id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0709.2506 | Tshilidzi Marwala | Vukosi N. Marivate, Fulufhelo V. Nelwamodo, Tshilidzi Marwala | Autoencoder, Principal Component Analysis and Support Vector Regression
for Data Imputation | 9 pages | null | null | null | cs.AI cs.DB | null | Data collection often results in records that have missing values or
variables. This investigation compares 3 different data imputation models and
identifies their merits by using accuracy measures. Autoencoder Neural
Networks, Principal components and Support Vector regression are used for
prediction and combined with a genetic algorithm to then impute missing
variables. The use of PCA improves the overall performance of the autoencoder
network while the use of support vector regression shows promising potential
for future investigation. Accuracies of up to 97.4 % on imputation of some of
the variables were achieved.
| [
{
"version": "v1",
"created": "Sun, 16 Sep 2007 18:15:01 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Marivate",
"Vukosi N.",
""
],
[
"Nelwamodo",
"Fulufhelo V.",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0709.2512 | Chao Chen | Chao Chen, Daniel Freedman | Quantifying Homology Classes II: Localization and Stability | The "companion paper" referred in this paper is another version of
the paper "Measuring and localizing homology classes" by the same authors.
Sept. 21st: authors name fixed | null | null | null | cs.CG cs.CC math.AT | null | In the companion paper, we measured homology classes and computed the optimal
homology basis. This paper addresses two related problems, namely, localization
and stability. We localize a class with the cycle minimizing a certain
objective function. We explore three different objective functions, namely,
volume, diameter and radius. We show that it is NP-hard to compute the smallest
cycle using the former two. We also prove that the measurement defined in the
companion paper is stable with regard to small changes of the geometry of the
concerned space.
| [
{
"version": "v1",
"created": "Sun, 16 Sep 2007 20:48:49 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Sep 2007 16:41:02 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Chen",
"Chao",
""
],
[
"Freedman",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
0709.2525 | Jesse Gilbert D | Jesse Gilbert | H-Decompositions | This paper has been withdrawn by the author | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that for all graphs H of size n, the complete graph $K_{2n+1}$ has an
$H$-decomposition.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 04:30:39 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Oct 2007 10:19:59 GMT"
},
{
"version": "v3",
"created": "Mon, 12 May 2008 22:03:55 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Sep 2008 16:58:22 GMT"
},
{
"version": "v5",
"created": "Thu, 29 Jul 2010 20:46:27 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Gilbert",
"Jesse",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.2562 | Paolo Laureti | Marcel Blattner, Alexander Hunziker, Paolo Laureti | When are recommender systems useful? | null | null | null | null | cs.IR cs.CY cs.DL cs.DS physics.data-an physics.soc-ph | null | Recommender systems are crucial tools to overcome the information overload
brought about by the Internet. Rigorous tests are needed to establish to what
extent sophisticated methods can improve the quality of the predictions. Here
we analyse a refined correlation-based collaborative filtering algorithm and
compare it with a novel spectral method for recommending. We test them on two
databases that bear different statistical properties (MovieLens and Jester)
without filtering out the less active users and ordering the opinions in time,
whenever possible. We find that, when the distribution of user-user
correlations is narrow, simple averages work nearly as well as advanced
methods. Recommender systems can, on the other hand, exploit a great deal of
additional information in systems where external influence is negligible and
peoples' tastes emerge entirely. These findings are validated by simulations
with artificially generated data.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 09:27:07 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Blattner",
"Marcel",
""
],
[
"Hunziker",
"Alexander",
""
],
[
"Laureti",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0709.2598 | Holger Schnettler | Holger Schnettler | On the 3/4-Conjecture for Fix-Free Codes -- A Survey | null | null | null | null | cs.IT math.CO math.IT | null | In this survey we concern ourself with the question, wether there exists a
fix-free code for a given sequence of codeword lengths. For a given alphabet,
we obtain the {\em Kraftsum} of a code, if we divide for every length the
number of codewords of this length in the code by the total number of all
possible words of this length and then take summation over all codeword lengths
which appears in the code. The same way the Kraftsum of a lengths sequence
$(l_1,..., l_n) $ is given by $\sum_{i=1}^n q^{-l_i} $, where $q$ is the
numbers of letters in the alphabet. Kraft and McMillan have shown in
\cite{kraft} (1956), that there exists a prefix-free code with codeword lengths
of a certain lengths sequence, if the Kraftsum of the lengths sequence is
smaller than or equal to one. Furthermore they have shown, that the converse
also holds for all (uniquely decipherable) codes.\footnote{In this survey a
code means a set of words, such that any message which is encoded with these
words can be uniquely decoded. Therefore we omit in future the "uniquely
decipherable" and write only "code".} The question rises, if Kraft's and
McMillan's result can be generalized to other types of codes? Throughout, we
try to give an answer on this question for the class of fix-free codes. Since
any code has Kraftsum smaller than or equal to one, this answers the question
for the second implication of Kraft-McMillan's theorem. Therefore we pay
attention mainly to the first implication.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 12:10:29 GMT"
}
] | 2007-09-18T00:00:00 | [
[
"Schnettler",
"Holger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2618 | Andreea Picu | Andreea Picu (CITI, INRIA Rh\^one-Alpes), Antoine Fraboulet (CITI,
INRIA Rh\^one-Alpes), Eric Fleury (CITI, INRIA Rh\^one-Alpes) | On Frequency Optimisation for Power Saving in WSNs: Finding Optimum
Hardware Timers Frequencies | null | null | null | RR-6290 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless Sensor Networks research and demand are now in full expansion, since
people came to understand these are the key to a large number of issues in
industry, commerce, home automation, healthcare, agriculture and environment,
monitoring, public safety etc. One of the most challenging research problems in
sensor networks research is power awareness and power-saving techniques. In
this master's thesis, we have studied one particular power-saving technique,
i.e. frequency scaling. In particular, we analysed the close relationship
between clock frequencies in a microcontroller and several types of constraints
imposed on these frequencies, e.g. by other components of the microcontroller,
by protocol specifications, by external factors etc. Among these constraints,
we were especially interested in the ones imposed by the timer service and by
the serial ports' transmission rates. Our efforts resulted in a microcontroller
configuration management tool which aims at assisting application programmers
in choosing microcontroller configurations, in function of the particular needs
and constraints of their application.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 06:25:50 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Feb 2012 14:50:50 GMT"
}
] | 2012-02-28T00:00:00 | [
[
"Picu",
"Andreea",
"",
"CITI, INRIA Rhône-Alpes"
],
[
"Fraboulet",
"Antoine",
"",
"CITI,\n INRIA Rhône-Alpes"
],
[
"Fleury",
"Eric",
"",
"CITI, INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.2635 | Greg Kohring | G.A. Kohring and L. Lo Iacono | Non-Blocking Signature of very large SOAP Messages | 13 pages, 5 figures | in H.-G. Hegering, A. Lehmann, H.J. Ohlbach and C. Scheideler,
eds., INFORMATIK 2008, Beherrschbare Systeme - dank Informatik (Koellen Druck
& Verlag GmbH, Bonn, 2008). | null | null | cs.DC | null | Data transfer and staging services are common components in Grid-based, or
more generally, in service-oriented applications. Security mechanisms play a
central role in such services, especially when they are deployed in sensitive
application fields like e-health. The adoption of WS-Security and related
standards to SOAP-based transfer services is, however, problematic as a
straightforward adoption of SOAP with MTOM introduces considerable
inefficiencies in the signature generation process when large data sets are
involved. This paper proposes a non-blocking, signature generation approach
enabling a stream-like processing with considerable performance enhancements.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 13:50:42 GMT"
}
] | 2009-04-01T00:00:00 | [
[
"Kohring",
"G. A.",
""
],
[
"Iacono",
"L. Lo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.2689 | Kettani Omar | Omar Kettani | An algorithm for solving the Independent Set problem | This paper has been withdrawn | null | null | null | cs.DM | null | This paper has been withdrawn by the author, due an error in claim 1.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 18:13:10 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Sep 2007 09:17:50 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Sep 2007 05:00:31 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Kettani",
"Omar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.2721 | Yufang Xi | Yufang Xi and Edmund M. Yeh | Pricing, Competition, and Routing for Selfish and Strategic Nodes in
Multi-hop Relay Networks | 28 pages, 8 figures, submitted to JSAC on Game Theory in
Communication Systems | null | null | null | cs.GT | null | We study a pricing game in multi-hop relay networks where nodes price their
services and route their traffic selfishly and strategically. In this game,
each node (1) announces pricing functions which specify the payments it demands
from its respective customers depending on the amount of traffic they route to
it and (2) allocates the total traffic it receives to its service providers.
The profit of a node is the difference between the revenue earned from
servicing others and the cost of using others' services. We show that the
socially optimal routing of such a game can always be induced by an equilibrium
where no node can increase its profit by unilaterally changing its pricing
functions or routing decision. On the other hand, there may also exist
inefficient equilibria. We characterize the loss of efficiency by deriving the
price of anarchy at inefficient equilibria. We show that the price of anarchy
is finite for oligopolies with concave marginal cost functions, while it is
infinite for general topologies and cost functions.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2007 20:52:29 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Oct 2007 17:16:17 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"Xi",
"Yufang",
""
],
[
"Yeh",
"Edmund M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0709.2813 | Luca Giuzzi | L. Giuzzi, A. Sonnino | LDPC codes from Singer cycles | 11 Pages | Discrete Applied Mathematics 157: 1723-1728 (2009) | 10.1016/j.dam.2009.01.013 | null | cs.IT math.IT | null | The main goal of coding theory is to devise efficient systems to exploit the
full capacity of a communication channel, thus achieving an arbitrarily small
error probability. Low Density Parity Check (LDPC) codes are a family of block
codes--characterised by admitting a sparse parity check matrix--with good
correction capabilities. In the present paper the orbits of subspaces of a
finite projective space under the action of a Singer cycle are investigated.
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2007 15:17:21 GMT"
}
] | 2009-07-18T00:00:00 | [
[
"Giuzzi",
"L.",
""
],
[
"Sonnino",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2831 | Monique Teillaud | Mridul Aanjaneya, Monique Teillaud (INRIA Sophia Antipolis) | Triangulating the Real Projective Plane | null | null | null | null | cs.CG | null | We consider the problem of computing a triangulation of the real projective
plane P2, given a finite point set S={p1, p2,..., pn} as input. We prove that a
triangulation of P2 always exists if at least six points in S are in general
position, i.e., no three of them are collinear. We also design an algorithm for
triangulating P2 if this necessary condition holds. As far as we know, this is
the first computational result on the real projective plane.
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2007 15:36:38 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Dec 2007 15:23:14 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Aanjaneya",
"Mridul",
"",
"INRIA Sophia Antipolis"
],
[
"Teillaud",
"Monique",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0709.2833 | B.Sundar Rajan | G. Susinder Rajan and B. Sundar Rajan | Distributed Space Time Codes with Low Decoding Complexity for
Asynchronous Relay Networks | A technical report of DRDO-IISc Programme on Advanced Research in
Mathematical Engineering, Indian Institute of Science, Bangalore, India | null | null | TR-PME-2007-09 | cs.IT math.IT | null | Recently Li and Xia have proposed a transmission scheme for wireless relay
networks based on the Alamouti space time code and orthogonal frequency
division multiplexing to combat the effect of timing errors at the relay nodes.
This transmission scheme is amazingly simple and achieves a diversity order of
two for any number of relays. Motivated by its simplicity, this scheme is
extended to a more general transmission scheme that can achieve full
cooperative diversity for any number of relays. The conditions on the
distributed space time code (DSTC) structure that admit its application in the
proposed transmission scheme are identified and it is pointed out that the
recently proposed full diversity four group decodable DSTCs from precoded
co-ordinate interleaved orthogonal designs and extended Clifford algebras
satisfy these conditions. It is then shown how differential encoding at the
source can be combined with the proposed transmission scheme to arrive at a new
transmission scheme that can achieve full cooperative diversity in asynchronous
wireless relay networks with no channel information and also no timing error
knowledge at the destination node. Finally, four group decodable distributed
differential space time codes applicable in this new transmission scheme for
power of two number of relays are also provided.
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2007 14:14:59 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2851 | Marios Kountouris | David Gesbert, Marios Kountouris | Joint power control and user scheduling in multicell wireless networks:
Capacity scaling laws | Submitted to IEEE Transactions on Information Theory, Sept. 2007 | null | null | null | cs.IT math.IT | null | We address the optimization of the sum rate performance in multicell
interference-limited singlehop networks where access points are allowed to
cooperate in terms of joint resource allocation. The resource allocation
policies considered here combine power control and user scheduling. Although
very promising from a conceptual point of view, the optimization of the sum of
per-link rates hinges, in principle, on tough issues such as computational
complexity and the requirement for heavy receiver-to-transmitter channel
information feedback across all network cells. In this paper, we show that, in
fact, distributed algorithms are actually obtainable in the asymptotic regime
where the numbers of users per cell is allowed to grow large. Additionally,
using extreme value theory, we provide scaling laws for upper and lower bounds
for the network capacity (sum of single user rates over all cells),
corresponding to zero-interference and worst-case interference scenarios. We
show that the scaling is either dominated by path loss statistics or by
small-scale fading, depending on the regime and user location scenario. We show
that upper and lower rate bounds behave in fact identically, asymptotically.
This remarkable result suggests not only that distributed resource allocation
is practically possible but also that the impact of multicell interference on
the capacity (in terms of scaling) actually vanishes asymptotically.
