id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0709.2506
Tshilidzi Marwala
Vukosi N. Marivate, Fulufhelo V. Nelwamodo, Tshilidzi Marwala
Autoencoder, Principal Component Analysis and Support Vector Regression for Data Imputation
9 pages
null
null
null
cs.AI cs.DB
null
Data collection often results in records that have missing values or variables. This investigation compares 3 different data imputation models and identifies their merits by using accuracy measures. Autoencoder Neural Networks, Principal components and Support Vector regression are used for prediction and combined with a genetic algorithm to then impute missing variables. The use of PCA improves the overall performance of the autoencoder network while the use of support vector regression shows promising potential for future investigation. Accuracies of up to 97.4 % on imputation of some of the variables were achieved.
[ { "version": "v1", "created": "Sun, 16 Sep 2007 18:15:01 GMT" } ]
2007-09-18T00:00:00
[ [ "Marivate", "Vukosi N.", "" ], [ "Nelwamodo", "Fulufhelo V.", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0709.2512
Chao Chen
Chao Chen, Daniel Freedman
Quantifying Homology Classes II: Localization and Stability
The "companion paper" referred in this paper is another version of the paper "Measuring and localizing homology classes" by the same authors. Sept. 21st: authors name fixed
null
null
null
cs.CG cs.CC math.AT
null
In the companion paper, we measured homology classes and computed the optimal homology basis. This paper addresses two related problems, namely, localization and stability. We localize a class with the cycle minimizing a certain objective function. We explore three different objective functions, namely, volume, diameter and radius. We show that it is NP-hard to compute the smallest cycle using the former two. We also prove that the measurement defined in the companion paper is stable with regard to small changes of the geometry of the concerned space.
[ { "version": "v1", "created": "Sun, 16 Sep 2007 20:48:49 GMT" }, { "version": "v2", "created": "Fri, 21 Sep 2007 16:41:02 GMT" } ]
2011-11-10T00:00:00
[ [ "Chen", "Chao", "" ], [ "Freedman", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
0709.2525
Jesse Gilbert D
Jesse Gilbert
H-Decompositions
This paper has been withdrawn by the author
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that for all graphs H of size n, the complete graph $K_{2n+1}$ has an $H$-decomposition.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 04:30:39 GMT" }, { "version": "v2", "created": "Fri, 5 Oct 2007 10:19:59 GMT" }, { "version": "v3", "created": "Mon, 12 May 2008 22:03:55 GMT" }, { "version": "v4", "created": "Tue, 16 Sep 2008 16:58:22 GMT" }, { "version": "v5", "created": "Thu, 29 Jul 2010 20:46:27 GMT" } ]
2010-08-02T00:00:00
[ [ "Gilbert", "Jesse", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.2562
Paolo Laureti
Marcel Blattner, Alexander Hunziker, Paolo Laureti
When are recommender systems useful?
null
null
null
null
cs.IR cs.CY cs.DL cs.DS physics.data-an physics.soc-ph
null
Recommender systems are crucial tools to overcome the information overload brought about by the Internet. Rigorous tests are needed to establish to what extent sophisticated methods can improve the quality of the predictions. Here we analyse a refined correlation-based collaborative filtering algorithm and compare it with a novel spectral method for recommending. We test them on two databases that bear different statistical properties (MovieLens and Jester) without filtering out the less active users and ordering the opinions in time, whenever possible. We find that, when the distribution of user-user correlations is narrow, simple averages work nearly as well as advanced methods. Recommender systems can, on the other hand, exploit a great deal of additional information in systems where external influence is negligible and peoples' tastes emerge entirely. These findings are validated by simulations with artificially generated data.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 09:27:07 GMT" } ]
2007-09-19T00:00:00
[ [ "Blattner", "Marcel", "" ], [ "Hunziker", "Alexander", "" ], [ "Laureti", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0709.2598
Holger Schnettler
Holger Schnettler
On the 3/4-Conjecture for Fix-Free Codes -- A Survey
null
null
null
null
cs.IT math.CO math.IT
null
In this survey we concern ourself with the question, wether there exists a fix-free code for a given sequence of codeword lengths. For a given alphabet, we obtain the {\em Kraftsum} of a code, if we divide for every length the number of codewords of this length in the code by the total number of all possible words of this length and then take summation over all codeword lengths which appears in the code. The same way the Kraftsum of a lengths sequence $(l_1,..., l_n) $ is given by $\sum_{i=1}^n q^{-l_i} $, where $q$ is the numbers of letters in the alphabet. Kraft and McMillan have shown in \cite{kraft} (1956), that there exists a prefix-free code with codeword lengths of a certain lengths sequence, if the Kraftsum of the lengths sequence is smaller than or equal to one. Furthermore they have shown, that the converse also holds for all (uniquely decipherable) codes.\footnote{In this survey a code means a set of words, such that any message which is encoded with these words can be uniquely decoded. Therefore we omit in future the "uniquely decipherable" and write only "code".} The question rises, if Kraft's and McMillan's result can be generalized to other types of codes? Throughout, we try to give an answer on this question for the class of fix-free codes. Since any code has Kraftsum smaller than or equal to one, this answers the question for the second implication of Kraft-McMillan's theorem. Therefore we pay attention mainly to the first implication.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 12:10:29 GMT" } ]
2007-09-18T00:00:00
[ [ "Schnettler", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2618
Andreea Picu
Andreea Picu (CITI, INRIA Rh\^one-Alpes), Antoine Fraboulet (CITI, INRIA Rh\^one-Alpes), Eric Fleury (CITI, INRIA Rh\^one-Alpes)
On Frequency Optimisation for Power Saving in WSNs: Finding Optimum Hardware Timers Frequencies
null
null
null
RR-6290
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks research and demand are now in full expansion, since people came to understand these are the key to a large number of issues in industry, commerce, home automation, healthcare, agriculture and environment, monitoring, public safety etc. One of the most challenging research problems in sensor networks research is power awareness and power-saving techniques. In this master's thesis, we have studied one particular power-saving technique, i.e. frequency scaling. In particular, we analysed the close relationship between clock frequencies in a microcontroller and several types of constraints imposed on these frequencies, e.g. by other components of the microcontroller, by protocol specifications, by external factors etc. Among these constraints, we were especially interested in the ones imposed by the timer service and by the serial ports' transmission rates. Our efforts resulted in a microcontroller configuration management tool which aims at assisting application programmers in choosing microcontroller configurations, in function of the particular needs and constraints of their application.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 06:25:50 GMT" }, { "version": "v2", "created": "Mon, 27 Feb 2012 14:50:50 GMT" } ]
2012-02-28T00:00:00
[ [ "Picu", "Andreea", "", "CITI, INRIA Rhône-Alpes" ], [ "Fraboulet", "Antoine", "", "CITI,\n INRIA Rhône-Alpes" ], [ "Fleury", "Eric", "", "CITI, INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.2635
Greg Kohring
G.A. Kohring and L. Lo Iacono
Non-Blocking Signature of very large SOAP Messages
13 pages, 5 figures
in H.-G. Hegering, A. Lehmann, H.J. Ohlbach and C. Scheideler, eds., INFORMATIK 2008, Beherrschbare Systeme - dank Informatik (Koellen Druck & Verlag GmbH, Bonn, 2008).
null
null
cs.DC
null
Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, problematic as a straightforward adoption of SOAP with MTOM introduces considerable inefficiencies in the signature generation process when large data sets are involved. This paper proposes a non-blocking, signature generation approach enabling a stream-like processing with considerable performance enhancements.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 13:50:42 GMT" } ]
2009-04-01T00:00:00
[ [ "Kohring", "G. A.", "" ], [ "Iacono", "L. Lo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.2689
Kettani Omar
Omar Kettani
An algorithm for solving the Independent Set problem
This paper has been withdrawn
null
null
null
cs.DM
null
This paper has been withdrawn by the author, due an error in claim 1.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 18:13:10 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 09:17:50 GMT" }, { "version": "v3", "created": "Fri, 21 Sep 2007 05:00:31 GMT" } ]
2011-11-10T00:00:00
[ [ "Kettani", "Omar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.2721
Yufang Xi
Yufang Xi and Edmund M. Yeh
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-hop Relay Networks
28 pages, 8 figures, submitted to JSAC on Game Theory in Communication Systems
null
null
null
cs.GT
null
We study a pricing game in multi-hop relay networks where nodes price their services and route their traffic selfishly and strategically. In this game, each node (1) announces pricing functions which specify the payments it demands from its respective customers depending on the amount of traffic they route to it and (2) allocates the total traffic it receives to its service providers. The profit of a node is the difference between the revenue earned from servicing others and the cost of using others' services. We show that the socially optimal routing of such a game can always be induced by an equilibrium where no node can increase its profit by unilaterally changing its pricing functions or routing decision. On the other hand, there may also exist inefficient equilibria. We characterize the loss of efficiency by deriving the price of anarchy at inefficient equilibria. We show that the price of anarchy is finite for oligopolies with concave marginal cost functions, while it is infinite for general topologies and cost functions.
[ { "version": "v1", "created": "Mon, 17 Sep 2007 20:52:29 GMT" }, { "version": "v2", "created": "Mon, 15 Oct 2007 17:16:17 GMT" } ]
2007-10-15T00:00:00
[ [ "Xi", "Yufang", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0709.2813
Luca Giuzzi
L. Giuzzi, A. Sonnino
LDPC codes from Singer cycles
11 Pages
Discrete Applied Mathematics 157: 1723-1728 (2009)
10.1016/j.dam.2009.01.013
null
cs.IT math.IT
null
The main goal of coding theory is to devise efficient systems to exploit the full capacity of a communication channel, thus achieving an arbitrarily small error probability. Low Density Parity Check (LDPC) codes are a family of block codes--characterised by admitting a sparse parity check matrix--with good correction capabilities. In the present paper the orbits of subspaces of a finite projective space under the action of a Singer cycle are investigated.
[ { "version": "v1", "created": "Tue, 18 Sep 2007 15:17:21 GMT" } ]
2009-07-18T00:00:00
[ [ "Giuzzi", "L.", "" ], [ "Sonnino", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2831
Monique Teillaud
Mridul Aanjaneya, Monique Teillaud (INRIA Sophia Antipolis)
Triangulating the Real Projective Plane
null
null
null
null
cs.CG
null
We consider the problem of computing a triangulation of the real projective plane P2, given a finite point set S={p1, p2,..., pn} as input. We prove that a triangulation of P2 always exists if at least six points in S are in general position, i.e., no three of them are collinear. We also design an algorithm for triangulating P2 if this necessary condition holds. As far as we know, this is the first computational result on the real projective plane.
[ { "version": "v1", "created": "Tue, 18 Sep 2007 15:36:38 GMT" }, { "version": "v2", "created": "Fri, 14 Dec 2007 15:23:14 GMT" } ]
2011-11-10T00:00:00
[ [ "Aanjaneya", "Mridul", "", "INRIA Sophia Antipolis" ], [ "Teillaud", "Monique", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0709.2833
B.Sundar Rajan
G. Susinder Rajan and B. Sundar Rajan
Distributed Space Time Codes with Low Decoding Complexity for Asynchronous Relay Networks
A technical report of DRDO-IISc Programme on Advanced Research in Mathematical Engineering, Indian Institute of Science, Bangalore, India
null
null
TR-PME-2007-09
cs.IT math.IT
null
Recently Li and Xia have proposed a transmission scheme for wireless relay networks based on the Alamouti space time code and orthogonal frequency division multiplexing to combat the effect of timing errors at the relay nodes. This transmission scheme is amazingly simple and achieves a diversity order of two for any number of relays. Motivated by its simplicity, this scheme is extended to a more general transmission scheme that can achieve full cooperative diversity for any number of relays. The conditions on the distributed space time code (DSTC) structure that admit its application in the proposed transmission scheme are identified and it is pointed out that the recently proposed full diversity four group decodable DSTCs from precoded co-ordinate interleaved orthogonal designs and extended Clifford algebras satisfy these conditions. It is then shown how differential encoding at the source can be combined with the proposed transmission scheme to arrive at a new transmission scheme that can achieve full cooperative diversity in asynchronous wireless relay networks with no channel information and also no timing error knowledge at the destination node. Finally, four group decodable distributed differential space time codes applicable in this new transmission scheme for power of two number of relays are also provided.
[ { "version": "v1", "created": "Tue, 18 Sep 2007 14:14:59 GMT" } ]
2007-09-19T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2851
Marios Kountouris
David Gesbert, Marios Kountouris
Joint power control and user scheduling in multicell wireless networks: Capacity scaling laws
Submitted to IEEE Transactions on Information Theory, Sept. 2007
null
null
null
cs.IT math.IT
null
We address the optimization of the sum rate performance in multicell interference-limited singlehop networks where access points are allowed to cooperate in terms of joint resource allocation. The resource allocation policies considered here combine power control and user scheduling. Although very promising from a conceptual point of view, the optimization of the sum of per-link rates hinges, in principle, on tough issues such as computational complexity and the requirement for heavy receiver-to-transmitter channel information feedback across all network cells. In this paper, we show that, in fact, distributed algorithms are actually obtainable in the asymptotic regime where the numbers of users per cell is allowed to grow large. Additionally, using extreme value theory, we provide scaling laws for upper and lower bounds for the network capacity (sum of single user rates over all cells), corresponding to zero-interference and worst-case interference scenarios. We show that the scaling is either dominated by path loss statistics or by small-scale fading, depending on the regime and user location scenario. We show that upper and lower rate bounds behave in fact identically, asymptotically. This remarkable result suggests not only that distributed resource allocation is practically possible but also that the impact of multicell interference on the capacity (in terms of scaling) actually vanishes asymptotically.
