), 789-80
null
null
cs.DM
null
A word w is called synchronizing (recurrent, reset, directed) word of a deterministic finite automaton (DFA) if w sends all states of the automaton on a unique state. Jan Cerny had found in 1964 a sequence of n-state complete DFA with shortest synchronizing word of length (n-1)^2. He had conjectured that it is an upper bound for the length of the shortest synchronizing word for any $n$-state complete DFA. The examples of DFA with shortest synchronizing word of length (n-1)^2 are relatively rare. To the Cerny sequence were added in all examples of Cerny, Piricka and Rosenauerova (1971), of Kari (2001) and of Roman (2004). By help of a program based on some effective algorithms, a wide class of automata of size less than 11 was checked. The order of the algorithm finding synchronizing word is quadratic for overwhelming majority of known to date automata. Some new examples of n-state DFA with minimal synchronizing word of length (n-1)^2 were discovered. The program recognized some remarkable trends concerning the length of the minimal synchronizing word. http://www.cs.biu.ac.il/~trakht/Testas.html
[ { "version": "v1", "created": "Sat, 8 Sep 2007 10:07:52 GMT" } ]
2007-09-11T00:00:00
[ [ "Trahtman", "A. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.1201
Alessio Guglielmi
Paola Bruscoli and Alessio Guglielmi
On the Proof Complexity of Deep Inference
Minor improvements over the published version. Always updated version at <http://cs.bath.ac.uk/ag/p/PrComplDI.pdf>
ACM Transactions on Computational Logic 10 (2:14) 2009, pp. 1-34
10.1145/1462179.1462186
null
cs.CC cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain two results about the proof complexity of deep inference: 1) deep-inference proof systems are as powerful as Frege ones, even when both are extended with the Tseitin extension rule or with the substitution rule; 2) there are analytic deep-inference proof systems that exhibit an exponential speed-up over analytic Gentzen proof systems that they polynomially simulate.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 11:35:28 GMT" }, { "version": "v2", "created": "Mon, 11 Feb 2008 15:34:38 GMT" }, { "version": "v3", "created": "Sun, 19 Apr 2009 18:55:21 GMT" } ]
2009-04-19T00:00:00
[ [ "Bruscoli", "Paola", "" ], [ "Guglielmi", "Alessio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0709.1205
Alessio Guglielmi
Alessio Guglielmi and Tom Gundersen
Normalisation Control in Deep Inference via Atomic Flows
null
Logical Methods in Computer Science, Volume 4, Issue 1 (March 31, 2008) lmcs:1081
10.2168/LMCS-4(1:9)2008
null
math.LO cs.LO
null
We introduce `atomic flows': they are graphs obtained from derivations by tracing atom occurrences and forgetting the logical structure. We study simple manipulations of atomic flows that correspond to complex reductions on derivations. This allows us to prove, for propositional logic, a new and very general normalisation theorem, which contains cut elimination as a special case. We operate in deep inference, which is more general than other syntactic paradigms, and where normalisation is more difficult to control. We argue that atomic flows are a significant technical advance for normalisation theory, because 1) the technique they support is largely independent of syntax; 2) indeed, it is largely independent of logical inference rules; 3) they constitute a powerful geometric formalism, which is more intuitive than syntax.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 12:24:19 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 12:34:27 GMT" }, { "version": "v3", "created": "Mon, 31 Mar 2008 10:59:23 GMT" } ]
2015-07-01T00:00:00
[ [ "Guglielmi", "Alessio", "" ], [ "Gundersen", "Tom", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.1207
Mikael Franzen
Mikael Franzen
The P versus NP Brief
4 pages, 1 figure; added notational definition for functions for section 2, formatting and wording changes; corrected typo, recompiled pdf-file
null
null
null
cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper discusses why P and NP are likely to be different. It analyses the essence of the concepts and points out that P and NP might be diverse by sheer definition. It also speculates that P and NP may be unequal due to natural laws.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 12:45:51 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2009 23:42:52 GMT" }, { "version": "v3", "created": "Thu, 30 Apr 2009 23:58:14 GMT" } ]
2009-05-01T00:00:00
[ [ "Franzen", "Mikael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.1211
Anthony R\'eveillac
Anthony Reveillac
Likelihood ratios and Bayesian inference for Poisson channels
13 pages
null
null
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, infinite-dimensional methods have been introduced for the Gaussian channels estimation. The aim of this paper is to study the application of similar methods to Poisson channels. In particular we compute the Bayesian estimator of a Poisson channel using the likelihood ratio and the discrete Malliavin gradient. This algorithm is suitable for numerical implementation via the Monte-Carlo scheme. As an application we provide an new proof of the formula obtained recently by Guo, Shamai and Verdu\'u relating some derivatives of the input-output mutual information of a time-continuous Poisson channel and the conditional mean estimator of the input. These results are then extended to mixed Gaussian-Poisson channels.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 13:28:13 GMT" }, { "version": "v2", "created": "Mon, 26 Nov 2007 07:33:03 GMT" }, { "version": "v3", "created": "Wed, 11 Feb 2009 09:22:01 GMT" } ]
2009-02-11T00:00:00
[ [ "Reveillac", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0709.1227
Yanghua Xiao
Yanghua Xiao, Wentao Wu, Wei Wang and Zhengying He
Efficient Algorithms for Node Disjoint Subgraph Homeomorphism Determination
15 pages, 11 figures, submitted to DASFAA 2008
In Proceeding of 13th International Conference on Database Systems for Advanced Applications, 2008
10.1007/978-3-540-78568-2
null
cs.DS cs.DB
null
Recently, great efforts have been dedicated to researches on the management of large scale graph based data such as WWW, social networks, biological networks. In the study of graph based data management, node disjoint subgraph homeomorphism relation between graphs is more suitable than (sub)graph isomorphism in many cases, especially in those cases that node skipping and node mismatching are allowed. However, no efficient node disjoint subgraph homeomorphism determination (ndSHD) algorithms have been available. In this paper, we propose two computationally efficient ndSHD algorithms based on state spaces searching with backtracking, which employ many heuristics to prune the search spaces. Experimental results on synthetic data sets show that the proposed algorithms are efficient, require relative little time in most of the testing cases, can scale to large or dense graphs, and can accommodate to more complex fuzzy matching cases.
