id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0712.2467
Jeffrey Andrews PhD
Jeff Andrews, Nihar Jindal, Martin Haenggi, Randy Berry, Syed Jafar, Dongning Guo, Sanjay Shakkottai, Robert Heath, Michael Neely, Steven Weber, Aylin Yener
Rethinking Information Theory for Mobile Ad Hoc Networks
Submitted to IEEE Communications Magazine
null
10.1109/MCOM.2008.4689214
null
cs.IT math.IT
null
The subject of this paper is the long-standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks (MANETs). A MANET is a peer-to-peer network with no pre-existing infrastructure. MANETs are the most general wireless networks, with single-hop, relay, interference, mesh, and star networks comprising special cases. The lack of a MANET capacity theory has stunted the development and commercialization of many types of wireless networks, including emergency, military, sensor, and community mesh networks. Information theory, which has been vital for links and centralized networks, has not been successfully applied to decentralized wireless networks. Even if this was accomplished, for such a theory to truly characterize the limits of deployed MANETs it must overcome three key roadblocks. First, most current capacity results rely on the allowance of unbounded delay and reliability. Second, spatial and timescale decompositions have not yet been developed for optimally modeling the spatial and temporal dynamics of wireless networks. Third, a useful network capacity theory must integrate rather than ignore the important role of overhead messaging and feedback. This paper describes some of the shifts in thinking that may be needed to overcome these roadblocks and develop a more general theory that we refer to as non-equilibrium information theory.
[ { "version": "v1", "created": "Fri, 14 Dec 2007 21:35:46 GMT" } ]
2016-11-17T00:00:00
[ [ "Andrews", "Jeff", "" ], [ "Jindal", "Nihar", "" ], [ "Haenggi", "Martin", "" ], [ "Berry", "Randy", "" ], [ "Jafar", "Syed", "" ], [ "Guo", "Dongning", "" ], [ "Shakkottai", "Sanjay", "" ], [ "Heath", "Robert", "" ], [ "Neely", "Michael", "" ], [ "Weber", "Steven", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2469
Zhenning Kong
Zhenning Kong and Edmund M. Yeh
Directed Percolation in Wireless Networks with Interference and Noise
null
null
null
null
cs.IT cs.NI math.IT math.PR
null
Previous studies of connectivity in wireless networks have focused on undirected geometric graphs. More sophisticated models such as Signal-to-Interference-and-Noise-Ratio (SINR) model, however, usually leads to directed graphs. In this paper, we study percolation processes in wireless networks modelled by directed SINR graphs. We first investigate interference-free networks, where we define four types of phase transitions and show that they take place at the same time. By coupling the directed SINR graph with two other undirected SINR graphs, we further obtain analytical upper and lower bounds on the critical density. Then, we show that with interference, percolation in directed SINR graphs depends not only on the density but also on the inverse system processing gain. We also provide bounds on the critical value of the inverse system processing gain.
[ { "version": "v1", "created": "Fri, 14 Dec 2007 21:45:16 GMT" } ]
2007-12-18T00:00:00
[ [ "Kong", "Zhenning", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0712.2497
Fangwen Fu
Fangwen Fu and Mihaela van der Schaar
A New Theoretic Foundation for Cross-Layer Optimization
39 pages, 10 figures, technical report
null
null
null
cs.NI cs.LG
null
Cross-layer optimization solutions have been proposed in recent years to improve the performance of network users operating in a time-varying, error-prone wireless environment. However, these solutions often rely on ad-hoc optimization approaches, which ignore the different environmental dynamics experienced at various layers by a user and violate the layered network architecture of the protocol stack by requiring layers to provide access to their internal protocol parameters to other layers. This paper presents a new theoretic foundation for cross-layer optimization, which allows each layer to make autonomous decisions individually, while maximizing the utility of the wireless user by optimally determining what information needs to be exchanged among layers. Hence, this cross-layer framework does not change the current layered architecture. Specifically, because the wireless user interacts with the environment at various layers of the protocol stack, the cross-layer optimization problem is formulated as a layered Markov decision process (MDP) in which each layer adapts its own protocol parameters and exchanges information (messages) with other layers in order to cooperatively maximize the performance of the wireless user. The message exchange mechanism for determining the optimal cross-layer transmission strategies has been designed for both off-line optimization and on-line dynamic adaptation. We also show that many existing cross-layer optimization algorithms can be formulated as simplified, sub-optimal, versions of our layered MDP framework.
