id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0708.4409 | Amy Glen | Amy Glen, Jacques Justin, Giuseppe Pirillo | Characterizations of finite and infinite episturmian words via
lexicographic orderings | 18 pages; to appear in the European Journal of Combinatorics | European Journal of Combinatorics 29 (2008) 45-58 | 10.1016/j.ejc.2007.01.002 | null | math.CO cs.DM | null | In this paper, we characterize by lexicographic order all finite Sturmian and
episturmian words, i.e., all (finite) factors of such infinite words.
Consequently, we obtain a characterization of infinite episturmian words in a
"wide sense" (episturmian and episkew infinite words). That is, we characterize
the set of all infinite words whose factors are (finite) episturmian.
Similarly, we characterize by lexicographic order all balanced infinite words
over a 2-letter alphabet; in other words, all Sturmian and skew infinite words,
the factors of which are (finite) Sturmian.
| [
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:51:41 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
],
[
"Justin",
"Jacques",
""
],
[
"Pirillo",
"Giuseppe",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.0035 | Mahmoud Taherzadeh | Mahmoud Taherzadeh and Amir K. Khandani | On The Limitations of The Naive Lattice Decoding | 15 pages, 3 figures | null | null | null | cs.IT math.IT | null | In this paper, the inherent drawbacks of the naive lattice decoding for MIMO
fading systems is investigated. We show that using the naive lattice decoding
for MIMO systems has considerable deficiencies in terms of the rate-diversity
trade-off. Unlike the case of maximum-likelihood decoding, in this case, even
the perfect lattice space-time codes which have the non-vanishing determinant
property can not achieve the optimal rate-diversity trade-off. Indeed, we show
that in the case of naive lattice decoding, when we fix the underlying lattice,
all the codes based on full-rate lattices have the same rate-diversity
trade-off as V-BLAST. Also, we drive a lower bound on the symbol error
probability of the naive lattice decoding for the fixed-rate MIMO systems (with
equal numbers of receive and transmit antennas). This bound shows that
asymptotically, the naive lattice decoding has an unbounded loss in terms of
the required SNR, compared to the maximum likelihood decoding.
| [
{
"version": "v1",
"created": "Sat, 1 Sep 2007 06:08:13 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Taherzadeh",
"Mahmoud",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0099 | Avraham Trahtman N | A. N. Trahtman | The road coloring problem | 9 pages, correct typos | null | null | null | cs.DM | null | The synchronizing word of deterministic automaton is a word in the alphabet
of colors (considered as letters) of its edges that maps the automaton to a
single state. A coloring of edges of a directed graph is synchronizing if the
coloring turns the graph into deterministic finite automaton possessing a
synchronizing word.
The road coloring problem is a problem of synchronizing coloring of directed
finite strongly connected graph with constant outdegree of all its vertices if
the greatest common divisor of lengths of all its cycles is one. The problem
was posed by Adler, Goodwyn and Weiss over 30 years ago and evoked a noticeable
interest among the specialists in theory of graphs, deterministic automata and
symbolic dynamics. The problem is described even in "Wikipedia" - the popular
Internet Encyclopedia. The positive solution of the road coloring problem is
presented.
| [
{
"version": "v1",
"created": "Sun, 2 Sep 2007 10:08:46 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Sep 2007 16:15:52 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Oct 2007 16:52:54 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Dec 2007 08:07:18 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Trahtman",
"A. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.0116 | Fionn Murtagh | Fionn Murtagh | On Ultrametric Algorithmic Information | Forthcoming, Computer Journal. Minor corrections 29 Oct. 2007 | Computer Journal, 53, 405-416, 2010 | 10.1093/comjnl/bxm084 | null | cs.AI cs.CL | null | How best to quantify the information of an object, whether natural or
artifact, is a problem of wide interest. A related problem is the computability
of an object. We present practical examples of a new way to address this
problem. By giving an appropriate representation to our objects, based on a
hierarchical coding of information, we exemplify how it is remarkably easy to
compute complex objects. Our algorithmic complexity is related to the length of
the class of objects, rather than to the length of the object.
| [
{
"version": "v1",
"created": "Sun, 2 Sep 2007 17:00:40 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Sep 2007 11:21:51 GMT"
}
] | 2011-06-14T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0709.0124 | B.Sundar Rajan | Harshan J. and B. Sundar Rajan | High Rate Single-Symbol ML Decodable Precoded DSTBCs for Cooperative
Networks | Submitted to IEEE Transactions on Information Theory as
"Correspondence" | null | null | null | cs.IT math.IT | null | Distributed Orthogonal Space-Time Block Codes (DOSTBCs) achieving full
diversity order and single-symbol ML decodability have been introduced recently
by Yi and Kim for cooperative networks and an upperbound on the maximal rate of
such codes along with code constructions has been presented. In this paper, we
introduce a new class of Distributed STBCs called Semi-orthogonal Precoded
Distributed Single-Symbol Decodable STBCs (S-PDSSDC) wherein, the source
performs co-ordinate interleaving of information symbols appropriately before
transmitting it to all the relays. It is shown that DOSTBCs are a special case
of S-PDSSDCs. A special class of S-PDSSDCs having diagonal covariance matrix at
the destination is studied and an upperbound on the maximal rate of such codes
is derived. The bounds obtained are approximately twice larger than that of the
DOSTBCs. A systematic construction of S-PDSSDCs is presented when the number of
relays $K \geq 4$. The constructed codes are shown to achieve the upperbound on
the rate when $K$ is of the form 0 or 3 modulo 4. For the rest of the values of
$K$, the constructed codes are shown to have rates higher than that of DOSTBCs.
It is shown that S-PDSSDCs cannot be constructed with any form of linear
processing at the relays when the source doesn't perform co-ordinate
interleaving of the information symbols. Simulation result shows that S-PDSSDCs
have better probability of error performance than that of DOSTBCs.
| [
{
"version": "v1",
"created": "Sun, 2 Sep 2007 20:23:09 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"J.",
"Harshan",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0145 | Andrea Montanari | Andrea Montanari | Estimating Random Variables from Random Sparse Observations | 22 pages, 1 eps figures, invited paper for European Transactions on
Telecommunications | null | null | null | cs.IT math.IT math.PR | null | Let X_1,...., X_n be a collection of iid discrete random variables, and
Y_1,..., Y_m a set of noisy observations of such variables. Assume each
observation Y_a to be a random function of some a random subset of the X_i's,
and consider the conditional distribution of X_i given the observations, namely
\mu_i(x_i)\equiv\prob\{X_i=x_i|Y\} (a posteriori probability).
We establish a general relation between the distribution of \mu_i, and the
fixed points of the associated density evolution operator. Such relation holds
asymptotically in the large system limit, provided the average number of
variables an observation depends on is bounded. We discuss the relevance of our
result to a number of applications, ranging from sparse graph codes, to
multi-user detection, to group testing.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 02:57:58 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Montanari",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0709.0170 | Alexander Wolff | Xavier Goaoc and Jan Kratochvil and Yoshio Okamoto and Chan-Su Shin
and Andreas Spillner and Alexander Wolff | Untangling a Planar Graph | (v5) Minor, mostly linguistic changes | null | 10.1007/s00454-008-9130-6 | null | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A straight-line drawing $\delta$ of a planar graph $G$ need not be plane, but
can be made so by \emph{untangling} it, that is, by moving some of the vertices
of $G$. Let shift$(G,\delta)$ denote the minimum number of vertices that need
to be moved to untangle $\delta$. We show that shift$(G,\delta)$ is NP-hard to
compute and to approximate. Our hardness results extend to a version of
\textsc{1BendPointSetEmbeddability}, a well-known graph-drawing problem.
Further we define fix$(G,\delta)=n-shift(G,\delta)$ to be the maximum number
of vertices of a planar $n$-vertex graph $G$ that can be fixed when untangling
$\delta$. We give an algorithm that fixes at least $\sqrt{((\log n)-1)/\log
\log n}$ vertices when untangling a drawing of an $n$-vertex graph $G$. If $G$
is outerplanar, the same algorithm fixes at least $\sqrt{n/2}$ vertices. On the
other hand we construct, for arbitrarily large $n$, an $n$-vertex planar graph
$G$ and a drawing $\delta_G$ of $G$ with fix$(G,\delta_G) \le \sqrt{n-2}+1$ and
an $n$-vertex outerplanar graph $H$ and a drawing $\delta_H$ of $H$ with
fix$(H,\delta_H) \le 2 \sqrt{n-1}+1$. Thus our algorithm is asymptotically
worst-case optimal for outerplanar graphs.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 08:59:34 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Feb 2008 08:46:19 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Nov 2008 21:53:18 GMT"
},
{
"version": "v4",
"created": "Wed, 12 Nov 2008 13:15:12 GMT"
},
{
"version": "v5",
"created": "Tue, 27 Jan 2009 21:38:25 GMT"
}
] | 2009-01-27T00:00:00 | [
[
"Goaoc",
"Xavier",
""
],
[
"Kratochvil",
"Jan",
""
],
[
"Okamoto",
"Yoshio",
""
],
[
"Shin",
"Chan-Su",
""
],
[
"Spillner",
"Andreas",
""
],
[
"Wolff",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.0178 | Yasmine B. Sanderson | Yasmine B. Sanderson | Effective Generation of Subjectively Random Binary Sequences | Introduction and Section 6 revised | null | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for effectively generating binary sequences which
would be rated by people as highly likely to have been generated by a random
process, such as flipping a fair coin.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 09:32:28 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Oct 2008 10:19:14 GMT"
}
] | 2008-10-05T00:00:00 | [
[
"Sanderson",
"Yasmine B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.0204 | Sudhir Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A.
Rezaei | Capacity constraints and the inevitability of mediators in adword
auctions | 6 pages | null | null | null | cs.GT | null | One natural constraint in the sponsored search advertising framework arises
from the fact that there is a limit on the number of available slots,
especially for the popular keywords, and as a result, a significant pool of
advertisers are left out. We study the emergence of diversification in the
adword market triggered by such capacity constraints in the sense that new
market mechanisms, as well as, new for-profit agents are likely to emerge to
combat or to make profit from the opportunities created by shortages in
ad-space inventory. We propose a model where the additional capacity is
provided by for-profit agents (or, mediators), who compete for slots in the
original auction, draw traffic, and run their own sub-auctions. The quality of
the additional capacity provided by a mediator is measured by its {\it fitness}
factor. We compute revenues and payoffs for all the different parties at a {\it
symmetric Nash equilibrium} (SNE) when the mediator-based model is operated by
a mechanism currently being used by Google and Yahoo!, and then compare these
numbers with those obtained at a corresponding SNE for the same mechanism, but
without any mediators involved in the auctions. Such calculations allow us to
determine the value of the additional capacity. Our results show that the
revenue of the auctioneer, as well as the social value (i.e. efficiency),
always increase when mediators are involved; moreover even the payoffs of {\em
all} the bidders will increase if the mediator has a high enough fitness. Thus,
our analysis indicates that there are significant opportunities for
diversification in the internet economy and we should expect it to continue to
develop richer structure, with room for different types of agents and
mechanisms to coexist.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 12:09:56 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
],
[
"Gunadhi",
"Himawan",
""
],
[
"Rezaei",
"Behnam A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0709.0218 | Debprakash Patnaik | Debprakash Patnaik (Electrical Engg. Dept., Indian Institute of
Science), P. S. Sastry (Electrical Engg. Dept., Indian Institute of Science),
K. P. Unnikrishnan (General Motors R&D) | Inferring Neuronal Network Connectivity using Time-constrained Episodes | 9 pages. See also http://neural-code.cs.vt.edu/ | null | null | null | cs.DB q-bio.NC | null | Discovering frequent episodes in event sequences is an interesting data
mining task. In this paper, we argue that this framework is very effective for
analyzing multi-neuronal spike train data. Analyzing spike train data is an
important problem in neuroscience though there are no data mining approaches
reported for this. Motivated by this application, we introduce different
temporal constraints on the occurrences of episodes. We present algorithms for
discovering frequent episodes under temporal constraints. Through simulations,
we show that our method is very effective for analyzing spike train data for
unearthing underlying connectivity patterns.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 13:23:33 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Sep 2007 06:49:01 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Patnaik",
"Debprakash",
"",
"Electrical Engg. Dept., Indian Institute of\n Science"
],
[
"Sastry",
"P. S.",
"",
"Electrical Engg. Dept., Indian Institute of Science"
],
[
"Unnikrishnan",
"K. P.",
"",
"General Motors R&D"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0709.0223 | Vassilis Kostakos | Vassilis Kostakos, Eamonn O'Neill, Alan Penn | Brief encounter networks | 8 pages, 6 figures | ACM Transactions on Computer Human Interaction, 17(1):1-38, 2010 | 10.1145/1721831.1721833 | null | cs.CY | null | Many complex human and natural phenomena can usefully be represented as
networks describing the relationships between individuals. While these
relationships are typically intermittent, previous research has used network
representations that aggregate the relationships at discrete intervals.
However, such an aggregation discards important temporal information, thus
inhibiting our understanding of the networks dynamic behaviour and evolution.
We have recorded patterns of human urban encounter using Bluetooth technology
thus retaining the temporal properties of this network. Here we show how this
temporal information influences the structural properties of the network. We
show that the temporal properties of human urban encounter are scale-free,
leading to an overwhelming proportion of brief encounters between individuals.
While previous research has shown preferential attachment to result in
scale-free connectivity in aggregated network data, we found that scale-free
connectivity results from the temporal properties of the network. In addition,
we show that brief encounters act as weak social ties in the diffusion of
non-expiring information, yet persistent encounters provide the means for
sustaining time-expiring information through a network.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 13:14:30 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Kostakos",
"Vassilis",
""
],
[
"O'Neill",
"Eamonn",
""
],
[
"Penn",
"Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0709.0259 | Chien-Hwa Hwang | Chien-Hwa Hwang and Shih-Chang Chen | Spectrum Sensing in Wideband OFDM Cognitive Radios | 30 pages, 7 figures, submitted to IEEE Transactions on Signal
Processing, Aug. 2007 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, detection of the primary user (PU) signal in an orthogonal
frequency division multiplexing (OFDM) based cognitive radio (CR) system is
addressed. According to the prior knowledge of the PU signal known to the
detector, three detection algorithms based on the Neyman-Pearson philosophy are
proposed. In the first case, a Gaussian PU signal with completely known
probability density function (PDF) except for its received power is considered.