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2007 15:35:05 GMT"
}
] | 2007-09-19T00:00:00 | [
[
"Gesbert",
"David",
""
],
[
"Kountouris",
"Marios",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.2935 | Eberhard H.-A. Gerbracht | Eberhard H.-A. Gerbracht | An Extension to an Algebraic Method for Linear Time-Invariant System and
Network Theory: The full AC-Calculus | V1: documentclass IEEEtran, 6 pages, 1 figure. Re-release of the
printed version, with some minor typographical errors corrected | Proceedings of the Fifth International Workshop on Symbolic
Methods and Applications in Circuit Design, SMACD '98, Kaiserslautern,
October 8-9, 1998; The SMACD Committee (Ed.); pp. 134-139; ISSN 1029-9505 | null | null | math.CA cs.SC | null | Being inspired by phasor analysis in linear circuit theory, and its algebraic
counterpart - the AC-(operational)-calculus for sinusoids developed by W.
Marten and W. Mathis - we define a complex structure on several spaces of
real-valued elementary functions. This is used to algebraize inhomogeneous
linear ordinary differential equations with inhomogenities stemming from these
spaces. Thus we deduce an effective method to calculate particular solutions of
these ODEs in a purely algebraic way.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 00:17:40 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Gerbracht",
"Eberhard H. -A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0709.2961 | Andreas Schutt | Andreas Schutt and Peter J. Stuckey | Incremental Satisfiability and Implication for UTVPI Constraints | 14 pages, 1 figure | null | null | null | cs.DS cs.CG cs.LO | null | Unit two-variable-per-inequality (UTVPI) constraints form one of the largest
class of integer constraints which are polynomial time solvable (unless P=NP).
There is considerable interest in their use for constraint solving, abstract
interpretation, spatial databases, and theorem proving. In this paper we
develop a new incremental algorithm for UTVPI constraint satisfaction and
implication checking that requires O(m + n log n + p) time and O(n+m+p) space
to incrementally check satisfiability of m UTVPI constraints on n variables and
check implication of p UTVPI constraints.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 06:58:05 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Schutt",
"Andreas",
""
],
[
"Stuckey",
"Peter J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.2962 | Pascal Weil | Zoltan Esik, Pascal Weil (LaBRI) | Algebraic characterization of logically defined tree languages | 46 pages. Version 3: various local improvements (more typos
corrected, and "intuitive" explanations added) | International Journal of Algebra and Computation 20 (2010) 195-239 | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an algebraic characterization of the tree languages that are defined
by logical formulas using certain Lindstr\"om quantifiers. An important
instance of our result concerns first-order definable tree languages. Our
characterization relies on the usage of preclones, an algebraic structure
introduced by the authors in a previous paper, and of the block product
operation on preclones. Our results generalize analogous results on finite word
languages, but it must be noted that, as they stand, they do not yield an
algorithm to decide whether a given regular tree language is first-order
definable.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 07:14:08 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jan 2009 16:01:23 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jan 2009 07:08:38 GMT"
}
] | 2010-06-21T00:00:00 | [
[
"Esik",
"Zoltan",
"",
"LaBRI"
],
[
"Weil",
"Pascal",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0709.3013 | Patrick Heas | Patrick H\'eas (IRISA), Mihai Datcu (DLR, Oberpfaffenhofen) | Supervised learning on graphs of spatio-temporal similarity in satellite
image sequences | null | null | null | null | cs.CV | null | High resolution satellite image sequences are multidimensional signals
composed of spatio-temporal patterns associated to numerous and various
phenomena. Bayesian methods have been previously proposed in (Heas and Datcu,
2005) to code the information contained in satellite image sequences in a graph
representation using Bayesian methods. Based on such a representation, this
paper further presents a supervised learning methodology of semantics
associated to spatio-temporal patterns occurring in satellite image sequences.
It enables the recognition and the probabilistic retrieval of similar events.
Indeed, graphs are attached to statistical models for spatio-temporal
processes, which at their turn describe physical changes in the observed scene.
Therefore, we adjust a parametric model evaluating similarity types between
graph patterns in order to represent user-specific semantics attached to
spatio-temporal phenomena. The learning step is performed by the incremental
definition of similarity types via user-provided spatio-temporal pattern
examples attached to positive or/and negative semantics. From these examples,
probabilities are inferred using a Bayesian network and a Dirichlet model. This
enables to links user interest to a specific similarity model between graph
patterns. According to the current state of learning, semantic posterior
probabilities are updated for all possible graph patterns so that similar
spatio-temporal phenomena can be recognized and retrieved from the image
sequence. Few experiments performed on a multi-spectral SPOT image sequence
illustrate the proposed spatio-temporal recognition method.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 13:18:18 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Sep 2007 07:59:26 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Héas",
"Patrick",
"",
"IRISA"
],
[
"Datcu",
"Mihai",
"",
"DLR, Oberpfaffenhofen"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0709.3034 | Anastasia Analyti | Carlo Meghini, Yannis Tzitzikas, Anastasia Analyti | Query Evaluation in P2P Systems of Taxonomy-based Sources: Algorithms,
Complexity, and Optimizations | null | null | null | null | cs.DB cs.DC cs.DS cs.LO | null | In this study, we address the problem of answering queries over a
peer-to-peer system of taxonomy-based sources. A taxonomy states subsumption
relationships between negation-free DNF formulas on terms and negation-free
conjunctions of terms. To the end of laying the foundations of our study, we
first consider the centralized case, deriving the complexity of the decision
problem and of query evaluation. We conclude by presenting an algorithm that is
efficient in data complexity and is based on hypergraphs. More expressive forms
of taxonomies are also investigated, which however lead to intractability. We
then move to the distributed case, and introduce a logical model of a network
of taxonomy-based sources. On such network, a distributed version of the
centralized algorithm is then presented, based on a message passing paradigm,
and its correctness is proved. We finally discuss optimization issues, and
relate our work to the literature.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 15:10:05 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Meghini",
"Carlo",
""
],
[
"Tzitzikas",
"Yannis",
""
],
[
"Analyti",
"Anastasia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.3094 | Sergey Dorogovtsev | S. N. Dorogovtsev, P. L. Krapivsky, J. F. F. Mendes | Transition from small to large world in growing networks | 5 pages | EPL 81, 30004 (2008) | 10.1209/0295-5075/81/30004 | null | cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph | null | We examine the global organization of growing networks in which a new vertex
is attached to already existing ones with a probability depending on their age.
We find that the network is infinite- or finite-dimensional depending on
whether the attachment probability decays slower or faster than $(age)^{-1}$.
The network becomes one-dimensional when the attachment probability decays
faster than $(age)^{-2}$. We describe structural characteristics of these
phases and transitions between them.
| [
{
"version": "v1",
"created": "Wed, 19 Sep 2007 19:45:18 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Sep 2007 06:57:37 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Nov 2007 16:58:01 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dorogovtsev",
"S. N.",
""
],
[
"Krapivsky",
"P. L.",
""
],
[
"Mendes",
"J. F. F.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0709.3257 | Sylvain Lombardy | Sylvain Lombardy (LIAFA), Jean Mairesse (LIAFA) | Series which are both max-plus and min-plus rational are unambiguous | null | RAIRO - Theoretical Informatics and Applications 40 (2006) 1-14 | 10.1051/ita:2005042 | null | cs.DM | null | Consider partial maps from the free monoid into the field of real numbers
with a rational domain. We show that two families of such series are actually
the same: the unambiguous rational series on the one hand, and the max-plus and
min-plus rational series on the other hand. The decidability of equality was
known to hold in both families with different proofs, so the above unifies the
picture. We give an effective procedure to build an unambiguous automaton from
a max-plus automaton and a min-plus one that recognize the same series.
| [
{
"version": "v1",
"created": "Thu, 20 Sep 2007 15:49:44 GMT"
}
] | 2007-09-21T00:00:00 | [
[
"Lombardy",
"Sylvain",
"",
"LIAFA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.3262 | Fabio G. Guerrero Moreno | Fabio G. Guerrero and Lucio A. Perez | A software for learning Information Theory basics with emphasis on
Entropy of Spanish | null | Revista Energia y Computacion, Vol. 16, No.1, June 2008, pp.58-64 | null | null | cs.IT math.IT | null | In this paper, a tutorial software to learn Information Theory basics in a
practical way is reported. The software, called IT-tutor-UV, makes use of a
modern existing Spanish corpus for the modeling of the source. Both the source
and the channel coding are also included in this educational tool as part of
the learning experience. Entropy values of the Spanish language obtained with
the IT-tutor-UV are discussed and compared to others that were previously
calculated under limited conditions.
| [
{
"version": "v1",
"created": "Thu, 20 Sep 2007 16:25:48 GMT"
}
] | 2008-08-27T00:00:00 | [
[
"Guerrero",
"Fabio G.",
""
],
[
"Perez",
"Lucio A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.3283 | Michael Kettner | Michael Kettner | Algorithmic and topological aspects of semi-algebraic sets defined by
quadratic polynomial | PhD thesis, final version, 109 pages, 9 figures | null | null | null | math.AG cs.CG math.AT math.GT | null | In this thesis, we consider semi-algebraic sets over a real closed field $R$
defined by quadratic polynomials. Semi-algebraic sets of $R^k$ are defined as
the smallest family of sets in $R^k$ that contains the algebraic sets as well
as the sets defined by polynomial inequalities, and which is also closed under
the boolean operations (complementation, finite unions and finite
intersections). We prove new bounds on the Betti numbers as well as on the
number of different stable homotopy types of certain fibers of semi-algebraic
sets over a real closed field $R$ defined by quadratic polynomials, in terms of
the parameters of the system of polynomials defining them, which improve the
known results. We conclude the thesis with presenting two new algorithms along
with their implementations. The first algorithm computes the number of
connected components and the first Betti number of a semi-algebraic set defined
by compact objects in $\mathbb{R}^k$ which are simply connected. This algorithm
improves the well-know method using a triangulation of the semi-algebraic set.
Moreover, the algorithm has been efficiently implemented which was not possible
before. The second algorithm computes efficiently the real intersection of
three quadratic surfaces in $\mathbb{R}^3$ using a semi-numerical approach.
| [
{
"version": "v1",
"created": "Thu, 20 Sep 2007 19:28:10 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Kettner",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
0709.3334 | Yong Wang | Yong Wang | Mistake Analyses on Proof about Perfect Secrecy of One-time-pad | This paper has been withdrawn | null | null | null | cs.CR | null | This paper has been withdrawn
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 02:31:45 GMT"
},
{
"version": "v2",
"created": "Wed, 18 May 2011 01:19:14 GMT"
}
] | 2011-05-19T00:00:00 | [
[
"Wang",
"Yong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.3384 | Mariano Zelke | Mariano Zelke | Weighted Matching in the Semi-Streaming Model | 12 pages, 2 figures | Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.DM cs.DS | null | We reduce the best known approximation ratio for finding a weighted matching
of a graph using a one-pass semi-streaming algorithm from 5.828 to 5.585. The
semi-streaming model forbids random access to the input and restricts the
memory to O(n*polylog(n)) bits. It was introduced by Muthukrishnan in 2003 and
is appropriate when dealing with massive graphs.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 09:34:19 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Zelke",
"Mariano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0709.3420 | Marc Barthelemy | Eric D. Kolaczyk, David B. Chua, Marc Barthelemy | Co-Betweenness: A Pairwise Notion of Centrality | 9 pages, 9 figures | Social Networks 31 (2009), pp. 190-203 | null | null | cs.NI physics.soc-ph | null | Betweenness centrality is a metric that seeks to quantify a sense of the
importance of a vertex in a network graph in terms of its "control" on the
distribution of information along geodesic paths throughout that network. This
quantity however does not capture how different vertices participate together
in such control. In order to allow for the uncovering of finer details in this
regard, we introduce here an extension of betweenness centrality to pairs of
vertices, which we term co-betweenness, that provides the basis for quantifying
various analogous pairwise notions of importance and control. More
specifically, we motivate and define a precise notion of co-betweenness, we
present an efficient algorithm for its computation, extending the algorithm of
Brandes in a natural manner, and we illustrate the utilization of this
co-betweenness on a handful of different communication networks. From these
real-world examples, we show that the co-betweenness allows one to identify
certain vertices which are not the most central vertices but which,
nevertheless, act as important actors in the relaying and dispatching of
information in the network.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 12:20:05 GMT"
}
] | 2009-08-28T00:00:00 | [
[
"Kolaczyk",
"Eric D.",
""
],
[
"Chua",
"David B.",
""
],
[
"Barthelemy",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0709.3427 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Amaury
Lendasse (CIS), Damien Fran\c{c}ois (CESAME), Vincent Wertz (CESAME), Michel
Verleysen (DICE - MLG) | Mutual information for the selection of relevant variables in
spectrometric nonlinear modelling | null | Chemometrics and Intelligent Laboratory Systems / I Mathematical
Background Chemometrics Intell Lab Syst 80, 2 (2006) 215-226 | 10.1016/j.chemolab.2005.06.010 | null | cs.LG cs.NE stat.AP | null | Data from spectrophotometers form vectors of a large number of exploitable
variables. Building quantitative models using these variables most often
requires using a smaller set of variables than the initial one. Indeed, a too
large number of input variables to a model results in a too large number of
parameters, leading to overfitting and poor generalization abilities. In this
paper, we suggest the use of the mutual information measure to select variables
from the initial set. The mutual information measures the information content
in input variables with respect to the model output, without making any
assumption on the model that will be used; it is thus suitable for nonlinear
modelling. In addition, it leads to the selection of variables among the
initial set, and not to linear or nonlinear combinations of them. Without
decreasing the model performances compared to other variable projection
methods, it allows therefore a greater interpretability of the results.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 12:49:47 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lendasse",
"Amaury",
"",
"CIS"
],
[
"François",
"Damien",
"",
"CESAME"
],
[
"Wertz",
"Vincent",
"",
"CESAME"
],
[
"Verleysen",
"Michel",
"",
"DICE - MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0709.3461 | Fabrice Rossi | Brieuc Conan-Guez (LITA), Fabrice Rossi (INRIA Rocquencourt / INRIA
Sophia Antipolis), A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia
Antipolis) | Fast Algorithm and Implementation of Dissimilarity Self-Organizing Maps | null | Neural Networks 19, 6-7 (2006) 855-863 | 10.1016/j.neunet.2006.05.002 | null | cs.NE cs.LG | null | In many real world applications, data cannot be accurately represented by
vectors. In those situations, one possible solution is to rely on dissimilarity
measures that enable sensible comparison between observations. Kohonen's
Self-Organizing Map (SOM) has been adapted to data described only through their
dissimilarity matrix. This algorithm provides both non linear projection and
clustering of non vector data. Unfortunately, the algorithm suffers from a high
cost that makes it quite difficult to use with voluminous data sets. In this
paper, we propose a new algorithm that provides an important reduction of the
theoretical cost of the dissimilarity SOM without changing its outcome (the
results are exactly the same as the ones obtained with the original algorithm).