[ { "version": "v1", "created": "Tue, 18 Sep 2007 15:35:05 GMT" } ]
2007-09-19T00:00:00
[ [ "Gesbert", "David", "" ], [ "Kountouris", "Marios", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.2935
Eberhard H.-A. Gerbracht
Eberhard H.-A. Gerbracht
An Extension to an Algebraic Method for Linear Time-Invariant System and Network Theory: The full AC-Calculus
V1: documentclass IEEEtran, 6 pages, 1 figure. Re-release of the printed version, with some minor typographical errors corrected
Proceedings of the Fifth International Workshop on Symbolic Methods and Applications in Circuit Design, SMACD '98, Kaiserslautern, October 8-9, 1998; The SMACD Committee (Ed.); pp. 134-139; ISSN 1029-9505
null
null
math.CA cs.SC
null
Being inspired by phasor analysis in linear circuit theory, and its algebraic counterpart - the AC-(operational)-calculus for sinusoids developed by W. Marten and W. Mathis - we define a complex structure on several spaces of real-valued elementary functions. This is used to algebraize inhomogeneous linear ordinary differential equations with inhomogenities stemming from these spaces. Thus we deduce an effective method to calculate particular solutions of these ODEs in a purely algebraic way.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 00:17:40 GMT" } ]
2007-09-20T00:00:00
[ [ "Gerbracht", "Eberhard H. -A.", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0709.2961
Andreas Schutt
Andreas Schutt and Peter J. Stuckey
Incremental Satisfiability and Implication for UTVPI Constraints
14 pages, 1 figure
null
null
null
cs.DS cs.CG cs.LO
null
Unit two-variable-per-inequality (UTVPI) constraints form one of the largest class of integer constraints which are polynomial time solvable (unless P=NP). There is considerable interest in their use for constraint solving, abstract interpretation, spatial databases, and theorem proving. In this paper we develop a new incremental algorithm for UTVPI constraint satisfaction and implication checking that requires O(m + n log n + p) time and O(n+m+p) space to incrementally check satisfiability of m UTVPI constraints on n variables and check implication of p UTVPI constraints.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 06:58:05 GMT" } ]
2007-09-20T00:00:00
[ [ "Schutt", "Andreas", "" ], [ "Stuckey", "Peter J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.2962
Pascal Weil
Zoltan Esik, Pascal Weil (LaBRI)
Algebraic characterization of logically defined tree languages
46 pages. Version 3: various local improvements (more typos corrected, and "intuitive" explanations added)
International Journal of Algebra and Computation 20 (2010) 195-239
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an algebraic characterization of the tree languages that are defined by logical formulas using certain Lindstr\"om quantifiers. An important instance of our result concerns first-order definable tree languages. Our characterization relies on the usage of preclones, an algebraic structure introduced by the authors in a previous paper, and of the block product operation on preclones. Our results generalize analogous results on finite word languages, but it must be noted that, as they stand, they do not yield an algorithm to decide whether a given regular tree language is first-order definable.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 07:14:08 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2009 16:01:23 GMT" }, { "version": "v3", "created": "Thu, 22 Jan 2009 07:08:38 GMT" } ]
2010-06-21T00:00:00
[ [ "Esik", "Zoltan", "", "LaBRI" ], [ "Weil", "Pascal", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0709.3013
Patrick Heas
Patrick H\'eas (IRISA), Mihai Datcu (DLR, Oberpfaffenhofen)
Supervised learning on graphs of spatio-temporal similarity in satellite image sequences
null
null
null
null
cs.CV
null
High resolution satellite image sequences are multidimensional signals composed of spatio-temporal patterns associated to numerous and various phenomena. Bayesian methods have been previously proposed in (Heas and Datcu, 2005) to code the information contained in satellite image sequences in a graph representation using Bayesian methods. Based on such a representation, this paper further presents a supervised learning methodology of semantics associated to spatio-temporal patterns occurring in satellite image sequences. It enables the recognition and the probabilistic retrieval of similar events. Indeed, graphs are attached to statistical models for spatio-temporal processes, which at their turn describe physical changes in the observed scene. Therefore, we adjust a parametric model evaluating similarity types between graph patterns in order to represent user-specific semantics attached to spatio-temporal phenomena. The learning step is performed by the incremental definition of similarity types via user-provided spatio-temporal pattern examples attached to positive or/and negative semantics. From these examples, probabilities are inferred using a Bayesian network and a Dirichlet model. This enables to links user interest to a specific similarity model between graph patterns. According to the current state of learning, semantic posterior probabilities are updated for all possible graph patterns so that similar spatio-temporal phenomena can be recognized and retrieved from the image sequence. Few experiments performed on a multi-spectral SPOT image sequence illustrate the proposed spatio-temporal recognition method.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 13:18:18 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2007 07:59:26 GMT" } ]
2007-09-20T00:00:00
[ [ "Héas", "Patrick", "", "IRISA" ], [ "Datcu", "Mihai", "", "DLR, Oberpfaffenhofen" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0709.3034
Anastasia Analyti
Carlo Meghini, Yannis Tzitzikas, Anastasia Analyti
Query Evaluation in P2P Systems of Taxonomy-based Sources: Algorithms, Complexity, and Optimizations
null
null
null
null
cs.DB cs.DC cs.DS cs.LO
null
In this study, we address the problem of answering queries over a peer-to-peer system of taxonomy-based sources. A taxonomy states subsumption relationships between negation-free DNF formulas on terms and negation-free conjunctions of terms. To the end of laying the foundations of our study, we first consider the centralized case, deriving the complexity of the decision problem and of query evaluation. We conclude by presenting an algorithm that is efficient in data complexity and is based on hypergraphs. More expressive forms of taxonomies are also investigated, which however lead to intractability. We then move to the distributed case, and introduce a logical model of a network of taxonomy-based sources. On such network, a distributed version of the centralized algorithm is then presented, based on a message passing paradigm, and its correctness is proved. We finally discuss optimization issues, and relate our work to the literature.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 15:10:05 GMT" } ]
2007-09-20T00:00:00
[ [ "Meghini", "Carlo", "" ], [ "Tzitzikas", "Yannis", "" ], [ "Analyti", "Anastasia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.3094
Sergey Dorogovtsev
S. N. Dorogovtsev, P. L. Krapivsky, J. F. F. Mendes
Transition from small to large world in growing networks
5 pages
EPL 81, 30004 (2008)
10.1209/0295-5075/81/30004
null
cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph
null
We examine the global organization of growing networks in which a new vertex is attached to already existing ones with a probability depending on their age. We find that the network is infinite- or finite-dimensional depending on whether the attachment probability decays slower or faster than $(age)^{-1}$. The network becomes one-dimensional when the attachment probability decays faster than $(age)^{-2}$. We describe structural characteristics of these phases and transitions between them.
[ { "version": "v1", "created": "Wed, 19 Sep 2007 19:45:18 GMT" }, { "version": "v2", "created": "Thu, 27 Sep 2007 06:57:37 GMT" }, { "version": "v3", "created": "Fri, 23 Nov 2007 16:58:01 GMT" } ]
2009-11-13T00:00:00
[ [ "Dorogovtsev", "S. N.", "" ], [ "Krapivsky", "P. L.", "" ], [ "Mendes", "J. F. F.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0709.3257
Sylvain Lombardy
Sylvain Lombardy (LIAFA), Jean Mairesse (LIAFA)
Series which are both max-plus and min-plus rational are unambiguous
null
RAIRO - Theoretical Informatics and Applications 40 (2006) 1-14
10.1051/ita:2005042
null
cs.DM
null
Consider partial maps from the free monoid into the field of real numbers with a rational domain. We show that two families of such series are actually the same: the unambiguous rational series on the one hand, and the max-plus and min-plus rational series on the other hand. The decidability of equality was known to hold in both families with different proofs, so the above unifies the picture. We give an effective procedure to build an unambiguous automaton from a max-plus automaton and a min-plus one that recognize the same series.
[ { "version": "v1", "created": "Thu, 20 Sep 2007 15:49:44 GMT" } ]
2007-09-21T00:00:00
[ [ "Lombardy", "Sylvain", "", "LIAFA" ], [ "Mairesse", "Jean", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.3262
Fabio G. Guerrero Moreno
Fabio G. Guerrero and Lucio A. Perez
A software for learning Information Theory basics with emphasis on Entropy of Spanish
null
Revista Energia y Computacion, Vol. 16, No.1, June 2008, pp.58-64
null
null
cs.IT math.IT
null
In this paper, a tutorial software to learn Information Theory basics in a practical way is reported. The software, called IT-tutor-UV, makes use of a modern existing Spanish corpus for the modeling of the source. Both the source and the channel coding are also included in this educational tool as part of the learning experience. Entropy values of the Spanish language obtained with the IT-tutor-UV are discussed and compared to others that were previously calculated under limited conditions.
[ { "version": "v1", "created": "Thu, 20 Sep 2007 16:25:48 GMT" } ]
2008-08-27T00:00:00
[ [ "Guerrero", "Fabio G.", "" ], [ "Perez", "Lucio A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.3283
Michael Kettner
Michael Kettner
Algorithmic and topological aspects of semi-algebraic sets defined by quadratic polynomial
PhD thesis, final version, 109 pages, 9 figures
null
null
null
math.AG cs.CG math.AT math.GT
null
In this thesis, we consider semi-algebraic sets over a real closed field $R$ defined by quadratic polynomials. Semi-algebraic sets of $R^k$ are defined as the smallest family of sets in $R^k$ that contains the algebraic sets as well as the sets defined by polynomial inequalities, and which is also closed under the boolean operations (complementation, finite unions and finite intersections). We prove new bounds on the Betti numbers as well as on the number of different stable homotopy types of certain fibers of semi-algebraic sets over a real closed field $R$ defined by quadratic polynomials, in terms of the parameters of the system of polynomials defining them, which improve the known results. We conclude the thesis with presenting two new algorithms along with their implementations. The first algorithm computes the number of connected components and the first Betti number of a semi-algebraic set defined by compact objects in $\mathbb{R}^k$ which are simply connected. This algorithm improves the well-know method using a triangulation of the semi-algebraic set. Moreover, the algorithm has been efficiently implemented which was not possible before. The second algorithm computes efficiently the real intersection of three quadratic surfaces in $\mathbb{R}^3$ using a semi-numerical approach.
[ { "version": "v1", "created": "Thu, 20 Sep 2007 19:28:10 GMT" } ]
2011-11-10T00:00:00
[ [ "Kettner", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
0709.3334
Yong Wang
Yong Wang
Mistake Analyses on Proof about Perfect Secrecy of One-time-pad
This paper has been withdrawn
null
null
null
cs.CR
null
This paper has been withdrawn
[ { "version": "v1", "created": "Fri, 21 Sep 2007 02:31:45 GMT" }, { "version": "v2", "created": "Wed, 18 May 2011 01:19:14 GMT" } ]
2011-05-19T00:00:00
[ [ "Wang", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.3384
Mariano Zelke
Mariano Zelke
Weighted Matching in the Semi-Streaming Model
12 pages, 2 figures
Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DM cs.DS
null
We reduce the best known approximation ratio for finding a weighted matching of a graph using a one-pass semi-streaming algorithm from 5.828 to 5.585. The semi-streaming model forbids random access to the input and restricts the memory to O(n*polylog(n)) bits. It was introduced by Muthukrishnan in 2003 and is appropriate when dealing with massive graphs.
[ { "version": "v1", "created": "Fri, 21 Sep 2007 09:34:19 GMT" } ]
2008-02-25T00:00:00
[ [ "Zelke", "Mariano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0709.3420
Marc Barthelemy
Eric D. Kolaczyk, David B. Chua, Marc Barthelemy
Co-Betweenness: A Pairwise Notion of Centrality
9 pages, 9 figures
Social Networks 31 (2009), pp. 190-203
null
null
cs.NI physics.soc-ph
null
Betweenness centrality is a metric that seeks to quantify a sense of the importance of a vertex in a network graph in terms of its "control" on the distribution of information along geodesic paths throughout that network. This quantity however does not capture how different vertices participate together in such control. In order to allow for the uncovering of finer details in this regard, we introduce here an extension of betweenness centrality to pairs of vertices, which we term co-betweenness, that provides the basis for quantifying various analogous pairwise notions of importance and control. More specifically, we motivate and define a precise notion of co-betweenness, we present an efficient algorithm for its computation, extending the algorithm of Brandes in a natural manner, and we illustrate the utilization of this co-betweenness on a handful of different communication networks. From these real-world examples, we show that the co-betweenness allows one to identify certain vertices which are not the most central vertices but which, nevertheless, act as important actors in the relaying and dispatching of information in the network.
[ { "version": "v1", "created": "Fri, 21 Sep 2007 12:20:05 GMT" } ]
2009-08-28T00:00:00
[ [ "Kolaczyk", "Eric D.", "" ], [ "Chua", "David B.", "" ], [ "Barthelemy", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0709.3427
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Amaury Lendasse (CIS), Damien Fran\c{c}ois (CESAME), Vincent Wertz (CESAME), Michel Verleysen (DICE - MLG)
Mutual information for the selection of relevant variables in spectrometric nonlinear modelling
null
Chemometrics and Intelligent Laboratory Systems / I Mathematical Background Chemometrics Intell Lab Syst 80, 2 (2006) 215-226
10.1016/j.chemolab.2005.06.010
null
cs.LG cs.NE stat.AP
null
Data from spectrophotometers form vectors of a large number of exploitable variables. Building quantitative models using these variables most often requires using a smaller set of variables than the initial one. Indeed, a too large number of input variables to a model results in a too large number of parameters, leading to overfitting and poor generalization abilities. In this paper, we suggest the use of the mutual information measure to select variables from the initial set. The mutual information measures the information content in input variables with respect to the model output, without making any assumption on the model that will be used; it is thus suitable for nonlinear modelling. In addition, it leads to the selection of variables among the initial set, and not to linear or nonlinear combinations of them. Without decreasing the model performances compared to other variable projection methods, it allows therefore a greater interpretability of the results.