[ { "version": "v1", "created": "Sat, 8 Sep 2007 18:14:47 GMT" } ]
2008-10-09T00:00:00
[ [ "Xiao", "Yanghua", "" ], [ "Wu", "Wentao", "" ], [ "Wang", "Wei", "" ], [ "He", "Zhengying", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0709.1263
Thorsten Theobald
Thorsten Theobald
Enumerating the Nash equilibria of rank 1-games
15 pages
null
null
null
cs.GT math.OC
null
A bimatrix game $(A,B)$ is called a game of rank $k$ if the rank of the matrix $A+B$ is at most $k$. We consider the problem of enumerating the Nash equilibria in (non-degenerate) games of rank 1. In particular, we show that even for games of rank 1 not all equilibria can be reached by a Lemke-Howson path and present a parametric simplex-type algorithm for enumerating all Nash equilibria of a non-degenerate game of rank 1.
[ { "version": "v1", "created": "Sun, 9 Sep 2007 13:32:23 GMT" } ]
2007-09-11T00:00:00
[ [ "Theobald", "Thorsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0709.1272
Alfredo Buttari Dr
Alfredo Buttari, Julien Langou, Jakub Kurzak, Jack Dongarra
A Class of Parallel Tiled Linear Algebra Algorithms for Multicore Architectures
null
null
null
Lapack working Note 191
cs.MS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As multicore systems continue to gain ground in the High Performance Computing world, linear algebra algorithms have to be reformulated or new algorithms have to be developed in order to take advantage of the architectural features on these new processors. Fine grain parallelism becomes a major requirement and introduces the necessity of loose synchronization in the parallel execution of an operation. This paper presents an algorithm for the Cholesky, LU and QR factorization where the operations can be represented as a sequence of small tasks that operate on square blocks of data. These tasks can be dynamically scheduled for execution based on the dependencies among them and on the availability of computational resources. This may result in an out of order execution of the tasks which will completely hide the presence of intrinsically sequential tasks in the factorization. Performance comparisons are presented with the LAPACK algorithms where parallelism can only be exploited at the level of the BLAS operations and vendor implementations.
[ { "version": "v1", "created": "Sun, 9 Sep 2007 16:32:46 GMT" }, { "version": "v2", "created": "Tue, 11 Sep 2007 07:14:07 GMT" }, { "version": "v3", "created": "Thu, 12 Jun 2008 18:09:13 GMT" } ]
2008-06-12T00:00:00
[ [ "Buttari", "Alfredo", "" ], [ "Langou", "Julien", "" ], [ "Kurzak", "Jakub", "" ], [ "Dongarra", "Jack", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.1308
Giorgi Japaridze
Giorgi Japaridze
Cirquent calculus deepened
Significant improvements over the previous versions
Journal of Logic and Computation 18 (2008), pp. 983-1028
10.1093/logcom/exn019
null
cs.LO math.LO
null
Cirquent calculus is a new proof-theoretic and semantic framework, whose main distinguishing feature is being based on circuits, as opposed to the more traditional approaches that deal with tree-like objects such as formulas or sequents. Among its advantages are greater efficiency, flexibility and expressiveness. This paper presents a detailed elaboration of a deep-inference cirquent logic, which is naturally and inherently resource conscious. It shows that classical logic, both syntactically and semantically, is just a special, conservative fragment of this more general and, in a sense, more basic logic -- the logic of resources in the form of cirquent calculus. The reader will find various arguments in favor of switching to the new framework, such as arguments showing the insufficiency of the expressive power of linear logic or other formula-based approaches to developing resource logics, exponential improvements over the traditional approaches in both representational and proof complexities offered by cirquent calculus, and more. Among the main purposes of this paper is to provide an introductory-style starting point for what, as the author wishes to hope, might have a chance to become a new line of research in proof theory -- a proof theory based on circuits instead of formulas.
[ { "version": "v1", "created": "Mon, 10 Sep 2007 18:00:51 GMT" }, { "version": "v2", "created": "Tue, 18 Sep 2007 19:38:26 GMT" }, { "version": "v3", "created": "Tue, 1 Apr 2008 12:09:13 GMT" } ]
2011-04-15T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0709.1401
Arnaud Spiwack
Thierry Coquand and Arnaud Spiwack
A proof of strong normalisation using domain theory
16 pages
Logical Methods in Computer Science, Volume 3, Issue 4 (December 4, 2007) lmcs:1099
10.2168/LMCS-3(4:12)2007
null
cs.LO cs.PL
null
Ulrich Berger presented a powerful proof of strong normalisation using domains, in particular it simplifies significantly Tait's proof of strong normalisation of Spector's bar recursion. The main contribution of this paper is to show that, using ideas from intersection types and Martin-Lof's domain interpretation of type theory one can in turn simplify further U. Berger's argument. We build a domain model for an untyped programming language where U. Berger has an interpretation only for typed terms or alternatively has an interpretation for untyped terms but need an extra condition to deduce strong normalisation. As a main application, we show that Martin-L\"{o}f dependent type theory extended with a program for Spector double negation shift.
[ { "version": "v1", "created": "Mon, 10 Sep 2007 14:08:26 GMT" }, { "version": "v2", "created": "Tue, 4 Dec 2007 14:43:36 GMT" } ]
2015-07-01T00:00:00
[ [ "Coquand", "Thierry", "" ], [ "Spiwack", "Arnaud", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0709.1433
Mamadou Moustapha Kant\'e
Mamadou Moustapha Kante and Michael Rao
The Rank-Width of Edge-Colored Graphs
It is an update of the last version generalising all the results to edge-colored graphs and answering some of the raised questions
Theory of Computing Systems 52(4):599-644(2013)
10.1007/s00224-012-9399-y
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clique-width is a complexity measure of directed as well as undirected graphs. Rank-width is an equivalent complexity measure for undirected graphs and has good algorithmic and structural properties. It is in particular related to the vertex-minor relation. We discuss an extension of the notion of rank-width to edge-colored graphs. A C-colored graph is a graph where the arcs are colored with colors from the set C. There is not a natural notion of rank-width for C-colored graphs. We define two notions of rank-width for them, both based on a coding of C-colored graphs by edge-colored graphs where each edge has exactly one color from a field F and named respectively F-rank-width and F-bi-rank-width. The two notions are equivalent to clique-width. We then present a notion of vertex-minor for F-colored graphs and prove that F-colored graphs of bounded F-rank-width are characterised by a finite list of F-colored graphs to exclude as vertex-minors. A cubic-time algorithm to decide whether a F-colored graph has F-rank-width (resp. F-bi-rank-width) at most k, for fixed k, is also given. Graph operations to check MSOL-definable properties on F-colored graphs of bounded rank-width are presented. A specialisation of all these notions to (directed) graphs without edge colors is presented, which shows that our results generalise the ones in undirected graphs.