Moreover, we introduce implementation methods that result in very short running
times. Improvements deduced from the theoretical cost model are validated on
simulated and real world data (a word list clustering problem). We also
demonstrate that the proposed implementation methods reduce by a factor up to 3
the running time of the fast algorithm over a standard implementation.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 15:20:07 GMT"
}
] | 2007-09-24T00:00:00 | [
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA\n Sophia Antipolis"
],
[
"Golli",
"Aïcha El",
"",
"INRIA Rocquencourt / INRIA Sophia\n Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0709.3541 | Nan Liu | Shabnam Shafiee, Nan Liu and Sennur Ulukus | Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The
2-2-1 Channel | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2025549 | null | cs.IT math.IT | null | We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel,
which consists of a transmitter and a receiver with two antennas each, and an
eavesdropper with a single antenna. We determine the secrecy capacity of this
channel by proposing an achievable scheme and then developing a tight upper
bound that meets the proposed achievable secrecy rate. We show that, for this
channel, Gaussian signalling in the form of beam-forming is optimal, and no
pre-processing of information is necessary.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2007 22:27:40 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Shafiee",
"Shabnam",
""
],
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.3553 | Sergey Andreyev | Sergey Andreyev | Design of moveable and resizable graphics | 21 pages, 7 figures | null | null | null | cs.GR cs.HC | null | We are communicating with computers on two different levels. On upper level
we have a very flexible system of windows: we can move them, resize, overlap or
put side by side. At any moment we decide what would be the best view and
reorganize the whole view easily. Then we start any application, go to the
inner level, and everything changes. Here we are stripped of all the
flexibility and can work only inside the scenario, developed by the designer of
the program. Interface will allow us to change some tiny details, but in
general everything is fixed: graphics is neither moveable, nor resizable, and
the same with controls. Author designed an extremely powerful mechanism of
turning graphical objects and controls into moveable and resizable. This can
not only significantly improve the existing applications, but this will bring
the applications to another level. (To estimate the possible difference, try to
imagine the Windows system without its flexibility and compare it with the
current one.) This article explains in details the construction and use of
moveable and resizable graphical objects.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2007 00:21:08 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Andreyev",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0709.3554 | Mirela Damian | Mirela Damian, Robin Flatland, Joseph O'Rourke and Suneeta Ramaswami | A New Lower Bound on Guard Placement for Wireless Localization | 4 pages, 3 figures | null | null | null | cs.CG cs.CC | null | The problem of wireless localization asks to place and orient stations in the
plane, each of which broadcasts a unique key within a fixed angular range, so
that each point in the plane can determine whether it is inside or outside a
given polygonal region. The primary goal is to minimize the number of stations.
In this paper we establish a lower bound of 2n/3 - 1 stations for polygons in
general position, for the case in which the placement of stations is restricted
to polygon vertices, improving upon the existing n/2 lower bound.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2007 00:35:28 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Ramaswami",
"Suneeta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.3586 | Fabrice Rossi | A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia Antipolis),
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc
Conan-Guez (LITA), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia
Antipolis) | Une adaptation des cartes auto-organisatrices pour des donn\'ees
d\'ecrites par un tableau de dissimilarit\'es | null | Revue de Statistique Appliqu\'ee LIV, 3 (2006) 33-64 | null | null | cs.NE cs.LG | null | Many data analysis methods cannot be applied to data that are not represented
by a fixed number of real values, whereas most of real world observations are
not readily available in such a format. Vector based data analysis methods have
therefore to be adapted in order to be used with non standard complex data. A
flexible and general solution for this adaptation is to use a (dis)similarity
measure. Indeed, thanks to expert knowledge on the studied data, it is
generally possible to define a measure that can be used to make pairwise
comparison between observations. General data analysis methods are then
obtained by adapting existing methods to (dis)similarity matrices. In this
article, we propose an adaptation of Kohonen's Self Organizing Map (SOM) to
(dis)similarity data. The proposed algorithm is an adapted version of the
vector based batch SOM. The method is validated on real world data: we provide
an analysis of the usage patterns of the web site of the Institut National de
Recherche en Informatique et Automatique, constructed thanks to web log mining
method.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2007 15:53:54 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Golli",
"Aïcha El",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt / INRIA Sophia\n Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0709.3587 | Fabrice Rossi | A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc
Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis), Fabrice Rossi
(INRIA Rocquencourt / INRIA Sophia Antipolis) | Self-organizing maps and symbolic data | null | Journal of Symbolic Data Analysis 2, 1 (2004) | null | null | cs.NE cs.LG | null | In data analysis new forms of complex data have to be considered like for
example (symbolic data, functional data, web data, trees, SQL query and
multimedia data, ...). In this context classical data analysis for knowledge
discovery based on calculating the center of gravity can not be used because
input are not $\mathbb{R}^p$ vectors. In this paper, we present an application
on real world symbolic data using the self-organizing map. To this end, we
propose an extension of the self-organizing map that can handle symbolic data.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2007 15:54:37 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Golli",
"Aïcha El",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Conan-Guez",
"Brieuc",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0709.3590 | Jesse Gilbert D | Jesse Gilbert | An extension of a result concerning convex geometric graphs | This paper has been withdrawn by the author. This paper was presented
at Discrete Math Days in Fort Collins Colorado | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show a general result known as the Erdos_Sos Conjecture: if
$E(G)>{1/2}(k-1)n$ where $G$ has order $n$ then $G$ contains every tree of
order $k+1$ as a subgraph.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 07:21:25 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Sep 2007 13:12:46 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Sep 2007 20:15:33 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Sep 2008 16:55:37 GMT"
},
{
"version": "v5",
"created": "Thu, 29 Jul 2010 20:46:06 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Gilbert",
"Jesse",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.3600 | Yijia Fan | Yijia (Richard) Fan, H. Vincent Poor, John S. Thompson | Cooperative Multiplexing in a Half Duplex Relay Network: Performance and
Constraints | To appear in the Proceedings of the 45th Annual Allerton Conference
on Communication, Control and Computing, Monticello, IL, September 26 - 28,
2007 | null | null | null | cs.IT math.IT | null | Previous work on relay networks has concentrated primarily on the diversity
benefits of such techniques. This paper explores the possibility of also
obtaining multiplexing gain in a relay network, while retaining diversity gain.
Specifically, consider a network in which a single source node is equipped with
one antenna and a destination is equipped with two antennas. It is shown that,
in certain scenarios, by adding a relay with two antennas and using a
successive relaying protocol, the diversity multiplexing tradeoff performance
of the network can be lower bounded by that of a 2 by 2 MIMO channel, when the
decode-and-forward protocol is applied at the relay. A distributed D-BLAST
architecture is developed, in which parallel channel coding is applied to
achieve this tradeoff. A space-time coding strategy, which can bring a maximal
multiplexing gain of more than one, is also derived for this scenario. As will
be shown, while this space-time coding strategy exploits maximal diversity for
a small multiplexing gain, the proposed successive relaying scheme offers a
significant performance advantage for higher data rate transmission. In
addition to the specific results shown here, these ideas open a new direction
for exploiting the benefits of wireless relay networks.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 18:07:52 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Sep 2007 01:32:54 GMT"
}
] | 2007-09-29T00:00:00 | [
[
"Yijia",
"",
"",
"Richard"
],
[
"Fan",
"",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Thompson",
"John S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.3639 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Damien
Fran\c{c}ois (CESAME), Vincent Wertz (CESAME), Marc Meurens (BNUT), Michel
Verleysen (DICE - MLG) | Fast Selection of Spectral Variables with B-Spline Compression | null | Chemometrics and Intelligent Laboratory Systems / I Mathematical
Background Chemometrics Intell Lab Syst 86, 2 (2007) 208-218 | 10.1016/j.chemolab.2006.06.007 | null | cs.LG stat.AP | null | The large number of spectral variables in most data sets encountered in
spectral chemometrics often renders the prediction of a dependent variable
uneasy. The number of variables hopefully can be reduced, by using either
projection techniques or selection methods; the latter allow for the
interpretation of the selected variables. Since the optimal approach of testing
all possible subsets of variables with the prediction model is intractable, an
incremental selection approach using a nonparametric statistics is a good
option, as it avoids the computationally intensive use of the model itself. It
has two drawbacks however: the number of groups of variables to test is still
huge, and colinearities can make the results unstable. To overcome these
limitations, this paper presents a method to select groups of spectral
variables. It consists in a forward-backward procedure applied to the
coefficients of a B-Spline representation of the spectra. The criterion used in
the forward-backward procedure is the mutual information, allowing to find
nonlinear dependencies between variables, on the contrary of the generally used
correlation. The spline representation is used to get interpretability of the
results, as groups of consecutive spectral variables will be selected. The
experiments conducted on NIR spectra from fescue grass and diesel fuels show
that the method provides clearly identified groups of selected variables,
making interpretation easy, while keeping a low computational load. The
prediction performances obtained using the selected coefficients are higher
than those obtained by the same method applied directly to the original
variables and similar to those obtained using traditional models, although
using significantly less spectral variables.
| [
{
"version": "v1",
"created": "Sun, 23 Sep 2007 14:08:51 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"François",
"Damien",
"",
"CESAME"
],
[
"Wertz",
"Vincent",
"",
"CESAME"
],
[
"Meurens",
"Marc",
"",
"BNUT"
],
[
"Verleysen",
"Michel",
"",
"DICE - MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0709.3640 | Fabrice Rossi | Damien Fran\c{c}ois (CESAME), Fabrice Rossi (INRIA Rocquencourt /
INRIA Sophia Antipolis), Vincent Wertz (CESAME), Michel Verleysen (DICE -
MLG) | Resampling methods for parameter-free and robust feature selection with
mutual information | null | Neurocomputing 70, 7-9 (2007) 1276-1288 | 10.1016/j.neucom.2006.11.019 | null | cs.LG stat.AP | null | Combining the mutual information criterion with a forward feature selection
strategy offers a good trade-off between optimality of the selected feature
subset and computation time. However, it requires to set the parameter(s) of
the mutual information estimator and to determine when to halt the forward
procedure. These two choices are difficult to make because, as the
dimensionality of the subset increases, the estimation of the mutual
information becomes less and less reliable. This paper proposes to use
resampling methods, a K-fold cross-validation and the permutation test, to
address both issues. The resampling methods bring information about the
variance of the estimator, information which can then be used to automatically
set the parameter and to calculate a threshold to stop the forward procedure.
The procedure is illustrated on a synthetic dataset as well as on real-world
examples.
| [
{
"version": "v1",
"created": "Sun, 23 Sep 2007 14:09:28 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"François",
"Damien",
"",
"CESAME"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt /\n INRIA Sophia Antipolis"
],
[
"Wertz",
"Vincent",
"",
"CESAME"
],
[
"Verleysen",
"Michel",
"",
"DICE -\n MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0709.3641 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE),
Nicolas Delannay (DICE - MLG), Brieuc Conan-Guez (INRIA Rocquencourt / INRIA
Sophia Antipolis, CEREMADE), Michel Verleysen (DICE - MLG) | Representation of Functional Data in Neural Networks | Also available online from:
http://www.sciencedirect.com/science/journal/09252312 | Neurocomputing 64 (2005) 183--210 | 10.1016/j.neucom.2004.11.012 | null | cs.NE | null | Functional Data Analysis (FDA) is an extension of traditional data analysis
to functional data, for example spectra, temporal series, spatio-temporal
images, gesture recognition data, etc. Functional data are rarely known in
practice; usually a regular or irregular sampling is known. For this reason,
some processing is needed in order to benefit from the smooth character of
functional data in the analysis methods. This paper shows how to extend the
Radial-Basis Function Networks (RBFN) and Multi-Layer Perceptron (MLP) models
to functional data inputs, in particular when the latter are known through
lists of input-output pairs. Various possibilities for functional processing
are discussed, including the projection on smooth bases, Functional Principal
Component Analysis, functional centering and reduction, and the use of
differential operators. It is shown how to incorporate these functional
processing into the RBFN and MLP models. The functional approach is illustrated
on a benchmark of spectrometric data analysis.
| [
{
"version": "v1",
"created": "Sun, 23 Sep 2007 14:10:08 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE"
],
[
"Delannay",
"Nicolas",
"",
"DICE - MLG"
],
[
"Conan-Guez",
"Brieuc",
"",
"INRIA Rocquencourt / INRIA\n Sophia Antipolis, CEREMADE"
],
[
"Verleysen",
"Michel",
"",
"DICE - MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0709.3642 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE),
Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE) | Functional Multi-Layer Perceptron: a Nonlinear Tool for Functional Data
Analysis | http://www.sciencedirect.com/science/journal/08936080 | Neural Networks 18, 1 (2005) 45--60 | 10.1016/j.neunet.2004.07.001 | null | cs.NE | null | In this paper, we study a natural extension of Multi-Layer Perceptrons (MLP)
to functional inputs. We show that fundamental results for classical MLP can be
extended to functional MLP. We obtain universal approximation results that show
the expressive power of functional MLP is comparable to that of numerical MLP.