[ { "version": "v1", "created": "Fri, 21 Sep 2007 12:49:47 GMT" } ]
2007-09-26T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lendasse", "Amaury", "", "CIS" ], [ "François", "Damien", "", "CESAME" ], [ "Wertz", "Vincent", "", "CESAME" ], [ "Verleysen", "Michel", "", "DICE - MLG" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0709.3461
Fabrice Rossi
Brieuc Conan-Guez (LITA), Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia Antipolis)
Fast Algorithm and Implementation of Dissimilarity Self-Organizing Maps
null
Neural Networks 19, 6-7 (2006) 855-863
10.1016/j.neunet.2006.05.002
null
cs.NE cs.LG
null
In many real world applications, data cannot be accurately represented by vectors. In those situations, one possible solution is to rely on dissimilarity measures that enable sensible comparison between observations. Kohonen's Self-Organizing Map (SOM) has been adapted to data described only through their dissimilarity matrix. This algorithm provides both non linear projection and clustering of non vector data. Unfortunately, the algorithm suffers from a high cost that makes it quite difficult to use with voluminous data sets. In this paper, we propose a new algorithm that provides an important reduction of the theoretical cost of the dissimilarity SOM without changing its outcome (the results are exactly the same as the ones obtained with the original algorithm). Moreover, we introduce implementation methods that result in very short running times. Improvements deduced from the theoretical cost model are validated on simulated and real world data (a word list clustering problem). We also demonstrate that the proposed implementation methods reduce by a factor up to 3 the running time of the fast algorithm over a standard implementation.
[ { "version": "v1", "created": "Fri, 21 Sep 2007 15:20:07 GMT" } ]
2007-09-24T00:00:00
[ [ "Conan-Guez", "Brieuc", "", "LITA" ], [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA\n Sophia Antipolis" ], [ "Golli", "Aïcha El", "", "INRIA Rocquencourt / INRIA Sophia\n Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0709.3541
Nan Liu
Shabnam Shafiee, Nan Liu and Sennur Ulukus
Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2025549
null
cs.IT math.IT
null
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate. We show that, for this channel, Gaussian signalling in the form of beam-forming is optimal, and no pre-processing of information is necessary.
[ { "version": "v1", "created": "Fri, 21 Sep 2007 22:27:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Shafiee", "Shabnam", "" ], [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.3553
Sergey Andreyev
Sergey Andreyev
Design of moveable and resizable graphics
21 pages, 7 figures
null
null
null
cs.GR cs.HC
null
We are communicating with computers on two different levels. On upper level we have a very flexible system of windows: we can move them, resize, overlap or put side by side. At any moment we decide what would be the best view and reorganize the whole view easily. Then we start any application, go to the inner level, and everything changes. Here we are stripped of all the flexibility and can work only inside the scenario, developed by the designer of the program. Interface will allow us to change some tiny details, but in general everything is fixed: graphics is neither moveable, nor resizable, and the same with controls. Author designed an extremely powerful mechanism of turning graphical objects and controls into moveable and resizable. This can not only significantly improve the existing applications, but this will bring the applications to another level. (To estimate the possible difference, try to imagine the Windows system without its flexibility and compare it with the current one.) This article explains in details the construction and use of moveable and resizable graphical objects.
[ { "version": "v1", "created": "Sat, 22 Sep 2007 00:21:08 GMT" } ]
2007-09-25T00:00:00
[ [ "Andreyev", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0709.3554
Mirela Damian
Mirela Damian, Robin Flatland, Joseph O'Rourke and Suneeta Ramaswami
A New Lower Bound on Guard Placement for Wireless Localization
4 pages, 3 figures
null
null
null
cs.CG cs.CC
null
The problem of wireless localization asks to place and orient stations in the plane, each of which broadcasts a unique key within a fixed angular range, so that each point in the plane can determine whether it is inside or outside a given polygonal region. The primary goal is to minimize the number of stations. In this paper we establish a lower bound of 2n/3 - 1 stations for polygons in general position, for the case in which the placement of stations is restricted to polygon vertices, improving upon the existing n/2 lower bound.
[ { "version": "v1", "created": "Sat, 22 Sep 2007 00:35:28 GMT" } ]
2007-09-25T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ], [ "Ramaswami", "Suneeta", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.3586
Fabrice Rossi
A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia Antipolis), Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc Conan-Guez (LITA), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis)
Une adaptation des cartes auto-organisatrices pour des donn\'ees d\'ecrites par un tableau de dissimilarit\'es
null
Revue de Statistique Appliqu\'ee LIV, 3 (2006) 33-64
null
null
cs.NE cs.LG
null
Many data analysis methods cannot be applied to data that are not represented by a fixed number of real values, whereas most of real world observations are not readily available in such a format. Vector based data analysis methods have therefore to be adapted in order to be used with non standard complex data. A flexible and general solution for this adaptation is to use a (dis)similarity measure. Indeed, thanks to expert knowledge on the studied data, it is generally possible to define a measure that can be used to make pairwise comparison between observations. General data analysis methods are then obtained by adapting existing methods to (dis)similarity matrices. In this article, we propose an adaptation of Kohonen's Self Organizing Map (SOM) to (dis)similarity data. The proposed algorithm is an adapted version of the vector based batch SOM. The method is validated on real world data: we provide an analysis of the usage patterns of the web site of the Institut National de Recherche en Informatique et Automatique, constructed thanks to web log mining method.
[ { "version": "v1", "created": "Sat, 22 Sep 2007 15:53:54 GMT" } ]
2007-09-25T00:00:00
[ [ "Golli", "Aïcha El", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Conan-Guez", "Brieuc", "", "LITA" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia\n Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0709.3587
Fabrice Rossi
A\"icha El Golli (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis), Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis)
Self-organizing maps and symbolic data
null
Journal of Symbolic Data Analysis 2, 1 (2004)
null
null
cs.NE cs.LG
null
In data analysis new forms of complex data have to be considered like for example (symbolic data, functional data, web data, trees, SQL query and multimedia data, ...). In this context classical data analysis for knowledge discovery based on calculating the center of gravity can not be used because input are not $\mathbb{R}^p$ vectors. In this paper, we present an application on real world symbolic data using the self-organizing map. To this end, we propose an extension of the self-organizing map that can handle symbolic data.
[ { "version": "v1", "created": "Sat, 22 Sep 2007 15:54:37 GMT" } ]
2007-09-25T00:00:00
[ [ "Golli", "Aïcha El", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Conan-Guez", "Brieuc", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0709.3590
Jesse Gilbert D
Jesse Gilbert
An extension of a result concerning convex geometric graphs
This paper has been withdrawn by the author. This paper was presented at Discrete Math Days in Fort Collins Colorado
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show a general result known as the Erdos_Sos Conjecture: if $E(G)>{1/2}(k-1)n$ where $G$ has order $n$ then $G$ contains every tree of order $k+1$ as a subgraph.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 07:21:25 GMT" }, { "version": "v2", "created": "Tue, 25 Sep 2007 13:12:46 GMT" }, { "version": "v3", "created": "Tue, 25 Sep 2007 20:15:33 GMT" }, { "version": "v4", "created": "Tue, 16 Sep 2008 16:55:37 GMT" }, { "version": "v5", "created": "Thu, 29 Jul 2010 20:46:06 GMT" } ]
2010-08-02T00:00:00
[ [ "Gilbert", "Jesse", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.3600
Yijia Fan
Yijia (Richard) Fan, H. Vincent Poor, John S. Thompson
Cooperative Multiplexing in a Half Duplex Relay Network: Performance and Constraints
To appear in the Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007
null
null
null
cs.IT math.IT
null
Previous work on relay networks has concentrated primarily on the diversity benefits of such techniques. This paper explores the possibility of also obtaining multiplexing gain in a relay network, while retaining diversity gain. Specifically, consider a network in which a single source node is equipped with one antenna and a destination is equipped with two antennas. It is shown that, in certain scenarios, by adding a relay with two antennas and using a successive relaying protocol, the diversity multiplexing tradeoff performance of the network can be lower bounded by that of a 2 by 2 MIMO channel, when the decode-and-forward protocol is applied at the relay. A distributed D-BLAST architecture is developed, in which parallel channel coding is applied to achieve this tradeoff. A space-time coding strategy, which can bring a maximal multiplexing gain of more than one, is also derived for this scenario. As will be shown, while this space-time coding strategy exploits maximal diversity for a small multiplexing gain, the proposed successive relaying scheme offers a significant performance advantage for higher data rate transmission. In addition to the specific results shown here, these ideas open a new direction for exploiting the benefits of wireless relay networks.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 18:07:52 GMT" }, { "version": "v2", "created": "Sat, 29 Sep 2007 01:32:54 GMT" } ]
2007-09-29T00:00:00
[ [ "Yijia", "", "", "Richard" ], [ "Fan", "", "" ], [ "Poor", "H. Vincent", "" ], [ "Thompson", "John S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.3639
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Damien Fran\c{c}ois (CESAME), Vincent Wertz (CESAME), Marc Meurens (BNUT), Michel Verleysen (DICE - MLG)
Fast Selection of Spectral Variables with B-Spline Compression
null
Chemometrics and Intelligent Laboratory Systems / I Mathematical Background Chemometrics Intell Lab Syst 86, 2 (2007) 208-218
10.1016/j.chemolab.2006.06.007
null
cs.LG stat.AP
null
The large number of spectral variables in most data sets encountered in spectral chemometrics often renders the prediction of a dependent variable uneasy. The number of variables hopefully can be reduced, by using either projection techniques or selection methods; the latter allow for the interpretation of the selected variables. Since the optimal approach of testing all possible subsets of variables with the prediction model is intractable, an incremental selection approach using a nonparametric statistics is a good option, as it avoids the computationally intensive use of the model itself. It has two drawbacks however: the number of groups of variables to test is still huge, and colinearities can make the results unstable. To overcome these limitations, this paper presents a method to select groups of spectral variables. It consists in a forward-backward procedure applied to the coefficients of a B-Spline representation of the spectra. The criterion used in the forward-backward procedure is the mutual information, allowing to find nonlinear dependencies between variables, on the contrary of the generally used correlation. The spline representation is used to get interpretability of the results, as groups of consecutive spectral variables will be selected. The experiments conducted on NIR spectra from fescue grass and diesel fuels show that the method provides clearly identified groups of selected variables, making interpretation easy, while keeping a low computational load. The prediction performances obtained using the selected coefficients are higher than those obtained by the same method applied directly to the original variables and similar to those obtained using traditional models, although using significantly less spectral variables.
[ { "version": "v1", "created": "Sun, 23 Sep 2007 14:08:51 GMT" } ]
2007-09-26T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "François", "Damien", "", "CESAME" ], [ "Wertz", "Vincent", "", "CESAME" ], [ "Meurens", "Marc", "", "BNUT" ], [ "Verleysen", "Michel", "", "DICE - MLG" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0709.3640
Fabrice Rossi
Damien Fran\c{c}ois (CESAME), Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Vincent Wertz (CESAME), Michel Verleysen (DICE - MLG)
Resampling methods for parameter-free and robust feature selection with mutual information
null
Neurocomputing 70, 7-9 (2007) 1276-1288
10.1016/j.neucom.2006.11.019
null
cs.LG stat.AP
null
Combining the mutual information criterion with a forward feature selection strategy offers a good trade-off between optimality of the selected feature subset and computation time. However, it requires to set the parameter(s) of the mutual information estimator and to determine when to halt the forward procedure. These two choices are difficult to make because, as the dimensionality of the subset increases, the estimation of the mutual information becomes less and less reliable. This paper proposes to use resampling methods, a K-fold cross-validation and the permutation test, to address both issues. The resampling methods bring information about the variance of the estimator, information which can then be used to automatically set the parameter and to calculate a threshold to stop the forward procedure. The procedure is illustrated on a synthetic dataset as well as on real-world examples.
[ { "version": "v1", "created": "Sun, 23 Sep 2007 14:09:28 GMT" } ]
2007-09-26T00:00:00
[ [ "François", "Damien", "", "CESAME" ], [ "Rossi", "Fabrice", "", "INRIA Rocquencourt /\n INRIA Sophia Antipolis" ], [ "Wertz", "Vincent", "", "CESAME" ], [ "Verleysen", "Michel", "", "DICE -\n MLG" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0709.3641
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE), Nicolas Delannay (DICE - MLG), Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE), Michel Verleysen (DICE - MLG)
Representation of Functional Data in Neural Networks
Also available online from: http://www.sciencedirect.com/science/journal/09252312
Neurocomputing 64 (2005) 183--210
10.1016/j.neucom.2004.11.012
null
cs.NE
null
Functional Data Analysis (FDA) is an extension of traditional data analysis to functional data, for example spectra, temporal series, spatio-temporal images, gesture recognition data, etc. Functional data are rarely known in practice; usually a regular or irregular sampling is known. For this reason, some processing is needed in order to benefit from the smooth character of functional data in the analysis methods. This paper shows how to extend the Radial-Basis Function Networks (RBFN) and Multi-Layer Perceptron (MLP) models to functional data inputs, in particular when the latter are known through lists of input-output pairs. Various possibilities for functional processing are discussed, including the projection on smooth bases, Functional Principal Component Analysis, functional centering and reduction, and the use of differential operators. It is shown how to incorporate these functional processing into the RBFN and MLP models. The functional approach is illustrated on a benchmark of spectrometric data analysis.