The frequency band that the PU signal resides is also assumed known. Detection
is performed individually at each OFDM sub-carrier possibly interfered by the
PU signal, and the results are then combined to form a final decision. In the
second case, the sub-carriers that the PU signal resides are known.
Observations from all possibly interfered sub-carriers are considered jointly
to exploit the fact that the presence of a PU signal interferers all of them
simultaneously. In the last case, it is assumed no PU signal prior knowledge is
available. The detection is involved with a search of the interfered band. The
proposed detector is able to detect an abrupt power change when tracing along
the frequency axis.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 15:16:20 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2008 05:04:22 GMT"
}
] | 2008-10-06T00:00:00 | [
[
"Hwang",
"Chien-Hwa",
""
],
[
"Chen",
"Shih-Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0289 | Christian Schaffner | Christian Schaffner | Cryptography in the Bounded-Quantum-Storage Model | PhD Thesis, BRICS, University of Aarhus, Denmark, 128 pages | null | null | null | quant-ph cs.CR | null | This thesis initiates the study of cryptographic protocols in the
bounded-quantum-storage model. On the practical side, simple protocols for
Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are
presented. No quantum memory is required for honest players, whereas the
protocols can only be broken by an adversary controlling a large amount of
quantum memory. The protocols are efficient, non-interactive and can be
implemented with today's technology.
On the theoretical side, new entropic uncertainty relations involving
min-entropy are established and used to prove the security of protocols
according to new strong security definitions. For instance, in the realistic
setting of Quantum Key Distribution (QKD) against quantum-memory-bounded
eavesdroppers, the uncertainty relation allows to prove the security of QKD
protocols while tolerating considerably higher error rates compared to the
standard model with unbounded adversaries.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 19:28:46 GMT"
}
] | 2007-09-04T00:00:00 | [
[
"Schaffner",
"Christian",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.0303 | Marian Boguna | Marian Boguna, Dmitri Krioukov, kc claffy | Navigability of Complex Networks | null | Nature Physics 5, 74-80 (2009) | 10.1038/NPHYS1130 | null | physics.soc-ph cond-mat.dis-nn cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Routing information through networks is a universal phenomenon in both
natural and manmade complex systems. When each node has full knowledge of the
global network connectivity, finding short communication paths is merely a
matter of distributed computation. However, in many real networks nodes
communicate efficiently even without such global intelligence. Here we show
that the peculiar structural characteristics of many complex networks support
efficient communication without global knowledge. We also describe a general
mechanism that explains this connection between network structure and function.
This mechanism relies on the presence of a metric space hidden behind an
observable network. Our findings suggest that real networks in nature have
underlying metric spaces that remain undiscovered. Their discovery would have
practical applications ranging from routing in the Internet and searching
social networks, to studying information flows in neural, gene regulatory
networks, or signaling pathways.
| [
{
"version": "v1",
"created": "Mon, 3 Sep 2007 18:57:26 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Sep 2008 22:26:42 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 13:00:20 GMT"
}
] | 2009-05-20T00:00:00 | [
[
"Boguna",
"Marian",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.0355 | Roland Bouffanais | Nicolas Bodard, Roland Bouffanais, Michel O. Deville | Solution of moving-boundary problems by the spectral element method | Applied Numerical Mathematics, In Press, 2008 | Applied Numerial Mathematics 58 (2008) 968-984 | 10.1016/j.apnum.2007.04.009 | null | cs.CE cs.NA | null | This paper describes a novel numerical model aiming at solving
moving-boundary problems such as free-surface flows or fluid-structure
interaction. This model uses a moving-grid technique to solve the
Navier--Stokes equations expressed in the arbitrary Lagrangian--Eulerian
kinematics. The discretization in space is based on the spectral element
method. The coupling of the fluid equations and the moving-grid equations is
essentially done through the conditions on the moving boundaries. Two- and
three-dimensional simulations are presented: translation and rotation of a
cylinder in a fluid, and large-amplitude sloshing in a rectangular tank. The
accuracy and robustness of the present numerical model is studied and
discussed.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 14:51:56 GMT"
}
] | 2022-09-29T00:00:00 | [
[
"Bodard",
"Nicolas",
""
],
[
"Bouffanais",
"Roland",
""
],
[
"Deville",
"Michel O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0709.0367 | Francesco Zamponi | Fabrizio Altarelli, Remi Monasson and Francesco Zamponi | Relationship between clustering and algorithmic phase transitions in the
random k-XORSAT model and its NP-complete extensions | 15 pages, 4 figures, Proceedings of the International Workshop on
Statistical-Mechanical Informatics, September 16-19, 2007, Kyoto, Japan; some
imprecisions in the previous version have been corrected | Journal of Physics: Conference Series 95 (2008) 012013 | 10.1088/1742-6596/95/1/012013 | null | cs.CC | null | We study the performances of stochastic heuristic search algorithms on
Uniquely Extendible Constraint Satisfaction Problems with random inputs. We
show that, for any heuristic preserving the Poissonian nature of the underlying
instance, the (heuristic-dependent) largest ratio $\alpha_a$ of constraints per
variables for which a search algorithm is likely to find solutions is smaller
than the critical ratio $\alpha_d$ above which solutions are clustered and
highly correlated. In addition we show that the clustering ratio can be reached
when the number k of variables per constraints goes to infinity by the
so-called Generalized Unit Clause heuristic.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 08:56:27 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Oct 2007 11:35:29 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Altarelli",
"Fabrizio",
""
],
[
"Monasson",
"Remi",
""
],
[
"Zamponi",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.0370 | Damien Chablat | Ying Wang (DIE), Wei Zhang (DIE), Fouad Bennis (IRCCyN), Damien
Chablat (IRCCyN) | An Integrated Simulation System for Human Factors Study | null | Dans The Institute of Industrial Engineers Annual Conference - The
Institute of Industrial Engineers Annual Conference, Orlando : \'Etats-Unis
d'Am\'erique (2006) | null | null | cs.HC | null | It has been reported that virtual reality can be a useful tool for ergonomics
study. The proposed integrated simulation system aims at measuring operator's
performance in an interactive way for 2D control panel design. By incorporating
some sophisticated virtual reality hardware/software, the system allows natural
human-system and/or human-human interaction in a simulated virtual environment;
enables dynamic objective measurement of human performance; and evaluates the
quality of the system design in human factors perspective based on the
measurement. It can also be for operation training for some 2D control panels.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 09:20:03 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Wang",
"Ying",
"",
"DIE"
],
[
"Zhang",
"Wei",
"",
"DIE"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0709.0409 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Maher Baili
(IRCCyN) | A DH-parameter based condition for 3R orthogonal manipulators to have 4
distinct inverse kinematic solutions | null | Journal of Mechanical Design 127 (2005) 150-155 | null | null | cs.RO | null | Positioning 3R manipulators may have two or four inverse kinematic solutions
(IKS). This paper derives a necessary and sufficient condition for 3R
positioning manipulators with orthogonal joint axes to have four distinct IKS.
We show that the transition between manipulators with 2 and 4 IKS is defined by
the set of manipulators with a quadruple root of their inverse kinematics. The
resulting condition is explicit and states that the last link length of the
manipulator must be greater than a quantity that depends on three of its
remaining DH-parameters. This result is of interest for the design of new
manipulators.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 12:27:14 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Baili",
"Maher",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0709.0426 | Noelle Carbonell | No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA),
Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Do oral messages help visual search? | 26 pages | Advances in Natural Multimodal Dialogue Systems, Dordrecht (NL)
Springer (Ed.) (2005) pp. 131-157 | null | null | cs.HC | null | A preliminary experimental study is presented, that aims at eliciting the
contribution of oral messages to facilitating visual search tasks on crowded
visual displays. Results of quantitative and qualitative analyses suggest that
appropriate verbal messages can improve both target selection time and
accuracy. In particular, multimodal messages including a visual presentation of
the isolated target together with absolute spatial oral information on its
location in the displayed scene seem most effective. These messages also got
top-ranking ratings from most subjects.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 13:23:40 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Kieffer",
"Suzanne",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0709.0428 | Noelle Carbonell | Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Oral messages improve visual search | 4 pages | Dans Proceedings of ACM Working Conference on Advanced Visual
Interfaces - ACM Working Conference on Advanced Visual Interfaces (AVI 2006),
Venezia : Italie (2006) | null | null | cs.HC | null | Input multimodality combining speech and hand gestures has motivated numerous
usability studies. Contrastingly, issues relating to the design and ergonomic
evaluation of multimodal output messages combining speech with visual
modalities have not yet been addressed extensively. The experimental study
presented here addresses one of these issues. Its aim is to assess the actual
efficiency and usability of oral system messages including brief spatial
information for helping users to locate objects on crowded displays rapidly.
Target presentation mode, scene spatial structure and task difficulty were
chosen as independent variables. Two conditions were defined: the visual target
presentation mode (VP condition) and the multimodal target presentation mode
(MP condition). Each participant carried out two blocks of visual search tasks
(120 tasks per block, and one block per condition). Scene target presentation
mode, scene structure and task difficulty were found to be significant factors.
Multimodal target presentation proved to be more efficient than visual target
presentation. In addition, participants expressed very positive judgments on
multimodal target presentations which were preferred to visual presentations by
a majority of participants. Besides, the contribution of spatial messages to
visual search speed and accuracy was influenced by scene spatial structure and
task difficulty: (i) messages improved search efficiency to a lesser extent for
2D array layouts than for some other symmetrical layouts, although the use of
2D arrays for displaying pictures is currently prevailing; (ii) message
usefulness increased with task difficulty. Most of these results are
statistically significant.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 13:27:33 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Kieffer",
"Suzanne",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0709.0435 | Andreas Witzel | Krzysztof R. Apt and Andreas Witzel | A Generic Approach to Coalition Formation | 21 pages. To appear in International Game Theory Review (IGTR) | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an abstract approach to coalition formation that focuses on simple
merge and split rules transforming partitions of a group of players. We
identify conditions under which every iteration of these rules yields a unique
partition. The main conceptual tool is a specific notion of a stable partition.
The results are parametrized by a preference relation between partitions of a
group of players and naturally apply to coalitional TU-games, hedonic games and
exchange economy games.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 14:15:28 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2009 20:17:22 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Mar 2009 09:28:28 GMT"
}
] | 2009-03-03T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Witzel",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0709.0446 | Riccardo Pucella | Alessio Lomuscio and Wojciech Penczek | Logic Column 19: Symbolic Model Checking for Temporal-Epistemic Logics | 23 pages | null | null | null | cs.LO | null | This article surveys some of the recent work in verification of temporal
epistemic logic via symbolic model checking, focusing on OBDD-based and
SAT-based approaches for epistemic logics built on discrete and real-time
branching time temporal logics.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 14:38:10 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Lomuscio",
"Alessio",
""
],
[
"Penczek",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.0492 | Stephanie Wehner | Stephanie Wehner, J\"urg Wullschleger | Composable Security in the Bounded-Quantum-Storage Model | 21 pages | Proceedings of ICALP 2008, pages 604--615 | null | null | quant-ph cs.CR | null | We present a simplified framework for proving sequential composability in the
quantum setting. In particular, we give a new, simulation-based, definition for
security in the bounded-quantum-storage model, and show that this definition
allows for sequential composition of protocols. Damgard et al. (FOCS '05,
CRYPTO '07) showed how to securely implement bit commitment and oblivious
transfer in the bounded-quantum-storage model, where the adversary is only
allowed to store a limited number of qubits. However, their security
definitions did only apply to the standalone setting, and it was not clear if
their protocols could be composed. Indeed, we first give a simple attack that
shows that these protocols are not composable without a small refinement of the
model. Finally, we prove the security of their randomized oblivious transfer
protocol in our refined model. Secure implementations of oblivious transfer and
bit commitment then follow easily by a (classical) reduction to randomized
oblivious transfer.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 18:15:13 GMT"
}
] | 2009-01-20T00:00:00 | [
[
"Wehner",
"Stephanie",
""
],
[
"Wullschleger",
"Jürg",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.0509 | Enrique ter Horst Dr | Henryk Gzyl and Enrique ter Horst | Filtering Additive Measurement Noise with Maximum Entropy in the Mean | null | null | null | null | cs.LG | null | The purpose of this note is to show how the method of maximum entropy in the
mean (MEM) may be used to improve parametric estimation when the measurements
are corrupted by large level of noise. The method is developed in the context
on a concrete example: that of estimation of the parameter in an exponential
distribution. We compare the performance of our method with the bayesian and
maximum likelihood approaches.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 19:36:22 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Gzyl",
"Henryk",
""
],
[
"ter Horst",
"Enrique",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0709.0511 | Oskar Sandberg | Oskar Sandberg | Double Clustering and Graph Navigability | null | null | null | null | math.PR cs.DS math.CO | null | Graphs are called navigable if one can find short paths through them using
only local knowledge. It has been shown that for a graph to be navigable, its
construction needs to meet strict criteria. Since such graphs nevertheless seem
to appear in nature, it is of interest to understand why these criteria should
be fulfilled.
In this paper we present a simple method for constructing graphs based on a
model where nodes vertices are ``similar'' in two different ways, and tend to
connect to those most similar to them - or cluster - with respect to both. We
prove that this leads to navigable networks for several cases, and hypothesize
that it also holds in great generality. Enough generality, perhaps, to explain
the occurrence of navigable networks in nature.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 19:38:14 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Sandberg",
"Oskar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0709.0516 | Sachin Adlakha | Sachin Adlakha, Ramesh Johari and Andrea Goldsmith | Competition in Wireless Systems via Bayesian Interference Games | 30 pages, 3 figures | null | null | null | cs.GT | null | We study competition between wireless devices with incomplete information
about their opponents. We model such interactions as Bayesian interference
games. Each wireless device selects a power profile over the entire available
bandwidth to maximize its data rate. Such competitive models represent
situations in which several wireless devices share spectrum without any central
authority or coordinated protocol.