We obtain consistency results which imply that the estimation of optimal
parameters for functional MLP is statistically well defined. We finally show on
simulated and real world data that the proposed model performs in a very
satisfactory way.
| [
{
"version": "v1",
"created": "Sun, 23 Sep 2007 14:10:48 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE"
],
[
"Conan-Guez",
"Brieuc",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0709.3689 | Ming-xue Liao | Liao Ming-Xue, He Xiao-Xin, Fan Zhi-Hua | Static Deadlock Detection in MPI Synchronization Communication | accepted by HPC Asia 2007 | null | null | null | cs.DC | null | It is very common to use dynamic methods to detect deadlocks in MPI programs
for the reason that static methods have some restrictions. To guarantee high
reliability of some important MPI-based application software, a model of MPI
synchronization communication is abstracted and a type of static method is
devised to examine deadlocks in such modes. The model has three forms with
different complexity: sequential model, single-loop model and nested-loop
model. Sequential model is a base for all models. Single-loop model must be
treated with a special type of equation group and nested-loop model extends the
methods for the other two models. A standard Java-based software framework
originated from these methods is constructed for determining whether MPI
programs are free from synchronization communication deadlocks. Our practice
shows the software framework is better than those tools using dynamic methods
because it can dig out all synchronization communication deadlocks before an
MPI-based program goes into running.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 05:33:29 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Ming-Xue",
"Liao",
""
],
[
"Xiao-Xin",
"He",
""
],
[
"Zhi-Hua",
"Fan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.3692 | Ming-xue Liao | Ming-xue Liao, Zhi-hua Fan | Deadlock Detection in Basic Models of MPI Synchronization Communication
Programs | accepted by Acta Electronica Sinica (in Chinese) | null | null | null | cs.DC | null | A model of MPI synchronization communication programs is presented and its
three basic simplified models are also defined. A series of theorems and
methods for deciding whether deadlocks will occur among the three models are
given and proved strictly. These theories and methods for simple models'
deadlock detection are the necessary base for real MPI program deadlock
detection. The methods are based on a static analysis through programs and with
runtime detection in necessary cases and they are able to determine before
compiling whether it will be deadlocked for two of the three basic models. For
another model, some deadlock cases can be found before compiling and others at
runtime. Our theorems can be used to prove the correctness of currently popular
MPI program deadlock detection algorithms. Our methods may decrease codes that
those algorithms need to change to MPI source or profiling interface and may
detects deadlocks ahead of program execution, thus the overheads can be reduced
greatly.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 06:02:29 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2008 08:07:23 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Liao",
"Ming-xue",
""
],
[
"Fan",
"Zhi-hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.3693 | Ming-xue Liao | Liao Ming-Xue, He Xiao-Xin, Fan Zhi-Hua | Algorithm of Static Deadlock Detection in MPI Synchronization
Communication Sequential Model | This paper has been accepted by Computer Engineering (in Chinese) | null | null | null | cs.DC | null | Detecting deadlocks in MPI synchronization communication programs is very
difficult and need building program models. All complex models are based on
sequential models. The sequential model is mapped into a set of character
strings and its deadlock detection problem is translated into an equivalent
multi-queue string matching problem. An algorithm is devised and implemented to
statically detect deadlocks in sequential models of MPI synchronization
communication programs. The time and space complexity of the algorithm is O(n)
where n is the amount of message in model. The algorithm is better than usual
circle-detection methods and can adapt well to dynamic message stream.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 06:06:34 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Ming-Xue",
"Liao",
""
],
[
"Xiao-Xin",
"He",
""
],
[
"Zhi-Hua",
"Fan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.3753 | Aditya Mahajan | Aditya Mahajan and Demosthenis Teneketzis | On Real-Time Communication Systems with Noisy Feedback | 5 pages, 2 figures, submitted to IEEE Information Theory Workshop | null | null | null | cs.IT cs.MA math.IT math.OC math.PR | null | We consider a real-time communication system with noisy feedback consisting
of a Markov source, a forward and a backward discrete memoryless channels, and
a receiver with finite memory. The objective is to design an optimal
communication strategy (that is, encoding, decoding, and memory update
strategies) to minimize the total expected distortion over a finite horizon. We
present a sequential decomposition for the problem, which results in a set of
nested optimality equations to determine optimal communication strategies. This
provides a systematic methodology to determine globally optimal joint
source-channel encoding and decoding strategies for real-time communication
systems with noisy feedback.
| [
{
"version": "v1",
"created": "Sun, 23 Sep 2007 04:20:38 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Mahajan",
"Aditya",
""
],
[
"Teneketzis",
"Demosthenis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0709.3826 | Gerald Krafft | Gerald Krafft | Research Paper on Transaction-Oriented Simulation In Ad Hoc Grids | 6 pages, condensed research paper of my thesis with the same title | null | null | null | cs.DC | null | This paper analyses the requirements of performing parallel
transaction-oriented simulations with a special focus on the space-parallel
approach and discrete event simulation synchronisation algorithms that are
suitable for transaction-oriented simulation and the target environment of Ad
Hoc Grids. To demonstrate the findings a Java-based parallel
transaction-oriented simulator for the simulation language GPSS/H is
implemented on the basis of the most promising Shock Resistant Time Warp
synchronisation algorithm and using the Grid framework ProActive. The
validation of this parallel simulator shows that the Shock Resistant Time Warp
algorithm can successfully reduce the number of rolled back Transaction moves
but it also reveals circumstances in which the Shock Resistant Time Warp
algorithm can be outperformed by the normal Time Warp algorithm. The conclusion
of this paper suggests possible improvements to the Shock Resistant Time Warp
algorithm to avoid such problems.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 19:25:27 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Krafft",
"Gerald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.3827 | Sanket Dusad | S. Dusad, S. N. Diggavi | On Successive Refinement of Diversity for Fading ISI Channels | In Proceedings of the 44th Annual Allerton Conference on
Communication, Control and Computing, University of Illinois, Monticello, IL,
September 27 - 29, 2006 | null | null | null | cs.IT math.IT | null | Rate and diversity impose a fundamental tradeoff in communications. This
tradeoff was investigated for Intersymbol Interference (ISI) channels in [4]. A
different point of view was explored in [1] where high-rate codes were designed
so that they have a high-diversity code embedded within them. Such diversity
embedded codes were investigated for flat fading channels and in this paper we
explore its application to ISI channels. In particular, we investigate the rate
tuples achievable for diversity embedded codes for scalar ISI channels through
particular coding strategies. The main result of this paper is that the
diversity multiplexing tradeoff for fading ISI channels is indeed successively
refinable. This implies that for fading single input single output (SISO) ISI
channels one can embed a high diversity code within a high rate code without
any performance loss (asymptotically). This is related to a deterministic
structural observation about the asymptotic behavior of frequency response of
channel with respect to fading strength of time domain taps.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2007 19:26:17 GMT"
}
] | 2007-09-25T00:00:00 | [
[
"Dusad",
"S.",
""
],
[
"Diggavi",
"S. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.3880 | Yi Su | Yi Su and Mihaela van der Schaar | A New Perspective on Multi-user Power Control Games in Interference
Channels | 20 pages, 8 figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of how to allocate power among competing
users sharing a frequency-selective interference channel. We model the
interaction between selfish users as a non-cooperative game. As opposed to the
existing iterative water-filling algorithm that studies the myopic users, this
paper studies how a foresighted user, who knows the channel state information
and response strategies of its competing users, should optimize its
transmission strategy. To characterize this multi-user interaction, the
Stackelberg equilibrium is introduced, and the existence of this equilibrium
for the investigated non-cooperative game is shown. We analyze this interaction
in more detail using a simple two-user example, where the foresighted user
determines its transmission strategy by solving as a bi-level program which
allows him to account for the myopic user's response. It is analytically shown
that a foresighted user can improve its performance, if it has the necessary
information about its competitors. Since the optimal solution of Stackelberg
equilibrium is computationally prohibitive, we propose a practical
low-complexity approach based on Lagrangian duality theory. Numerical
simulations verify the performance improvements. Possible ways to acquire the
required information and to extend the formulation to more than two users are
also discussed.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 06:34:20 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2008 03:30:25 GMT"
}
] | 2008-12-16T00:00:00 | [
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0709.3915 | Alexandros Dimakis | Alexandros G. Dimakis, Amin A. Gohari, Martin J. Wainwright | Guessing Facets: Polytope Structure and Improved LP Decoding | Submitted, IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In this paper we investigate the structure of the fundamental polytope used
in the Linear Programming decoding introduced by Feldman, Karger and
Wainwright. We begin by showing that for expander codes, every fractional
pseudocodeword always has at least a constant fraction of non-integral bits. We
then prove that for expander codes, the active set of any fractional
pseudocodeword is smaller by a constant fraction than the active set of any
codeword. We further exploit these geometrical properties to devise an improved
decoding algorithm with the same complexity order as LP decoding that provably
performs better, for any blocklength. It proceeds by guessing facets of the
polytope, and then resolving the linear program on these facets. While the LP
decoder succeeds only if the ML codeword has the highest likelihood over all
pseudocodewords, we prove that the proposed algorithm, when applied to suitable
expander codes, succeeds unless there exist a certain number of
pseudocodewords, all adjacent to the ML codeword on the LP decoding polytope,
and with higher likelihood than the ML codeword. We then describe an extended
algorithm, still with polynomial complexity, that succeeds as long as there are
at most polynomially many pseudocodewords above the ML codeword.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 10:48:25 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Dimakis",
"Alexandros G.",
""
],
[
"Gohari",
"Amin A.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.3921 | Alexandros Dimakis | Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright | Geographic Gossip: Efficient Averaging for Sensor Networks | To appear, IEEE Transactions on Signal Processing | null | 10.1109/TSP.2007.908946 | null | cs.IT cs.NI math.IT math.PR | null | Gossip algorithms for distributed computation are attractive due to their
simplicity, distributed nature, and robustness in noisy and uncertain
environments. However, using standard gossip algorithms can lead to a
significant waste in energy by repeatedly recirculating redundant information.
For realistic sensor network model topologies like grids and random geometric
graphs, the inefficiency of gossip schemes is related to the slow mixing times
of random walks on the communication graph. We propose and analyze an
alternative gossiping scheme that exploits geographic information. By utilizing
geographic routing combined with a simple resampling method, we demonstrate
substantial gains over previously proposed gossip protocols. For regular graphs
such as the ring or grid, our algorithm improves standard gossip by factors of
$n$ and $\sqrt{n}$ respectively. For the more challenging case of random
geometric graphs, our algorithm computes the true average to accuracy
$\epsilon$ using $O(\frac{n^{1.5}}{\sqrt{\log n}} \log \epsilon^{-1})$ radio
transmissions, which yields a $\sqrt{\frac{n}{\log n}}$ factor improvement over
standard gossip algorithms. We illustrate these theoretical results with
experimental comparisons between our algorithm and standard methods as applied
to various classes of random fields.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 11:15:28 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dimakis",
"Alexandros G.",
""
],
[
"Sarwate",
"Anand D.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0709.3965 | Tshilidzi Marwala | Greg Hulley and Tshilidzi Marwala | Evolving Classifiers: Methods for Incremental Learning | 14 pages | null | null | null | cs.LG cs.AI cs.NE | null | The ability of a classifier to take on new information and classes by
evolving the classifier without it having to be fully retrained is known as
incremental learning. Incremental learning has been successfully applied to
many classification problems, where the data is changing and is not all
available at once. In this paper there is a comparison between Learn++, which
is one of the most recent incremental learning algorithms, and the new proposed
method of Incremental Learning Using Genetic Algorithm (ILUGA). Learn++ has
shown good incremental learning capabilities on benchmark datasets on which the
new ILUGA method has been tested. ILUGA has also shown good incremental
learning ability using only a few classifiers and does not suffer from
catastrophic forgetting. The results obtained for ILUGA on the Optical
Character Recognition (OCR) and Wine datasets are good, with an overall
accuracy of 93% and 94% respectively showing a 4% improvement over Learn++.MT
for the difficult multi-class OCR dataset.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 14:28:32 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Sep 2007 10:37:00 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Hulley",
"Greg",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0709.3967 | Tshilidzi Marwala | Gidudu Anthony, Hulley Greg and Marwala Tshilidzi | Classification of Images Using Support Vector Machines | 6 pages | null | null | null | cs.LG cs.AI | null | Support Vector Machines (SVMs) are a relatively new supervised classification
technique to the land cover mapping community. They have their roots in
Statistical Learning Theory and have gained prominence because they are robust,
accurate and are effective even when using a small training sample. By their
nature SVMs are essentially binary classifiers, however, they can be adopted to
handle the multiple classification tasks common in remote sensing studies. The
two approaches commonly used are the One-Against-One (1A1) and One-Against-All
(1AA) techniques. In this paper, these approaches are evaluated in as far as
their impact and implication for land cover mapping. The main finding from this
research is that whereas the 1AA technique is more predisposed to yielding
unclassified and mixed pixels, the resulting classification accuracy is not
significantly different from 1A1 approach. It is the authors conclusions that
ultimately the choice of technique adopted boils down to personal preference
and the uniqueness of the dataset at hand.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 14:37:40 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Anthony",
"Gidudu",
""
],
[
"Greg",
"Hulley",
""
],
[
"Tshilidzi",
"Marwala",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.3974 | Sebastien Verel | S\'ebastien Verel (I3S), Philippe Collard (I3S), Marco Tomassini
(ISI), Leonardo Vanneschi (DISCO) | Fitness landscape of the cellular automata majority problem: View from
the Olympus | null | Theoretical Computer Science 378, 1 (2007) 54-77 | 10.1016/j.tcs.2007.01.001 | null | cs.AI | null | In this paper we study cellular automata (CAs) that perform the computational
Majority task. This task is a good example of what the phenomenon of emergence
in complex systems is. We take an interest in the reasons that make this
particular fitness landscape a difficult one. The first goal is to study the
landscape as such, and thus it is ideally independent from the actual
heuristics used to search the space. However, a second goal is to understand
the features a good search technique for this particular problem space should
possess. We statistically quantify in various ways the degree of difficulty of
searching this landscape. Due to neutrality, investigations based on sampling
techniques on the whole landscape are difficult to conduct. So, we go exploring
the landscape from the top. Although it has been proved that no CA can perform
the task perfectly, several efficient CAs for this task have been found.