[ { "version": "v1", "created": "Sun, 23 Sep 2007 14:10:08 GMT" } ]
2007-09-25T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE" ], [ "Delannay", "Nicolas", "", "DICE - MLG" ], [ "Conan-Guez", "Brieuc", "", "INRIA Rocquencourt / INRIA\n Sophia Antipolis, CEREMADE" ], [ "Verleysen", "Michel", "", "DICE - MLG" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0709.3642
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE), Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE)
Functional Multi-Layer Perceptron: a Nonlinear Tool for Functional Data Analysis
http://www.sciencedirect.com/science/journal/08936080
Neural Networks 18, 1 (2005) 45--60
10.1016/j.neunet.2004.07.001
null
cs.NE
null
In this paper, we study a natural extension of Multi-Layer Perceptrons (MLP) to functional inputs. We show that fundamental results for classical MLP can be extended to functional MLP. We obtain universal approximation results that show the expressive power of functional MLP is comparable to that of numerical MLP. We obtain consistency results which imply that the estimation of optimal parameters for functional MLP is statistically well defined. We finally show on simulated and real world data that the proposed model performs in a very satisfactory way.
[ { "version": "v1", "created": "Sun, 23 Sep 2007 14:10:48 GMT" } ]
2007-09-25T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE" ], [ "Conan-Guez", "Brieuc", "", "INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0709.3689
Ming-xue Liao
Liao Ming-Xue, He Xiao-Xin, Fan Zhi-Hua
Static Deadlock Detection in MPI Synchronization Communication
accepted by HPC Asia 2007
null
null
null
cs.DC
null
It is very common to use dynamic methods to detect deadlocks in MPI programs for the reason that static methods have some restrictions. To guarantee high reliability of some important MPI-based application software, a model of MPI synchronization communication is abstracted and a type of static method is devised to examine deadlocks in such modes. The model has three forms with different complexity: sequential model, single-loop model and nested-loop model. Sequential model is a base for all models. Single-loop model must be treated with a special type of equation group and nested-loop model extends the methods for the other two models. A standard Java-based software framework originated from these methods is constructed for determining whether MPI programs are free from synchronization communication deadlocks. Our practice shows the software framework is better than those tools using dynamic methods because it can dig out all synchronization communication deadlocks before an MPI-based program goes into running.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 05:33:29 GMT" } ]
2007-09-25T00:00:00
[ [ "Ming-Xue", "Liao", "" ], [ "Xiao-Xin", "He", "" ], [ "Zhi-Hua", "Fan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.3692
Ming-xue Liao
Ming-xue Liao, Zhi-hua Fan
Deadlock Detection in Basic Models of MPI Synchronization Communication Programs
accepted by Acta Electronica Sinica (in Chinese)
null
null
null
cs.DC
null
A model of MPI synchronization communication programs is presented and its three basic simplified models are also defined. A series of theorems and methods for deciding whether deadlocks will occur among the three models are given and proved strictly. These theories and methods for simple models' deadlock detection are the necessary base for real MPI program deadlock detection. The methods are based on a static analysis through programs and with runtime detection in necessary cases and they are able to determine before compiling whether it will be deadlocked for two of the three basic models. For another model, some deadlock cases can be found before compiling and others at runtime. Our theorems can be used to prove the correctness of currently popular MPI program deadlock detection algorithms. Our methods may decrease codes that those algorithms need to change to MPI source or profiling interface and may detects deadlocks ahead of program execution, thus the overheads can be reduced greatly.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 06:02:29 GMT" }, { "version": "v2", "created": "Mon, 28 Jan 2008 08:07:23 GMT" } ]
2008-01-28T00:00:00
[ [ "Liao", "Ming-xue", "" ], [ "Fan", "Zhi-hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.3693
Ming-xue Liao
Liao Ming-Xue, He Xiao-Xin, Fan Zhi-Hua
Algorithm of Static Deadlock Detection in MPI Synchronization Communication Sequential Model
This paper has been accepted by Computer Engineering (in Chinese)
null
null
null
cs.DC
null
Detecting deadlocks in MPI synchronization communication programs is very difficult and need building program models. All complex models are based on sequential models. The sequential model is mapped into a set of character strings and its deadlock detection problem is translated into an equivalent multi-queue string matching problem. An algorithm is devised and implemented to statically detect deadlocks in sequential models of MPI synchronization communication programs. The time and space complexity of the algorithm is O(n) where n is the amount of message in model. The algorithm is better than usual circle-detection methods and can adapt well to dynamic message stream.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 06:06:34 GMT" } ]
2007-09-25T00:00:00
[ [ "Ming-Xue", "Liao", "" ], [ "Xiao-Xin", "He", "" ], [ "Zhi-Hua", "Fan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.3753
Aditya Mahajan
Aditya Mahajan and Demosthenis Teneketzis
On Real-Time Communication Systems with Noisy Feedback
5 pages, 2 figures, submitted to IEEE Information Theory Workshop
null
null
null
cs.IT cs.MA math.IT math.OC math.PR
null
We consider a real-time communication system with noisy feedback consisting of a Markov source, a forward and a backward discrete memoryless channels, and a receiver with finite memory. The objective is to design an optimal communication strategy (that is, encoding, decoding, and memory update strategies) to minimize the total expected distortion over a finite horizon. We present a sequential decomposition for the problem, which results in a set of nested optimality equations to determine optimal communication strategies. This provides a systematic methodology to determine globally optimal joint source-channel encoding and decoding strategies for real-time communication systems with noisy feedback.
[ { "version": "v1", "created": "Sun, 23 Sep 2007 04:20:38 GMT" } ]
2007-09-25T00:00:00
[ [ "Mahajan", "Aditya", "" ], [ "Teneketzis", "Demosthenis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0709.3826
Gerald Krafft
Gerald Krafft
Research Paper on Transaction-Oriented Simulation In Ad Hoc Grids
6 pages, condensed research paper of my thesis with the same title
null
null
null
cs.DC
null
This paper analyses the requirements of performing parallel transaction-oriented simulations with a special focus on the space-parallel approach and discrete event simulation synchronisation algorithms that are suitable for transaction-oriented simulation and the target environment of Ad Hoc Grids. To demonstrate the findings a Java-based parallel transaction-oriented simulator for the simulation language GPSS/H is implemented on the basis of the most promising Shock Resistant Time Warp synchronisation algorithm and using the Grid framework ProActive. The validation of this parallel simulator shows that the Shock Resistant Time Warp algorithm can successfully reduce the number of rolled back Transaction moves but it also reveals circumstances in which the Shock Resistant Time Warp algorithm can be outperformed by the normal Time Warp algorithm. The conclusion of this paper suggests possible improvements to the Shock Resistant Time Warp algorithm to avoid such problems.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 19:25:27 GMT" } ]
2007-09-25T00:00:00
[ [ "Krafft", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.3827
Sanket Dusad
S. Dusad, S. N. Diggavi
On Successive Refinement of Diversity for Fading ISI Channels
In Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing, University of Illinois, Monticello, IL, September 27 - 29, 2006
null
null
null
cs.IT math.IT
null
Rate and diversity impose a fundamental tradeoff in communications. This tradeoff was investigated for Intersymbol Interference (ISI) channels in [4]. A different point of view was explored in [1] where high-rate codes were designed so that they have a high-diversity code embedded within them. Such diversity embedded codes were investigated for flat fading channels and in this paper we explore its application to ISI channels. In particular, we investigate the rate tuples achievable for diversity embedded codes for scalar ISI channels through particular coding strategies. The main result of this paper is that the diversity multiplexing tradeoff for fading ISI channels is indeed successively refinable. This implies that for fading single input single output (SISO) ISI channels one can embed a high diversity code within a high rate code without any performance loss (asymptotically). This is related to a deterministic structural observation about the asymptotic behavior of frequency response of channel with respect to fading strength of time domain taps.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 19:26:17 GMT" } ]
2007-09-25T00:00:00
[ [ "Dusad", "S.", "" ], [ "Diggavi", "S. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.3880
Yi Su
Yi Su and Mihaela van der Schaar
A New Perspective on Multi-user Power Control Games in Interference Channels
20 pages, 8 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between selfish users as a non-cooperative game. As opposed to the existing iterative water-filling algorithm that studies the myopic users, this paper studies how a foresighted user, who knows the channel state information and response strategies of its competing users, should optimize its transmission strategy. To characterize this multi-user interaction, the Stackelberg equilibrium is introduced, and the existence of this equilibrium for the investigated non-cooperative game is shown. We analyze this interaction in more detail using a simple two-user example, where the foresighted user determines its transmission strategy by solving as a bi-level program which allows him to account for the myopic user's response. It is analytically shown that a foresighted user can improve its performance, if it has the necessary information about its competitors. Since the optimal solution of Stackelberg equilibrium is computationally prohibitive, we propose a practical low-complexity approach based on Lagrangian duality theory. Numerical simulations verify the performance improvements. Possible ways to acquire the required information and to extend the formulation to more than two users are also discussed.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 06:34:20 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2008 03:30:25 GMT" } ]
2008-12-16T00:00:00
[ [ "Su", "Yi", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0709.3915
Alexandros Dimakis
Alexandros G. Dimakis, Amin A. Gohari, Martin J. Wainwright
Guessing Facets: Polytope Structure and Improved LP Decoding
Submitted, IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper we investigate the structure of the fundamental polytope used in the Linear Programming decoding introduced by Feldman, Karger and Wainwright. We begin by showing that for expander codes, every fractional pseudocodeword always has at least a constant fraction of non-integral bits. We then prove that for expander codes, the active set of any fractional pseudocodeword is smaller by a constant fraction than the active set of any codeword. We further exploit these geometrical properties to devise an improved decoding algorithm with the same complexity order as LP decoding that provably performs better, for any blocklength. It proceeds by guessing facets of the polytope, and then resolving the linear program on these facets. While the LP decoder succeeds only if the ML codeword has the highest likelihood over all pseudocodewords, we prove that the proposed algorithm, when applied to suitable expander codes, succeeds unless there exist a certain number of pseudocodewords, all adjacent to the ML codeword on the LP decoding polytope, and with higher likelihood than the ML codeword. We then describe an extended algorithm, still with polynomial complexity, that succeeds as long as there are at most polynomially many pseudocodewords above the ML codeword.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 10:48:25 GMT" } ]
2007-09-26T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Gohari", "Amin A.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.3921
Alexandros Dimakis
Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright
Geographic Gossip: Efficient Averaging for Sensor Networks
To appear, IEEE Transactions on Signal Processing
null
10.1109/TSP.2007.908946
null
cs.IT cs.NI math.IT math.PR
null
Gossip algorithms for distributed computation are attractive due to their simplicity, distributed nature, and robustness in noisy and uncertain environments. However, using standard gossip algorithms can lead to a significant waste in energy by repeatedly recirculating redundant information. For realistic sensor network model topologies like grids and random geometric graphs, the inefficiency of gossip schemes is related to the slow mixing times of random walks on the communication graph. We propose and analyze an alternative gossiping scheme that exploits geographic information. By utilizing geographic routing combined with a simple resampling method, we demonstrate substantial gains over previously proposed gossip protocols. For regular graphs such as the ring or grid, our algorithm improves standard gossip by factors of $n$ and $\sqrt{n}$ respectively. For the more challenging case of random geometric graphs, our algorithm computes the true average to accuracy $\epsilon$ using $O(\frac{n^{1.5}}{\sqrt{\log n}} \log \epsilon^{-1})$ radio transmissions, which yields a $\sqrt{\frac{n}{\log n}}$ factor improvement over standard gossip algorithms. We illustrate these theoretical results with experimental comparisons between our algorithm and standard methods as applied to various classes of random fields.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 11:15:28 GMT" } ]
2009-11-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Sarwate", "Anand D.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0709.3965
Tshilidzi Marwala
Greg Hulley and Tshilidzi Marwala
Evolving Classifiers: Methods for Incremental Learning
14 pages
null
null
null
cs.LG cs.AI cs.NE
null
The ability of a classifier to take on new information and classes by evolving the classifier without it having to be fully retrained is known as incremental learning. Incremental learning has been successfully applied to many classification problems, where the data is changing and is not all available at once. In this paper there is a comparison between Learn++, which is one of the most recent incremental learning algorithms, and the new proposed method of Incremental Learning Using Genetic Algorithm (ILUGA). Learn++ has shown good incremental learning capabilities on benchmark datasets on which the new ILUGA method has been tested. ILUGA has also shown good incremental learning ability using only a few classifiers and does not suffer from catastrophic forgetting. The results obtained for ILUGA on the Optical Character Recognition (OCR) and Wine datasets are good, with an overall accuracy of 93% and 94% respectively showing a 4% improvement over Learn++.MT for the difficult multi-class OCR dataset.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 14:28:32 GMT" }, { "version": "v2", "created": "Wed, 26 Sep 2007 10:37:00 GMT" } ]
2007-09-26T00:00:00
[ [ "Hulley", "Greg", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0709.3967
Tshilidzi Marwala
Gidudu Anthony, Hulley Greg and Marwala Tshilidzi
Classification of Images Using Support Vector Machines
6 pages
null
null
null
cs.LG cs.AI
null