[ { "version": "v1", "created": "Mon, 10 Sep 2007 16:17:20 GMT" }, { "version": "v2", "created": "Fri, 19 Oct 2007 07:31:35 GMT" }, { "version": "v3", "created": "Mon, 3 Mar 2008 10:01:47 GMT" }, { "version": "v4", "created": "Mon, 26 Jul 2010 14:37:29 GMT" }, { "version": "v5", "created": "Tue, 8 Jul 2014 11:24:47 GMT" } ]
2014-07-09T00:00:00
[ [ "Kante", "Mamadou Moustapha", "" ], [ "Rao", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0709.1441
Daniel Baum
Daniel S. Baum and Helmut B\"olcskei
Information-theoretic analysis of MIMO channel sounding
99 pages, 14 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The large majority of commercially available multiple-input multiple-output (MIMO) radio channel measurement devices (sounders) is based on time-division multiplexed switching (TDMS) of a single transmit/receive radio-frequency chain into the elements of a transmit/receive antenna array. While being cost-effective, such a solution can cause significant measurement errors due to phase noise and frequency offset in the local oscillators. In this paper, we systematically analyze the resulting errors and show that, in practice, overestimation of channel capacity by several hundred percent can occur. Overestimation is caused by phase noise (and to a lesser extent frequency offset) leading to an increase of the MIMO channel rank. Our analysis furthermore reveals that the impact of phase errors is, in general, most pronounced if the physical channel has low rank (typical for line-of-sight or poor scattering scenarios). The extreme case of a rank-1 physical channel is analyzed in detail. Finally, we present measurement results obtained from a commercially employed TDMS-based MIMO channel sounder. In the light of the findings of this paper, the results obtained through MIMO channel measurement campaigns using TDMS-based channel sounders should be interpreted with great care.
[ { "version": "v1", "created": "Mon, 10 Sep 2007 17:22:35 GMT" } ]
2007-09-11T00:00:00
[ [ "Baum", "Daniel S.", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.1449
Yue Li
Yue Li and Yu Liu
Supervised secure entanglement sharing for faithful quantum teleportation via tripartite W states
7 pages, 4 figures, revised the detection mode and security analysis, added one successful eavesdropping rate plot in Fig. 3
null
null
null
quant-ph cs.CR
null
We present a supervised secure entanglement sharing protocol via tripartite W states for faithful quantum teleportation. By guaranteeing a secure entanglement distribution in the charge of a third believed supervisor, quantum information of an unknown state of a 2-level particle can be faithfully teleported from the sender to the remote receiver via the Bell states distilled from the tripartite W states. We emphasize that reliable teleportation after our protocol between two communication parties depends on the agreement of the supervisor to cooperate via taking the W states as both the quantum channel and eavesdropping detector. The security against typical individual eavesdropping attacks is proved and its experimental feasibility is briefly illustrated.
[ { "version": "v1", "created": "Mon, 10 Sep 2007 17:01:14 GMT" }, { "version": "v2", "created": "Sun, 18 Nov 2007 14:18:48 GMT" } ]
2007-11-19T00:00:00
[ [ "Li", "Yue", "" ], [ "Liu", "Yu", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.1500
Shmuel Onn
Yael Berstein and Shmuel Onn
The Graver Complexity of Integer Programming
Improved Bound $\Omega(2^m)$
Annals of Combinatorics, 13:289--296, 2009
null
null
math.CO cs.CC cs.DM math.AC
null
In this article we establish an exponential lower bound on the Graver complexity of integer programs. This provides new type of evidence supporting the presumable intractability of integer programming. Specifically, we show that the Graver complexity of the incidence matrix of the complete bipartite graph $K_{3,m}$ satisfies $g(m)=\Omega(2^m)$, with $g(m)\geq 17\cdot 2^{m-3}-7$ for every $m>3$ .