In contrast to games where devices have complete information about their
opponents, we consider scenarios where the devices are unaware of the
interference they cause to other devices. Such games, which are modeled as
Bayesian games, can exhibit significantly different equilibria. We first
consider a simple scenario of simultaneous move games, where we show that the
unique Bayes-Nash equilibrium is where both devices spread their power equally
across the entire bandwidth. We then extend this model to a two-tiered spectrum
sharing case where users act sequentially. Here one of the devices, called the
primary user, is the owner of the spectrum and it selects its power profile
first. The second device (called the secondary user) then responds by choosing
a power profile to maximize its Shannon capacity. In such sequential move
games, we show that there exist equilibria in which the primary user obtains a
higher data rate by using only a part of the bandwidth.
In a repeated Bayesian interference game, we show the existence of reputation
effects: an informed primary user can bluff to prevent spectrum usage by a
secondary user who suffers from lack of information about the channel gains.
The resulting equilibrium can be highly inefficient, suggesting that
competitive spectrum sharing is highly suboptimal.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 19:45:00 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Adlakha",
"Sachin",
""
],
[
"Johari",
"Ramesh",
""
],
[
"Goldsmith",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0709.0518 | Abdellatif Zaidi | A. Zaidi and L. Vandendorpe | Rate Regions for the Partially-Cooperative Relay Broadcast Channel with
Non-causal Side Information | 7 pages, Proc. of IEEE International Symposium on Information theory,
ISIT 2007, Nice, France | null | null | null | cs.IT math.IT | null | In this work, we consider a partially cooperative relay broadcast channel
(PC-RBC) controlled by random parameters. We provide rate regions for two
different situations: 1) when side information (SI) S^n on the random
parameters is non-causally known at both the source and the relay and, 2) when
side information S^n is non-causally known at the source only. These achievable
regions are derived for the general discrete memoryless case first and then
extended to the case when the channel is degraded Gaussian and the SI is
additive i.i.d. Gaussian. In this case, the source uses generalized dirty paper
coding (GDPC), i.e., DPC combined with partial state cancellation, when only
the source is informed, and DPC alone when both the source and the relay are
informed. It appears that, even though it can not completely eliminate the
effect of the SI (in contrast to the case of source and relay being informed),
GDPC is particularly useful when only the source is informed.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 02:14:34 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Zaidi",
"A.",
""
],
[
"Vandendorpe",
"L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0522 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | Qualitative Belief Conditioning Rules (QBCR) | 13 pages. Presented at Fusion 2007 International Conference, Quebec
City, Canada, July 2007 | Proceedings of Fusion 2007 International Conference, Quebec City,
Canada, July 2007 | null | null | cs.AI | null | In this paper we extend the new family of (quantitative) Belief Conditioning
Rules (BCR) recently developed in the Dezert-Smarandache Theory (DSmT) to their
qualitative counterpart for belief revision. Since the revision of quantitative
as well as qualitative belief assignment given the occurrence of a new event
(the conditioning constraint) can be done in many possible ways, we present
here only what we consider as the most appealing Qualitative Belief
Conditioning Rules (QBCR) which allow to revise the belief directly with words
and linguistic labels and thus avoids the introduction of ad-hoc translations
of quantitative beliefs into quantitative ones for solving the problem.
| [
{
"version": "v1",
"created": "Tue, 4 Sep 2007 20:03:04 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.0566 | Debprakash Patnaik | K.P.Unnikrishnan (General Motors R&D Center, Warren, MI), Debprakash
Patnaik (Dept. Elecetrical Engineering, Indian Institute of Science,
Bangalore), P.S.Sastry (Dept. Elecetrical Engineering, Indian Institute of
Science, Bangalore) | Discovering Patterns in Multi-neuronal Spike Trains using the Frequent
Episode Method | Also see http://neural-code.cs.vt.edu/ | null | null | null | cs.DB q-bio.NC | null | Discovering the 'Neural Code' from multi-neuronal spike trains is an
important task in neuroscience. For such an analysis, it is important to
unearth interesting regularities in the spiking patterns. In this report, we
present an efficient method for automatically discovering synchrony, synfire
chains, and more general sequences of neuronal firings. We use the Frequent
Episode Discovery framework of Laxman, Sastry, and Unnikrishnan (2005), in
which the episodes are represented and recognized using finite-state automata.
Many aspects of functional connectivity between neuronal populations can be
inferred from the episodes. We demonstrate these using simulated multi-neuronal
data from a Poisson model. We also present a method to assess the statistical
significance of the discovered episodes. Since the Temporal Data Mining (TDM)
methods used in this report can analyze data from hundreds and potentially
thousands of neurons, we argue that this framework is appropriate for
discovering the `Neural Code'.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 14:46:59 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Sep 2007 06:51:41 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Unnikrishnan",
"K. P.",
"",
"General Motors R&D Center, Warren, MI"
],
[
"Patnaik",
"Debprakash",
"",
"Dept. Elecetrical Engineering, Indian Institute of Science,\n Bangalore"
],
[
"Sastry",
"P. S.",
"",
"Dept. Elecetrical Engineering, Indian Institute of\n Science, Bangalore"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0709.0599 | Igal Sason | Igal Sason | On Universal Properties of Capacity-Approaching LDPC Ensembles | Published in the IEEE Trans. on Information Theory, vol. 55, no. 7,
pp. 2956 - 2990, July 2009 | null | 10.1109/TIT.2009.2021305 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is focused on the derivation of some universal properties of
capacity-approaching low-density parity-check (LDPC) code ensembles whose
transmission takes place over memoryless binary-input output-symmetric (MBIOS)
channels. Properties of the degree distributions, graphical complexity and the
number of fundamental cycles in the bipartite graphs are considered via the
derivation of information-theoretic bounds. These bounds are expressed in terms
of the target block/ bit error probability and the gap (in rate) to capacity.
Most of the bounds are general for any decoding algorithm, and some others are
proved under belief propagation (BP) decoding. Proving these bounds under a
certain decoding algorithm, validates them automatically also under any
sub-optimal decoding algorithm. A proper modification of these bounds makes
them universal for the set of all MBIOS channels which exhibit a given
capacity. Bounds on the degree distributions and graphical complexity apply to
finite-length LDPC codes and to the asymptotic case of an infinite block
length. The bounds are compared with capacity-approaching LDPC code ensembles
under BP decoding, and they are shown to be informative and are easy to
calculate. Finally, some interesting open problems are considered.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 12:25:58 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Sep 2007 14:10:41 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Sep 2007 07:49:42 GMT"
},
{
"version": "v4",
"created": "Sun, 21 Oct 2007 11:52:19 GMT"
},
{
"version": "v5",
"created": "Thu, 26 Feb 2015 07:40:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sason",
"Igal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0624 | Martin Ziegler | Katharina L\"urwer-Br\"uggemeier and Martin Ziegler | On Faster Integer Calculations using Non-Arithmetic Primitives | null | null | null | null | cs.DS | null | The unit cost model is both convenient and largely realistic for describing
integer decision algorithms over (+,*). Additional operations like division
with remainder or bitwise conjunction, although equally supported by computing
hardware, may lead to a considerable drop in complexity. We show a variety of
concrete problems to benefit from such NON-arithmetic primitives by presenting
and analyzing corresponding fast algorithms.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 11:34:54 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Lürwer-Brüggemeier",
"Katharina",
""
],
[
"Ziegler",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0709.0670 | Daniil Ryabko | Daniil Ryabko, Juergen Schmidhuber | Using Data Compressors to Construct Rank Tests | null | Applied Mathematics Letters, 22:7, 1029-1032, 2009 | null | null | cs.DS cs.IT math.IT | null | Nonparametric rank tests for homogeneity and component independence are
proposed, which are based on data compressors. For homogeneity testing the idea
is to compress the binary string obtained by ordering the two joint samples and
writing 0 if the element is from the first sample and 1 if it is from the
second sample and breaking ties by randomization (extension to the case of
multiple samples is straightforward). $H_0$ should be rejected if the string is
compressed (to a certain degree) and accepted otherwise. We show that such a
test obtained from an ideal data compressor is valid against all alternatives.
Component independence is reduced to homogeneity testing by constructing two
samples, one of which is the first half of the original and the other is the
second half with one of the components randomly permuted.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 15:06:04 GMT"
}
] | 2012-02-28T00:00:00 | [
[
"Ryabko",
"Daniil",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0674 | Juergen Schmidhuber | Juergen Schmidhuber | Simple Algorithmic Principles of Discovery, Subjective Beauty, Selective
Attention, Curiosity & Creativity | 15 pages, 3 highly compressible low-complexity drawings. Joint
Invited Lecture for Algorithmic Learning Theory (ALT 2007) and Discovery
Science (DS 2007), Sendai, Japan, 2007 | null | null | null | cs.AI cs.GR | null | I postulate that human or other intelligent agents function or should
function as follows. They store all sensory observations as they come - the
data is holy. At any time, given some agent's current coding capabilities, part
of the data is compressible by a short and hopefully fast program / description
/ explanation / world model. In the agent's subjective eyes, such data is more
regular and more "beautiful" than other data. It is well-known that knowledge
of regularity and repeatability may improve the agent's ability to plan actions
leading to external rewards. In absence of such rewards, however, known beauty
is boring. Then "interestingness" becomes the first derivative of subjective
beauty: as the learning agent improves its compression algorithm, formerly
apparently random data parts become subjectively more regular and beautiful.
Such progress in compressibility is measured and maximized by the curiosity
drive: create action sequences that extend the observation history and yield
previously unknown / unpredictable but quickly learnable algorithmic
regularity. We discuss how all of the above can be naturally implemented on
computers, through an extension of passive unsupervised learning to the case of
active data selection: we reward a general reinforcement learner (with access
to the adaptive compressor) for actions that improve the subjective
compressibility of the growing data. An unusually large breakthrough in
compressibility deserves the name "discovery". The "creativity" of artists,
dancers, musicians, pure mathematicians can be viewed as a by-product of this
principle. Several qualitative examples support this hypothesis.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 15:20:59 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0709.0677 | Binhai Zhu | Binhai Zhu | On the Complexity of Protein Local Structure Alignment Under the
Discrete Fr\'echet Distance | 11 pages, 2 figures | null | null | null | cs.CC cs.DS | null | We show that given $m$ proteins (or protein backbones, which are modeled as
3D polygonal chains each of length O(n)) the problem of protein local structure
alignment under the discrete Fr\'{e}chet distance is as hard as Independent
Set. So the problem does not admit any approximation of factor
$n^{1-\epsilon}$. This is the strongest negative result regarding the protein
local structure alignment problem. On the other hand, if $m$ is a constant,
then the problem can be solved in polygnomial time.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 15:30:54 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Zhu",
"Binhai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0709.0680 | Damien Chablat | Antoine Rennuit (IRCCyN), Alain Micaelli (LIST), Claude Andriot
(LIST), Fran\c{c}ois Guillaume, Nicolas Chevassus, Damien Chablat (IRCCyN),
Patrick Chedmail (IRCCyN) | Designing a Virtual Manikin Animation Framework Aimed at Virtual
Prototyping | null | Dans Laval Virtual - Laval Virtual, Laval : France (2004) | null | null | cs.RO | null | In the industry, numerous commercial packages provide tools to introduce, and
analyse human behaviour in the product's environment (for maintenance,
ergonomics...), thanks to Virtual Humans. We will focus on control. Thanks to
algorithms newly introduced in recent research papers, we think we can provide
an implementation, which even widens, and simplifies the animation capacities
of virtual manikins. In order to do so, we are going to express the industrial
expectations as for Virtual Humans, without considering feasibility (not to
bias the issue). The second part will show that no commercial application
provides the tools that perfectly meet the needs. Thus we propose a new
animation framework that better answers the problem. Our contribution is the
integration - driven by need ~ of available new scientific techniques to
animate Virtual Humans, in a new control scheme that better answers industrial
expectations.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 15:52:53 GMT"
}
] | 2007-09-06T00:00:00 | [
[
"Rennuit",
"Antoine",
"",
"IRCCyN"
],
[
"Micaelli",
"Alain",
"",
"LIST"
],
[
"Andriot",
"Claude",
"",
"LIST"
],
[
"Guillaume",
"François",
"",
"IRCCyN"
],
[
"Chevassus",
"Nicolas",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Chedmail",
"Patrick",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0709.0746 | Ketan Mulmuley D | Ketan D. Mulmuley, Milind Sohoni | Geometric Complexity Theory: Introduction | 161 pages | null | null | TR-2007-16, comp. sci. dept., The University Of Chicago | cs.CC | null | These are lectures notes for the introductory graduate courses on geometric
complexity theory (GCT) in the computer science department, the university of
Chicago. Part I consists of the lecture notes for the course given by the first
author in the spring quarter, 2007. It gives introduction to the basic
structure of GCT. Part II consists of the lecture notes for the course given by
the second author in the spring quarter, 2003. It gives introduction to
invariant theory with a view towards GCT. No background in algebraic geometry
or representation theory is assumed. These lecture notes in conjunction with
the article \cite{GCTflip1}, which describes in detail the basic plan of GCT
based on the principle called the flip, should provide a high level picture of
GCT assuming familiarity with only basic notions of algebra, such as groups,
rings, fields etc.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 21:54:52 GMT"
}
] | 2014-08-02T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
],
[
"Sohoni",
"Milind",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.0748 | Ketan Mulmuley D | Ketan D. Mulmuley | On P vs. NP, Geometric Complexity Theory, and the Flip I: a high level
view | 103 pages | null | null | TR-2007-13, comp. sci. dept., The University of Chicago | cs.CC | null | Geometric complexity theory (GCT) is an approach to the $P$ vs. $NP$ and
related problems through algebraic geometry and representation theory. This
article gives a high-level exposition of the basic plan of GCT based on the
principle, called the flip, without assuming any background in algebraic
geometry or representation theory.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 22:10:31 GMT"
}
] | 2007-09-07T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.0749 | Ketan Mulmuley D | Ketan D. Mulmuley | Geometric Complexity Theory VII: Nonstandard quantum group for the
plethysm problem | 59 pages, changed content | null | null | TR-2007-14, comp. sci. dept., The University Of Chicago | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes a {\em nonstandard} quantum group that may be used to
derive a positive formula for the plethysm problem, just as the standard
(Drinfeld-Jimbo) quantum group can be used to derive the positive
Littlewood-Richardson rule for arbitrary complex semisimple Lie groups. The
sequel \cite{GCT8} gives conjecturally correct algorithms to construct
canonical bases of the coordinate rings of these nonstandard quantum groups and
canonical bases of the dually paired nonstandard deformations of the symmetric
group algebra. A positive $#P$-formula for the plethysm constant follows from
the conjectural properties of these canonical bases and the duality and
reciprocity conjectures herein.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 22:23:15 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2008 17:06:03 GMT"
}
] | 2008-09-01T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.0751 | Ketan Mulmuley D | Ketan D. Mulmuley | Geometric Complexity Theory VIII: On canonical bases for the nonstandard
quantum groups | 71 pages, changed content | null | null | TR-2007-15, comp. sci. dept., The University Of Chicago | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article gives conjecturally correct algorithms to construct canonical
bases of the irreducible polynomial representations and the matrix coordinate
rings of the nonstandard quantum groups in GCT4 and GCT7, and canonical bases
of the dually paired nonstandard deformations of the symmetric group algebra
therein. These are generalizations of the canonical bases of the irreducible
polynomial representations and the matrix coordinate ring of the standard
quantum group, as constructed by Kashiwara and Lusztig, and the Kazhdan-Lusztig
basis of the Hecke algebra. A positive ($#P$-) formula for the well-known
plethysm constants follows from their conjectural properties and the duality
and reciprocity conjectures in \cite{GCT7}.