Support Vector Machines (SVMs) are a relatively new supervised classification technique to the land cover mapping community. They have their roots in Statistical Learning Theory and have gained prominence because they are robust, accurate and are effective even when using a small training sample. By their nature SVMs are essentially binary classifiers, however, they can be adopted to handle the multiple classification tasks common in remote sensing studies. The two approaches commonly used are the One-Against-One (1A1) and One-Against-All (1AA) techniques. In this paper, these approaches are evaluated in as far as their impact and implication for land cover mapping. The main finding from this research is that whereas the 1AA technique is more predisposed to yielding unclassified and mixed pixels, the resulting classification accuracy is not significantly different from 1A1 approach. It is the authors conclusions that ultimately the choice of technique adopted boils down to personal preference and the uniqueness of the dataset at hand.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 14:37:40 GMT" } ]
2007-09-26T00:00:00
[ [ "Anthony", "Gidudu", "" ], [ "Greg", "Hulley", "" ], [ "Tshilidzi", "Marwala", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.3974
Sebastien Verel
S\'ebastien Verel (I3S), Philippe Collard (I3S), Marco Tomassini (ISI), Leonardo Vanneschi (DISCO)
Fitness landscape of the cellular automata majority problem: View from the Olympus
null
Theoretical Computer Science 378, 1 (2007) 54-77
10.1016/j.tcs.2007.01.001
null
cs.AI
null
In this paper we study cellular automata (CAs) that perform the computational Majority task. This task is a good example of what the phenomenon of emergence in complex systems is. We take an interest in the reasons that make this particular fitness landscape a difficult one. The first goal is to study the landscape as such, and thus it is ideally independent from the actual heuristics used to search the space. However, a second goal is to understand the features a good search technique for this particular problem space should possess. We statistically quantify in various ways the degree of difficulty of searching this landscape. Due to neutrality, investigations based on sampling techniques on the whole landscape are difficult to conduct. So, we go exploring the landscape from the top. Although it has been proved that no CA can perform the task perfectly, several efficient CAs for this task have been found. Exploiting similarities between these CAs and symmetries in the landscape, we define the Olympus landscape which is regarded as the ''heavenly home'' of the best local optima known (blok). Then we measure several properties of this subspace. Although it is easier to find relevant CAs in this subspace than in the overall landscape, there are structural reasons that prevent a searcher from finding overfitted CAs in the Olympus. Finally, we study dynamics and performance of genetic algorithms on the Olympus in order to confirm our analysis and to find efficient CAs for the Majority problem with low computational cost.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 15:40:38 GMT" } ]
2007-09-26T00:00:00
[ [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Tomassini", "Marco", "", "ISI" ], [ "Vanneschi", "Leonardo", "", "DISCO" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.4010
Sebastien Verel
Philippe Collard (I3S), S\'ebastien Verel (I3S), Manuel Clergue (I3S)
Local search heuristics: Fitness Cloud versus Fitness Landscape
null
Dans Poster at the 2004 European Conference on Artificial Intelligence (ECAI04) - the 2004 European Conference on Artificial Intelligence (ECAI04), Valencia : Espagne (2004)
null
null
cs.AI
null
This paper introduces the concept of fitness cloud as an alternative way to visualize and analyze search spaces than given by the geographic notion of fitness landscape. It is argued that the fitness cloud concept overcomes several deficiencies of the landscape representation. Our analysis is based on the correlation between fitness of solutions and fitnesses of nearest solutions according to some neighboring. We focus on the behavior of local search heuristics, such as hill climber, on the well-known NK fitness landscape. In both cases the fitness vs. fitness correlation is shown to be related to the epistatic parameter K.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 19:15:50 GMT" } ]
2007-09-26T00:00:00
[ [ "Collard", "Philippe", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.4011
Sebastien Verel
S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S)
Measuring the Evolvability Landscape to study Neutrality
null
Dans Poster at Genetic and Evolutionary Computation -- GECCO-2006 - Genetic and Evolutionary Computation -- GECCO-2006, Seattle, WA : \'Etats-Unis d'Am\'erique (2006)
null
null
cs.AI
null
This theoretical work defines the measure of autocorrelation of evolvability in the context of neutral fitness landscape. This measure has been studied on the classical MAX-SAT problem. This work highlight a new characteristic of neutral fitness landscapes which allows to design new adapted metaheuristic.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 19:17:08 GMT" } ]
2007-09-26T00:00:00
[ [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.4015
Amanda Bouffier
Amanda Bouffier (LIPN)
From Texts to Structured Documents: The Case of Health Practice Guidelines
null
Dans International Semantic Web Conference Proceedings - International Semantic Web Conference-Doctoral Consortium, Busan : Cor\'ee, R\'epublique de (2007)
10.1007/978-3-540-76298-0_69
null
cs.AI
null
This paper describes a system capable of semi-automatically filling an XML template from free texts in the clinical domain (practice guidelines). The XML template includes semantic information not explicitly encoded in the text (pairs of conditions and actions/recommendations). Therefore, there is a need to compute the exact scope of conditions over text sequences expressing the required actions. We present in this paper the rules developed for this task. We show that the system yields good performance when applied to the analysis of French practice guidelines.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 19:26:08 GMT" } ]
2015-05-13T00:00:00
[ [ "Bouffier", "Amanda", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.4035
Shuangqing Wei
Shuangqing Wei, Rajgopal Kannan, Sitharama Iyengar and Nageswara S. Rao
Energy Efficient Estimation of Gaussian Sources Over Inhomogeneous Gaussian MAC Channels
null
null
null
null
cs.IT math.IT
null
It has been shown lately the optimality of uncoded transmission in estimating Gaussian sources over homogeneous/symmetric Gaussian multiple access channels (MAC) using multiple sensors. It remains, however, unclear whether it still holds for any arbitrary networks and/or with high channel signal-to-noise ratio (SNR) and high signal-to-measurement-noise ratio (SMNR). In this paper, we first provide a joint source and channel coding approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary condition in restoring Gaussian sources with a prescribed distortion value. An interesting relationship between our proposed joint approach with a more straightforward separate source and channel coding scheme is then established. We then formulate constrained power minimization problems and transform them to relaxed convex geometric programming problems, whose numerical results exhibit that either separate or uncoded scheme becomes dominant over a linear topology network. In addition, we prove that the optimal decoding order to minimize the total transmission powers for both source and channel coding parts is solely subject to the ranking of MAC channel qualities, and has nothing to do with the ranking of measurement qualities. Finally, asymptotic results for homogeneous networks are obtained which not only confirm the existing optimality of the uncoded approach, but also show that the asymptotic SNR exponents of these three approaches are all the same. Moreover, the proposed joint approach share the same asymptotic ratio with respect to high SNR and high SMNR as the uncoded scheme.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 21:01:25 GMT" } ]
2007-09-27T00:00:00
[ [ "Wei", "Shuangqing", "" ], [ "Kannan", "Rajgopal", "" ], [ "Iyengar", "Sitharama", "" ], [ "Rao", "Nageswara S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4048
P. Oscar Boykin
P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M. Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury
A Symphony Conducted by Brunet
13 pages, 11 figures
null
null
null
cs.DC cs.NI
null
We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep $k \le \log N$ shortcut connections and to route to any other node with a short average delay of $O(\frac{1}{k}\log^2 N)$. %This provides a continuous trade-off between node degree and routing latency. We present experimental results taken from several PlanetLab deployments of size up to 1060 nodes. These succes sful deployments represent some of the largest PlanetLab deployments of P2P overlays found in the literature, and show our implementation's robustness to massive node dynamics in a WAN environment.
[ { "version": "v1", "created": "Tue, 25 Sep 2007 22:09:17 GMT" } ]
2007-09-27T00:00:00
[ [ "Boykin", "P. Oscar", "" ], [ "Bridgewater", "Jesse S. A.", "" ], [ "Kong", "Joseph S.", "" ], [ "Lozev", "Kamen M.", "" ], [ "Rezaei", "Behnam A.", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0709.4063
Grenville Croll
Grenville J. Croll
The Importance and Criticality of Spreadsheets in the City of London
11 pages, with references
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 82-92 ISBN:1-902724-16-X
null
null
cs.CY
null
Spreadsheets have been with us in their present form for over a quarter of a century. We have become so used to them that we forget that we are using them at all. It may serve us well to stand back for a moment to review where, when and how we use spreadsheets in the financial markets and elsewhere in order to inform research that may guide their future development. In this article I bring together the experiences of a number of senior practitioners who have spent much of their careers working with large spreadsheets that have been and continue to be used to support major financial transactions and manage large institutions in the City of London. The author suggests that the City of London is presently exposed to significant reputational risk through the continued uncontrolled use of critical spreadsheets in the financial markets and elsewhere.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 00:14:51 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2008 20:30:35 GMT" } ]
2008-03-10T00:00:00
[ [ "Croll", "Grenville J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0709.4087
David Eppstein
David Eppstein
The Topology of Bendless Three-Dimensional Orthogonal Graph Drawing
23 pages, 16 figures. A much shorter version of this paper will appear at Graph Drawing 2008. This version incorporates feedback from the GD reviewers and new material on covering maps
J. Graph Algorithms & Applications 17(1): 35-55, 2013
10.7155/jgaa.00283
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider embeddings of 3-regular graphs into 3-dimensional Cartesian coordinates, in such a way that two vertices are adjacent if and only if two of their three coordinates are equal (that is, if they lie on an axis-parallel line) and such that no three points lie on the same axis-parallel line; we call a graph with such an embedding an xyz graph}. We describe a correspondence between xyz graphs and face-colored embeddings of the graph onto two-dimensional manifolds, and we relate bipartiteness of the xyz graph to orientability of the underlying topological surface. Using this correspondence, we show that planar graphs are xyz graphs if and only if they are bipartite, cubic, and three-connected, and that it is NP-complete to determine whether an arbitrary graph is an xyz graph. We also describe an algorithm with running time O(n 2^{n/2}) for testing whether a given graph is an xyz graph.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 06:49:33 GMT" }, { "version": "v2", "created": "Tue, 30 Oct 2007 20:39:27 GMT" }, { "version": "v3", "created": "Fri, 22 Aug 2008 23:31:11 GMT" } ]
2015-07-16T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0709.4117
Sylvain Lombardy
Ines Klimann (LIAFA), Sylvain Lombardy (LIAFA), Jean Mairesse (LIAFA), Christophe Prieur (LIAFA)
Deciding Unambiguity and Sequentiality starting from a Finitely Ambiguous Max-Plus Automaton
null
Theoretical Computer Science 327, 3 (2004) 349-373
10.1016/j.tcs.2004.02.049
null
cs.CC
null
Finite automata with weights in the max-plus semiring are considered. The main result is: it is decidable in an effective way whether a series that is recognized by a finitely ambiguous max-plus automaton is unambiguous, or is sequential. A collection of examples is given to illustrate the hierarchy of max-plus series with respect to ambiguity.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 09:51:28 GMT" } ]
2007-09-27T00:00:00
[ [ "Klimann", "Ines", "", "LIAFA" ], [ "Lombardy", "Sylvain", "", "LIAFA" ], [ "Mairesse", "Jean", "", "LIAFA" ], [ "Prieur", "Christophe", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0709.4118
Francesco Ranzato
Francesco Ranzato and Francesco Tapparo
An efficient simulation algorithm based on abstract interpretation
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of algorithms for computing the simulation preorder are available. Let Sigma denote the state space, -> the transition relation and Psim the partition of Sigma induced by simulation equivalence. The algorithms by Henzinger, Henzinger, Kopke and by Bloom and Paige run in O(|Sigma||->|)-time and, as far as time-complexity is concerned, they are the best available algorithms. However, these algorithms have the drawback of a space complexity that is more than quadratic in the size of the state space. The algorithm by Gentilini, Piazza, Policriti--subsequently corrected by van Glabbeek and Ploeger--appears to provide the best compromise between time and space complexity. Gentilini et al.'s algorithm runs in O(|Psim|^2|->|)-time while the space complexity is in O(|Psim|^2 + |Sigma|log|Psim|). We present here a new efficient simulation algorithm that is obtained as a modification of Henzinger et al.'s algorithm and whose correctness is based on some techniques used in applications of abstract interpretation to model checking. Our algorithm runs in O(|Psim||->|)-time and O(|Psim||Sigma|log|Sigma|)-space. Thus, this algorithm improves the best known time bound while retaining an acceptable space complexity that is in general less than quadratic in the size of the state space. An experimental evaluation showed good comparative results with respect to Henzinger, Henzinger and Kopke's algorithm.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 09:54:31 GMT" }, { "version": "v2", "created": "Fri, 5 Dec 2008 19:57:53 GMT" } ]
2008-12-05T00:00:00
[ [ "Ranzato", "Francesco", "" ], [ "Tapparo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0709.4263
Maciej Dziemia\'nczuk
M. Dziemianczuk
On Cobweb posets tiling problem
15 pages, 15 figures
Adv. Stud. Contemp. Math. volume 16 (2), 2008 (April) pp. 219-233
null
null
math.CO cs.DM
null
Kwasniewski's cobweb posets uniquely represented by directed acyclic graphs are such a generalization of the Fibonacci tree that allows joint combinatorial interpretation for all of them under admissibility condition. This interpretation was derived in the source papers and it entailes natural enquieres already formulated therein. In our note we response to one of those problems. This is a tiling problem. Our observations on tiling problem include proofs of tiling's existence for some cobweb-admissible sequences. We show also that not all cobwebs admit tiling as defined below.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 20:44:53 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 14:13:44 GMT" } ]
2009-09-29T00:00:00
[ [ "Dziemianczuk", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.4273
Sergey Gubin
Sergey Gubin
Set Matrices and The Path/Cycle Problem
7 pages
null
null
null
cs.DM cs.CC cs.DS math.CO
null
Presentation of set matrices and demonstration of their efficiency as a tool using the path/cycle problem.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 21:44:10 GMT" } ]
2007-09-28T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0709.4280
Laurent Bartholdi
Laurent Bartholdi
A converse to Moore's theorem on cellular automata
null
J. Eur. Math. Soc. 12 (2010), 241-248
10.471/JEMS/196
null
math.CO cs.IT math.DS math.GR math.IT
null
We prove a converse to Moore's ``Garden-of-Eden'' theorem: a group G is amenable if and only if all cellular automata living on G that admit mutually erasable patterns also admit gardens of Eden. It had already been conjectured in that amenability could be characterized by cellular automata. We prove the first part of that conjecture.