Exploiting similarities between these CAs and symmetries in the landscape, we
define the Olympus landscape which is regarded as the ''heavenly home'' of the
best local optima known (blok). Then we measure several properties of this
subspace. Although it is easier to find relevant CAs in this subspace than in
the overall landscape, there are structural reasons that prevent a searcher
from finding overfitted CAs in the Olympus. Finally, we study dynamics and
performance of genetic algorithms on the Olympus in order to confirm our
analysis and to find efficient CAs for the Majority problem with low
computational cost.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 15:40:38 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Tomassini",
"Marco",
"",
"ISI"
],
[
"Vanneschi",
"Leonardo",
"",
"DISCO"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.4010 | Sebastien Verel | Philippe Collard (I3S), S\'ebastien Verel (I3S), Manuel Clergue (I3S) | Local search heuristics: Fitness Cloud versus Fitness Landscape | null | Dans Poster at the 2004 European Conference on Artificial
Intelligence (ECAI04) - the 2004 European Conference on Artificial
Intelligence (ECAI04), Valencia : Espagne (2004) | null | null | cs.AI | null | This paper introduces the concept of fitness cloud as an alternative way to
visualize and analyze search spaces than given by the geographic notion of
fitness landscape. It is argued that the fitness cloud concept overcomes
several deficiencies of the landscape representation. Our analysis is based on
the correlation between fitness of solutions and fitnesses of nearest solutions
according to some neighboring. We focus on the behavior of local search
heuristics, such as hill climber, on the well-known NK fitness landscape. In
both cases the fitness vs. fitness correlation is shown to be related to the
epistatic parameter K.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 19:15:50 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.4011 | Sebastien Verel | S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S) | Measuring the Evolvability Landscape to study Neutrality | null | Dans Poster at Genetic and Evolutionary Computation -- GECCO-2006
- Genetic and Evolutionary Computation -- GECCO-2006, Seattle, WA :
\'Etats-Unis d'Am\'erique (2006) | null | null | cs.AI | null | This theoretical work defines the measure of autocorrelation of evolvability
in the context of neutral fitness landscape. This measure has been studied on
the classical MAX-SAT problem. This work highlight a new characteristic of
neutral fitness landscapes which allows to design new adapted metaheuristic.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 19:17:08 GMT"
}
] | 2007-09-26T00:00:00 | [
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.4015 | Amanda Bouffier | Amanda Bouffier (LIPN) | From Texts to Structured Documents: The Case of Health Practice
Guidelines | null | Dans International Semantic Web Conference Proceedings -
International Semantic Web Conference-Doctoral Consortium, Busan : Cor\'ee,
R\'epublique de (2007) | 10.1007/978-3-540-76298-0_69 | null | cs.AI | null | This paper describes a system capable of semi-automatically filling an XML
template from free texts in the clinical domain (practice guidelines). The XML
template includes semantic information not explicitly encoded in the text
(pairs of conditions and actions/recommendations). Therefore, there is a need
to compute the exact scope of conditions over text sequences expressing the
required actions. We present in this paper the rules developed for this task.
We show that the system yields good performance when applied to the analysis of
French practice guidelines.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 19:26:08 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Bouffier",
"Amanda",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.4035 | Shuangqing Wei | Shuangqing Wei, Rajgopal Kannan, Sitharama Iyengar and Nageswara S.
Rao | Energy Efficient Estimation of Gaussian Sources Over Inhomogeneous
Gaussian MAC Channels | null | null | null | null | cs.IT math.IT | null | It has been shown lately the optimality of uncoded transmission in estimating
Gaussian sources over homogeneous/symmetric Gaussian multiple access channels
(MAC) using multiple sensors. It remains, however, unclear whether it still
holds for any arbitrary networks and/or with high channel signal-to-noise ratio
(SNR) and high signal-to-measurement-noise ratio (SMNR). In this paper, we
first provide a joint source and channel coding approach in estimating Gaussian
sources over Gaussian MAC channels, as well as its sufficient and necessary
condition in restoring Gaussian sources with a prescribed distortion value. An
interesting relationship between our proposed joint approach with a more
straightforward separate source and channel coding scheme is then established.
We then formulate constrained power minimization problems and transform them to
relaxed convex geometric programming problems, whose numerical results exhibit
that either separate or uncoded scheme becomes dominant over a linear topology
network. In addition, we prove that the optimal decoding order to minimize the
total transmission powers for both source and channel coding parts is solely
subject to the ranking of MAC channel qualities, and has nothing to do with the
ranking of measurement qualities. Finally, asymptotic results for homogeneous
networks are obtained which not only confirm the existing optimality of the
uncoded approach, but also show that the asymptotic SNR exponents of these
three approaches are all the same. Moreover, the proposed joint approach share
the same asymptotic ratio with respect to high SNR and high SMNR as the uncoded
scheme.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 21:01:25 GMT"
}
] | 2007-09-27T00:00:00 | [
[
"Wei",
"Shuangqing",
""
],
[
"Kannan",
"Rajgopal",
""
],
[
"Iyengar",
"Sitharama",
""
],
[
"Rao",
"Nageswara S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4048 | P. Oscar Boykin | P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M.
Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury | A Symphony Conducted by Brunet | 13 pages, 11 figures | null | null | null | cs.DC cs.NI | null | We introduce BruNet, a general P2P software framework which we use to produce
the first implementation of Symphony, a 1-D Kleinberg small-world architecture.
Our framework is designed to easily implement and measure different P2P
protocols over different transport layers such as TCP or UDP. This paper
discusses our implementation of the Symphony network, which allows each node to
keep $k \le \log N$ shortcut connections and to route to any other node with a
short average delay of $O(\frac{1}{k}\log^2 N)$. %This provides a continuous
trade-off between node degree and routing latency. We present experimental
results taken from several PlanetLab deployments of size up to 1060 nodes.
These succes sful deployments represent some of the largest PlanetLab
deployments of P2P overlays found in the literature, and show our
implementation's robustness to massive node dynamics in a WAN environment.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2007 22:09:17 GMT"
}
] | 2007-09-27T00:00:00 | [
[
"Boykin",
"P. Oscar",
""
],
[
"Bridgewater",
"Jesse S. A.",
""
],
[
"Kong",
"Joseph S.",
""
],
[
"Lozev",
"Kamen M.",
""
],
[
"Rezaei",
"Behnam A.",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0709.4063 | Grenville Croll | Grenville J. Croll | The Importance and Criticality of Spreadsheets in the City of London | 11 pages, with references | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 82-92
ISBN:1-902724-16-X | null | null | cs.CY | null | Spreadsheets have been with us in their present form for over a quarter of a
century. We have become so used to them that we forget that we are using them
at all. It may serve us well to stand back for a moment to review where, when
and how we use spreadsheets in the financial markets and elsewhere in order to
inform research that may guide their future development. In this article I
bring together the experiences of a number of senior practitioners who have
spent much of their careers working with large spreadsheets that have been and
continue to be used to support major financial transactions and manage large
institutions in the City of London. The author suggests that the City of London
is presently exposed to significant reputational risk through the continued
uncontrolled use of critical spreadsheets in the financial markets and
elsewhere.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 00:14:51 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2008 20:30:35 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Croll",
"Grenville J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0709.4087 | David Eppstein | David Eppstein | The Topology of Bendless Three-Dimensional Orthogonal Graph Drawing | 23 pages, 16 figures. A much shorter version of this paper will
appear at Graph Drawing 2008. This version incorporates feedback from the GD
reviewers and new material on covering maps | J. Graph Algorithms & Applications 17(1): 35-55, 2013 | 10.7155/jgaa.00283 | null | cs.CG math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider embeddings of 3-regular graphs into 3-dimensional Cartesian
coordinates, in such a way that two vertices are adjacent if and only if two of
their three coordinates are equal (that is, if they lie on an axis-parallel
line) and such that no three points lie on the same axis-parallel line; we call
a graph with such an embedding an xyz graph}. We describe a correspondence
between xyz graphs and face-colored embeddings of the graph onto
two-dimensional manifolds, and we relate bipartiteness of the xyz graph to
orientability of the underlying topological surface. Using this correspondence,
we show that planar graphs are xyz graphs if and only if they are bipartite,
cubic, and three-connected, and that it is NP-complete to determine whether an
arbitrary graph is an xyz graph. We also describe an algorithm with running
time O(n 2^{n/2}) for testing whether a given graph is an xyz graph.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 06:49:33 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Oct 2007 20:39:27 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Aug 2008 23:31:11 GMT"
}
] | 2015-07-16T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0709.4117 | Sylvain Lombardy | Ines Klimann (LIAFA), Sylvain Lombardy (LIAFA), Jean Mairesse (LIAFA),
Christophe Prieur (LIAFA) | Deciding Unambiguity and Sequentiality starting from a Finitely
Ambiguous Max-Plus Automaton | null | Theoretical Computer Science 327, 3 (2004) 349-373 | 10.1016/j.tcs.2004.02.049 | null | cs.CC | null | Finite automata with weights in the max-plus semiring are considered. The
main result is: it is decidable in an effective way whether a series that is
recognized by a finitely ambiguous max-plus automaton is unambiguous, or is
sequential. A collection of examples is given to illustrate the hierarchy of
max-plus series with respect to ambiguity.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 09:51:28 GMT"
}
] | 2007-09-27T00:00:00 | [
[
"Klimann",
"Ines",
"",
"LIAFA"
],
[
"Lombardy",
"Sylvain",
"",
"LIAFA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
],
[
"Prieur",
"Christophe",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0709.4118 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | An efficient simulation algorithm based on abstract interpretation | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A number of algorithms for computing the simulation preorder are available.
Let Sigma denote the state space, -> the transition relation and Psim the
partition of Sigma induced by simulation equivalence. The algorithms by
Henzinger, Henzinger, Kopke and by Bloom and Paige run in O(|Sigma||->|)-time
and, as far as time-complexity is concerned, they are the best available
algorithms. However, these algorithms have the drawback of a space complexity
that is more than quadratic in the size of the state space. The algorithm by
Gentilini, Piazza, Policriti--subsequently corrected by van Glabbeek and
Ploeger--appears to provide the best compromise between time and space
complexity. Gentilini et al.'s algorithm runs in O(|Psim|^2|->|)-time while the
space complexity is in O(|Psim|^2 + |Sigma|log|Psim|). We present here a new
efficient simulation algorithm that is obtained as a modification of Henzinger
et al.'s algorithm and whose correctness is based on some techniques used in
applications of abstract interpretation to model checking. Our algorithm runs
in O(|Psim||->|)-time and O(|Psim||Sigma|log|Sigma|)-space. Thus, this
algorithm improves the best known time bound while retaining an acceptable
space complexity that is in general less than quadratic in the size of the
state space. An experimental evaluation showed good comparative results with
respect to Henzinger, Henzinger and Kopke's algorithm.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 09:54:31 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2008 19:57:53 GMT"
}
] | 2008-12-05T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0709.4263 | Maciej Dziemia\'nczuk | M. Dziemianczuk | On Cobweb posets tiling problem | 15 pages, 15 figures | Adv. Stud. Contemp. Math. volume 16 (2), 2008 (April) pp. 219-233 | null | null | math.CO cs.DM | null | Kwasniewski's cobweb posets uniquely represented by directed acyclic graphs
are such a generalization of the Fibonacci tree that allows joint combinatorial
interpretation for all of them under admissibility condition. This
interpretation was derived in the source papers and it entailes natural
enquieres already formulated therein. In our note we response to one of those
problems. This is a tiling problem. Our observations on tiling problem include
proofs of tiling's existence for some cobweb-admissible sequences. We show also
that not all cobwebs admit tiling as defined below.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 20:44:53 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Oct 2007 14:13:44 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Dziemianczuk",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.4273 | Sergey Gubin | Sergey Gubin | Set Matrices and The Path/Cycle Problem | 7 pages | null | null | null | cs.DM cs.CC cs.DS math.CO | null | Presentation of set matrices and demonstration of their efficiency as a tool
using the path/cycle problem.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 21:44:10 GMT"
}
] | 2007-09-28T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0709.4280 | Laurent Bartholdi | Laurent Bartholdi | A converse to Moore's theorem on cellular automata | null | J. Eur. Math. Soc. 12 (2010), 241-248 | 10.471/JEMS/196 | null | math.CO cs.IT math.DS math.GR math.IT | null | We prove a converse to Moore's ``Garden-of-Eden'' theorem: a group G is
amenable if and only if all cellular automata living on G that admit mutually
erasable patterns also admit gardens of Eden.