| [
{
"version": "v1",
"created": "Wed, 5 Sep 2007 22:30:50 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2008 17:11:21 GMT"
}
] | 2008-09-01T00:00:00 | [
[
"Mulmuley",
"Ketan D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.0787 | Toshiya Takami | Taizo Kobayashi, Toshiya Takami, Kin'ya Takahashi, Ryota Mibu, Mutsumi
Aoyagi | Sound Generation by a Turbulent Flow in Musical Instruments -
Multiphysics Simulation Approach - | 6 pages, 10 figure files, to appear in the proceedings of HPCAsia07 | null | null | null | physics.comp-ph cs.CE physics.flu-dyn | null | Total computational costs of scientific simulations are analyzed between
direct numerical simulations (DNS) and multiphysics simulations (MPS) for sound
generation in musical instruments. In order to produce acoustic sound by a
turbulent flow in a simple recorder-like instrument, compressible fluid dynamic
calculations with a low Mach number are required around the edges and the
resonator of the instrument in DNS, while incompressible fluid dynamic
calculations coupled with dynamics of sound propagation based on the
Lighthill's acoustic analogy are used in MPS. These strategies are evaluated
not only from the viewpoint of computational performances but also from the
theoretical points of view as tools for scientific simulations of complicated
systems.
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 13:47:31 GMT"
}
] | 2007-09-07T00:00:00 | [
[
"Kobayashi",
"Taizo",
""
],
[
"Takami",
"Toshiya",
""
],
[
"Takahashi",
"Kin'ya",
""
],
[
"Mibu",
"Ryota",
""
],
[
"Aoyagi",
"Mutsumi",
""
]
] | [
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
] |
0709.0883 | Joshua Herman J | Joshua Jay Herman | Liquid State Machines in Adbiatic Quantum Computers for General
Computation | Totally wrong | null | null | null | cs.CC cs.NE | null | Major mistakes do not read
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 16:04:42 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Sep 2007 19:34:51 GMT"
},
{
"version": "v3",
"created": "Sun, 9 Sep 2007 14:29:14 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Sep 2007 13:09:13 GMT"
},
{
"version": "v5",
"created": "Fri, 8 Jul 2011 01:54:35 GMT"
}
] | 2011-07-11T00:00:00 | [
[
"Herman",
"Joshua Jay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0709.0896 | Michael J. Kurtz | Michael J. Kurtz, Edwin A. Henneken | Open Access does not increase citations for research articles from The
Astrophysical Journal | null | null | null | null | cs.DL cs.CY | null | We demonstrate conclusively that there is no "Open Access Advantage" for
papers from the Astrophysical Journal. The two to one citation advantage
enjoyed by papers deposited in the arXiv e-print server is due entirely to the
nature and timing of the deposited papers. This may have implications for other
disciplines.
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 16:00:43 GMT"
}
] | 2007-09-07T00:00:00 | [
[
"Kurtz",
"Michael J.",
""
],
[
"Henneken",
"Edwin A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0709.0906 | Sylvain Boussier | Sylvain Boussier (LGI2P), Hideki Hashimoto, Michel Vasquez (LGI2P) | A Greedy Randomized Adaptive Search Procedure for Technicians and
Interventions Scheduling for Telecommunications | 3 pages | null | null | null | cs.DM | null | The subject of the 5th challenge proposed by the French Society of Operations
Research and Decision Analysis (ROADEF) consists in scheduling technicians and
interventions for telecommunications
(http://www.g-scop.inpg.fr/ChallengeROADEF2007/ or http://www.roadef.org/). We
detail the algorithm we proposed for this challenge which is a Greedy
Randomized Adaptative Search Procedure (GRASP). Computational results led us to
the 1st position in the Junior category and to the 4th position in All category
of the Challenge ROADEF 2007.
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 16:12:06 GMT"
}
] | 2007-09-07T00:00:00 | [
[
"Boussier",
"Sylvain",
"",
"LGI2P"
],
[
"Hashimoto",
"Hideki",
"",
"LGI2P"
],
[
"Vasquez",
"Michel",
"",
"LGI2P"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.0907 | Cristobal Rojas | Mathieu Hoyrup and Cristobal Rojas | Computability of probability measures and Martin-Lof randomness over
metric spaces | 29 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate algorithmic randomness on more general spaces
than the Cantor space, namely computable metric spaces. To do this, we first
develop a unified framework allowing computations with probability measures. We
show that any computable metric space with a computable probability measure is
isomorphic to the Cantor space in a computable and measure-theoretic sense. We
show that any computable metric space admits a universal uniform randomness
test (without further assumption).
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 16:16:23 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2008 15:19:47 GMT"
}
] | 2008-07-23T00:00:00 | [
[
"Hoyrup",
"Mathieu",
""
],
[
"Rojas",
"Cristobal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.0929 | Vladimir Gudkov | V. Gudkov and V. Montealegre | Analysis of network by generalized mutual entropies | null | null | 10.1016/j.physa.2008.01.005 | null | cond-mat.dis-nn cs.NI physics.comp-ph | null | Generalized mutual entropy is defined for networks and applied for analysis
of complex network structures. The method is tested for the case of computer
simulated scale free networks, random networks, and their mixtures. The
possible applications for real network analysis are discussed.
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 18:00:15 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Gudkov",
"V.",
""
],
[
"Montealegre",
"V.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0709.0961 | Harish Sethu | Harish Sethu and Thomas Gerety | A New Distributed Topology Control Algorithm for Wireless Environments
with Non-Uniform Path Loss and Multipath Propagation | To appear in Ad Hoc Networks | Ad Hoc Networks, May 2010, volume 8, issue 3, pages 280-294. | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Each node in a wireless multi-hop network can adjust the power level at which
it transmits and thus change the topology of the network to save energy by
choosing the neighbors with which it directly communicates. Many previous
algorithms for distributed topology control have assumed an ability at each
node to deduce some location-based information such as the direction and the
distance of its neighbor nodes with respect to itself. Such a deduction of
location-based information, however, cannot be relied upon in real environments
where the path loss exponents vary greatly leading to significant errors in
distance estimates. Also, multipath effects may result in different signal
paths with different loss characteristics, and none of these paths may be
line-of-sight, making it difficult to estimate the direction of a neighboring
node. In this paper, we present Step Topology Control (STC), a simple
distributed topology control algorithm which reduces energy consumption while
preserving the connectivity of a heterogeneous sensor network without use of
any location-based information. We show that the STC algorithm achieves the
same or better order of communication and computational complexity when
compared to other known algorithms that also preserve connectivity without the
use of location-based information. We also present a detailed simulation-based
comparative analysis of the energy savings and interference reduction achieved
by the algorithms. The results show that, in spite of not incurring a higher
communication or computational complexity, the STC algorithm performs better
than other algorithms in uniform wireless environments and especially better
when path loss characteristics are non-uniform.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 15:13:34 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 22:36:40 GMT"
}
] | 2010-03-26T00:00:00 | [
[
"Sethu",
"Harish",
""
],
[
"Gerety",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.0965 | Harish Sethu | Harish Sethu | The Induced Bounded-Degree Subgraph Problem and Stream Control in MIMO
Networks | null | null | null | null | cs.NI | null | In this report, we consider maximal solutions to the induced bounded-degree
subgraph problem and relate it to issues concerning stream control in
multiple-input multiple-output (MIMO) networks. We present a new distributed
algorithm that completes in logarithmic time with high probability and is
guaranteed to complete in linear time. We conclude the report with simulation
results that address the effectiveness of stream control and the relative
impact of receiver overloading and flexible interference suppression.
| [
{
"version": "v1",
"created": "Thu, 6 Sep 2007 22:40:22 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Sethu",
"Harish",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.0974 | Sergey Gubin | Sergey Gubin | Finding Paths and Cycles in Graphs | 11 pages | null | null | null | cs.DM cs.CC cs.DS math.CO | null | A polynomial time algorithm which detects all paths and cycles of all lengths
in form of vertex pairs (start, finish).
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 00:04:20 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0709.0993 | Oleg Shro | O. I. Shro | The Description of Information in 4-Dimensional Pseudo-Euclidean
Information Space | 40 pages. This is conceptual article from information theory. This
article contains original results received by the author | null | null | null | cs.IT math.IT nlin.AO physics.soc-ph | null | This article is presented new method of description information systems in
abstract 4-dimensional pseudo-Euclidean information space (4-DPIES) with using
special relativity (SR) methods. This purpose core postulates of existence
4-DPIES are formulated. The theorem setting existence criteria of the invariant
velocity of the information transference is formulated and proved. One more
theorem allowed relating discrete parameters of information and continuous
space-time treating and also row of supplementary theorems is formulated and
proved. For description of dynamics and interaction of information, in article
is introduced general parameter of information - generalized information
emotion (GIE), reminding simultaneously on properties the mass and the charge.
At performing calculation of information observable parameters in the
information space is introduced continual integration methods of Feynman. The
applying idea about existence of GIE as measures of the information inertness
and the interaction carrier, and using continual integration methods of Feynman
can be calculated probability of information process in 4-DPIES. In this frame
presented approach has allowed considering information systems when interest is
presented with information processes, their related with concrete definition
without necessity. The relation between 4-DPIES and real systems parameters is
set at modelling of matching between observable processes and real phenomena
from information interpretation.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 05:24:02 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Shro",
"O. I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0709.1023 | Jorge Kurchan | Florent Krzakala and Jorge Kurchan | Constraint optimization and landscapes | Contribution to STATPHYS23 | Eur. Phys. J. B 64, 563-565 (2008) | 10.1140/epjb/e2008-00052-x | null | quant-ph cond-mat.stat-mech cs.CC nlin.AO | null | We describe an effective landscape introduced in [1] for the analysis of
Constraint Satisfaction problems, such as Sphere Packing, K-SAT and Graph
Coloring. This geometric construction reexpresses these problems in the more
familiar terms of optimization in rugged energy landscapes. In particular, it
allows one to understand the puzzling fact that unsophisticated programs are
successful well beyond what was considered to be the `hard' transition, and
suggests an algorithm defining a new, higher, easy-hard frontier.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 08:49:38 GMT"
}
] | 2008-09-25T00:00:00 | [
[
"Krzakala",
"Florent",
""
],
[
"Kurchan",
"Jorge",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0709.1024 | Roland Bouffanais | Roland Bouffanais, Vincent Keller, Ralf Gruber, Michel O. Deville | Computational performance of a parallelized high-order spectral and
mortar element toolbox | Preprint submitted for publication to Parallel Computing | null | null | null | cs.DC cs.PF | null | In this paper, a comprehensive performance review of a MPI-based high-order
spectral and mortar element method C++ toolbox is presented. The focus is put
on the performance evaluation of several aspects with a particular emphasis on
the parallel efficiency. The performance evaluation is analyzed and compared to
predictions given by a heuristic model, the so-called Gamma model. A
tailor-made CFD computation benchmark case is introduced and used to carry out
this review, stressing the particular interest for commodity clusters.