[ { "version": "v1", "created": "Wed, 26 Sep 2007 22:44:33 GMT" } ]
2009-12-17T00:00:00
[ [ "Bartholdi", "Laurent", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4303
Yong Wang
Yong Wang
Security Analyses of One-time System
This paper has been withdrawn
null
null
null
cs.CR
null
This paper has been withdrawn
[ { "version": "v1", "created": "Thu, 27 Sep 2007 03:11:58 GMT" }, { "version": "v2", "created": "Tue, 17 May 2011 15:19:40 GMT" }, { "version": "v3", "created": "Wed, 18 May 2011 01:19:32 GMT" } ]
2011-05-19T00:00:00
[ [ "Wang", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.4397
Serge Burckel
Serge Burckel
The Parallel-Sequential Duality : Matrices and Graphs
11 pages
null
null
null
math.CO cs.IT math.IT
null
Usually, mathematical objects have highly parallel interpretations. In this paper, we consider them as sequential constructors of other objects. In particular, we prove that every reflexive directed graph can be interpreted as a program that builds another and is itself builded by another. That leads to some optimal memory computations, codings similar to modular decompositions and other strange dynamical phenomenons.
[ { "version": "v1", "created": "Thu, 27 Sep 2007 13:55:13 GMT" }, { "version": "v2", "created": "Sat, 27 Oct 2007 07:37:53 GMT" } ]
2007-10-27T00:00:00
[ [ "Burckel", "Serge", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4420
Yong Wang
Yong Wang
Confirmation of Shannon's Mistake about Perfect Secrecy of One-time-pad
This paper has been withdrawn
null
null
null
cs.CR
null
This paper has been withdrawn
[ { "version": "v1", "created": "Thu, 27 Sep 2007 15:05:52 GMT" }, { "version": "v2", "created": "Wed, 18 May 2011 01:18:50 GMT" } ]
2011-05-19T00:00:00
[ [ "Wang", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0709.4464
Jesus-Emeterio Navarro-Barrientos
J.-Emeterio Navarro
Adaptive Investment Strategies For Periodic Environments
Paper submitted to Advances in Complex Systems (November, 2007) 22 pages, 9 figures
Advances in Complex Systems Vol. 11, No. 5 (2008) 761-787
10.1142/S0219525908001933
null
cs.CE cs.NE
null
In this paper, we present an adaptive investment strategy for environments with periodic returns on investment. In our approach, we consider an investment model where the agent decides at every time step the proportion of wealth to invest in a risky asset, keeping the rest of the budget in a risk-free asset. Every investment is evaluated in the market via a stylized return on investment function (RoI), which is modeled by a stochastic process with unknown periodicities and levels of noise. For comparison reasons, we present two reference strategies which represent the case of agents with zero-knowledge and complete-knowledge of the dynamics of the returns. We consider also an investment strategy based on technical analysis to forecast the next return by fitting a trend line to previous received returns. To account for the performance of the different strategies, we perform some computer experiments to calculate the average budget that can be obtained with them over a certain number of time steps. To assure for fair comparisons, we first tune the parameters of each strategy. Afterwards, we compare the performance of these strategies for RoIs with different periodicities and levels of noise.
[ { "version": "v1", "created": "Thu, 27 Sep 2007 19:04:00 GMT" }, { "version": "v2", "created": "Wed, 28 Nov 2007 16:13:07 GMT" } ]
2008-12-01T00:00:00
[ [ "Navarro", "J. -Emeterio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0709.4466
K Sivakumar
Taikun Cheng, Krishnamoorthy Sivakumar, Benjamin J. Belzer
Serially Concatenated IRA Codes
Forty-Fifth Annual Allerton Conference on Communication, Control, and Computing, 2007, 4 pages, 4 figures
null
null
null
cs.IT math.IT
null
We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.
[ { "version": "v1", "created": "Thu, 27 Sep 2007 18:38:09 GMT" } ]
2007-09-28T00:00:00
[ [ "Cheng", "Taikun", "" ], [ "Sivakumar", "Krishnamoorthy", "" ], [ "Belzer", "Benjamin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4497
Fedor Manin
Fedor Manin
The complexity of nonrepetitive edge coloring of graphs
null
null
null
null
cs.CC cs.DM
null
A squarefree word is a sequence $w$ of symbols such that there are no strings $x, y$, and $z$ for which $w=xyyz$. A nonrepetitive coloring of a graph is an edge coloring in which the sequence of colors along any open path is squarefree. We show that determining whether a graph $G$ has a nonrepetitive $k$-coloring is $\Sigma_2^p$-complete. When we restrict to paths of lengths at most $n$, the problem becomes NP-complete for fixed $n$.
[ { "version": "v1", "created": "Thu, 27 Sep 2007 20:56:42 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 22:05:37 GMT" } ]
2007-12-07T00:00:00
[ [ "Manin", "Fedor", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.4506
Alireza Bayesteh
Shahab Oveis Gharan, Alireza Bayesteh, Amir K. khandani
Optimum Diversity-Multiplexing Tradeoff in the Multiple Relays Network
null
null
null
Technical Report UW-E&CE#2007-19, University of Waterloo, April 11 2007
cs.IT math.IT
null
In this paper, a multiple-relay network in considered, in which $K$ single-antenna relays assist a single-antenna transmitter to communicate with a single-antenna receiver in a half-duplex mode. A new Amplify and Forward (AF) scheme is proposed for this network and is shown to achieve the optimum diversity-multiplexing trade-off curve.
[ { "version": "v1", "created": "Thu, 27 Sep 2007 21:51:13 GMT" } ]
2007-10-01T00:00:00
[ [ "Gharan", "Shahab Oveis", "" ], [ "Bayesteh", "Alireza", "" ], [ "khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4513
Jubin Jose
Jubin Jose, Alexei Ashikhmin, Phil Whiting, Sriram Vishwanath
Scheduling and Pre-Conditioning in Multi-User MIMO TDD Systems
6 pages, 4 figures, ICC 2008
null
null
null
cs.IT math.IT
null
The downlink transmission in multi-user multiple-input multiple-output (MIMO) systems has been extensively studied from both communication-theoretic and information-theoretic perspectives. Most of these papers assume perfect/imperfect channel knowledge. In general, the problem of channel training and estimation is studied separately. However, in interference-limited communication systems with high mobility, this problem is tightly coupled with the problem of maximizing throughput of the system. In this paper, scheduling and pre-conditioning based schemes in the presence of reciprocal channel are considered to address this. In the case of homogeneous users, a scheduling scheme is proposed and an improved lower bound on the sum capacity is derived. The problem of choosing training sequence length to maximize net throughput of the system is studied. In the case of heterogeneous users, a modified pre-conditioning method is proposed and an optimized pre-conditioning matrix is derived. This method is combined with a scheduling scheme to further improve net achievable weighted-sum rate.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 01:32:24 GMT" }, { "version": "v2", "created": "Mon, 5 May 2008 18:55:17 GMT" } ]
2008-05-05T00:00:00
[ [ "Jose", "Jubin", "" ], [ "Ashikhmin", "Alexei", "" ], [ "Whiting", "Phil", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0709.4552
Derek Groen
Derek Groen, Simon Portegies Zwart, Steve McMillan and Jun Makino
Distributed N-body Simulation on the Grid Using Dedicated Hardware
(in press) New Astronomy, 24 pages, 5 figures
NewAstron.13:348-358,2008
10.1016/j.newast.2007.11.004
null
astro-ph cs.DC
null
We present performance measurements of direct gravitational N -body simulation on the grid, with and without specialized (GRAPE-6) hardware. Our inter-continental virtual organization consists of three sites, one in Tokyo, one in Philadelphia and one in Amsterdam. We run simulations with up to 196608 particles for a variety of topologies. In many cases, high performance simulations over the entire planet are dominated by network bandwidth rather than latency. With this global grid of GRAPEs our calculation time remains dominated by communication over the entire range of N, which was limited due to the use of three sites. Increasing the number of particles will result in a more efficient execution. Based on these timings we construct and calibrate a model to predict the performance of our simulation on any grid infrastructure with or without GRAPE. We apply this model to predict the simulation performance on the Netherlands DAS-3 wide area computer. Equipping the DAS-3 with GRAPE-6Af hardware would achieve break-even between calculation and communication at a few million particles, resulting in a compute time of just over ten hours for 1 N -body time unit. Key words: high-performance computing, grid, N-body simulation, performance modelling
[ { "version": "v1", "created": "Fri, 28 Sep 2007 08:48:31 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2007 09:51:26 GMT" } ]
2008-11-26T00:00:00
[ [ "Groen", "Derek", "" ], [ "Zwart", "Simon Portegies", "" ], [ "McMillan", "Steve", "" ], [ "Makino", "Jun", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.4558
Jeremy Lee
Jeremy Lee
Practical Multiwriter Lock-Free Queues for "Hard Real-Time" Systems without CAS
9 Pages, Preprint
null
null
null
cs.OS cs.DC
null
FIFO queues with a single reader and writer can be insufficient for "hard real-time" systems where interrupt handlers require wait-free guarantees when writing to message queues. We present an algorithm which elegantly and practically solves this problem on small processors that are often found in embedded systems. The algorithm does not require special CPU instructions (such as atomic CAS), and therefore is more robust than many existing methods that suffer the ABA problem associated with swing pointers. The algorithm gives "first-in, almost first-out" guarantees under pathological interrupt conditions, which manifests as arbitrary "shoving" among nearly-simultaneous arrivals at the end of the queue.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 09:04:27 GMT" } ]
2007-10-01T00:00:00
[ [ "Lee", "Jeremy", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0709.4565
Guillaume Theyssier
Mathieu Sablik (UMPA-ENSL), Guillaume Theyssier (LM-Savoie)
Topological Dynamics of 2D Cellular Automata
null
4th Conference on Computability in Europe, CiE 2008, Athens : Gr\`ece (2008)
10.1007/978-3-540-69407-6
null
cs.DM
null
Topological dynamics of cellular automata (CA), inherited from classical dynamical systems theory, has been essentially studied in dimension 1. This paper focuses on 2D CA and aims at showing that the situation is different and more complex. The main results are the existence of non sensitive CA without equicontinuous points, the non-recursivity of sensitivity constants and the existence of CA having only non-recursive equicontinuous points. They all show a difference between the 1D and the 2D case. Thanks to these new constructions, we also extend undecidability results concerning topological classification previously obtained in the 1D case.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 09:37:34 GMT" }, { "version": "v2", "created": "Thu, 3 Jan 2008 11:02:43 GMT" }, { "version": "v3", "created": "Fri, 21 Mar 2008 08:54:22 GMT" } ]
2009-04-29T00:00:00
[ [ "Sablik", "Mathieu", "", "UMPA-ENSL" ], [ "Theyssier", "Guillaume", "", "LM-Savoie" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0709.4655
Jan Van den Bussche
Jan Van den Bussche
Mining for trees in a graph is NP-complete
null
null
null
null
cs.DB cs.AI
null
Mining for trees in a graph is shown to be NP-complete.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 17:08:39 GMT" } ]
2007-10-01T00:00:00
[ [ "Bussche", "Jan Van den", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0709.4669
Muhammad Marwan Muhammad Fuad
Muhammad Marwan Muhammad Fuad (VALORIA), Pierre-Fran\c{c}ois Marteau (VALORIA)
The Extended Edit Distance Metric
Technical report
Content-Based Multimedia Indexing, CBMI 2008, london : United Kingdom (2008)
10.1109/CBMI.2008.4564953
null
cs.IR
null
Similarity search is an important problem in information retrieval. This similarity is based on a distance. Symbolic representation of time series has attracted many researchers recently, since it reduces the dimensionality of these high dimensional data objects. We propose a new distance metric that is applied to symbolic data objects and we test it on time series data bases in a classification task. We compare it to other distances that are well known in the literature for symbolic data objects. We also prove, mathematically, that our distance is metric.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 18:45:48 GMT" } ]
2010-06-18T00:00:00
[ [ "Fuad", "Muhammad Marwan Muhammad", "", "VALORIA" ], [ "Marteau", "Pierre-François", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0709.4671
Ruoheng Liu
Ruoheng Liu and H. Vincent Poor
Secrecy Capacity Region of a Multi-Antenna Gaussian Broadcast Channel with Confidential Messages
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with information-theoretic secrecy. That is, each user would like to obtain its own confidential message in a reliable and safe manner. This communication model is referred to as the multi-antenna Gaussian broadcast channel with confidential messages (MGBC-CM). Under this communication scenario, a secret dirty-paper coding scheme and the corresponding achievable secrecy rate region are first developed based on Gaussian codebooks. Next, a computable Sato-type outer bound on the secrecy capacity region is provided for the MGBC-CM. Furthermore, the Sato-type outer bound prove to be consistent with the boundary of the secret dirty-paper coding achievable rate region, and hence, the secrecy capacity region of the MGBC-CM is established. Finally, two numerical examples demonstrate that both users can achieve positive rates simultaneously under the information-theoretic secrecy requirement.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 19:10:03 GMT" } ]
2007-10-01T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0009
Adam Lipowski
Adam Lipowski and Dorota Lipowska
Bio-linguistic transition and Baldwin effect in an evolutionary naming-game model
7 pages, minor changes, accepted in Int.J.Mod.Phys.C, proceedings of Max Born Symp. Wroclaw (Poland), Sept. 2007. Java applet is available at http://spin.amu.edu.pl/~lipowski/biolin.html or http://www.amu.edu.pl/~lipowski/biolin.html
Int.J.Mod.Phys. C vol.19, pp. 399-407 (2008)
10.1142/S0129183108012248
null
cs.CL cond-mat.stat-mech cs.AI physics.soc-ph q-bio.PE
null
We examine an evolutionary naming-game model where communicating agents are equipped with an evolutionarily selected learning ability. Such a coupling of biological and linguistic ingredients results in an abrupt transition: upon a small change of a model control parameter a poorly communicating group of linguistically unskilled agents transforms into almost perfectly communicating group with large learning abilities. When learning ability is kept fixed, the transition appears to be continuous. Genetic imprinting of the learning abilities proceeds via Baldwin effect: initially unskilled communicating agents learn a language and that creates a niche in which there is an evolutionary pressure for the increase of learning ability.Our model suggests that when linguistic (or cultural) processes became intensive enough, a transition took place where both linguistic performance and biological endowment of our species experienced an abrupt change that perhaps triggered the rapid expansion of human civilization.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 09:39:49 GMT" }, { "version": "v2", "created": "Sun, 21 Oct 2007 13:20:17 GMT" } ]
2009-11-13T00:00:00
[ [ "Lipowski", "Adam", "" ], [ "Lipowska", "Dorota", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0710.0013
Jason Johnson
Jason K. Johnson, Dmitry M. Malioutov, Alan S. Willsky
Lagrangian Relaxation for MAP Estimation in Graphical Models
10 pages, presented at 45th Allerton conference on communication, control and computing, to appear in proceedings
null
null
null
cs.AI
null
We develop a general framework for MAP estimation in discrete and Gaussian graphical models using Lagrangian relaxation techniques. The key idea is to reformulate an intractable estimation problem as one defined on a more tractable graph, but subject to additional constraints. Relaxing these constraints gives a tractable dual problem, one defined by a thin graph, which is then optimized by an iterative procedure. When this iterative optimization leads to a consistent estimate, one which also satisfies the constraints, then it corresponds to an optimal MAP estimate of the original model. Otherwise there is a ``duality gap'', and we obtain a bound on the optimal solution. Thus, our approach combines convex optimization with dynamic programming techniques applicable for thin graphs. The popular tree-reweighted max-product (TRMP) method may be seen as solving a particular class of such relaxations, where the intractable graph is relaxed to a set of spanning trees. We also consider relaxations to a set of small induced subgraphs, thin subgraphs (e.g. loops), and a connected tree obtained by ``unwinding'' cycles. In addition, we propose a new class of multiscale relaxations that introduce ``summary'' variables. The potential benefits of such generalizations include: reducing or eliminating the ``duality gap'' in hard problems, reducing the number or Lagrange multipliers in the dual problem, and accelerating convergence of the iterative optimization procedure.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 21:29:43 GMT" } ]
2007-10-02T00:00:00
[ [ "Johnson", "Jason K.", "" ], [ "Malioutov", "Dmitry M.", "" ], [ "Willsky", "Alan S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.0020
Moslem Noori
Moslem Noori, Masoud Ardakani
A Probability Model for Lifetime of Wireless Sensor Networks
9 Pages, Submitted to INFOCOM 2008
null
null
null
cs.NI
null
Considering a wireless sensor network whose nodes are distributed randomly over a given area, a probability model for the network lifetime is provided. Using this model and assuming that packet generation follows a Poisson distribution, an analytical expression for the complementary cumulative density function (ccdf) of the lifetime is obtained. Using this ccdf, one can accurately find the probability that the network achieves a given lifetime. It is also shown that when the number of sensors, $N$, is large, with an error exponentially decaying with $N$, one can predict whether or not a certain lifetime can be achieved. The results of this work are obtained for both multi-hop and single-hop wireless sensor networks and are verified with computer simulation. The approaches of this paper are shown to be applicable to other packet generation models and the effect of the area shape is also investigated.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 22:12:42 GMT" } ]
2007-10-02T00:00:00
[ [ "Noori", "Moslem", "" ], [ "Ardakani", "Masoud", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.0021
Maryna Nesterenko dr.