[ { "version": "v1", "created": "Mon, 10 Sep 2007 22:19:06 GMT" }, { "version": "v2", "created": "Thu, 22 Nov 2007 08:00:10 GMT" } ]
2010-06-07T00:00:00
[ [ "Berstein", "Yael", "" ], [ "Onn", "Shmuel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0709.1516
Marcus Hutter
Marcus Hutter
On Universal Prediction and Bayesian Confirmation
24 pages
Theoretical Computer Science, 384 (2007) pages 33-48
null
null
math.ST cs.IT cs.LG math.IT stat.ML stat.TH
null
The Bayesian framework is a well-studied and successful framework for inductive reasoning, which includes hypothesis testing and confirmation, parameter estimation, sequence prediction, classification, and regression. But standard statistical guidelines for choosing the model class and prior are not always available or fail, in particular in complex situations. Solomonoff completed the Bayesian framework by providing a rigorous, unique, formal, and universal choice for the model class and the prior. We discuss in breadth how and in which sense universal (non-i.i.d.) sequence prediction solves various (philosophical) problems of traditional Bayesian sequence prediction. We show that Solomonoff's model possesses many desirable properties: Strong total and weak instantaneous bounds, and in contrast to most classical continuous prior densities has no zero p(oste)rior problem, i.e. can confirm universal hypotheses, is reparametrization and regrouping invariant, and avoids the old-evidence and updating problem. It even performs well (actually better) in non-computable environments.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 01:39:20 GMT" } ]
2008-06-26T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0709.1647
Joseph O'Rourke
Joseph O'Rourke
Unfolding Restricted Convex Caps
null
null
null
Smith Computer Science 086
cs.CG
null
This paper details an algorithm for unfolding a class of convex polyhedra, where each polyhedron in the class consists of a convex cap over a rectangular base, with several restrictions: the cap's faces are quadrilaterals, with vertices over an underlying integer lattice, and such that the cap convexity is ``radially monotone,'' a type of smoothness constraint. Extensions of Cauchy's arm lemma are used in the proof of non-overlap.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 15:01:31 GMT" } ]
2007-09-12T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0709.1667
Federico Ricci-Tersenghi
Andrea Montanari, Federico Ricci-Tersenghi and Guilhem Semerjian
Solving Constraint Satisfaction Problems through Belief Propagation-guided decimation
10 pages, 4 figures. A longer version can be found as arXiv:0904.3395 [cond-mat.dis-nn]
Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing (Monticello, IL, USA), 352-359 (2007)
null
null
cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Message passing algorithms have proved surprisingly successful in solving hard constraint satisfaction problems on sparse random graphs. In such applications, variables are fixed sequentially to satisfy the constraints. Message passing is run after each step. Its outcome provides an heuristic to make choices at next step. This approach has been referred to as `decimation,' with reference to analogous procedures in statistical physics. The behavior of decimation procedures is poorly understood. Here we consider a simple randomized decimation algorithm based on belief propagation (BP), and analyze its behavior on random k-satisfiability formulae. In particular, we propose a tree model for its analysis and we conjecture that it provides asymptotically exact predictions in the limit of large instances. This conjecture is confirmed by numerical simulations.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 15:48:56 GMT" }, { "version": "v2", "created": "Mon, 1 Oct 2007 15:01:01 GMT" }, { "version": "v3", "created": "Tue, 4 Jun 2019 11:43:45 GMT" } ]
2019-06-05T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Ricci-Tersenghi", "Federico", "" ], [ "Semerjian", "Guilhem", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.1674
Amin Mobasher
Amin Mobasher and Amir K. Khandani
Matrix-Lifting Semi-Definite Programming for Decoding in Multiple Antenna Systems
Submitted to IEEE Transaction on Information Theory, Aug. 2007
null
null
Technical report UW-E&CE #2007-06
cs.IT math.IT
null
This paper presents a computationally efficient decoder for multiple antenna systems. The proposed algorithm can be used for any constellation (QAM or PSK) and any labeling method. The decoder is based on matrix-lifting Semi-Definite Programming (SDP). The strength of the proposed method lies in a new relaxation algorithm applied to the method of Mobasher et al. This results in a reduction of the number of variables from $(NK+1)^2$ to $(2N+K)^2$, where $N$ is the number of antennas and $K$ is the number of constellation points in each real dimension. Since the computational complexity of solving SDP is a polynomial function of the number of variables, we have a significant complexity reduction. Moreover, the proposed method offers a better performance as compared to the best quasi-maximum likelihood decoding methods reported in the literature.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 16:36:23 GMT" } ]
2007-09-12T00:00:00
[ [ "Mobasher", "Amin", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.1699
Paul Fodor
Paul Fodor
Efficient Tabling Mechanisms for Transaction Logic Programs
null
null
null
null
cs.LO cs.AI
null
In this paper we present efficient evaluation algorithms for the Horn Transaction Logic (a generalization of the regular Horn logic programs with state updates). We present two complementary methods for optimizing the implementation of Transaction Logic. The first method is based on tabling and we modified the proof theory to table calls and answers on states (practically, equivalent to dynamic programming). The call-answer table is indexed on the call and a signature of the state in which the call was made. The answer columns contain the answer unification and a signature of the state after the call was executed. The states are signed efficiently using a technique based on tries and counting. The second method is based on incremental evaluation and it applies when the data oracle contains derived relations. The deletions and insertions (executed in the transaction oracle) change the state of the database. Using the heuristic of inertia (only a part of the state changes in response to elementary updates), most of the time it is cheaper to compute only the changes in the state than to recompute the entire state from scratch. The two methods are complementary by the fact that the first method optimizes the evaluation when a call is repeated in the same state, and the second method optimizes the evaluation of a new state when a call-state pair is not found by the tabling mechanism (i.e. the first method). The proof theory of Transaction Logic with the application of tabling and incremental evaluation is sound and complete with respect to its model theory.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 19:00:02 GMT" } ]
2007-09-12T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.1701
Jean Dezert
Xinde Li (ICRL), Xinhan Huang (ICRL), Florentin Smarandache (UNM), Jean Dezert (ONERA)
Enrichment of Qualitative Beliefs for Reasoning under Uncertainty
12 pages
null
null
null
cs.AI
null
This paper deals with enriched qualitative belief functions for reasoning under uncertainty and for combining information expressed in natural language through linguistic labels. In this work, two possible enrichments (quantitative and/or qualitative) of linguistic labels are considered and operators (addition, multiplication, division, etc) for dealing with them are proposed and explained. We denote them $qe$-operators, $qe$ standing for "qualitative-enriched" operators. These operators can be seen as a direct extension of the classical qualitative operators ($q$-operators) proposed recently in the Dezert-Smarandache Theory of plausible and paradoxist reasoning (DSmT). $q$-operators are also justified in details in this paper. The quantitative enrichment of linguistic label is a numerical supporting degree in $[0,\infty)$, while the qualitative enrichment takes its values in a finite ordered set of linguistic values. Quantitative enrichment is less precise than qualitative enrichment, but it is expected more close with what human experts can easily provide when expressing linguistic labels with supporting degrees. Two simple examples are given to show how the fusion of qualitative-enriched belief assignments can be done.