Conclusions are drawn from this extensive series of analyses and modeling
leading to specific recommendations concerning such toolbox development and
parallel implementation.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 08:52:32 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Bouffanais",
"Roland",
""
],
[
"Keller",
"Vincent",
""
],
[
"Gruber",
"Ralf",
""
],
[
"Deville",
"Michel O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0709.1056 | Stephane Norte | Stephane Norte | A Sudoku Game for People with Motor Impairments | 7 pages, 5 figures | null | null | null | cs.HC cs.CY | null | Computer games are motivating and beneficial in learning different
educational skills. Most people use their fingers, hands, and arms when using a
computer game. However, for people with motor disabilities this task can be a
barrier. We present a new Sudoku game for people whose motion is impaired,
called Sudoku 4ALL. With this special interface a person can control the game
with the voice or with a single switch. Our research aims to cautiously search
for issues that might be appropriate for computational support and to build
enabling technologies that increase individuals' functional independence in a
game environment.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 11:59:22 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Sep 2007 13:26:17 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Sep 2007 21:08:35 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Norte",
"Stephane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0709.1074 | Shu-Tao Xia | Shu-Tao Xia and Fang-Wei Fu | Johnson Type Bounds on Constant Dimension Codes | 12 pages, submitted to Designs, Codes and Cryptography | null | null | null | cs.IT math.IT | null | Very recently, an operator channel was defined by Koetter and Kschischang
when they studied random network coding. They also introduced constant
dimension codes and demonstrated that these codes can be employed to correct
errors and/or erasures over the operator channel. Constant dimension codes are
equivalent to the so-called linear authentication codes introduced by Wang,
Xing and Safavi-Naini when constructing distributed authentication systems in
2003. In this paper, we study constant dimension codes. It is shown that
Steiner structures are optimal constant dimension codes achieving the
Wang-Xing-Safavi-Naini bound. Furthermore, we show that constant dimension
codes achieve the Wang-Xing-Safavi-Naini bound if and only if they are certain
Steiner structures. Then, we derive two Johnson type upper bounds, say I and
II, on constant dimension codes. The Johnson type bound II slightly improves on
the Wang-Xing-Safavi-Naini bound. Finally, we point out that a family of known
Steiner structures is actually a family of optimal constant dimension codes
achieving both the Johnson type bounds I and II.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 13:07:31 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Xia",
"Shu-Tao",
""
],
[
"Fu",
"Fang-Wei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.1080 | Cas Cremers | Cas Cremers | On the Protocol Composition Logic PCL | null | null | null | null | cs.CR cs.LO | null | A recent development in formal security protocol analysis is the Protocol
Composition Logic (PCL). We identify a number of problems with this logic as
well as with extensions of the logic, as defined in
[DDMP05,HSD+05,He05,Dat05,Der06,DDMR07]. The identified problems imply strong
restrictions on the scope of PCL, and imply that some currently claimed PCL
proofs cannot be proven within the logic, or make use of unsound axioms. Where
possible, we propose solutions for these problems.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 13:32:06 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Sep 2007 12:14:41 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Sep 2007 21:51:00 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Oct 2007 13:28:21 GMT"
},
{
"version": "v5",
"created": "Fri, 2 Nov 2007 11:10:19 GMT"
},
{
"version": "v6",
"created": "Wed, 19 Dec 2007 15:58:11 GMT"
},
{
"version": "v7",
"created": "Fri, 22 Feb 2008 16:12:11 GMT"
}
] | 2008-02-22T00:00:00 | [
[
"Cremers",
"Cas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.1099 | Cherif Smaili | Cherif Smaili (INRIA Lorraine - LORIA), Maan El Badaoui El Najjar
(INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA) | Multi-Sensor Fusion Method using Dynamic Bayesian Network for Precise
Vehicle Localization and Road Matching | null | null | null | null | cs.AI cs.RO | null | This paper presents a multi-sensor fusion strategy for a novel road-matching
method designed to support real-time navigational features within advanced
driving-assistance systems. Managing multihypotheses is a useful strategy for
the road-matching problem. The multi-sensor fusion and multi-modal estimation
are realized using Dynamical Bayesian Network. Experimental results, using data
from Antilock Braking System (ABS) sensors, a differential Global Positioning
System (GPS) receiver and an accurate digital roadmap, illustrate the
performances of this approach, especially in ambiguous situations.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 15:03:37 GMT"
}
] | 2007-09-10T00:00:00 | [
[
"Smaili",
"Cherif",
"",
"INRIA Lorraine - LORIA"
],
[
"Najjar",
"Maan El Badaoui El",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0709.1166 | Daniel Lemire | Daniel Lemire, Martin Brooks, Yuhong Yan | An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation | This is the extended version of our ICDM'05 paper (arXiv:cs/0702142) | Daniel Lemire, Martin Brooks and Yuhong Yan, An Optimal Linear
Time Algorithm for Quasi-Monotonic Segmentation. International Journal of
Computer Mathematics 86 (7), 2009. | 10.1080/00207160701694153 | NRC-00156 | cs.DB | null | Monotonicity is a simple yet significant qualitative characteristic. We
consider the problem of segmenting a sequence in up to K segments. We want
segments to be as monotonic as possible and to alternate signs. We propose a
quality metric for this problem using the l_inf norm, and we present an optimal
linear time algorithm based on novel formalism. Moreover, given a
precomputation in time O(n log n) consisting of a labeling of all extrema, we
compute any optimal segmentation in constant time. We compare experimentally
its performance to two piecewise linear segmentation heuristics (top-down and
bottom-up). We show that our algorithm is faster and more accurate.
Applications include pattern recognition and qualitative modeling.
| [
{
"version": "v1",
"created": "Fri, 7 Sep 2007 21:18:57 GMT"
}
] | 2009-09-01T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Brooks",
"Martin",
""
],
[
"Yan",
"Yuhong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0709.1167 | Marko Antonio Rodriguez | Marko A. Rodriguez, Jennifer H. Watkins, Johan Bollen, Carlos
Gershenson | Using RDF to Model the Structure and Process of Systems | International Conference on Complex Systems, Boston MA, October 2007 | InterJournal of Complex Systems, 2131, ISSN: 1081-0625, February
2008 | null | LAUR-07-5720 | cs.AI | null | Many systems can be described in terms of networks of discrete elements and
their various relationships to one another. A semantic network, or
multi-relational network, is a directed labeled graph consisting of a
heterogeneous set of entities connected by a heterogeneous set of
relationships. Semantic networks serve as a promising general-purpose modeling
substrate for complex systems. Various standardized formats and tools are now
available to support practical, large-scale semantic network models. First, the
Resource Description Framework (RDF) offers a standardized semantic network
data model that can be further formalized by ontology modeling languages such
as RDF Schema (RDFS) and the Web Ontology Language (OWL). Second, the recent
introduction of highly performant triple-stores (i.e. semantic network
databases) allows semantic network models on the order of $10^9$ edges to be
efficiently stored and manipulated. RDF and its related technologies are
currently used extensively in the domains of computer science, digital library
science, and the biological sciences. This article will provide an introduction
to RDF/RDFS/OWL and an examination of its suitability to model discrete element
complex systems.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 01:18:18 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Oct 2007 16:00:19 GMT"
}
] | 2008-11-03T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Watkins",
"Jennifer H.",
""
],
[
"Bollen",
"Johan",
""
],
[
"Gershenson",
"Carlos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.1190 | Mohsen Bayati | Mohsen Bayati, Christian Borgs, Jennifer Chayes, Riccardo Zecchina | Belief-Propagation for Weighted b-Matchings on Arbitrary Graphs and its
Relation to Linear Programs with Integer Solutions | 28 pages, 2 figures. Submitted to SIAM journal on Discrete
Mathematics on March 19, 2009; accepted for publication (in revised form)
August 30, 2010; published electronically July 1, 2011 | SIAM J. Discrete Math. 2011, Vol 25, Issue 2, pp. 989-1011 | 10.1137/090753115 | null | cs.IT cs.AI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the general problem of finding the minimum weight $\bm$-matching
on arbitrary graphs. We prove that, whenever the linear programming (LP)
relaxation of the problem has no fractional solutions, then the belief
propagation (BP) algorithm converges to the correct solution. We also show that
when the LP relaxation has a fractional solution then the BP algorithm can be
used to solve the LP relaxation. Our proof is based on the notion of graph
covers and extends the analysis of (Bayati-Shah-Sharma 2005 and Huang-Jebara
2007}.
These results are notable in the following regards: (1) It is one of a very
small number of proofs showing correctness of BP without any constraint on the
graph structure. (2) Variants of the proof work for both synchronous and
asynchronous BP; it is the first proof of convergence and correctness of an
asynchronous BP algorithm for a combinatorial optimization problem.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 08:21:34 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Feb 2008 02:56:38 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Aug 2011 21:43:21 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Bayati",
"Mohsen",
""
],
[
"Borgs",
"Christian",
""
],
[
"Chayes",
"Jennifer",
""
],
[
"Zecchina",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.1197 | Avraham Trahtman N | A.N. Trahtman | An efficient algorithm finds noticeable trends and examples concerning
the \v{C}erny conjecture | MFCS06. LNCS 4162, 10 pages | Lectures Notes in Computer Science, 4162(2006), 789-80 | null | null | cs.DM | null | A word w is called synchronizing (recurrent, reset, directed) word of a
deterministic finite automaton (DFA) if w sends all states of the automaton on
a unique state. Jan Cerny had found in 1964 a sequence of n-state complete DFA
with shortest synchronizing word of length (n-1)^2. He had conjectured that it
is an upper bound for the length of the shortest synchronizing word for any
$n$-state complete DFA.
The examples of DFA with shortest synchronizing word of length (n-1)^2 are
relatively rare. To the Cerny sequence were added in all examples of Cerny,
Piricka and Rosenauerova (1971), of Kari (2001) and of Roman (2004).
By help of a program based on some effective algorithms, a wide class of
automata of size less than 11 was checked. The order of the algorithm finding
synchronizing word is quadratic for overwhelming majority of known to date
automata. Some new examples of n-state DFA with minimal synchronizing word of
length (n-1)^2 were discovered. The program recognized some remarkable trends
concerning the length of the minimal synchronizing word.
http://www.cs.biu.ac.il/~trakht/Testas.html
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 10:07:52 GMT"
}
] | 2007-09-11T00:00:00 | [
[
"Trahtman",
"A. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.1201 | Alessio Guglielmi | Paola Bruscoli and Alessio Guglielmi | On the Proof Complexity of Deep Inference | Minor improvements over the published version. Always updated version
at <http://cs.bath.ac.uk/ag/p/PrComplDI.pdf> | ACM Transactions on Computational Logic 10 (2:14) 2009, pp. 1-34 | 10.1145/1462179.1462186 | null | cs.CC cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain two results about the proof complexity of deep inference: 1)
deep-inference proof systems are as powerful as Frege ones, even when both are
extended with the Tseitin extension rule or with the substitution rule; 2)
there are analytic deep-inference proof systems that exhibit an exponential
speed-up over analytic Gentzen proof systems that they polynomially simulate.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 11:35:28 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2008 15:34:38 GMT"
},
{
"version": "v3",
"created": "Sun, 19 Apr 2009 18:55:21 GMT"
}
] | 2009-04-19T00:00:00 | [
[
"Bruscoli",
"Paola",
""
],
[
"Guglielmi",
"Alessio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0709.1205 | Alessio Guglielmi | Alessio Guglielmi and Tom Gundersen | Normalisation Control in Deep Inference via Atomic Flows | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 31,
2008) lmcs:1081 | 10.2168/LMCS-4(1:9)2008 | null | math.LO cs.LO | null | We introduce `atomic flows': they are graphs obtained from derivations by
tracing atom occurrences and forgetting the logical structure. We study simple
manipulations of atomic flows that correspond to complex reductions on
derivations. This allows us to prove, for propositional logic, a new and very
general normalisation theorem, which contains cut elimination as a special
case. We operate in deep inference, which is more general than other syntactic
paradigms, and where normalisation is more difficult to control. We argue that
atomic flows are a significant technical advance for normalisation theory,
because 1) the technique they support is largely independent of syntax; 2)
indeed, it is largely independent of logical inference rules; 3) they
constitute a powerful geometric formalism, which is more intuitive than syntax.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 12:24:19 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 12:34:27 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Mar 2008 10:59:23 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Guglielmi",
"Alessio",
""
],
[
"Gundersen",
"Tom",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.1207 | Mikael Franzen | Mikael Franzen | The P versus NP Brief | 4 pages, 1 figure; added notational definition for functions for
section 2, formatting and wording changes; corrected typo, recompiled
pdf-file | null | null | null | cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper discusses why P and NP are likely to be different. It analyses the
essence of the concepts and points out that P and NP might be diverse by sheer
definition. It also speculates that P and NP may be unequal due to natural
laws.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 12:45:51 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 23:42:52 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Apr 2009 23:58:14 GMT"
}
] | 2009-05-01T00:00:00 | [
[
"Franzen",
"Mikael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.1211 | Anthony R\'eveillac | Anthony Reveillac | Likelihood ratios and Bayesian inference for Poisson channels | 13 pages | null | null | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, infinite-dimensional methods have been introduced for the
Gaussian channels estimation. The aim of this paper is to study the application
of similar methods to Poisson channels. In particular we compute the Bayesian
estimator of a Poisson channel using the likelihood ratio and the discrete
Malliavin gradient. This algorithm is suitable for numerical implementation via
the Monte-Carlo scheme. As an application we provide an new proof of the
formula obtained recently by Guo, Shamai and Verdu\'u relating some derivatives
of the input-output mutual information of a time-continuous Poisson channel and
the conditional mean estimator of the input. These results are then extended to
mixed Gaussian-Poisson channels.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 13:28:13 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Nov 2007 07:33:03 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Feb 2009 09:22:01 GMT"
}
] | 2009-02-11T00:00:00 | [
[
"Reveillac",
"Anthony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0709.1227 | Yanghua Xiao | Yanghua Xiao, Wentao Wu, Wei Wang and Zhengying He | Efficient Algorithms for Node Disjoint Subgraph Homeomorphism
Determination | 15 pages, 11 figures, submitted to DASFAA 2008 | In Proceeding of 13th International Conference on Database Systems
for Advanced Applications, 2008 | 10.1007/978-3-540-78568-2 | null | cs.DS cs.DB | null | Recently, great efforts have been dedicated to researches on the management
of large scale graph based data such as WWW, social networks, biological
networks. In the study of graph based data management, node disjoint subgraph
homeomorphism relation between graphs is more suitable than (sub)graph
isomorphism in many cases, especially in those cases that node skipping and
node mismatching are allowed. However, no efficient node disjoint subgraph
homeomorphism determination (ndSHD) algorithms have been available. In this
paper, we propose two computationally efficient ndSHD algorithms based on state
spaces searching with backtracking, which employ many heuristics to prune the
search spaces. Experimental results on synthetic data sets show that the
proposed algorithms are efficient, require relative little time in most of the
testing cases, can scale to large or dense graphs, and can accommodate to more
complex fuzzy matching cases.