Maryna Nesterenko, Jiri Patera, Dmytro Zhavrotskyj
New families of cryptographic systems
null
null
null
null
cs.CR math.GM
null
A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straightforward possibility of extending the method to encryption of higher dimensional data.
[ { "version": "v1", "created": "Fri, 28 Sep 2007 22:15:28 GMT" } ]
2007-10-02T00:00:00
[ [ "Nesterenko", "Maryna", "" ], [ "Patera", "Jiri", "" ], [ "Zhavrotskyj", "Dmytro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
0710.0043
Julian McAuley
Julian J. McAuley, Tiberio S. Caetano and Marconi S. Barbosa
Graph rigidity, Cyclic Belief Propagation and Point Pattern Matching
9 pages, 8 figures
null
null
null
cs.CV
null
A recent paper \cite{CaeCaeSchBar06} proposed a provably optimal, polynomial time method for performing near-isometric point pattern matching by means of exact probabilistic inference in a chordal graphical model. Their fundamental result is that the chordal graph in question is shown to be globally rigid, implying that exact inference provides the same matching solution as exact inference in a complete graphical model. This implies that the algorithm is optimal when there is no noise in the point patterns. In this paper, we present a new graph which is also globally rigid but has an advantage over the graph proposed in \cite{CaeCaeSchBar06}: its maximal clique size is smaller, rendering inference significantly more efficient. However, our graph is not chordal and thus standard Junction Tree algorithms cannot be directly applied. Nevertheless, we show that loopy belief propagation in such a graph converges to the optimal solution. This allows us to retain the optimality guarantee in the noiseless case, while substantially reducing both memory requirements and processing time. Our experimental results show that the accuracy of the proposed solution is indistinguishable from that of \cite{CaeCaeSchBar06} when there is noise in the point patterns.
[ { "version": "v1", "created": "Sat, 29 Sep 2007 06:19:09 GMT" }, { "version": "v2", "created": "Wed, 3 Oct 2007 06:54:12 GMT" } ]
2007-10-03T00:00:00
[ [ "McAuley", "Julian J.", "" ], [ "Caetano", "Tiberio S.", "" ], [ "Barbosa", "Marconi S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.0083
Andrew McGregor
Stanislav Angelov, Keshav Kunal, Andrew McGregor
Sorting and Selection with Random Costs
null
null
null
null
cs.DS
null
There is a growing body of work on sorting and selection in models other than the unit-cost comparison model. This work is the first treatment of a natural stochastic variant of the problem where the cost of comparing two elements is a random variable. Each cost is chosen independently and is known to the algorithm. In particular we consider the following three models: each cost is chosen uniformly in the range $[0,1]$, each cost is 0 with some probability $p$ and 1 otherwise, or each cost is 1 with probability $p$ and infinite otherwise. We present lower and upper bounds (optimal in most cases) for these problems. We obtain our upper bounds by carefully designing algorithms to ensure that the costs incurred at various stages are independent and using properties of random partial orders when appropriate.
[ { "version": "v1", "created": "Sat, 29 Sep 2007 18:10:28 GMT" } ]
2007-10-02T00:00:00
[ [ "Angelov", "Stanislav", "" ], [ "Kunal", "Keshav", "" ], [ "McGregor", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.0105
Dmitrii Manin
Dmitrii Manin
Zipf's Law and Avoidance of Excessive Synonymy
47 pages; fixed reference list missing in v.1
Main text in Cognitive Science, 32 (7) 2008, pp. 1075 - 1098; Appendix A TBP separately in J. Quant. Ling.
10.1080/03640210802020003
null
cs.CL physics.soc-ph
null
Zipf's law states that if words of language are ranked in the order of decreasing frequency in texts, the frequency of a word is inversely proportional to its rank. It is very robust as an experimental observation, but to date it escaped satisfactory theoretical explanation. We suggest that Zipf's law may arise from the evolution of word semantics dominated by expansion of meanings and competition of synonyms.
[ { "version": "v1", "created": "Sun, 30 Sep 2007 03:21:54 GMT" }, { "version": "v2", "created": "Wed, 3 Oct 2007 03:36:45 GMT" } ]
2009-01-22T00:00:00
[ [ "Manin", "Dmitrii", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0710.0116
Amichai Sanderovich
Amichai Sanderovich, Shlomo Shamai (Shitz) and Yossef Steinberg
Distributed MIMO receiver - Achievable rates and upper bounds
null
null
null
null
cs.IT math.IT
null
In this paper we investigate the achievable rate of a system that includes a nomadic transmitter with several antennas, which is received by multiple agents, exhibiting independent channel gains and additive circular-symmetric complex Gaussian noise. In the nomadic regime, we assume that the agents do not have any decoding ability. These agents process their channel observations and forward them to the final destination through lossless links with a fixed capacity. We propose new achievable rates based on elementary compression and also on a Wyner-Ziv (CEO-like) processing, for both fast fading and block fading channels, as well as for general discrete channels. The simpler two agents scheme is solved, up to an implicit equation with a single variable. Limiting the nomadic transmitter to a circular-symmetric complex Gaussian signalling, new upper bounds are derived for both fast and block fading, based on the vector version of the entropy power inequality. These bounds are then compared to the achievable rates in several extreme scenarios. The asymptotic setting with numbers of agents and transmitter's antennas taken to infinity is analyzed. In addition, the upper bounds are analytically shown to be tight in several examples, while numerical calculations reveal a rather small gap in a finite $2\times2$ setting. The advantage of the Wyner-Ziv approach over elementary compression is shown where only the former can achieve the full diversity-multiplexing tradeoff. We also consider the non-nomadic setting, with agents that can decode. Here we give an achievable rate, over fast fading channel, which combines broadcast with dirty paper coding and the decentralized reception, which was introduced for the nomadic setting.
[ { "version": "v1", "created": "Sun, 30 Sep 2007 08:22:15 GMT" } ]
2007-10-02T00:00:00
[ [ "Sanderovich", "Amichai", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Steinberg", "Yossef", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0142
Marco Baldi
Marco Baldi
LDPC codes in the McEliece cryptosystem: attacks and countermeasures
NATO Advanced Research Workshop 2008: Enhancing Crypto-Primitives with Techniques from Coding Theory
NATO Science for Peace and Security Series - D: Information and Communication Security, vol. 23, pp. 160-174, IOS Press, 2009. Edited by Bart Preneel, Stefan Dodunekov, Vincent Rijmen, Svetla Nikova. ISBN 978-1-60750-002-5
10.3233/978-1-60750-002-5-160
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The McEliece cryptosystem is a public-key cryptosystem based on coding theory that has successfully resisted cryptanalysis for thirty years. The original version, based on Goppa codes, is able to guarantee a high level of security, and is faster than competing solutions, like RSA. Despite this, it has been rarely considered in practical applications, due to two major drawbacks: i) large size of the public key and ii) low transmission rate. Low-Density Parity-Check (LDPC) codes are state-of-art forward error correcting codes that permit to approach the Shannon limit while ensuring limited complexity. Quasi-Cyclic (QC) LDPC codes are a particular class of LDPC codes, able to join low complexity encoding of QC codes with high-performing and low-complexity decoding of LDPC codes. In a previous work it has been proposed to adopt a particular family of QC-LDPC codes in the McEliece cryptosystem to reduce the key size and increase the transmission rate. Recently, however, new attacks have been found that are able to exploit a flaw in the transformation from the private key to the public one. Such attacks can be effectively countered by changing the form of some constituent matrices, without altering the system parameters. This work gives an overview of the QC-LDPC codes-based McEliece cryptosystem and its cryptanalysis. Two recent versions are considered, and their ability to counter all the currently known attacks is discussed. A third version able to reach a higher security level is also proposed. Finally, it is shown that the new QC-LDPC codes-based cryptosystem scales favorably with the key length.