It had already been conjectured in that amenability could be characterized by
cellular automata. We prove the first part of that conjecture.
| [
{
"version": "v1",
"created": "Wed, 26 Sep 2007 22:44:33 GMT"
}
] | 2009-12-17T00:00:00 | [
[
"Bartholdi",
"Laurent",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4303 | Yong Wang | Yong Wang | Security Analyses of One-time System | This paper has been withdrawn | null | null | null | cs.CR | null | This paper has been withdrawn
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 03:11:58 GMT"
},
{
"version": "v2",
"created": "Tue, 17 May 2011 15:19:40 GMT"
},
{
"version": "v3",
"created": "Wed, 18 May 2011 01:19:32 GMT"
}
] | 2011-05-19T00:00:00 | [
[
"Wang",
"Yong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.4397 | Serge Burckel | Serge Burckel | The Parallel-Sequential Duality : Matrices and Graphs | 11 pages | null | null | null | math.CO cs.IT math.IT | null | Usually, mathematical objects have highly parallel interpretations. In this
paper, we consider them as sequential constructors of other objects. In
particular, we prove that every reflexive directed graph can be interpreted as
a program that builds another and is itself builded by another. That leads to
some optimal memory computations, codings similar to modular decompositions and
other strange dynamical phenomenons.
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 13:55:13 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Oct 2007 07:37:53 GMT"
}
] | 2007-10-27T00:00:00 | [
[
"Burckel",
"Serge",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4420 | Yong Wang | Yong Wang | Confirmation of Shannon's Mistake about Perfect Secrecy of One-time-pad | This paper has been withdrawn | null | null | null | cs.CR | null | This paper has been withdrawn
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 15:05:52 GMT"
},
{
"version": "v2",
"created": "Wed, 18 May 2011 01:18:50 GMT"
}
] | 2011-05-19T00:00:00 | [
[
"Wang",
"Yong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0709.4464 | Jesus-Emeterio Navarro-Barrientos | J.-Emeterio Navarro | Adaptive Investment Strategies For Periodic Environments | Paper submitted to Advances in Complex Systems (November, 2007) 22
pages, 9 figures | Advances in Complex Systems Vol. 11, No. 5 (2008) 761-787 | 10.1142/S0219525908001933 | null | cs.CE cs.NE | null | In this paper, we present an adaptive investment strategy for environments
with periodic returns on investment. In our approach, we consider an investment
model where the agent decides at every time step the proportion of wealth to
invest in a risky asset, keeping the rest of the budget in a risk-free asset.
Every investment is evaluated in the market via a stylized return on investment
function (RoI), which is modeled by a stochastic process with unknown
periodicities and levels of noise. For comparison reasons, we present two
reference strategies which represent the case of agents with zero-knowledge and
complete-knowledge of the dynamics of the returns. We consider also an
investment strategy based on technical analysis to forecast the next return by
fitting a trend line to previous received returns. To account for the
performance of the different strategies, we perform some computer experiments
to calculate the average budget that can be obtained with them over a certain
number of time steps. To assure for fair comparisons, we first tune the
parameters of each strategy. Afterwards, we compare the performance of these
strategies for RoIs with different periodicities and levels of noise.
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 19:04:00 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Nov 2007 16:13:07 GMT"
}
] | 2008-12-01T00:00:00 | [
[
"Navarro",
"J. -Emeterio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0709.4466 | K Sivakumar | Taikun Cheng, Krishnamoorthy Sivakumar, Benjamin J. Belzer | Serially Concatenated IRA Codes | Forty-Fifth Annual Allerton Conference on Communication, Control, and
Computing, 2007, 4 pages, 4 figures | null | null | null | cs.IT math.IT | null | We address the error floor problem of low-density parity check (LDPC) codes
on the binary-input additive white Gaussian noise (AWGN) channel, by
constructing a serially concatenated code consisting of two systematic
irregular repeat accumulate (IRA) component codes connected by an interleaver.
The interleaver is designed to prevent stopping-set error events in one of the
IRA codes from propagating into stopping set events of the other code.
Simulations with two 128-bit rate 0.707 IRA component codes show that the
proposed architecture achieves a much lower error floor at higher SNRs,
compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2
dB at low to medium SNRs. Experiments indicate that the SNR penalty can be
reduced at larger blocklengths.
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 18:38:09 GMT"
}
] | 2007-09-28T00:00:00 | [
[
"Cheng",
"Taikun",
""
],
[
"Sivakumar",
"Krishnamoorthy",
""
],
[
"Belzer",
"Benjamin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4497 | Fedor Manin | Fedor Manin | The complexity of nonrepetitive edge coloring of graphs | null | null | null | null | cs.CC cs.DM | null | A squarefree word is a sequence $w$ of symbols such that there are no strings
$x, y$, and $z$ for which $w=xyyz$. A nonrepetitive coloring of a graph is an
edge coloring in which the sequence of colors along any open path is
squarefree. We show that determining whether a graph $G$ has a nonrepetitive
$k$-coloring is $\Sigma_2^p$-complete. When we restrict to paths of lengths at
most $n$, the problem becomes NP-complete for fixed $n$.
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 20:56:42 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 22:05:37 GMT"
}
] | 2007-12-07T00:00:00 | [
[
"Manin",
"Fedor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.4506 | Alireza Bayesteh | Shahab Oveis Gharan, Alireza Bayesteh, Amir K. khandani | Optimum Diversity-Multiplexing Tradeoff in the Multiple Relays Network | null | null | null | Technical Report UW-E&CE#2007-19, University of Waterloo, April 11
2007 | cs.IT math.IT | null | In this paper, a multiple-relay network in considered, in which $K$
single-antenna relays assist a single-antenna transmitter to communicate with a
single-antenna receiver in a half-duplex mode. A new Amplify and Forward (AF)
scheme is proposed for this network and is shown to achieve the optimum
diversity-multiplexing trade-off curve.
| [
{
"version": "v1",
"created": "Thu, 27 Sep 2007 21:51:13 GMT"
}
] | 2007-10-01T00:00:00 | [
[
"Gharan",
"Shahab Oveis",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4513 | Jubin Jose | Jubin Jose, Alexei Ashikhmin, Phil Whiting, Sriram Vishwanath | Scheduling and Pre-Conditioning in Multi-User MIMO TDD Systems | 6 pages, 4 figures, ICC 2008 | null | null | null | cs.IT math.IT | null | The downlink transmission in multi-user multiple-input multiple-output (MIMO)
systems has been extensively studied from both communication-theoretic and
information-theoretic perspectives. Most of these papers assume
perfect/imperfect channel knowledge. In general, the problem of channel
training and estimation is studied separately. However, in interference-limited
communication systems with high mobility, this problem is tightly coupled with
the problem of maximizing throughput of the system. In this paper, scheduling
and pre-conditioning based schemes in the presence of reciprocal channel are
considered to address this. In the case of homogeneous users, a scheduling
scheme is proposed and an improved lower bound on the sum capacity is derived.
The problem of choosing training sequence length to maximize net throughput of
the system is studied. In the case of heterogeneous users, a modified
pre-conditioning method is proposed and an optimized pre-conditioning matrix is
derived. This method is combined with a scheduling scheme to further improve
net achievable weighted-sum rate.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 01:32:24 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2008 18:55:17 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Jose",
"Jubin",
""
],
[
"Ashikhmin",
"Alexei",
""
],
[
"Whiting",
"Phil",
""
],
[
"Vishwanath",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0709.4552 | Derek Groen | Derek Groen, Simon Portegies Zwart, Steve McMillan and Jun Makino | Distributed N-body Simulation on the Grid Using Dedicated Hardware | (in press) New Astronomy, 24 pages, 5 figures | NewAstron.13:348-358,2008 | 10.1016/j.newast.2007.11.004 | null | astro-ph cs.DC | null | We present performance measurements of direct gravitational N -body
simulation on the grid, with and without specialized (GRAPE-6) hardware. Our
inter-continental virtual organization consists of three sites, one in Tokyo,
one in Philadelphia and one in Amsterdam. We run simulations with up to 196608
particles for a variety of topologies. In many cases, high performance
simulations over the entire planet are dominated by network bandwidth rather
than latency. With this global grid of GRAPEs our calculation time remains
dominated by communication over the entire range of N, which was limited due to
the use of three sites. Increasing the number of particles will result in a
more efficient execution. Based on these timings we construct and calibrate a
model to predict the performance of our simulation on any grid infrastructure
with or without GRAPE. We apply this model to predict the simulation
performance on the Netherlands DAS-3 wide area computer. Equipping the DAS-3
with GRAPE-6Af hardware would achieve break-even between calculation and
communication at a few million particles, resulting in a compute time of just
over ten hours for 1 N -body time unit. Key words: high-performance computing,
grid, N-body simulation, performance modelling
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 08:48:31 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2007 09:51:26 GMT"
}
] | 2008-11-26T00:00:00 | [
[
"Groen",
"Derek",
""
],
[
"Zwart",
"Simon Portegies",
""
],
[
"McMillan",
"Steve",
""
],
[
"Makino",
"Jun",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.4558 | Jeremy Lee | Jeremy Lee | Practical Multiwriter Lock-Free Queues for "Hard Real-Time" Systems
without CAS | 9 Pages, Preprint | null | null | null | cs.OS cs.DC | null | FIFO queues with a single reader and writer can be insufficient for "hard
real-time" systems where interrupt handlers require wait-free guarantees when
writing to message queues. We present an algorithm which elegantly and
practically solves this problem on small processors that are often found in
embedded systems. The algorithm does not require special CPU instructions (such
as atomic CAS), and therefore is more robust than many existing methods that
suffer the ABA problem associated with swing pointers. The algorithm gives
"first-in, almost first-out" guarantees under pathological interrupt
conditions, which manifests as arbitrary "shoving" among nearly-simultaneous
arrivals at the end of the queue.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 09:04:27 GMT"
}
] | 2007-10-01T00:00:00 | [
[
"Lee",
"Jeremy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0709.4565 | Guillaume Theyssier | Mathieu Sablik (UMPA-ENSL), Guillaume Theyssier (LM-Savoie) | Topological Dynamics of 2D Cellular Automata | null | 4th Conference on Computability in Europe, CiE 2008, Athens :
Gr\`ece (2008) | 10.1007/978-3-540-69407-6 | null | cs.DM | null | Topological dynamics of cellular automata (CA), inherited from classical
dynamical systems theory, has been essentially studied in dimension 1. This
paper focuses on 2D CA and aims at showing that the situation is different and
more complex. The main results are the existence of non sensitive CA without
equicontinuous points, the non-recursivity of sensitivity constants and the
existence of CA having only non-recursive equicontinuous points. They all show
a difference between the 1D and the 2D case. Thanks to these new constructions,
we also extend undecidability results concerning topological classification
previously obtained in the 1D case.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 09:37:34 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jan 2008 11:02:43 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Mar 2008 08:54:22 GMT"
}
] | 2009-04-29T00:00:00 | [
[
"Sablik",
"Mathieu",
"",
"UMPA-ENSL"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0709.4655 | Jan Van den Bussche | Jan Van den Bussche | Mining for trees in a graph is NP-complete | null | null | null | null | cs.DB cs.AI | null | Mining for trees in a graph is shown to be NP-complete.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 17:08:39 GMT"
}
] | 2007-10-01T00:00:00 | [
[
"Bussche",
"Jan Van den",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0709.4669 | Muhammad Marwan Muhammad Fuad | Muhammad Marwan Muhammad Fuad (VALORIA), Pierre-Fran\c{c}ois Marteau
(VALORIA) | The Extended Edit Distance Metric | Technical report | Content-Based Multimedia Indexing, CBMI 2008, london : United
Kingdom (2008) | 10.1109/CBMI.2008.4564953 | null | cs.IR | null | Similarity search is an important problem in information retrieval. This
similarity is based on a distance. Symbolic representation of time series has
attracted many researchers recently, since it reduces the dimensionality of
these high dimensional data objects. We propose a new distance metric that is
applied to symbolic data objects and we test it on time series data bases in a
classification task. We compare it to other distances that are well known in
the literature for symbolic data objects. We also prove, mathematically, that
our distance is metric.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 18:45:48 GMT"
}
] | 2010-06-18T00:00:00 | [
[
"Fuad",
"Muhammad Marwan Muhammad",
"",
"VALORIA"
],
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0709.4671 | Ruoheng Liu | Ruoheng Liu and H. Vincent Poor | Secrecy Capacity Region of a Multi-Antenna Gaussian Broadcast Channel
with Confidential Messages | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In wireless data networks, communication is particularly susceptible to
eavesdropping due to its broadcast nature. Security and privacy systems have
become critical for wireless providers and enterprise networks. This paper
considers the problem of secret communication over the Gaussian broadcast
channel, where a multi-antenna transmitter sends independent confidential
messages to two users with information-theoretic secrecy. That is, each user
would like to obtain its own confidential message in a reliable and safe
manner. This communication model is referred to as the multi-antenna Gaussian
broadcast channel with confidential messages (MGBC-CM). Under this
communication scenario, a secret dirty-paper coding scheme and the
corresponding achievable secrecy rate region are first developed based on
Gaussian codebooks. Next, a computable Sato-type outer bound on the secrecy
capacity region is provided for the MGBC-CM. Furthermore, the Sato-type outer
bound prove to be consistent with the boundary of the secret dirty-paper coding
achievable rate region, and hence, the secrecy capacity region of the MGBC-CM
is established. Finally, two numerical examples demonstrate that both users can
achieve positive rates simultaneously under the information-theoretic secrecy
requirement.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 19:10:03 GMT"
}
] | 2007-10-01T00:00:00 | [
[
"Liu",
"Ruoheng",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0009 | Adam Lipowski | Adam Lipowski and Dorota Lipowska | Bio-linguistic transition and Baldwin effect in an evolutionary
naming-game model | 7 pages, minor changes, accepted in Int.J.Mod.Phys.C, proceedings of
Max Born Symp. Wroclaw (Poland), Sept. 2007. Java applet is available at
http://spin.amu.edu.pl/~lipowski/biolin.html or
http://www.amu.edu.pl/~lipowski/biolin.html | Int.J.Mod.Phys. C vol.19, pp. 399-407 (2008) | 10.1142/S0129183108012248 | null | cs.CL cond-mat.stat-mech cs.AI physics.soc-ph q-bio.PE | null | We examine an evolutionary naming-game model where communicating agents are
equipped with an evolutionarily selected learning ability. Such a coupling of
biological and linguistic ingredients results in an abrupt transition: upon a
small change of a model control parameter a poorly communicating group of
linguistically unskilled agents transforms into almost perfectly communicating
group with large learning abilities. When learning ability is kept fixed, the
transition appears to be continuous. Genetic imprinting of the learning
abilities proceeds via Baldwin effect: initially unskilled communicating agents
learn a language and that creates a niche in which there is an evolutionary
pressure for the increase of learning ability.Our model suggests that when
linguistic (or cultural) processes became intensive enough, a transition took
place where both linguistic performance and biological endowment of our species
experienced an abrupt change that perhaps triggered the rapid expansion of
human civilization.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 09:39:49 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Oct 2007 13:20:17 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Lipowski",
"Adam",
""
],
[
"Lipowska",
"Dorota",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
0710.0013 | Jason Johnson | Jason K. Johnson, Dmitry M. Malioutov, Alan S. Willsky | Lagrangian Relaxation for MAP Estimation in Graphical Models | 10 pages, presented at 45th Allerton conference on communication,
control and computing, to appear in proceedings | null | null | null | cs.AI | null | We develop a general framework for MAP estimation in discrete and Gaussian
graphical models using Lagrangian relaxation techniques. The key idea is to
reformulate an intractable estimation problem as one defined on a more
tractable graph, but subject to additional constraints. Relaxing these
constraints gives a tractable dual problem, one defined by a thin graph, which
is then optimized by an iterative procedure. When this iterative optimization
leads to a consistent estimate, one which also satisfies the constraints, then
it corresponds to an optimal MAP estimate of the original model. Otherwise
there is a ``duality gap'', and we obtain a bound on the optimal solution.