[ { "version": "v1", "created": "Tue, 11 Sep 2007 19:12:25 GMT" } ]
2007-09-12T00:00:00
[ [ "Li", "Xinde", "", "ICRL" ], [ "Huang", "Xinhan", "", "ICRL" ], [ "Smarandache", "Florentin", "", "UNM" ], [ "Dezert", "Jean", "", "ONERA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.1744
Eric Feron
S. Bayraktar and E. Feron
Experiments with small helicopter automated landings at unusual attitudes
20 pages
null
null
null
cs.RO
null
This paper describes a set of experiments involving small helicopters landing automated landing at unusual attitudes. By leveraging the increased agility of small air vehicles, we show that it is possible to automatically land a small helicopter on surfaces pitched at angles up to 60 degrees. Such maneuvers require considerable agility from the vehicle and its avionics system, and they pose significant technical and safety challenges. Our work builds upon previous activities in human-inspired, high-agility flight for small rotorcraft. However, it was not possible to leverage manual flight test data to extract landing maneuvers due to stringent attitude and position control requirements. Availability of low-cost, local navigation systems requiring no on-board instrumentation has proven particularly important for these experiments to be successful.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 02:16:44 GMT" } ]
2007-09-13T00:00:00
[ [ "Bayraktar", "S.", "" ], [ "Feron", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0709.1771
Heng Lian
Heng Lian
Variational local structure estimation for image super-resolution
9 pages
null
null
null
cs.CV
null
Super-resolution is an important but difficult problem in image/video processing. If a video sequence or some training set other than the given low-resolution image is available, this kind of extra information can greatly aid in the reconstruction of the high-resolution image. The problem is substantially more difficult with only a single low-resolution image on hand. The image reconstruction methods designed primarily for denoising is insufficient for super-resolution problem in the sense that it tends to oversmooth images with essentially no noise. We propose a new adaptive linear interpolation method based on variational method and inspired by local linear embedding (LLE). The experimental result shows that our method avoids the problem of oversmoothing and preserves image structures well.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 08:41:36 GMT" } ]
2007-09-13T00:00:00
[ [ "Lian", "Heng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0709.1794
Raphael M. Jungers
Raphael M. Jungers, Vladimir Y. Protasov, Vincent D. Blondel
Overlap-free words and spectra of matrices
26 pages, 2 figures
null
null
null
cs.DM
null
Overlap-free words are words over the binary alphabet $A=\{a, b\}$ that do not contain factors of the form $xvxvx$, where $x \in A$ and $v \in A^*$. We analyze the asymptotic growth of the number $u_n$ of overlap-free words of length $n$ as $ n \to \infty$. We obtain explicit formulas for the minimal and maximal rates of growth of $u_n$ in terms of spectral characteristics (the lower spectral radius and the joint spectral radius) of certain sets of matrices of dimension $20 \times 20$. Using these descriptions we provide new estimates of the rates of growth that are within 0.4% and $0.03 %$ of their exact values. The best previously known bounds were within 11% and 3% respectively. We then prove that the value of $u_n$ actually has the same rate of growth for ``almost all'' natural numbers $n$. This ``average'' growth is distinct from the maximal and minimal rates and can also be expressed in terms of a spectral quantity (the Lyapunov exponent). We use this expression to estimate it. In order to obtain our estimates, we introduce new algorithms to compute spectral characteristics of sets of matrices. These algorithms can be used in other contexts and are of independent interest.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 10:41:19 GMT" } ]
2007-09-13T00:00:00
[ [ "Jungers", "Raphael M.", "" ], [ "Protasov", "Vladimir Y.", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.1920
Aurelie Bugeau
Aurelie Bugeau (IRISA), Patrick P\'erez (IRISA)
Bandwidth selection for kernel estimation in mixed multi-dimensional spaces
null
null
null
null
cs.CV
null
Kernel estimation techniques, such as mean shift, suffer from one major drawback: the kernel bandwidth selection. The bandwidth can be fixed for all the data set or can vary at each points. Automatic bandwidth selection becomes a real challenge in case of multidimensional heterogeneous features. This paper presents a solution to this problem. It is an extension of \cite{Comaniciu03a} which was based on the fundamental property of normal distributions regarding the bias of the normalized density gradient. The selection is done iteratively for each type of features, by looking for the stability of local bandwidth estimates across a predefined range of bandwidths. A pseudo balloon mean shift filtering and partitioning are introduced. The validity of the method is demonstrated in the context of color image segmentation based on a 5-dimensional space.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 16:02:25 GMT" }, { "version": "v2", "created": "Fri, 14 Sep 2007 08:35:21 GMT" } ]
2011-11-10T00:00:00
[ [ "Bugeau", "Aurelie", "", "IRISA" ], [ "Pérez", "Patrick", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0709.1934
Petar Markovi\'c
Catarina Carvalho, V\'ictor Dalmau, Petar Markovi\'c and Mikl\'os Mar\'oti
CD(4) has bounded width
null
null
null
null
math.LO cs.CC
null
We prove that the constraint languages invariant under a short sequence of J\'onsson terms (containing at most three non-trivial ternary terms) are tractable by showing that they have bounded width. This improves the previous result by Kiss and Valeriote and presents some evidence that the Larose-Zadori conjecture holds in the congruence-distributive case.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 17:26:10 GMT" } ]
2007-09-14T00:00:00
[ [ "Carvalho", "Catarina", "" ], [ "Dalmau", "Víctor", "" ], [ "Marković", "Petar", "" ], [ "Maróti", "Miklós", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.1941
Pierre-Francois Marteau
Pierre-Fran\c{c}ois Marteau (VALORIA), Gildas G. M\'enier (VALORIA)
Speeding up Simplification of Polygonal Curves using Nested Approximations
12 pages + figures
Pattern Analysis & Applications (2008) 1-8
10.1007/s10044-008-0133-y
null
cs.CG
null
We develop a multiresolution approach to the problem of polygonal curve approximation. We show theoretically and experimentally that, if the simplification algorithm A used between any two successive levels of resolution satisfies some conditions, the multiresolution algorithm MR will have a complexity lower than the complexity of A. In particular, we show that if A has a O(N2/K) complexity (the complexity of a reduced search dynamic solution approach), where N and K are respectively the initial and the final number of segments, the complexity of MR is in O(N).We experimentally compare the outcomes of MR with those of the optimal "full search" dynamic programming solution and of classical merge and split approaches. The experimental evaluations confirm the theoretical derivations and show that the proposed approach evaluated on 2D coastal maps either shows a lower complexity or provides polygonal approximations closer to the initial curves.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 18:27:53 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 15:32:03 GMT" }, { "version": "v3", "created": "Sun, 2 Mar 2008 17:14:36 GMT" } ]
2008-07-22T00:00:00
[ [ "Marteau", "Pierre-François", "", "VALORIA" ], [ "Ménier", "Gildas G.", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0709.1942
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke, Suneeta Ramaswami
Connecting Polygonizations via Stretches and Twangs
15 pages, 14 figures, 3 appendices
null
null
null
cs.CG cs.DM
null
We show that the space of polygonizations of a fixed planar point set S of n points is connected by O(n^2) ``moves'' between simple polygons. Each move is composed of a sequence of atomic moves called ``stretches'' and ``twangs''. These atomic moves walk between weakly simple ``polygonal wraps'' of S. These moves show promise to serve as a basis for generating random polygons.