| [
{
"version": "v1",
"created": "Sat, 8 Sep 2007 18:14:47 GMT"
}
] | 2008-10-09T00:00:00 | [
[
"Xiao",
"Yanghua",
""
],
[
"Wu",
"Wentao",
""
],
[
"Wang",
"Wei",
""
],
[
"He",
"Zhengying",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0709.1263 | Thorsten Theobald | Thorsten Theobald | Enumerating the Nash equilibria of rank 1-games | 15 pages | null | null | null | cs.GT math.OC | null | A bimatrix game $(A,B)$ is called a game of rank $k$ if the rank of the
matrix $A+B$ is at most $k$. We consider the problem of enumerating the Nash
equilibria in (non-degenerate) games of rank 1. In particular, we show that
even for games of rank 1 not all equilibria can be reached by a Lemke-Howson
path and present a parametric simplex-type algorithm for enumerating all Nash
equilibria of a non-degenerate game of rank 1.
| [
{
"version": "v1",
"created": "Sun, 9 Sep 2007 13:32:23 GMT"
}
] | 2007-09-11T00:00:00 | [
[
"Theobald",
"Thorsten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0709.1272 | Alfredo Buttari Dr | Alfredo Buttari, Julien Langou, Jakub Kurzak, Jack Dongarra | A Class of Parallel Tiled Linear Algebra Algorithms for Multicore
Architectures | null | null | null | Lapack working Note 191 | cs.MS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As multicore systems continue to gain ground in the High Performance
Computing world, linear algebra algorithms have to be reformulated or new
algorithms have to be developed in order to take advantage of the architectural
features on these new processors. Fine grain parallelism becomes a major
requirement and introduces the necessity of loose synchronization in the
parallel execution of an operation. This paper presents an algorithm for the
Cholesky, LU and QR factorization where the operations can be represented as a
sequence of small tasks that operate on square blocks of data. These tasks can
be dynamically scheduled for execution based on the dependencies among them and
on the availability of computational resources. This may result in an out of
order execution of the tasks which will completely hide the presence of
intrinsically sequential tasks in the factorization. Performance comparisons
are presented with the LAPACK algorithms where parallelism can only be
exploited at the level of the BLAS operations and vendor implementations.
| [
{
"version": "v1",
"created": "Sun, 9 Sep 2007 16:32:46 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Sep 2007 07:14:07 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jun 2008 18:09:13 GMT"
}
] | 2008-06-12T00:00:00 | [
[
"Buttari",
"Alfredo",
""
],
[
"Langou",
"Julien",
""
],
[
"Kurzak",
"Jakub",
""
],
[
"Dongarra",
"Jack",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.1308 | Giorgi Japaridze | Giorgi Japaridze | Cirquent calculus deepened | Significant improvements over the previous versions | Journal of Logic and Computation 18 (2008), pp. 983-1028 | 10.1093/logcom/exn019 | null | cs.LO math.LO | null | Cirquent calculus is a new proof-theoretic and semantic framework, whose main
distinguishing feature is being based on circuits, as opposed to the more
traditional approaches that deal with tree-like objects such as formulas or
sequents. Among its advantages are greater efficiency, flexibility and
expressiveness. This paper presents a detailed elaboration of a deep-inference
cirquent logic, which is naturally and inherently resource conscious. It shows
that classical logic, both syntactically and semantically, is just a special,
conservative fragment of this more general and, in a sense, more basic logic --
the logic of resources in the form of cirquent calculus. The reader will find
various arguments in favor of switching to the new framework, such as arguments
showing the insufficiency of the expressive power of linear logic or other
formula-based approaches to developing resource logics, exponential
improvements over the traditional approaches in both representational and proof
complexities offered by cirquent calculus, and more. Among the main purposes of
this paper is to provide an introductory-style starting point for what, as the
author wishes to hope, might have a chance to become a new line of research in
proof theory -- a proof theory based on circuits instead of formulas.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 18:00:51 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Sep 2007 19:38:26 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Apr 2008 12:09:13 GMT"
}
] | 2011-04-15T00:00:00 | [
[
"Japaridze",
"Giorgi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0709.1401 | Arnaud Spiwack | Thierry Coquand and Arnaud Spiwack | A proof of strong normalisation using domain theory | 16 pages | Logical Methods in Computer Science, Volume 3, Issue 4 (December
4, 2007) lmcs:1099 | 10.2168/LMCS-3(4:12)2007 | null | cs.LO cs.PL | null | Ulrich Berger presented a powerful proof of strong normalisation using
domains, in particular it simplifies significantly Tait's proof of strong
normalisation of Spector's bar recursion. The main contribution of this paper
is to show that, using ideas from intersection types and Martin-Lof's domain
interpretation of type theory one can in turn simplify further U. Berger's
argument. We build a domain model for an untyped programming language where U.
Berger has an interpretation only for typed terms or alternatively has an
interpretation for untyped terms but need an extra condition to deduce strong
normalisation. As a main application, we show that Martin-L\"{o}f dependent
type theory extended with a program for Spector double negation shift.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 14:08:26 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Dec 2007 14:43:36 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Coquand",
"Thierry",
""
],
[
"Spiwack",
"Arnaud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0709.1433 | Mamadou Moustapha Kant\'e | Mamadou Moustapha Kante and Michael Rao | The Rank-Width of Edge-Colored Graphs | It is an update of the last version generalising all the results to
edge-colored graphs and answering some of the raised questions | Theory of Computing Systems 52(4):599-644(2013) | 10.1007/s00224-012-9399-y | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clique-width is a complexity measure of directed as well as undirected
graphs. Rank-width is an equivalent complexity measure for undirected graphs
and has good algorithmic and structural properties. It is in particular related
to the vertex-minor relation. We discuss an extension of the notion of
rank-width to edge-colored graphs. A C-colored graph is a graph where the arcs
are colored with colors from the set C. There is not a natural notion of
rank-width for C-colored graphs. We define two notions of rank-width for them,
both based on a coding of C-colored graphs by edge-colored graphs where each
edge has exactly one color from a field F and named respectively F-rank-width
and F-bi-rank-width. The two notions are equivalent to clique-width. We then
present a notion of vertex-minor for F-colored graphs and prove that F-colored
graphs of bounded F-rank-width are characterised by a finite list of F-colored
graphs to exclude as vertex-minors. A cubic-time algorithm to decide whether a
F-colored graph has F-rank-width (resp. F-bi-rank-width) at most k, for fixed
k, is also given. Graph operations to check MSOL-definable properties on
F-colored graphs of bounded rank-width are presented. A specialisation of all
these notions to (directed) graphs without edge colors is presented, which
shows that our results generalise the ones in undirected graphs.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 16:17:20 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Oct 2007 07:31:35 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Mar 2008 10:01:47 GMT"
},
{
"version": "v4",
"created": "Mon, 26 Jul 2010 14:37:29 GMT"
},
{
"version": "v5",
"created": "Tue, 8 Jul 2014 11:24:47 GMT"
}
] | 2014-07-09T00:00:00 | [
[
"Kante",
"Mamadou Moustapha",
""
],
[
"Rao",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0709.1441 | Daniel Baum | Daniel S. Baum and Helmut B\"olcskei | Information-theoretic analysis of MIMO channel sounding | 99 pages, 14 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | The large majority of commercially available multiple-input multiple-output
(MIMO) radio channel measurement devices (sounders) is based on time-division
multiplexed switching (TDMS) of a single transmit/receive radio-frequency chain
into the elements of a transmit/receive antenna array. While being
cost-effective, such a solution can cause significant measurement errors due to
phase noise and frequency offset in the local oscillators. In this paper, we
systematically analyze the resulting errors and show that, in practice,
overestimation of channel capacity by several hundred percent can occur.
Overestimation is caused by phase noise (and to a lesser extent frequency
offset) leading to an increase of the MIMO channel rank. Our analysis
furthermore reveals that the impact of phase errors is, in general, most
pronounced if the physical channel has low rank (typical for line-of-sight or
poor scattering scenarios). The extreme case of a rank-1 physical channel is
analyzed in detail. Finally, we present measurement results obtained from a
commercially employed TDMS-based MIMO channel sounder. In the light of the
findings of this paper, the results obtained through MIMO channel measurement
campaigns using TDMS-based channel sounders should be interpreted with great
care.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 17:22:35 GMT"
}
] | 2007-09-11T00:00:00 | [
[
"Baum",
"Daniel S.",
""
],
[
"Bölcskei",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.1449 | Yue Li | Yue Li and Yu Liu | Supervised secure entanglement sharing for faithful quantum
teleportation via tripartite W states | 7 pages, 4 figures, revised the detection mode and security analysis,
added one successful eavesdropping rate plot in Fig. 3 | null | null | null | quant-ph cs.CR | null | We present a supervised secure entanglement sharing protocol via tripartite W
states for faithful quantum teleportation. By guaranteeing a secure
entanglement distribution in the charge of a third believed supervisor, quantum
information of an unknown state of a 2-level particle can be faithfully
teleported from the sender to the remote receiver via the Bell states distilled
from the tripartite W states. We emphasize that reliable teleportation after
our protocol between two communication parties depends on the agreement of the
supervisor to cooperate via taking the W states as both the quantum channel and
eavesdropping detector. The security against typical individual eavesdropping
attacks is proved and its experimental feasibility is briefly illustrated.
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 17:01:14 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Nov 2007 14:18:48 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Li",
"Yue",
""
],
[
"Liu",
"Yu",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.1500 | Shmuel Onn | Yael Berstein and Shmuel Onn | The Graver Complexity of Integer Programming | Improved Bound $\Omega(2^m)$ | Annals of Combinatorics, 13:289--296, 2009 | null | null | math.CO cs.CC cs.DM math.AC | null | In this article we establish an exponential lower bound on the Graver
complexity of integer programs. This provides new type of evidence supporting
the presumable intractability of integer programming. Specifically, we show
that the Graver complexity of the incidence matrix of the complete bipartite
graph $K_{3,m}$ satisfies $g(m)=\Omega(2^m)$, with $g(m)\geq 17\cdot 2^{m-3}-7$
for every $m>3$ .
| [
{
"version": "v1",
"created": "Mon, 10 Sep 2007 22:19:06 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Nov 2007 08:00:10 GMT"
}
] | 2010-06-07T00:00:00 | [
[
"Berstein",
"Yael",
""
],
[
"Onn",
"Shmuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0709.1516 | Marcus Hutter | Marcus Hutter | On Universal Prediction and Bayesian Confirmation | 24 pages | Theoretical Computer Science, 384 (2007) pages 33-48 | null | null | math.ST cs.IT cs.LG math.IT stat.ML stat.TH | null | The Bayesian framework is a well-studied and successful framework for
inductive reasoning, which includes hypothesis testing and confirmation,
parameter estimation, sequence prediction, classification, and regression. But
standard statistical guidelines for choosing the model class and prior are not
always available or fail, in particular in complex situations. Solomonoff
completed the Bayesian framework by providing a rigorous, unique, formal, and
universal choice for the model class and the prior. We discuss in breadth how
and in which sense universal (non-i.i.d.) sequence prediction solves various
(philosophical) problems of traditional Bayesian sequence prediction. We show
that Solomonoff's model possesses many desirable properties: Strong total and
weak instantaneous bounds, and in contrast to most classical continuous prior
densities has no zero p(oste)rior problem, i.e. can confirm universal
hypotheses, is reparametrization and regrouping invariant, and avoids the
old-evidence and updating problem. It even performs well (actually better) in
non-computable environments.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 01:39:20 GMT"
}
] | 2008-06-26T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0709.1647 | Joseph O'Rourke | Joseph O'Rourke | Unfolding Restricted Convex Caps | null | null | null | Smith Computer Science 086 | cs.CG | null | This paper details an algorithm for unfolding a class of convex polyhedra,
where each polyhedron in the class consists of a convex cap over a rectangular
base, with several restrictions: the cap's faces are quadrilaterals, with
vertices over an underlying integer lattice, and such that the cap convexity is
``radially monotone,'' a type of smoothness constraint. Extensions of Cauchy's
arm lemma are used in the proof of non-overlap.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 15:01:31 GMT"
}
] | 2007-09-12T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0709.1667 | Federico Ricci-Tersenghi | Andrea Montanari, Federico Ricci-Tersenghi and Guilhem Semerjian | Solving Constraint Satisfaction Problems through Belief
Propagation-guided decimation | 10 pages, 4 figures. A longer version can be found as arXiv:0904.3395
[cond-mat.dis-nn] | Proceedings of the 45th Annual Allerton Conference on
Communication, Control, and Computing (Monticello, IL, USA), 352-359 (2007) | null | null | cs.AI cond-mat.dis-nn cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Message passing algorithms have proved surprisingly successful in solving
hard constraint satisfaction problems on sparse random graphs. In such
applications, variables are fixed sequentially to satisfy the constraints.
Message passing is run after each step. Its outcome provides an heuristic to
make choices at next step. This approach has been referred to as `decimation,'
with reference to analogous procedures in statistical physics.