Thus, our approach combines convex optimization with dynamic programming
techniques applicable for thin graphs. The popular tree-reweighted max-product
(TRMP) method may be seen as solving a particular class of such relaxations,
where the intractable graph is relaxed to a set of spanning trees. We also
consider relaxations to a set of small induced subgraphs, thin subgraphs (e.g.
loops), and a connected tree obtained by ``unwinding'' cycles. In addition, we
propose a new class of multiscale relaxations that introduce ``summary''
variables. The potential benefits of such generalizations include: reducing or
eliminating the ``duality gap'' in hard problems, reducing the number or
Lagrange multipliers in the dual problem, and accelerating convergence of the
iterative optimization procedure.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 21:29:43 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Johnson",
"Jason K.",
""
],
[
"Malioutov",
"Dmitry M.",
""
],
[
"Willsky",
"Alan S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.0020 | Moslem Noori | Moslem Noori, Masoud Ardakani | A Probability Model for Lifetime of Wireless Sensor Networks | 9 Pages, Submitted to INFOCOM 2008 | null | null | null | cs.NI | null | Considering a wireless sensor network whose nodes are distributed randomly
over a given area, a probability model for the network lifetime is provided.
Using this model and assuming that packet generation follows a Poisson
distribution, an analytical expression for the complementary cumulative density
function (ccdf) of the lifetime is obtained. Using this ccdf, one can
accurately find the probability that the network achieves a given lifetime. It
is also shown that when the number of sensors, $N$, is large, with an error
exponentially decaying with $N$, one can predict whether or not a certain
lifetime can be achieved. The results of this work are obtained for both
multi-hop and single-hop wireless sensor networks and are verified with
computer simulation. The approaches of this paper are shown to be applicable to
other packet generation models and the effect of the area shape is also
investigated.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 22:12:42 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Noori",
"Moslem",
""
],
[
"Ardakani",
"Masoud",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.0021 | Maryna Nesterenko dr. | Maryna Nesterenko, Jiri Patera, Dmytro Zhavrotskyj | New families of cryptographic systems | null | null | null | null | cs.CR math.GM | null | A symmetric encryption method based on properties of quasicrystals is
proposed. The advantages of the cipher are strict aperiodicity and everywhere
discontinuous property as well as the speed of computation, simplicity of
implementation and a straightforward possibility of extending the method to
encryption of higher dimensional data.
| [
{
"version": "v1",
"created": "Fri, 28 Sep 2007 22:15:28 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Nesterenko",
"Maryna",
""
],
[
"Patera",
"Jiri",
""
],
[
"Zhavrotskyj",
"Dmytro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0710.0043 | Julian McAuley | Julian J. McAuley, Tiberio S. Caetano and Marconi S. Barbosa | Graph rigidity, Cyclic Belief Propagation and Point Pattern Matching | 9 pages, 8 figures | null | null | null | cs.CV | null | A recent paper \cite{CaeCaeSchBar06} proposed a provably optimal, polynomial
time method for performing near-isometric point pattern matching by means of
exact probabilistic inference in a chordal graphical model. Their fundamental
result is that the chordal graph in question is shown to be globally rigid,
implying that exact inference provides the same matching solution as exact
inference in a complete graphical model. This implies that the algorithm is
optimal when there is no noise in the point patterns. In this paper, we present
a new graph which is also globally rigid but has an advantage over the graph
proposed in \cite{CaeCaeSchBar06}: its maximal clique size is smaller,
rendering inference significantly more efficient. However, our graph is not
chordal and thus standard Junction Tree algorithms cannot be directly applied.
Nevertheless, we show that loopy belief propagation in such a graph converges
to the optimal solution. This allows us to retain the optimality guarantee in
the noiseless case, while substantially reducing both memory requirements and
processing time. Our experimental results show that the accuracy of the
proposed solution is indistinguishable from that of \cite{CaeCaeSchBar06} when
there is noise in the point patterns.
| [
{
"version": "v1",
"created": "Sat, 29 Sep 2007 06:19:09 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Oct 2007 06:54:12 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"McAuley",
"Julian J.",
""
],
[
"Caetano",
"Tiberio S.",
""
],
[
"Barbosa",
"Marconi S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.0083 | Andrew McGregor | Stanislav Angelov, Keshav Kunal, Andrew McGregor | Sorting and Selection with Random Costs | null | null | null | null | cs.DS | null | There is a growing body of work on sorting and selection in models other than
the unit-cost comparison model. This work is the first treatment of a natural
stochastic variant of the problem where the cost of comparing two elements is a
random variable. Each cost is chosen independently and is known to the
algorithm. In particular we consider the following three models: each cost is
chosen uniformly in the range $[0,1]$, each cost is 0 with some probability $p$
and 1 otherwise, or each cost is 1 with probability $p$ and infinite otherwise.
We present lower and upper bounds (optimal in most cases) for these problems.
We obtain our upper bounds by carefully designing algorithms to ensure that the
costs incurred at various stages are independent and using properties of random
partial orders when appropriate.
| [
{
"version": "v1",
"created": "Sat, 29 Sep 2007 18:10:28 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Angelov",
"Stanislav",
""
],
[
"Kunal",
"Keshav",
""
],
[
"McGregor",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.0105 | Dmitrii Manin | Dmitrii Manin | Zipf's Law and Avoidance of Excessive Synonymy | 47 pages; fixed reference list missing in v.1 | Main text in Cognitive Science, 32 (7) 2008, pp. 1075 - 1098;
Appendix A TBP separately in J. Quant. Ling. | 10.1080/03640210802020003 | null | cs.CL physics.soc-ph | null | Zipf's law states that if words of language are ranked in the order of
decreasing frequency in texts, the frequency of a word is inversely
proportional to its rank. It is very robust as an experimental observation, but
to date it escaped satisfactory theoretical explanation. We suggest that Zipf's
law may arise from the evolution of word semantics dominated by expansion of
meanings and competition of synonyms.
| [
{
"version": "v1",
"created": "Sun, 30 Sep 2007 03:21:54 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Oct 2007 03:36:45 GMT"
}
] | 2009-01-22T00:00:00 | [
[
"Manin",
"Dmitrii",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0710.0116 | Amichai Sanderovich | Amichai Sanderovich, Shlomo Shamai (Shitz) and Yossef Steinberg | Distributed MIMO receiver - Achievable rates and upper bounds | null | null | null | null | cs.IT math.IT | null | In this paper we investigate the achievable rate of a system that includes a
nomadic transmitter with several antennas, which is received by multiple
agents, exhibiting independent channel gains and additive circular-symmetric
complex Gaussian noise. In the nomadic regime, we assume that the agents do not
have any decoding ability. These agents process their channel observations and
forward them to the final destination through lossless links with a fixed
capacity. We propose new achievable rates based on elementary compression and
also on a Wyner-Ziv (CEO-like) processing, for both fast fading and block
fading channels, as well as for general discrete channels. The simpler two
agents scheme is solved, up to an implicit equation with a single variable.
Limiting the nomadic transmitter to a circular-symmetric complex Gaussian
signalling, new upper bounds are derived for both fast and block fading, based
on the vector version of the entropy power inequality. These bounds are then
compared to the achievable rates in several extreme scenarios. The asymptotic
setting with numbers of agents and transmitter's antennas taken to infinity is
analyzed. In addition, the upper bounds are analytically shown to be tight in
several examples, while numerical calculations reveal a rather small gap in a
finite $2\times2$ setting. The advantage of the Wyner-Ziv approach over
elementary compression is shown where only the former can achieve the full
diversity-multiplexing tradeoff. We also consider the non-nomadic setting, with
agents that can decode. Here we give an achievable rate, over fast fading
channel, which combines broadcast with dirty paper coding and the decentralized
reception, which was introduced for the nomadic setting.
| [
{
"version": "v1",
"created": "Sun, 30 Sep 2007 08:22:15 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Sanderovich",
"Amichai",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
],
[
"Steinberg",
"Yossef",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0142 | Marco Baldi | Marco Baldi | LDPC codes in the McEliece cryptosystem: attacks and countermeasures | NATO Advanced Research Workshop 2008: Enhancing Crypto-Primitives
with Techniques from Coding Theory | NATO Science for Peace and Security Series - D: Information and
Communication Security, vol. 23, pp. 160-174, IOS Press, 2009. Edited by Bart
Preneel, Stefan Dodunekov, Vincent Rijmen, Svetla Nikova. ISBN
978-1-60750-002-5 | 10.3233/978-1-60750-002-5-160 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The McEliece cryptosystem is a public-key cryptosystem based on coding theory
that has successfully resisted cryptanalysis for thirty years. The original
version, based on Goppa codes, is able to guarantee a high level of security,
and is faster than competing solutions, like RSA. Despite this, it has been
rarely considered in practical applications, due to two major drawbacks: i)
large size of the public key and ii) low transmission rate. Low-Density
Parity-Check (LDPC) codes are state-of-art forward error correcting codes that
permit to approach the Shannon limit while ensuring limited complexity.
Quasi-Cyclic (QC) LDPC codes are a particular class of LDPC codes, able to join
low complexity encoding of QC codes with high-performing and low-complexity
decoding of LDPC codes. In a previous work it has been proposed to adopt a
particular family of QC-LDPC codes in the McEliece cryptosystem to reduce the
key size and increase the transmission rate. Recently, however, new attacks
have been found that are able to exploit a flaw in the transformation from the
private key to the public one. Such attacks can be effectively countered by
changing the form of some constituent matrices, without altering the system
parameters. This work gives an overview of the QC-LDPC codes-based McEliece
cryptosystem and its cryptanalysis. Two recent versions are considered, and
their ability to counter all the currently known attacks is discussed. A third
version able to reach a higher security level is also proposed. Finally, it is
shown that the new QC-LDPC codes-based cryptosystem scales favorably with the
key length.
| [
{
"version": "v1",
"created": "Sun, 30 Sep 2007 14:33:00 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jan 2009 11:53:29 GMT"
}
] | 2009-10-20T00:00:00 | [
[
"Baldi",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0169 | Andrew Krizhanovsky A | A. A. Krizhanovsky | Evaluation experiments on related terms search in Wikipedia: Information
Content and Adapted HITS (In Russian) | 10 pages, 1 figure, 3 tables, in Russian, short version of the paper
to be published in Proceedings of the Wiki-Conference 2007, Russia, St.
Petersburg, October 27-28. http://tinyurl.com/2czd6e ; v3: +figure; v4: typo
in Table 3; v5: +desc (res_hypo formula); v6: typo | null | null | null | cs.IR cs.CL | null | The classification of metrics and algorithms search for related terms via
WordNet, Roget's Thesaurus, and Wikipedia was extended to include adapted HITS
algorithm. Evaluation experiments on Information Content and adapted HITS
algorithm are described. The test collection of Russian word pairs with
human-assigned similarity judgments is proposed.