[ { "version": "v1", "created": "Wed, 12 Sep 2007 18:38:54 GMT" } ]
2007-09-13T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ], [ "Ramaswami", "Suneeta", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.2016
Konstantin Avrachenkov
Konstantin Avrachenkov, Nelly Litvak, Kim Son Pham
Distribution of PageRank Mass Among Principle Components of the Web
null
null
null
null
cs.NI cs.DS
null
We study the PageRank mass of principal components in a bow-tie Web Graph, as a function of the damping factor c. Using a singular perturbation approach, we show that the PageRank share of IN and SCC components remains high even for very large values of the damping factor, in spite of the fact that it drops to zero when c goes to one. However, a detailed study of the OUT component reveals the presence ``dead-ends'' (small groups of pages linking only to each other) that receive an unfairly high ranking when c is close to one. We argue that this problem can be mitigated by choosing c as small as 1/2.
[ { "version": "v1", "created": "Thu, 13 Sep 2007 08:29:53 GMT" } ]
2007-09-14T00:00:00
[ [ "Avrachenkov", "Konstantin", "" ], [ "Litvak", "Nelly", "" ], [ "Pham", "Kim Son", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0709.2065
Andrei Khrennikov
Andrei Khrennikov
Toward Psycho-robots
null
Paladyn Volume 1, Number 2, 99-108, 2010
10.2478/s13230-010-0014-0
null
cs.AI
null
We try to perform geometrization of psychology by representing mental states, <<ideas>>, by points of a metric space, <<mental space>>. Evolution of ideas is described by dynamical systems in metric mental space. We apply the mental space approach for modeling of flows of unconscious and conscious information in the human brain. In a series of models, Models 1-4, we consider cognitive systems with increasing complexity of psychological behavior determined by structure of flows of ideas. Since our models are in fact models of the AI-type, one immediately recognizes that they can be used for creation of AI-systems, which we call psycho-robots, exhibiting important elements of human psyche. Creation of such psycho-robots may be useful improvement of domestic robots. At the moment domestic robots are merely simple working devices (e.g. vacuum cleaners or lawn mowers) . However, in future one can expect demand in systems which be able not only perform simple work tasks, but would have elements of human self-developing psyche. Such AI-psyche could play an important role both in relations between psycho-robots and their owners as well as between psycho-robots. Since the presence of a huge numbers of psycho-complexes is an essential characteristic of human psychology, it would be interesting to model them in the AI-framework.
[ { "version": "v1", "created": "Thu, 13 Sep 2007 13:06:34 GMT" } ]
2010-11-30T00:00:00
[ [ "Khrennikov", "Andrei", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.2074
Vladimir Gudkov
V. Gudkov and V. Montealegre
Generalized entropies and open random and scale-free networks
talk at CTNEXT07 (July 2007)
null
10.1063/1.2828754
null
cond-mat.dis-nn cs.NI physics.soc-ph
null
We propose the concept of open network as an arbitrary selection of nodes of a large unknown network. Using the hypothesis that information of the whole network structure can be extrapolated from an arbitrary set of its nodes, we use Renyi mutual entropies in different q-orders to establish the minimum critical size of a random set of nodes that represents reliably the information of the main network structure. We also identify the clusters of nodes responsible for the structure of their containing network.
[ { "version": "v1", "created": "Thu, 13 Sep 2007 13:37:58 GMT" } ]
2009-11-13T00:00:00
[ [ "Gudkov", "V.", "" ], [ "Montealegre", "V.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0709.2196
Frank Nielsen
Frank Nielsen, Jean-Daniel Boissonnat, Richard Nock
Bregman Voronoi Diagrams: Properties, Algorithms and Applications
Extend the proceedings abstract of SODA 2007 (46 pages, 15 figures)
Discrete & Computational Geometry volume 44, pages281-307(2010)
10.1007/s00454-010-9256-1
null
cs.CG
null
The Voronoi diagram of a finite set of objects is a fundamental geometric structure that subdivides the embedding space into regions, each region consisting of the points that are closer to a given object than to the others. We may define many variants of Voronoi diagrams depending on the class of objects, the distance functions and the embedding space. In this paper, we investigate a framework for defining and building Voronoi diagrams for a broad class of distance functions called Bregman divergences. Bregman divergences include not only the traditional (squared) Euclidean distance but also various divergence measures based on entropic functions. Accordingly, Bregman Voronoi diagrams allow to define information-theoretic Voronoi diagrams in statistical parametric spaces based on the relative entropy of distributions. We define several types of Bregman diagrams, establish correspondences between those diagrams (using the Legendre transformation), and show how to compute them efficiently. We also introduce extensions of these diagrams, e.g. k-order and k-bag Bregman Voronoi diagrams, and introduce Bregman triangulations of a set of points and their connexion with Bregman Voronoi diagrams. We show that these triangulations capture many of the properties of the celebrated Delaunay triangulation. Finally, we give some applications of Bregman Voronoi diagrams which are of interest in the context of computational geometry and machine learning.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 01:31:17 GMT" } ]
2020-10-01T00:00:00
[ [ "Nielsen", "Frank", "" ], [ "Boissonnat", "Jean-Daniel", "" ], [ "Nock", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0709.2201
Jesse Gilbert D
Jesse Gilbert
A complete proof of The Graceful Tree Conjecture using the concept of Edge Degree
This paper has been withdrawn by the author
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show the Graceful Tree Conjecture holds.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 17:31:22 GMT" }, { "version": "v2", "created": "Mon, 17 Sep 2007 04:35:57 GMT" }, { "version": "v3", "created": "Tue, 18 Sep 2007 21:18:17 GMT" }, { "version": "v4", "created": "Thu, 20 Sep 2007 01:21:11 GMT" }, { "version": "v5", "created": "Fri, 21 Sep 2007 21:44:44 GMT" }, { "version": "v6", "created": "Fri, 5 Oct 2007 10:14:01 GMT" }, { "version": "v7", "created": "Tue, 13 May 2008 22:41:41 GMT" }, { "version": "v8", "created": "Wed, 14 Jan 2009 00:46:23 GMT" }, { "version": "v9", "created": "Thu, 29 Jul 2010 20:46:42 GMT" } ]