[ { "version": "v1", "created": "Sun, 30 Sep 2007 14:33:00 GMT" }, { "version": "v2", "created": "Sun, 11 Jan 2009 11:53:29 GMT" } ]
2009-10-20T00:00:00
[ [ "Baldi", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0169
Andrew Krizhanovsky A
A. A. Krizhanovsky
Evaluation experiments on related terms search in Wikipedia: Information Content and Adapted HITS (In Russian)
10 pages, 1 figure, 3 tables, in Russian, short version of the paper to be published in Proceedings of the Wiki-Conference 2007, Russia, St. Petersburg, October 27-28. http://tinyurl.com/2czd6e ; v3: +figure; v4: typo in Table 3; v5: +desc (res_hypo formula); v6: typo
null
null
null
cs.IR cs.CL
null
The classification of metrics and algorithms search for related terms via WordNet, Roget's Thesaurus, and Wikipedia was extended to include adapted HITS algorithm. Evaluation experiments on Information Content and adapted HITS algorithm are described. The test collection of Russian word pairs with human-assigned similarity judgments is proposed. ----- Klassifikacija metrik i algoritmov poiska semanticheski blizkih slov v tezaurusah WordNet, Rozhe i jenciklopedii Vikipedija rasshirena adaptirovannym HITS algoritmom. S pomow'ju jeksperimentov v Vikipedii oceneny metrika Information Content i adaptirovannyj algoritm HITS. Predlozhen resurs dlja ocenki semanticheskoj blizosti russkih slov.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 16:04:52 GMT" }, { "version": "v2", "created": "Wed, 3 Oct 2007 06:21:01 GMT" }, { "version": "v3", "created": "Sat, 6 Oct 2007 15:38:57 GMT" }, { "version": "v4", "created": "Sun, 14 Oct 2007 14:44:03 GMT" }, { "version": "v5", "created": "Sun, 4 Nov 2007 11:05:26 GMT" }, { "version": "v6", "created": "Wed, 16 Jan 2008 17:31:14 GMT" } ]
2008-01-16T00:00:00
[ [ "Krizhanovsky", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.0192
Tomas Filler
Tomas Filler and Jessica Fridrich
Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes
Forty-Fifth Annual Allerton Conference on Communication, Control, and Computing, 2007, 10 pages, 6 figures
null
null
null
cs.IT math.IT
null
We propose a new algorithm for binary quantization based on the Belief Propagation algorithm with decimation over factor graphs of Low Density Generator Matrix (LDGM) codes. This algorithm, which we call Bias Propagation (BiP), can be considered as a special case of the Survey Propagation algorithm proposed for binary quantization by Wainwright et al. [8]. It achieves the same near-optimal rate-distortion performance with a substantially simpler framework and 10-100 times faster implementation. We thus challenge the widespread belief that binary quantization based on sparse linear codes cannot be solved by simple Belief Propagation algorithms. Finally, we give examples of suitably irregular LDGM codes that work with the BiP algorithm and show their performance.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 02:14:40 GMT" } ]
2007-10-03T00:00:00
[ [ "Filler", "Tomas", "" ], [ "Fridrich", "Jessica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0198
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Z4-Linear Perfect Codes
15p. Bibliography updated
transl. from: Diskretn. Anal. Issled. Oper. Ser.1., 7(4) 2000, 78-90 [Russian]
null
null
cs.IT math.IT
null
For every $n = 2^k > 8$ there exist exactly $[(k+1)/2]$ mutually nonequivalent $Z_4$-linear extended perfect codes with distance 4. All these codes have different ranks.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 05:58:04 GMT" } ]
2008-05-10T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0199
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Z4-linear Hadamard and extended perfect codes
7p. WCC-2001
Electron. Notes Discrete Math. 6 (2001) 107-112
10.1016/S1571-0653(04)00161-1
null
cs.IT math.IT
null
If $N=2^k > 8$ then there exist exactly $[(k-1)/2]$ pairwise nonequivalent $Z_4$-linear Hadamard $(N,2N,N/2)$-codes and $[(k+1)/2]$ pairwise nonequivalent $Z_4$-linear extended perfect $(N,2^N/2N,4)$-codes. A recurrent construction of $Z_4$-linear Hadamard codes is given.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 07:33:13 GMT" } ]
2008-05-10T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0213
Marc Schoenauer
Fei Jiang (INRIA Futurs, INRIA Futurs), Hugues Berry (INRIA Futurs), Marc Schoenauer (INRIA Futurs)
Optimising the topology of complex neural networks
null
Dans ECCS'07 (2007)
null
null
cs.NE cs.AI
null
In this paper, we study instances of complex neural networks, i.e. neural netwo rks with complex topologies. We use Self-Organizing Map neural networks whose n eighbourhood relationships are defined by a complex network, to classify handwr itten digits. We show that topology has a small impact on performance and robus tness to neuron failures, at least at long learning times. Performance may howe ver be increased (by almost 10%) by artificial evolution of the network topo logy. In our experimental conditions, the evolved networks are more random than their parents, but display a more heterogeneous degree distribution.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 06:51:42 GMT" } ]
2007-10-02T00:00:00
[ [ "Jiang", "Fei", "", "INRIA Futurs, INRIA Futurs" ], [ "Berry", "Hugues", "", "INRIA Futurs" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.0225
Dmitry Lande
D.V. Lande, A.A. Snarskii
On the role of autocorrelations in texts
5 pages, 4 figures, 5 references
null
null
null
cs.CL
null
The task of finding a criterion allowing to distinguish a text from an arbitrary set of words is rather relevant in itself, for instance, in the aspect of development of means for internet-content indexing or separating signals and noise in communication channels. The Zipf law is currently considered to be the most reliable criterion of this kind [3]. At any rate, conventional stochastic word sets do not meet this law. The present paper deals with one of possible criteria based on the determination of the degree of data compression.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 08:23:24 GMT" } ]
2007-10-02T00:00:00
[ [ "Lande", "D. V.", "" ], [ "Snarskii", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.0228
Dmitry Lande
S. Braichevsky, D. Lande, A. Snarskii
On the fractal nature of mutual relevance sequences in the Internet news message flows
6 pages, 56 figures
null
null
null
cs.CL
null
In the task of information retrieval the term relevance is taken to mean formal conformity of a document given by the retrieval system to user's information query. As a rule, the documents found by the retrieval system should be submitted to the user in a certain order. Therefore, a retrieval perceived as a selection of documents formally solving the user's query, should be supplemented with a certain procedure of processing a relevant set. It would be natural to introduce a quantitative measure of document conformity to query, i.e. the relevance measure. Since no single rule exists for the determination of the relevance measure, we shall consider two of them which are the simplest in our opinion. The proposed approach does not suppose any restrictions and can be applied to other relevance measures.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 08:31:56 GMT" } ]
2007-10-02T00:00:00
[ [ "Braichevsky", "S.", "" ], [ "Lande", "D.", "" ], [ "Snarskii", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.0232
Maurice Margenstern
Maurice Margenstern
Constructing a uniform plane-filling path in the ternary heptagrid of the hyperbolic plane
null
null
null
null
cs.CG cs.DM
null
In this paper, we distinguish two levels for the plane-filling property. We consider a simple and a strong one. In this paper, we give the construction which proves that the simple plane-filling property also holds for the hyperbolic plane. The plane-filling property was established for the Euclidean plane by J. Kari, in 1994, in the strong version.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 08:42:03 GMT" } ]
2007-10-02T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.0243
Julian McAuley
Julian John McAuley, Tiberio S. Caetano
High-Order Nonparametric Belief-Propagation for Fast Image Inpainting
8 pages, 6 figures
null
null
null
cs.CV
null
In this paper, we use belief-propagation techniques to develop fast algorithms for image inpainting. Unlike traditional gradient-based approaches, which may require many iterations to converge, our techniques achieve competitive results after only a few iterations. On the other hand, while belief-propagation techniques are often unable to deal with high-order models due to the explosion in the size of messages, we avoid this problem by approximating our high-order prior model using a Gaussian mixture. By using such an approximation, we are able to inpaint images quickly while at the same time retaining good visual results.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 09:18:36 GMT" } ]
2007-10-02T00:00:00
[ [ "McAuley", "Julian John", "" ], [ "Caetano", "Tiberio S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.0244
Philip Baback Alipour
Philip B. Alipour
Theoretical Engineering and Satellite Comlink of a PTVD-SHAM System
50 pages, 10 figures (3 multi-figures), 2 tables. v.1: 1 postulate entailing hypothetical ideas, design and model on future technological advances of PTVD-SHAM. The results of the previous paper [arXiv:0707.1151v6], are extended in order to prove some introductory conjectures in theoretical engineering advanced to architectural analysis
null
null
null
cs.CE cs.AR
null
This paper focuses on super helical memory system's design, 'Engineering, Architectural and Satellite Communications' as a theoretical approach of an invention-model to 'store time-data'. The current release entails three concepts: 1- an in-depth theoretical physics engineering of the chip including its, 2- architectural concept based on VLSI methods, and 3- the time-data versus data-time algorithm. The 'Parallel Time Varying & Data Super-helical Access Memory' (PTVD-SHAM), possesses a waterfall effect in its architecture dealing with the process of voltage output-switch into diverse logic and quantum states described as 'Boolean logic & image-logic', respectively. Quantum dot computational methods are explained by utilizing coiled carbon nanotubes (CCNTs) and CNT field effect transistors (CNFETs) in the chip's architecture. Quantum confinement, categorized quantum well substrate, and B-field flux involvements are discussed in theory. Multi-access of coherent sequences of 'qubit addressing' in any magnitude, gained as pre-defined, here e.g., the 'big O notation' asymptotically confined into singularity while possessing a magnitude of 'infinity' for the orientation of array displacement. Gaussian curvature of k<0 versus k'>(k<0) is debated in aim of specifying the 2D electron gas characteristics, data storage system for defining short and long time cycles for different CCNT diameters where space-time continuum is folded by chance for the particle. Precise pre/post data timing for, e.g., seismic waves before earthquake mantle-reach event occurrence, including time varying self-clocking devices in diverse geographic locations for radar systems is illustrated in the Subsections of the paper. The theoretical fabrication process, electromigration between chip's components is discussed as well.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 09:35:30 GMT" } ]
2009-12-05T00:00:00
[ [ "Alipour", "Philip B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.0262
Sebastian Roch
Elchanan Mossel and Sebastien Roch
Incomplete Lineage Sorting: Consistent Phylogeny Estimation From Multiple Loci
Added a section on more general distance-based methods
null
null
null
q-bio.PE cs.CE cs.DS math.PR math.ST stat.TH
null
We introduce a simple algorithm for reconstructing phylogenies from multiple gene trees in the presence of incomplete lineage sorting, that is, when the topology of the gene trees may differ from that of the species tree. We show that our technique is statistically consistent under standard stochastic assumptions, that is, it returns the correct tree given sufficiently many unlinked loci. We also show that it can tolerate moderate estimation errors.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 11:11:43 GMT" }, { "version": "v2", "created": "Fri, 2 Nov 2007 03:41:04 GMT" } ]
2011-09-30T00:00:00
[ [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.0270
Supriya Krishnamurthy
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi
An Analytical Study of a Structured Overlay in the presence of Dynamic Membership
12 pages, 14 figures, to appear in IEEE/ACM Transactions on Networking
null
10.1109/TNET.2007.905590
null
cs.NI cond-mat.stat-mech cs.DC
null
In this paper we present an analytical study of dynamic membership (aka churn) in structured peer-to-peer networks. We use a fluid model approach to describe steady-state or transient phenomena, and apply it to the Chord system. For any rate of churn and stabilization rates, and any system size, we accurately account for the functional form of the probability of network disconnection as well as the fraction of failed or incorrect successor and finger pointers. We show how we can use these quantities to predict both the performance and consistency of lookups under churn. All theoretical predictions match simulation results. The analysis includes both features that are generic to structured overlays deploying a ring as well as Chord-specific details, and opens the door to a systematic comparative analysis of, at least, ring-based structured overlay systems under churn.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 12:17:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Krishnamurthy", "Supriya", "" ], [ "El-Ansary", "Sameh", "" ], [ "Aurell", "Erik", "" ], [ "Haridi", "Seif", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.0291
Wenyi Zhang
Wenyi Zhang, Urbashi Mitra
On Outage Behavior of Wideband Slow-Fading Channels
Extended abstract presented at 2007 Allerton Conference
null
null
null
cs.IT math.IT
null
This paper investigates point-to-point information transmission over a wideband slow-fading channel, modeled as an (asymptotically) large number of independent identically distributed parallel channels, with the random channel fading realizations remaining constant over the entire coding block. On the one hand, in the wideband limit the minimum achievable energy per nat required for reliable transmission, as a random variable, converges in probability to certain deterministic quantity. On the other hand, the exponential decay rate of the outage probability, termed as the wideband outage exponent, characterizes how the number of parallel channels, {\it i.e.}, the ``bandwidth'', should asymptotically scale in order to achieve a targeted outage probability at a targeted energy per nat. We examine two scenarios: when the transmitter has no channel state information and adopts uniform transmit power allocation among parallel channels; and when the transmitter is endowed with an one-bit channel state feedback for each parallel channel and accordingly allocates its transmit power. For both scenarios, we evaluate the wideband minimum energy per nat and the wideband outage exponent, and discuss their implication for system performance.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 03:47:03 GMT" } ]
2007-10-02T00:00:00
[ [ "Zhang", "Wenyi", "" ], [ "Mitra", "Urbashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0318
Alexander Tiskin
Vladimir Deineko and Alexander Tiskin
Fast minimum-weight double-tree shortcutting for Metric TSP: Is the best one good enough?
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Metric Traveling Salesman Problem (TSP) is a classical NP-hard optimization problem. The double-tree shortcutting method for Metric TSP yields an exponentially-sized space of TSP tours, each of which approximates the optimal solution within at most a factor of 2. We consider the problem of finding among these tours the one that gives the closest approximation, i.e.\ the \emph{minimum-weight double-tree shortcutting}. Burkard et al. gave an algorithm for this problem, running in time $O(n^3+2^d n^2)$ and memory $O(2^d n^2)$, where $d$ is the maximum node degree in the rooted minimum spanning tree. We give an improved algorithm for the case of small $d$ (including planar Euclidean TSP, where $d \leq 4$), running in time $O(4^d n^2)$ and memory $O(4^d n)$. This improvement allows one to solve the problem on much larger instances than previously attempted. Our computational experiments suggest that in terms of the time-quality tradeoff, the minimum-weight double-tree shortcutting method provides one of the best known tour-constructing heuristics.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 15:25:18 GMT" }, { "version": "v2", "created": "Sat, 20 Jun 2009 16:17:30 GMT" }, { "version": "v3", "created": "Thu, 16 Jul 2009 16:17:25 GMT" } ]
2009-07-16T00:00:00
[ [ "Deineko", "Vladimir", "" ], [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.0360
Sylvain Perifel
Pascal Koiran (LIP), Sylvain Perifel (LIP)
Interpolation in Valiant's theory
13 pages
null
null
null
cs.CC
null
We investigate the following question: if a polynomial can be evaluated at rational points by a polynomial-time boolean algorithm, does it have a polynomial-size arithmetic circuit? We argue that this question is certainly difficult. Answering it negatively would indeed imply that the constant-free versions of the algebraic complexity classes VP and VNP defined by Valiant are different. Answering this question positively would imply a transfer theorem from boolean to algebraic complexity. Our proof method relies on Lagrange interpolation and on recent results connecting the (boolean) counting hierarchy to algebraic complexity classes. As a byproduct we obtain two additional results: (i) The constant-free, degree-unbounded version of Valiant's hypothesis that VP and VNP differ implies the degree-bounded version. This result was previously known to hold for fields of positive characteristic only. (ii) If exponential sums of easy to compute polynomials can be computed efficiently, then the same is true of exponential products. We point out an application of this result to the P=NP problem in the Blum-Shub-Smale model of computation over the field of complex numbers.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 18:58:19 GMT" } ]
2007-10-02T00:00:00
[ [ "Koiran", "Pascal", "", "LIP" ], [ "Perifel", "Sylvain", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]