-----
Klassifikacija metrik i algoritmov poiska semanticheski blizkih slov v
tezaurusah WordNet, Rozhe i jenciklopedii Vikipedija rasshirena adaptirovannym
HITS algoritmom. S pomow'ju jeksperimentov v Vikipedii oceneny metrika
Information Content i adaptirovannyj algoritm HITS. Predlozhen resurs dlja
ocenki semanticheskoj blizosti russkih slov.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 16:04:52 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Oct 2007 06:21:01 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Oct 2007 15:38:57 GMT"
},
{
"version": "v4",
"created": "Sun, 14 Oct 2007 14:44:03 GMT"
},
{
"version": "v5",
"created": "Sun, 4 Nov 2007 11:05:26 GMT"
},
{
"version": "v6",
"created": "Wed, 16 Jan 2008 17:31:14 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Krizhanovsky",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.0192 | Tomas Filler | Tomas Filler and Jessica Fridrich | Binary quantization using Belief Propagation with decimation over factor
graphs of LDGM codes | Forty-Fifth Annual Allerton Conference on Communication, Control, and
Computing, 2007, 10 pages, 6 figures | null | null | null | cs.IT math.IT | null | We propose a new algorithm for binary quantization based on the Belief
Propagation algorithm with decimation over factor graphs of Low Density
Generator Matrix (LDGM) codes. This algorithm, which we call Bias Propagation
(BiP), can be considered as a special case of the Survey Propagation algorithm
proposed for binary quantization by Wainwright et al. [8]. It achieves the same
near-optimal rate-distortion performance with a substantially simpler framework
and 10-100 times faster implementation. We thus challenge the widespread belief
that binary quantization based on sparse linear codes cannot be solved by
simple Belief Propagation algorithms. Finally, we give examples of suitably
irregular LDGM codes that work with the BiP algorithm and show their
performance.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 02:14:40 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Filler",
"Tomas",
""
],
[
"Fridrich",
"Jessica",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0198 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | Z4-Linear Perfect Codes | 15p. Bibliography updated | transl. from: Diskretn. Anal. Issled. Oper. Ser.1., 7(4) 2000,
78-90 [Russian] | null | null | cs.IT math.IT | null | For every $n = 2^k > 8$ there exist exactly $[(k+1)/2]$ mutually
nonequivalent $Z_4$-linear extended perfect codes with distance 4. All these
codes have different ranks.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 05:58:04 GMT"
}
] | 2008-05-10T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0199 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | Z4-linear Hadamard and extended perfect codes | 7p. WCC-2001 | Electron. Notes Discrete Math. 6 (2001) 107-112 | 10.1016/S1571-0653(04)00161-1 | null | cs.IT math.IT | null | If $N=2^k > 8$ then there exist exactly $[(k-1)/2]$ pairwise nonequivalent
$Z_4$-linear Hadamard $(N,2N,N/2)$-codes and $[(k+1)/2]$ pairwise nonequivalent
$Z_4$-linear extended perfect $(N,2^N/2N,4)$-codes. A recurrent construction of
$Z_4$-linear Hadamard codes is given.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 07:33:13 GMT"
}
] | 2008-05-10T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0213 | Marc Schoenauer | Fei Jiang (INRIA Futurs, INRIA Futurs), Hugues Berry (INRIA Futurs),
Marc Schoenauer (INRIA Futurs) | Optimising the topology of complex neural networks | null | Dans ECCS'07 (2007) | null | null | cs.NE cs.AI | null | In this paper, we study instances of complex neural networks, i.e. neural
netwo rks with complex topologies. We use Self-Organizing Map neural networks
whose n eighbourhood relationships are defined by a complex network, to
classify handwr itten digits. We show that topology has a small impact on
performance and robus tness to neuron failures, at least at long learning
times. Performance may howe ver be increased (by almost 10%) by artificial
evolution of the network topo logy. In our experimental conditions, the evolved
networks are more random than their parents, but display a more heterogeneous
degree distribution.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 06:51:42 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Jiang",
"Fei",
"",
"INRIA Futurs, INRIA Futurs"
],
[
"Berry",
"Hugues",
"",
"INRIA Futurs"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.0225 | Dmitry Lande | D.V. Lande, A.A. Snarskii | On the role of autocorrelations in texts | 5 pages, 4 figures, 5 references | null | null | null | cs.CL | null | The task of finding a criterion allowing to distinguish a text from an
arbitrary set of words is rather relevant in itself, for instance, in the
aspect of development of means for internet-content indexing or separating
signals and noise in communication channels. The Zipf law is currently
considered to be the most reliable criterion of this kind [3]. At any rate,
conventional stochastic word sets do not meet this law. The present paper deals
with one of possible criteria based on the determination of the degree of data
compression.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 08:23:24 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Lande",
"D. V.",
""
],
[
"Snarskii",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.0228 | Dmitry Lande | S. Braichevsky, D. Lande, A. Snarskii | On the fractal nature of mutual relevance sequences in the Internet news
message flows | 6 pages, 56 figures | null | null | null | cs.CL | null | In the task of information retrieval the term relevance is taken to mean
formal conformity of a document given by the retrieval system to user's
information query. As a rule, the documents found by the retrieval system
should be submitted to the user in a certain order. Therefore, a retrieval
perceived as a selection of documents formally solving the user's query, should
be supplemented with a certain procedure of processing a relevant set. It would
be natural to introduce a quantitative measure of document conformity to query,
i.e. the relevance measure. Since no single rule exists for the determination
of the relevance measure, we shall consider two of them which are the simplest
in our opinion. The proposed approach does not suppose any restrictions and can
be applied to other relevance measures.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 08:31:56 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Braichevsky",
"S.",
""
],
[
"Lande",
"D.",
""
],
[
"Snarskii",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.0232 | Maurice Margenstern | Maurice Margenstern | Constructing a uniform plane-filling path in the ternary heptagrid of
the hyperbolic plane | null | null | null | null | cs.CG cs.DM | null | In this paper, we distinguish two levels for the plane-filling property. We
consider a simple and a strong one. In this paper, we give the construction
which proves that the simple plane-filling property also holds for the
hyperbolic plane. The plane-filling property was established for the Euclidean
plane by J. Kari, in 1994, in the strong version.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 08:42:03 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.0243 | Julian McAuley | Julian John McAuley, Tiberio S. Caetano | High-Order Nonparametric Belief-Propagation for Fast Image Inpainting | 8 pages, 6 figures | null | null | null | cs.CV | null | In this paper, we use belief-propagation techniques to develop fast
algorithms for image inpainting. Unlike traditional gradient-based approaches,
which may require many iterations to converge, our techniques achieve
competitive results after only a few iterations. On the other hand, while
belief-propagation techniques are often unable to deal with high-order models
due to the explosion in the size of messages, we avoid this problem by
approximating our high-order prior model using a Gaussian mixture. By using
such an approximation, we are able to inpaint images quickly while at the same
time retaining good visual results.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 09:18:36 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"McAuley",
"Julian John",
""
],
[
"Caetano",
"Tiberio S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.0244 | Philip Baback Alipour | Philip B. Alipour | Theoretical Engineering and Satellite Comlink of a PTVD-SHAM System | 50 pages, 10 figures (3 multi-figures), 2 tables. v.1: 1 postulate
entailing hypothetical ideas, design and model on future technological
advances of PTVD-SHAM. The results of the previous paper [arXiv:0707.1151v6],
are extended in order to prove some introductory conjectures in theoretical
engineering advanced to architectural analysis | null | null | null | cs.CE cs.AR | null | This paper focuses on super helical memory system's design, 'Engineering,
Architectural and Satellite Communications' as a theoretical approach of an
invention-model to 'store time-data'. The current release entails three
concepts: 1- an in-depth theoretical physics engineering of the chip including
its, 2- architectural concept based on VLSI methods, and 3- the time-data
versus data-time algorithm. The 'Parallel Time Varying & Data Super-helical
Access Memory' (PTVD-SHAM), possesses a waterfall effect in its architecture
dealing with the process of voltage output-switch into diverse logic and
quantum states described as 'Boolean logic & image-logic', respectively.
Quantum dot computational methods are explained by utilizing coiled carbon
nanotubes (CCNTs) and CNT field effect transistors (CNFETs) in the chip's
architecture. Quantum confinement, categorized quantum well substrate, and
B-field flux involvements are discussed in theory. Multi-access of coherent
sequences of 'qubit addressing' in any magnitude, gained as pre-defined, here
e.g., the 'big O notation' asymptotically confined into singularity while
possessing a magnitude of 'infinity' for the orientation of array displacement.
Gaussian curvature of k<0 versus k'>(k<0) is debated in aim of specifying the
2D electron gas characteristics, data storage system for defining short and
long time cycles for different CCNT diameters where space-time continuum is
folded by chance for the particle. Precise pre/post data timing for, e.g.,
seismic waves before earthquake mantle-reach event occurrence, including time
varying self-clocking devices in diverse geographic locations for radar systems
is illustrated in the Subsections of the paper. The theoretical fabrication
process, electromigration between chip's components is discussed as well.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 09:35:30 GMT"
}
] | 2009-12-05T00:00:00 | [
[
"Alipour",
"Philip B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.0262 | Sebastian Roch | Elchanan Mossel and Sebastien Roch | Incomplete Lineage Sorting: Consistent Phylogeny Estimation From
Multiple Loci | Added a section on more general distance-based methods | null | null | null | q-bio.PE cs.CE cs.DS math.PR math.ST stat.TH | null | We introduce a simple algorithm for reconstructing phylogenies from multiple
gene trees in the presence of incomplete lineage sorting, that is, when the
topology of the gene trees may differ from that of the species tree. We show
that our technique is statistically consistent under standard stochastic
assumptions, that is, it returns the correct tree given sufficiently many
unlinked loci. We also show that it can tolerate moderate estimation errors.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 11:11:43 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Nov 2007 03:41:04 GMT"
}
] | 2011-09-30T00:00:00 | [
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.0270 | Supriya Krishnamurthy | Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi | An Analytical Study of a Structured Overlay in the presence of Dynamic
Membership | 12 pages, 14 figures, to appear in IEEE/ACM Transactions on
Networking | null | 10.1109/TNET.2007.905590 | null | cs.NI cond-mat.stat-mech cs.DC | null | In this paper we present an analytical study of dynamic membership (aka
churn) in structured peer-to-peer networks. We use a fluid model approach to
describe steady-state or transient phenomena, and apply it to the Chord system.
For any rate of churn and stabilization rates, and any system size, we
accurately account for the functional form of the probability of network
disconnection as well as the fraction of failed or incorrect successor and
finger pointers. We show how we can use these quantities to predict both the
performance and consistency of lookups under churn. All theoretical predictions
match simulation results. The analysis includes both features that are generic
to structured overlays deploying a ring as well as Chord-specific details, and
opens the door to a systematic comparative analysis of, at least, ring-based
structured overlay systems under churn.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 12:17:43 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Krishnamurthy",
"Supriya",
""
],
[
"El-Ansary",
"Sameh",
""
],
[
"Aurell",
"Erik",
""
],
[
"Haridi",
"Seif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.0291 | Wenyi Zhang | Wenyi Zhang, Urbashi Mitra | On Outage Behavior of Wideband Slow-Fading Channels | Extended abstract presented at 2007 Allerton Conference | null | null | null | cs.IT math.IT | null | This paper investigates point-to-point information transmission over a
wideband slow-fading channel, modeled as an (asymptotically) large number of
independent identically distributed parallel channels, with the random channel
fading realizations remaining constant over the entire coding block. On the one
hand, in the wideband limit the minimum achievable energy per nat required for
reliable transmission, as a random variable, converges in probability to
certain deterministic quantity. On the other hand, the exponential decay rate
of the outage probability, termed as the wideband outage exponent,
characterizes how the number of parallel channels, {\it i.e.}, the
``bandwidth'', should asymptotically scale in order to achieve a targeted
outage probability at a targeted energy per nat. We examine two scenarios: when
the transmitter has no channel state information and adopts uniform transmit
power allocation among parallel channels; and when the transmitter is endowed
with an one-bit channel state feedback for each parallel channel and
accordingly allocates its transmit power. For both scenarios, we evaluate the
wideband minimum energy per nat and the wideband outage exponent, and discuss
their implication for system performance.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 03:47:03 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Zhang",
"Wenyi",
""
],
[
"Mitra",
"Urbashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0318 | Alexander Tiskin | Vladimir Deineko and Alexander Tiskin | Fast minimum-weight double-tree shortcutting for Metric TSP: Is the best
one good enough? | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Metric Traveling Salesman Problem (TSP) is a classical NP-hard
optimization problem. The double-tree shortcutting method for Metric TSP yields
an exponentially-sized space of TSP tours, each of which approximates the
optimal solution within at most a factor of 2. We consider the problem of
finding among these tours the one that gives the closest approximation, i.e.\
the \emph{minimum-weight double-tree shortcutting}. Burkard et al. gave an
algorithm for this problem, running in time $O(n^3+2^d n^2)$ and memory $O(2^d
n^2)$, where $d$ is the maximum node degree in the rooted minimum spanning
tree. We give an improved algorithm for the case of small $d$ (including planar
Euclidean TSP, where $d \leq 4$), running in time $O(4^d n^2)$ and memory
$O(4^d n)$. This improvement allows one to solve the problem on much larger
instances than previously attempted. Our computational experiments suggest that
in terms of the time-quality tradeoff, the minimum-weight double-tree
shortcutting method provides one of the best known tour-constructing
heuristics.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 15:25:18 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Jun 2009 16:17:30 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Jul 2009 16:17:25 GMT"
}
] | 2009-07-16T00:00:00 | [
[
"Deineko",
"Vladimir",
""
],
[
"Tiskin",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.0360 | Sylvain Perifel | Pascal Koiran (LIP), Sylvain Perifel (LIP) | Interpolation in Valiant's theory | 13 pages | null | null | null | cs.CC | null | We investigate the following question: if a polynomial can be evaluated at
rational points by a polynomial-time boolean algorithm, does it have a
polynomial-size arithmetic circuit? We argue that this question is certainly
difficult. Answering it negatively would indeed imply that the constant-free
versions of the algebraic complexity classes VP and VNP defined by Valiant are
different. Answering this question positively would imply a transfer theorem
from boolean to algebraic complexity. Our proof method relies on Lagrange
interpolation and on recent results connecting the (boolean) counting hierarchy
to algebraic complexity classes. As a byproduct we obtain two additional
results: (i) The constant-free, degree-unbounded version of Valiant's
hypothesis that VP and VNP differ implies the degree-bounded version. This
result was previously known to hold for fields of positive characteristic only.
(ii) If exponential sums of easy to compute polynomials can be computed
efficiently, then the same is true of exponential products. We point out an
application of this result to the P=NP problem in the Blum-Shub-Smale model of
computation over the field of complex numbers.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 18:58:19 GMT"
}
] | 2007-10-02T00:00:00 | [
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Perifel",
"Sylvain",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
Subsets and Splits