2010-08-02T00:00:00
[ [ "Gilbert", "Jesse", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.2224
Marius Buliga
Marius Buliga
Self-similar dilatation structures and automata
null
Proceedings of the Sixth Congress of Romanian Mahematicians, Bucharest 2007, vol. 1, 557-564
null
null
math.MG cs.DM
null
We show that on the boundary of the dyadic tree, any self-similar dilatation structure induces a web of interacting automata. This is a short version, for publication, of the paper arXiv:math/0612509v2
[ { "version": "v1", "created": "Fri, 14 Sep 2007 07:56:03 GMT" } ]
2009-06-13T00:00:00
[ [ "Buliga", "Marius", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.2225
Ananthanarayanan Chockalingam
T. Srikanth, K. Vishnu Vardhan, A. Chockalingam, and L. B. Milstein
Improved Linear Parallel Interference Cancellers
Accepted in IEEE Trans. on Wireless Communications
null
null
null
cs.IT cs.SC cs.SD cs.SE math.IT
null
In this paper, taking the view that a linear parallel interference canceller (LPIC) can be seen as a linear matrix filter, we propose new linear matrix filters that can result in improved bit error performance compared to other LPICs in the literature. The motivation for the proposed filters arises from the possibility of avoiding the generation of certain interference and noise terms in a given stage that would have been present in a conventional LPIC (CLPIC). In the proposed filters, we achieve such avoidance of the generation of interference and noise terms in a given stage by simply making the diagonal elements of a certain matrix in that stage equal to zero. Hence, the proposed filters do not require additional complexity compared to the CLPIC, and they can allow achieving a certain error performance using fewer LPIC stages. We also extend the proposed matrix filter solutions to a multicarrier DS-CDMA system, where we consider two types of receivers. In one receiver (referred to as Type-I receiver), LPIC is performed on each subcarrier first, followed by multicarrier combining (MCC). In the other receiver (called Type-II receiver), MCC is performed first, followed by LPIC. We show that in both Type-I and Type-II receivers, the proposed matrix filters outperform other matrix filters. Also, Type-II receiver performs better than Type-I receiver because of enhanced accuracy of the interference estimates achieved due to frequency diversity offered by MCC.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 07:56:21 GMT" } ]
2007-09-17T00:00:00
[ [ "Srikanth", "T.", "" ], [ "Vardhan", "K. Vishnu", "" ], [ "Chockalingam", "A.", "" ], [ "Milstein", "L. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2252
Mathias Boc
Mathias Boc, Anne Fladenmuller and Marcelo dias de Amorim
Otiy: Loactors tracking nodes
null
null
null
null
cs.NI
null
We propose Otiy, a node-centric location service that limits the impact of location updates generate by mobile nodes in IEEE802.11-based wireless mesh networks. Existing location services use node identifiers to determine the locator (aka anchor) that is responsible for keeping track of a node's location. Such a strategy can be inefficient because: (i) identifiers give no clue on the node's mobility and (ii) locators can be far from the source/destination shortest path, which increases both location delays and bandwidth consumption. To solve these issues, Otiy introduces a new strategy that identifies nodes to play the role of locators based on the likelihood of a destination to be close to these nodes- i.e., locators are identified depending on the mobility pattern of nodes. Otiy relies on the cyclic mobility patterns of nodes and creates a slotted agenda composed of a set of predicted locations, defined according to the past and present patterns of mobility. Correspondent nodes fetch this agenda only once and use it as a reference for identifying which locators are responsible for the node at different points in time. Over a period of about one year, the weekly proportion of nodes having at least 50% of exact location predictions is in average about 75%. This proportion increases by 10% when nodes also consider their closeness to the locator from only what they know about the network.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 10:21:45 GMT" } ]
2007-09-17T00:00:00
[ [ "Boc", "Mathias", "" ], [ "Fladenmuller", "Anne", "" ], [ "de Amorim", "Marcelo dias", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.2330
Gusztav Morvai
L. Gyorfi, G. Morvai
Queueing for ergodic arrivals and services
Queueing for ergodic arrivals and services. In Limit Theorems in Probability and Statistics, I. Berkes E. Csaki, M. Csorgo (Eds.), pp. 127-141, J. Bolyai Mathematical Society, 2002
In Limit Theorems in Probability and Statistics, I. Berkes E. Csaki, M. Csorgo (Eds.), pp. 127-141, J. Bolyai Mathematical Society, 2002
null
null
math.PR cs.IT math.IT
null
In this paper we revisit the results of Loynes (1962) on stability of queues for ergodic arrivals and services, and show examples when the arrivals are bounded and ergodic, the service rate is constant, and under stability the limit distribution has larger than exponential tail.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 15:31:48 GMT" } ]
2008-06-19T00:00:00
[ [ "Gyorfi", "L.", "" ], [ "Morvai", "G.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2346
Pilar Albert
Pilar Albert, Elvira Mayordomo, Philippe Moser, Sylvain Perifel
Pushdown Compression
null
null
null
null
cs.IT cs.CC math.IT
null
The pressing need for eficient compression schemes for XML documents has recently been focused on stack computation [6, 9], and in particular calls for a formulation of information-lossless stack or pushdown compressors that allows a formal analysis of their performance and a more ambitious use of the stack in XML compression, where so far it is mainly connected to parsing mechanisms. In this paper we introduce the model of pushdown compressor, based on pushdown transducers that compute a single injective function while keeping the widest generality regarding stack computation. The celebrated Lempel-Ziv algorithm LZ78 [10] was introduced as a general purpose compression algorithm that outperforms finite-state compressors on all sequences. We compare the performance of the Lempel-Ziv algorithm with that of the pushdown compressors, or compression algorithms that can be implemented with a pushdown transducer. This comparison is made without any a priori assumption on the data's source and considering the asymptotic compression ratio for infinite sequences. We prove that Lempel-Ziv is incomparable with pushdown compressors.