The behavior of decimation procedures is poorly understood. Here we consider
a simple randomized decimation algorithm based on belief propagation (BP), and
analyze its behavior on random k-satisfiability formulae. In particular, we
propose a tree model for its analysis and we conjecture that it provides
asymptotically exact predictions in the limit of large instances. This
conjecture is confirmed by numerical simulations.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 15:48:56 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Oct 2007 15:01:01 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Jun 2019 11:43:45 GMT"
}
] | 2019-06-05T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Ricci-Tersenghi",
"Federico",
""
],
[
"Semerjian",
"Guilhem",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.1674 | Amin Mobasher | Amin Mobasher and Amir K. Khandani | Matrix-Lifting Semi-Definite Programming for Decoding in Multiple
Antenna Systems | Submitted to IEEE Transaction on Information Theory, Aug. 2007 | null | null | Technical report UW-E&CE #2007-06 | cs.IT math.IT | null | This paper presents a computationally efficient decoder for multiple antenna
systems. The proposed algorithm can be used for any constellation (QAM or PSK)
and any labeling method. The decoder is based on matrix-lifting Semi-Definite
Programming (SDP). The strength of the proposed method lies in a new relaxation
algorithm applied to the method of Mobasher et al. This results in a reduction
of the number of variables from $(NK+1)^2$ to $(2N+K)^2$, where $N$ is the
number of antennas and $K$ is the number of constellation points in each real
dimension. Since the computational complexity of solving SDP is a polynomial
function of the number of variables, we have a significant complexity
reduction. Moreover, the proposed method offers a better performance as
compared to the best quasi-maximum likelihood decoding methods reported in the
literature.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 16:36:23 GMT"
}
] | 2007-09-12T00:00:00 | [
[
"Mobasher",
"Amin",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.1699 | Paul Fodor | Paul Fodor | Efficient Tabling Mechanisms for Transaction Logic Programs | null | null | null | null | cs.LO cs.AI | null | In this paper we present efficient evaluation algorithms for the Horn
Transaction Logic (a generalization of the regular Horn logic programs with
state updates). We present two complementary methods for optimizing the
implementation of Transaction Logic. The first method is based on tabling and
we modified the proof theory to table calls and answers on states (practically,
equivalent to dynamic programming). The call-answer table is indexed on the
call and a signature of the state in which the call was made. The answer
columns contain the answer unification and a signature of the state after the
call was executed. The states are signed efficiently using a technique based on
tries and counting. The second method is based on incremental evaluation and it
applies when the data oracle contains derived relations. The deletions and
insertions (executed in the transaction oracle) change the state of the
database. Using the heuristic of inertia (only a part of the state changes in
response to elementary updates), most of the time it is cheaper to compute only
the changes in the state than to recompute the entire state from scratch. The
two methods are complementary by the fact that the first method optimizes the
evaluation when a call is repeated in the same state, and the second method
optimizes the evaluation of a new state when a call-state pair is not found by
the tabling mechanism (i.e. the first method). The proof theory of Transaction
Logic with the application of tabling and incremental evaluation is sound and
complete with respect to its model theory.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 19:00:02 GMT"
}
] | 2007-09-12T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.1701 | Jean Dezert | Xinde Li (ICRL), Xinhan Huang (ICRL), Florentin Smarandache (UNM),
Jean Dezert (ONERA) | Enrichment of Qualitative Beliefs for Reasoning under Uncertainty | 12 pages | null | null | null | cs.AI | null | This paper deals with enriched qualitative belief functions for reasoning
under uncertainty and for combining information expressed in natural language
through linguistic labels. In this work, two possible enrichments (quantitative
and/or qualitative) of linguistic labels are considered and operators
(addition, multiplication, division, etc) for dealing with them are proposed
and explained. We denote them $qe$-operators, $qe$ standing for
"qualitative-enriched" operators. These operators can be seen as a direct
extension of the classical qualitative operators ($q$-operators) proposed
recently in the Dezert-Smarandache Theory of plausible and paradoxist reasoning
(DSmT). $q$-operators are also justified in details in this paper. The
quantitative enrichment of linguistic label is a numerical supporting degree in
$[0,\infty)$, while the qualitative enrichment takes its values in a finite
ordered set of linguistic values. Quantitative enrichment is less precise than
qualitative enrichment, but it is expected more close with what human experts
can easily provide when expressing linguistic labels with supporting degrees.
Two simple examples are given to show how the fusion of qualitative-enriched
belief assignments can be done.
| [
{
"version": "v1",
"created": "Tue, 11 Sep 2007 19:12:25 GMT"
}
] | 2007-09-12T00:00:00 | [
[
"Li",
"Xinde",
"",
"ICRL"
],
[
"Huang",
"Xinhan",
"",
"ICRL"
],
[
"Smarandache",
"Florentin",
"",
"UNM"
],
[
"Dezert",
"Jean",
"",
"ONERA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.1744 | Eric Feron | S. Bayraktar and E. Feron | Experiments with small helicopter automated landings at unusual
attitudes | 20 pages | null | null | null | cs.RO | null | This paper describes a set of experiments involving small helicopters landing
automated landing at unusual attitudes. By leveraging the increased agility of
small air vehicles, we show that it is possible to automatically land a small
helicopter on surfaces pitched at angles up to 60 degrees. Such maneuvers
require considerable agility from the vehicle and its avionics system, and they
pose significant technical and safety challenges. Our work builds upon previous
activities in human-inspired, high-agility flight for small rotorcraft.
However, it was not possible to leverage manual flight test data to extract
landing maneuvers due to stringent attitude and position control requirements.
Availability of low-cost, local navigation systems requiring no on-board
instrumentation has proven particularly important for these experiments to be
successful.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 02:16:44 GMT"
}
] | 2007-09-13T00:00:00 | [
[
"Bayraktar",
"S.",
""
],
[
"Feron",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0709.1771 | Heng Lian | Heng Lian | Variational local structure estimation for image super-resolution | 9 pages | null | null | null | cs.CV | null | Super-resolution is an important but difficult problem in image/video
processing. If a video sequence or some training set other than the given
low-resolution image is available, this kind of extra information can greatly
aid in the reconstruction of the high-resolution image. The problem is
substantially more difficult with only a single low-resolution image on hand.
The image reconstruction methods designed primarily for denoising is
insufficient for super-resolution problem in the sense that it tends to
oversmooth images with essentially no noise. We propose a new adaptive linear
interpolation method based on variational method and inspired by local linear
embedding (LLE). The experimental result shows that our method avoids the
problem of oversmoothing and preserves image structures well.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 08:41:36 GMT"
}
] | 2007-09-13T00:00:00 | [
[
"Lian",
"Heng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0709.1794 | Raphael M. Jungers | Raphael M. Jungers, Vladimir Y. Protasov, Vincent D. Blondel | Overlap-free words and spectra of matrices | 26 pages, 2 figures | null | null | null | cs.DM | null | Overlap-free words are words over the binary alphabet $A=\{a, b\}$ that do
not contain factors of the form $xvxvx$, where $x \in A$ and $v \in A^*$. We
analyze the asymptotic growth of the number $u_n$ of overlap-free words of
length $n$ as $ n \to \infty$. We obtain explicit formulas for the minimal and
maximal rates of growth of $u_n$ in terms of spectral characteristics (the
lower spectral radius and the joint spectral radius) of certain sets of
matrices of dimension $20 \times 20$. Using these descriptions we provide new
estimates of the rates of growth that are within 0.4% and $0.03 %$ of their
exact values. The best previously known bounds were within 11% and 3%
respectively. We then prove that the value of $u_n$ actually has the same rate
of growth for ``almost all'' natural numbers $n$. This ``average'' growth is
distinct from the maximal and minimal rates and can also be expressed in terms
of a spectral quantity (the Lyapunov exponent). We use this expression to
estimate it. In order to obtain our estimates, we introduce new algorithms to
compute spectral characteristics of sets of matrices. These algorithms can be
used in other contexts and are of independent interest.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 10:41:19 GMT"
}
] | 2007-09-13T00:00:00 | [
[
"Jungers",
"Raphael M.",
""
],
[
"Protasov",
"Vladimir Y.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.1920 | Aurelie Bugeau | Aurelie Bugeau (IRISA), Patrick P\'erez (IRISA) | Bandwidth selection for kernel estimation in mixed multi-dimensional
spaces | null | null | null | null | cs.CV | null | Kernel estimation techniques, such as mean shift, suffer from one major
drawback: the kernel bandwidth selection. The bandwidth can be fixed for all
the data set or can vary at each points. Automatic bandwidth selection becomes
a real challenge in case of multidimensional heterogeneous features. This paper
presents a solution to this problem. It is an extension of \cite{Comaniciu03a}
which was based on the fundamental property of normal distributions regarding
the bias of the normalized density gradient. The selection is done iteratively
for each type of features, by looking for the stability of local bandwidth
estimates across a predefined range of bandwidths. A pseudo balloon mean shift
filtering and partitioning are introduced. The validity of the method is
demonstrated in the context of color image segmentation based on a
5-dimensional space.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 16:02:25 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Sep 2007 08:35:21 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Bugeau",
"Aurelie",
"",
"IRISA"
],
[
"Pérez",
"Patrick",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0709.1934 | Petar Markovi\'c | Catarina Carvalho, V\'ictor Dalmau, Petar Markovi\'c and Mikl\'os
Mar\'oti | CD(4) has bounded width | null | null | null | null | math.LO cs.CC | null | We prove that the constraint languages invariant under a short sequence of
J\'onsson terms (containing at most three non-trivial ternary terms) are
tractable by showing that they have bounded width. This improves the previous
result by Kiss and Valeriote and presents some evidence that the Larose-Zadori
conjecture holds in the congruence-distributive case.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 17:26:10 GMT"
}
] | 2007-09-14T00:00:00 | [
[
"Carvalho",
"Catarina",
""
],
[
"Dalmau",
"Víctor",
""
],
[
"Marković",
"Petar",
""
],
[
"Maróti",
"Miklós",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.1941 | Pierre-Francois Marteau | Pierre-Fran\c{c}ois Marteau (VALORIA), Gildas G. M\'enier (VALORIA) | Speeding up Simplification of Polygonal Curves using Nested
Approximations | 12 pages + figures | Pattern Analysis & Applications (2008) 1-8 | 10.1007/s10044-008-0133-y | null | cs.CG | null | We develop a multiresolution approach to the problem of polygonal curve
approximation. We show theoretically and experimentally that, if the
simplification algorithm A used between any two successive levels of resolution
satisfies some conditions, the multiresolution algorithm MR will have a
complexity lower than the complexity of A. In particular, we show that if A has
a O(N2/K) complexity (the complexity of a reduced search dynamic solution
approach), where N and K are respectively the initial and the final number of
segments, the complexity of MR is in O(N).We experimentally compare the
outcomes of MR with those of the optimal "full search" dynamic programming
solution and of classical merge and split approaches. The experimental
evaluations confirm the theoretical derivations and show that the proposed
approach evaluated on 2D coastal maps either shows a lower complexity or
provides polygonal approximations closer to the initial curves.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 18:27:53 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Sep 2007 15:32:03 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Mar 2008 17:14:36 GMT"
}
] | 2008-07-22T00:00:00 | [
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
],
[
"Ménier",
"Gildas G.",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0709.1942 | Joseph O'Rourke | Mirela Damian, Robin Flatland, Joseph O'Rourke, Suneeta Ramaswami | Connecting Polygonizations via Stretches and Twangs | 15 pages, 14 figures, 3 appendices | null | null | null | cs.CG cs.DM | null | We show that the space of polygonizations of a fixed planar point set S of n
points is connected by O(n^2) ``moves'' between simple polygons. Each move is
composed of a sequence of atomic moves called ``stretches'' and ``twangs''.
These atomic moves walk between weakly simple ``polygonal wraps'' of S. These
moves show promise to serve as a basis for generating random polygons.
| [
{
"version": "v1",
"created": "Wed, 12 Sep 2007 18:38:54 GMT"
}
] | 2007-09-13T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Ramaswami",
"Suneeta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.2016 | Konstantin Avrachenkov | Konstantin Avrachenkov, Nelly Litvak, Kim Son Pham | Distribution of PageRank Mass Among Principle Components of the Web | null | null | null | null | cs.NI cs.DS | null | We study the PageRank mass of principal components in a bow-tie Web Graph, as
a function of the damping factor c. Using a singular perturbation approach, we
show that the PageRank share of IN and SCC components remains high even for
very large values of the damping factor, in spite of the fact that it drops to
zero when c goes to one. However, a detailed study of the OUT component reveals
the presence ``dead-ends'' (small groups of pages linking only to each other)
that receive an unfairly high ranking when c is close to one. We argue that
this problem can be mitigated by choosing c as small as 1/2.
| [
{
"version": "v1",
"created": "Thu, 13 Sep 2007 08:29:53 GMT"
}
] | 2007-09-14T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
""
],
[
"Litvak",
"Nelly",
""
],
[
"Pham",
"Kim Son",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0709.2065 | Andrei Khrennikov | Andrei Khrennikov | Toward Psycho-robots | null | Paladyn Volume 1, Number 2, 99-108, 2010 | 10.2478/s13230-010-0014-0 | null | cs.AI | null | We try to perform geometrization of psychology by representing mental states,
<<ideas>>, by points of a metric space, <<mental space>>. Evolution of ideas is
described by dynamical systems in metric mental space. We apply the mental
space approach for modeling of flows of unconscious and conscious information
in the human brain. In a series of models, Models 1-4, we consider cognitive
systems with increasing complexity of psychological behavior determined by
structure of flows of ideas. Since our models are in fact models of the
AI-type, one immediately recognizes that they can be used for creation of
AI-systems, which we call psycho-robots, exhibiting important elements of human
psyche. Creation of such psycho-robots may be useful improvement of domestic
robots. At the moment domestic robots are merely simple working devices (e.g.
vacuum cleaners or lawn mowers) . However, in future one can expect demand in
systems which be able not only perform simple work tasks, but would have
elements of human self-developing psyche. Such AI-psyche could play an
important role both in relations between psycho-robots and their owners as well
as between psycho-robots. Since the presence of a huge numbers of
psycho-complexes is an essential characteristic of human psychology, it would
be interesting to model them in the AI-framework.
| [
{
"version": "v1",
"created": "Thu, 13 Sep 2007 13:06:34 GMT"
}
] | 2010-11-30T00:00:00 | [
[
"Khrennikov",
"Andrei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.2074 | Vladimir Gudkov | V. Gudkov and V. Montealegre | Generalized entropies and open random and scale-free networks | talk at CTNEXT07 (July 2007) | null | 10.1063/1.2828754 | null | cond-mat.dis-nn cs.NI physics.soc-ph | null | We propose the concept of open network as an arbitrary selection of nodes of
a large unknown network. Using the hypothesis that information of the whole
network structure can be extrapolated from an arbitrary set of its nodes, we
use Renyi mutual entropies in different q-orders to establish the minimum
critical size of a random set of nodes that represents reliably the information
of the main network structure. We also identify the clusters of nodes
responsible for the structure of their containing network.
| [
{
"version": "v1",
"created": "Thu, 13 Sep 2007 13:37:58 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Gudkov",
"V.",
""
],
[
"Montealegre",
"V.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0709.2196 | Frank Nielsen | Frank Nielsen, Jean-Daniel Boissonnat, Richard Nock | Bregman Voronoi Diagrams: Properties, Algorithms and Applications | Extend the proceedings abstract of SODA 2007 (46 pages, 15 figures) | Discrete & Computational Geometry volume 44, pages281-307(2010) | 10.1007/s00454-010-9256-1 | null | cs.CG | null | The Voronoi diagram of a finite set of objects is a fundamental geometric
structure that subdivides the embedding space into regions, each region
consisting of the points that are closer to a given object than to the others.