[ { "version": "v1", "created": "Fri, 14 Sep 2007 17:00:09 GMT" }, { "version": "v2", "created": "Mon, 17 Sep 2007 11:15:58 GMT" } ]
2007-09-17T00:00:00
[ [ "Albert", "Pilar", "" ], [ "Mayordomo", "Elvira", "" ], [ "Moser", "Philippe", "" ], [ "Perifel", "Sylvain", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2401
Timothy Baldwin
Timothy Baldwin
Bootstrapping Deep Lexical Resources: Resources for Courses
null
In Proceedings of the ACL-SIGLEX 2005 Workshop on Deep Lexical Acquisition, Ann Arbor, USA, pp. 67-76
null
null
cs.CL
null
We propose a range of deep lexical acquisition methods which make use of morphological, syntactic and ontological language resources to model word similarity and bootstrap from a seed lexicon. The different methods are deployed in learning lexical items for a precision grammar, and shown to each have strengths and weaknesses over different word classes. A particular focus of this paper is the relative accessibility of different language resource types, and predicted ``bang for the buck'' associated with each in deep lexical acquisition applications.
[ { "version": "v1", "created": "Sat, 15 Sep 2007 01:37:21 GMT" } ]
2007-09-18T00:00:00
[ [ "Baldwin", "Timothy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0709.2405
J. Maurice Rojas
Joel Gomez, Andrew Niles, and J. Maurice Rojas
New Complexity Bounds for Certain Real Fewnomial Zero Sets
8 pages, no figures. Extended abstract accepted and presented at MEGA (Effective Methods in Algebraic Geometry) 2007
null
null
null
math.AG cs.CG
null
Consider real bivariate polynomials f and g, respectively having 3 and m monomial terms. We prove that for all m>=3, there are systems of the form (f,g) having exactly 2m-1 roots in the positive quadrant. Even examples with m=4 having 7 positive roots were unknown before this paper, so we detail an explicit example of this form. We also present an O(n^{11}) upper bound for the number of diffeotopy types of the real zero set of an n-variate polynomial with n+4 monomial terms.
[ { "version": "v1", "created": "Sat, 15 Sep 2007 06:28:46 GMT" } ]
2007-09-18T00:00:00
[ [ "Gomez", "Joel", "" ], [ "Niles", "Andrew", "" ], [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0709.2410
Gesualdo Scutari
Gesualdo Scutari, Sergio Barbarossa, Loreto Pescosolido
Distributed Decision Through Self-Synchronizing Sensor Networks in the Presence of Propagation Delays and Asymmetric Channels
To be published on IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.909377
null
cs.MA cs.DC
null
In this paper we propose and analyze a distributed algorithm for achieving globally optimal decisions, either estimation or detection, through a self-synchronization mechanism among linearly coupled integrators initialized with local measurements. We model the interaction among the nodes as a directed graph with weights (possibly) dependent on the radio channels and we pose special attention to the effect of the propagation delay occurring in the exchange of data among sensors, as a function of the network geometry. We derive necessary and sufficient conditions for the proposed system to reach a consensus on globally optimal decision statistics. One of the major results proved in this work is that a consensus is reached with exponential convergence speed for any bounded delay condition if and only if the directed graph is quasi-strongly connected. We provide a closed form expression for the global consensus, showing that the effect of delays is, in general, the introduction of a bias in the final decision. Finally, we exploit our closed form expression to devise a double-step consensus mechanism able to provide an unbiased estimate with minimum extra complexity, without the need to know or estimate the channel parameters.
[ { "version": "v1", "created": "Sat, 15 Sep 2007 08:40:18 GMT" }, { "version": "v2", "created": "Wed, 19 Sep 2007 15:29:37 GMT" } ]
2009-11-13T00:00:00
[ [ "Scutari", "Gesualdo", "" ], [ "Barbarossa", "Sergio", "" ], [ "Pescosolido", "Loreto", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.2445
Yi Su
Yi Su and Mihaela van der Schaar
A Simple Characterization of Strategic Behaviors in Broadcast Channels
10 pages, 3 figures
null
10.1109/LSP.2007.910259
null
cs.IT cs.GT math.IT
null
In this paper, we consider the problem of resource allocation among two competing users sharing a binary symmetric broadcast channel. We model the interaction between autonomous selfish users in the resource allocation and analyze their strategic behavior in manipulating the allocation outcome. We analytically show that users will improve their performance (i.e. gain higher allocated rates) if they have more information about the strategy of the competing user.
[ { "version": "v1", "created": "Sat, 15 Sep 2007 20:32:10 GMT" } ]
2009-11-13T00:00:00
[ [ "Su", "Yi", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2446
Fangwen Fu
Fangwen Fu, Mihaela van der Schaar
Learning for Dynamic Bidding in Cognitive Radio Resources
29pages, 6 figures
null
null
null
cs.LG cs.GT
null
In this paper, we model the various wireless users in a cognitive radio network as a collection of selfish, autonomous agents that strategically interact in order to acquire the dynamically available spectrum opportunities. Our main focus is on developing solutions for wireless users to successfully compete with each other for the limited and time-varying spectrum opportunities, given the experienced dynamics in the wireless network. We categorize these dynamics into two types: one is the disturbance due to the environment (e.g. wireless channel conditions, source traffic characteristics, etc.) and the other is the impact caused by competing users. To analyze the interactions among users given the environment disturbance, we propose a general stochastic framework for modeling how the competition among users for spectrum opportunities evolves over time. At each stage of the dynamic resource allocation, a central spectrum moderator auctions the available resources and the users strategically bid for the required resources. The joint bid actions affect the resource allocation and hence, the rewards and future strategies of all users. Based on the observed resource allocation and corresponding rewards from previous allocations, we propose a best response learning algorithm that can be deployed by wireless users to improve their bidding policy at each stage. The simulation results show that by deploying the proposed best response learning algorithm, the wireless users can significantly improve their own performance in terms of both the packet loss rate and the incurred cost for the used resources.
[ { "version": "v1", "created": "Sat, 15 Sep 2007 20:48:57 GMT" } ]
2007-09-18T00:00:00
[ [ "Fu", "Fangwen", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]