We may define many variants of Voronoi diagrams depending on the class of
objects, the distance functions and the embedding space. In this paper, we
investigate a framework for defining and building Voronoi diagrams for a broad
class of distance functions called Bregman divergences. Bregman divergences
include not only the traditional (squared) Euclidean distance but also various
divergence measures based on entropic functions. Accordingly, Bregman Voronoi
diagrams allow to define information-theoretic Voronoi diagrams in statistical
parametric spaces based on the relative entropy of distributions. We define
several types of Bregman diagrams, establish correspondences between those
diagrams (using the Legendre transformation), and show how to compute them
efficiently. We also introduce extensions of these diagrams, e.g. k-order and
k-bag Bregman Voronoi diagrams, and introduce Bregman triangulations of a set
of points and their connexion with Bregman Voronoi diagrams. We show that these
triangulations capture many of the properties of the celebrated Delaunay
triangulation. Finally, we give some applications of Bregman Voronoi diagrams
which are of interest in the context of computational geometry and machine
learning.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 01:31:17 GMT"
}
] | 2020-10-01T00:00:00 | [
[
"Nielsen",
"Frank",
""
],
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Nock",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0709.2201 | Jesse Gilbert D | Jesse Gilbert | A complete proof of The Graceful Tree Conjecture using the concept of
Edge Degree | This paper has been withdrawn by the author | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show the Graceful Tree Conjecture holds.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 17:31:22 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Sep 2007 04:35:57 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Sep 2007 21:18:17 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Sep 2007 01:21:11 GMT"
},
{
"version": "v5",
"created": "Fri, 21 Sep 2007 21:44:44 GMT"
},
{
"version": "v6",
"created": "Fri, 5 Oct 2007 10:14:01 GMT"
},
{
"version": "v7",
"created": "Tue, 13 May 2008 22:41:41 GMT"
},
{
"version": "v8",
"created": "Wed, 14 Jan 2009 00:46:23 GMT"
},
{
"version": "v9",
"created": "Thu, 29 Jul 2010 20:46:42 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Gilbert",
"Jesse",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.2224 | Marius Buliga | Marius Buliga | Self-similar dilatation structures and automata | null | Proceedings of the Sixth Congress of Romanian Mahematicians,
Bucharest 2007, vol. 1, 557-564 | null | null | math.MG cs.DM | null | We show that on the boundary of the dyadic tree, any self-similar dilatation
structure induces a web of interacting automata. This is a short version, for
publication, of the paper arXiv:math/0612509v2
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 07:56:03 GMT"
}
] | 2009-06-13T00:00:00 | [
[
"Buliga",
"Marius",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.2225 | Ananthanarayanan Chockalingam | T. Srikanth, K. Vishnu Vardhan, A. Chockalingam, and L. B. Milstein | Improved Linear Parallel Interference Cancellers | Accepted in IEEE Trans. on Wireless Communications | null | null | null | cs.IT cs.SC cs.SD cs.SE math.IT | null | In this paper, taking the view that a linear parallel interference canceller
(LPIC) can be seen as a linear matrix filter, we propose new linear matrix
filters that can result in improved bit error performance compared to other
LPICs in the literature. The motivation for the proposed filters arises from
the possibility of avoiding the generation of certain interference and noise
terms in a given stage that would have been present in a conventional LPIC
(CLPIC). In the proposed filters, we achieve such avoidance of the generation
of interference and noise terms in a given stage by simply making the diagonal
elements of a certain matrix in that stage equal to zero. Hence, the proposed
filters do not require additional complexity compared to the CLPIC, and they
can allow achieving a certain error performance using fewer LPIC stages. We
also extend the proposed matrix filter solutions to a multicarrier DS-CDMA
system, where we consider two types of receivers. In one receiver (referred to
as Type-I receiver), LPIC is performed on each subcarrier first, followed by
multicarrier combining (MCC). In the other receiver (called Type-II receiver),
MCC is performed first, followed by LPIC. We show that in both Type-I and
Type-II receivers, the proposed matrix filters outperform other matrix filters.
Also, Type-II receiver performs better than Type-I receiver because of enhanced
accuracy of the interference estimates achieved due to frequency diversity
offered by MCC.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 07:56:21 GMT"
}
] | 2007-09-17T00:00:00 | [
[
"Srikanth",
"T.",
""
],
[
"Vardhan",
"K. Vishnu",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Milstein",
"L. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2252 | Mathias Boc | Mathias Boc, Anne Fladenmuller and Marcelo dias de Amorim | Otiy: Loactors tracking nodes | null | null | null | null | cs.NI | null | We propose Otiy, a node-centric location service that limits the impact of
location updates generate by mobile nodes in IEEE802.11-based wireless mesh
networks. Existing location services use node identifiers to determine the
locator (aka anchor) that is responsible for keeping track of a node's
location. Such a strategy can be inefficient because: (i) identifiers give no
clue on the node's mobility and (ii) locators can be far from the
source/destination shortest path, which increases both location delays and
bandwidth consumption. To solve these issues, Otiy introduces a new strategy
that identifies nodes to play the role of locators based on the likelihood of a
destination to be close to these nodes- i.e., locators are identified depending
on the mobility pattern of nodes. Otiy relies on the cyclic mobility patterns
of nodes and creates a slotted agenda composed of a set of predicted locations,
defined according to the past and present patterns of mobility. Correspondent
nodes fetch this agenda only once and use it as a reference for identifying
which locators are responsible for the node at different points in time. Over a
period of about one year, the weekly proportion of nodes having at least 50% of
exact location predictions is in average about 75%. This proportion increases
by 10% when nodes also consider their closeness to the locator from only what
they know about the network.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 10:21:45 GMT"
}
] | 2007-09-17T00:00:00 | [
[
"Boc",
"Mathias",
""
],
[
"Fladenmuller",
"Anne",
""
],
[
"de Amorim",
"Marcelo dias",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.2330 | Gusztav Morvai | L. Gyorfi, G. Morvai | Queueing for ergodic arrivals and services | Queueing for ergodic arrivals and services. In Limit Theorems in
Probability and Statistics, I. Berkes E. Csaki, M. Csorgo (Eds.), pp.
127-141, J. Bolyai Mathematical Society, 2002 | In Limit Theorems in Probability and Statistics, I. Berkes E.
Csaki, M. Csorgo (Eds.), pp. 127-141, J. Bolyai Mathematical Society, 2002 | null | null | math.PR cs.IT math.IT | null | In this paper we revisit the results of Loynes (1962) on stability of queues
for ergodic arrivals and services, and show examples when the arrivals are
bounded and ergodic, the service rate is constant, and under stability the
limit distribution has larger than exponential tail.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 15:31:48 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Gyorfi",
"L.",
""
],
[
"Morvai",
"G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2346 | Pilar Albert | Pilar Albert, Elvira Mayordomo, Philippe Moser, Sylvain Perifel | Pushdown Compression | null | null | null | null | cs.IT cs.CC math.IT | null | The pressing need for eficient compression schemes for XML documents has
recently been focused on stack computation [6, 9], and in particular calls for
a formulation of information-lossless stack or pushdown compressors that allows
a formal analysis of their performance and a more ambitious use of the stack in
XML compression, where so far it is mainly connected to parsing mechanisms. In
this paper we introduce the model of pushdown compressor, based on pushdown
transducers that compute a single injective function while keeping the widest
generality regarding stack computation. The celebrated Lempel-Ziv algorithm
LZ78 [10] was introduced as a general purpose compression algorithm that
outperforms finite-state compressors on all sequences. We compare the
performance of the Lempel-Ziv algorithm with that of the pushdown compressors,
or compression algorithms that can be implemented with a pushdown transducer.
This comparison is made without any a priori assumption on the data's source
and considering the asymptotic compression ratio for infinite sequences. We
prove that Lempel-Ziv is incomparable with pushdown compressors.
| [
{
"version": "v1",
"created": "Fri, 14 Sep 2007 17:00:09 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Sep 2007 11:15:58 GMT"
}
] | 2007-09-17T00:00:00 | [
[
"Albert",
"Pilar",
""
],
[
"Mayordomo",
"Elvira",
""
],
[
"Moser",
"Philippe",
""
],
[
"Perifel",
"Sylvain",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2401 | Timothy Baldwin | Timothy Baldwin | Bootstrapping Deep Lexical Resources: Resources for Courses | null | In Proceedings of the ACL-SIGLEX 2005 Workshop on Deep Lexical
Acquisition, Ann Arbor, USA, pp. 67-76 | null | null | cs.CL | null | We propose a range of deep lexical acquisition methods which make use of
morphological, syntactic and ontological language resources to model word
similarity and bootstrap from a seed lexicon. The different methods are
deployed in learning lexical items for a precision grammar, and shown to each
have strengths and weaknesses over different word classes. A particular focus
of this paper is the relative accessibility of different language resource
types, and predicted ``bang for the buck'' associated with each in deep lexical
acquisition applications.
| [
{
"version": "v1",
"created": "Sat, 15 Sep 2007 01:37:21 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Baldwin",
"Timothy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0709.2405 | J. Maurice Rojas | Joel Gomez, Andrew Niles, and J. Maurice Rojas | New Complexity Bounds for Certain Real Fewnomial Zero Sets | 8 pages, no figures. Extended abstract accepted and presented at MEGA
(Effective Methods in Algebraic Geometry) 2007 | null | null | null | math.AG cs.CG | null | Consider real bivariate polynomials f and g, respectively having 3 and m
monomial terms. We prove that for all m>=3, there are systems of the form (f,g)
having exactly 2m-1 roots in the positive quadrant. Even examples with m=4
having 7 positive roots were unknown before this paper, so we detail an
explicit example of this form. We also present an O(n^{11}) upper bound for the
number of diffeotopy types of the real zero set of an n-variate polynomial with
n+4 monomial terms.
| [
{
"version": "v1",
"created": "Sat, 15 Sep 2007 06:28:46 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Gomez",
"Joel",
""
],
[
"Niles",
"Andrew",
""
],
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0709.2410 | Gesualdo Scutari | Gesualdo Scutari, Sergio Barbarossa, Loreto Pescosolido | Distributed Decision Through Self-Synchronizing Sensor Networks in the
Presence of Propagation Delays and Asymmetric Channels | To be published on IEEE Transactions on Signal Processing | null | 10.1109/TSP.2007.909377 | null | cs.MA cs.DC | null | In this paper we propose and analyze a distributed algorithm for achieving
globally optimal decisions, either estimation or detection, through a
self-synchronization mechanism among linearly coupled integrators initialized
with local measurements. We model the interaction among the nodes as a directed
graph with weights (possibly) dependent on the radio channels and we pose
special attention to the effect of the propagation delay occurring in the
exchange of data among sensors, as a function of the network geometry. We
derive necessary and sufficient conditions for the proposed system to reach a
consensus on globally optimal decision statistics. One of the major results
proved in this work is that a consensus is reached with exponential convergence
speed for any bounded delay condition if and only if the directed graph is
quasi-strongly connected. We provide a closed form expression for the global
consensus, showing that the effect of delays is, in general, the introduction
of a bias in the final decision. Finally, we exploit our closed form expression
to devise a double-step consensus mechanism able to provide an unbiased
estimate with minimum extra complexity, without the need to know or estimate
the channel parameters.
| [
{
"version": "v1",
"created": "Sat, 15 Sep 2007 08:40:18 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Sep 2007 15:29:37 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Barbarossa",
"Sergio",
""
],
[
"Pescosolido",
"Loreto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.2445 | Yi Su | Yi Su and Mihaela van der Schaar | A Simple Characterization of Strategic Behaviors in Broadcast Channels | 10 pages, 3 figures | null | 10.1109/LSP.2007.910259 | null | cs.IT cs.GT math.IT | null | In this paper, we consider the problem of resource allocation among two
competing users sharing a binary symmetric broadcast channel. We model the
interaction between autonomous selfish users in the resource allocation and
analyze their strategic behavior in manipulating the allocation outcome. We
analytically show that users will improve their performance (i.e. gain higher
allocated rates) if they have more information about the strategy of the
competing user.
| [
{
"version": "v1",
"created": "Sat, 15 Sep 2007 20:32:10 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2446 | Fangwen Fu | Fangwen Fu, Mihaela van der Schaar | Learning for Dynamic Bidding in Cognitive Radio Resources | 29pages, 6 figures | null | null | null | cs.LG cs.GT | null | In this paper, we model the various wireless users in a cognitive radio
network as a collection of selfish, autonomous agents that strategically
interact in order to acquire the dynamically available spectrum opportunities.
Our main focus is on developing solutions for wireless users to successfully
compete with each other for the limited and time-varying spectrum
opportunities, given the experienced dynamics in the wireless network. We
categorize these dynamics into two types: one is the disturbance due to the
environment (e.g. wireless channel conditions, source traffic characteristics,
etc.) and the other is the impact caused by competing users. To analyze the
interactions among users given the environment disturbance, we propose a
general stochastic framework for modeling how the competition among users for
spectrum opportunities evolves over time. At each stage of the dynamic resource
allocation, a central spectrum moderator auctions the available resources and
the users strategically bid for the required resources. The joint bid actions
affect the resource allocation and hence, the rewards and future strategies of
all users. Based on the observed resource allocation and corresponding rewards
from previous allocations, we propose a best response learning algorithm that
can be deployed by wireless users to improve their bidding policy at each
stage. The simulation results show that by deploying the proposed best response
learning algorithm, the wireless users can significantly improve their own
performance in terms of both the packet loss rate and the incurred cost for the
used resources.
| [
{
"version": "v1",
"created": "Sat, 15 Sep 2007 20:48:57 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Fu",
"Fangwen",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
Subsets and Splits