[ { "version": "v1", "created": "Sat, 15 Dec 2007 06:50:43 GMT" } ]
2007-12-18T00:00:00
[ [ "Fu", "Fangwen", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0712.2501
Liang Wang
Wang Liang, Wang Bing-wen, Guo Yi-Ping
Cell mapping description for digital control system with quantization effect
22 pages,14 figues
null
null
null
cs.OH
null
Quantization problem in digital control system have attracted more and more attention in these years. Normally, a quantized variable is regarded as a perturbed copy of the unquantized variable in the research of quantization effect, but this model has shown many obvious disadvantages in control system analysis and design process. In this paper, we give a new model for quantization based 'cell mapping' concept. This cell model could clearly describe the global dynamics of quantized digital system. Then some important characteristics of control system like controllability are analyzed by this model. The finite precision control design method based on cell concept is also presented.
[ { "version": "v1", "created": "Sat, 15 Dec 2007 08:58:50 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2008 00:53:08 GMT" } ]
2008-01-04T00:00:00
[ [ "Liang", "Wang", "" ], [ "Bing-wen", "Wang", "" ], [ "Yi-Ping", "Guo", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0712.2552
Yeow Meng Chee
Yeow Meng Chee, Alan C. H. Ling, San Ling, and Hao Shen
The PBD-Closure of Constant-Composition Codes
8 pages
IEEE Transactions on Information Theory, vol. 53, No. 8, August 2007, pp. 2685-2692
10.1109/TIT.2007.901175
null
cs.IT cs.DM math.CO math.IT
null
We show an interesting PBD-closure result for the set of lengths of constant-composition codes whose distance and size meet certain conditions. A consequence of this PBD-closure result is that the size of optimal constant-composition codes can be determined for infinite families of parameter sets from just a single example of an optimal code. As an application, the size of several infinite families of optimal constant-composition codes are derived. In particular, the problem of determining the size of optimal constant-composition codes having distance four and weight three is solved for all lengths sufficiently large. This problem was previously unresolved for odd lengths, except for lengths seven and eleven.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 01:02:12 GMT" } ]
2007-12-18T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ling", "Alan C. H.", "" ], [ "Ling", "San", "" ], [ "Shen", "Hao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2553
Yeow Meng Chee
Yeow Meng Chee and Charles J. Colbourn
Constructions for Difference Triangle Sets
4 pages
IEEE Transactions on Information Theory, vol. 43, No. 4, July 1997, pp. 1346-1349
null
null
cs.IT cs.DM math.CO math.IT
null
Difference triangle sets are useful in many practical problems of information transmission. This correspondence studies combinatorial and computational constructions for difference triangle sets having small scopes. Our algorithms have been used to produce difference triangle sets whose scopes are the best currently known.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 01:17:35 GMT" } ]
2007-12-18T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Colbourn", "Charles J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2559
Glenn Merlet
Glenn Merlet (LIAFA)
Cycle time of stochastic max-plus linear systems
This article has been published by IMS in Electronic Journal of Probability at http://www.math.washington.edu/~ejpecp/viewarticle.php?id=1781
Electronic Journal of Probability 13 (2008) (2008) Paper 12, 322-340
null
null
math.PR cs.DM
null
We analyze the asymptotic behavior of sequences of random variables defined by an initial condition, a stationary and ergodic sequence of random matrices, and an induction formula involving multiplication is the so-called max-plus algebra. This type of recursive sequences are frequently used in applied probability as they model many systems as some queueing networks, train and computer networks, and production systems. We give a necessary condition for the recursive sequences to satisfy a strong law of large numbers, which proves to be sufficient when the matrices are i.i.d. Moreover, we construct a new example, in which the sequence of matrices is strongly mixing, that condition is satisfied, but the recursive sequence do not converges almost surely.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 07:54:35 GMT" }, { "version": "v2", "created": "Tue, 11 Mar 2008 20:04:21 GMT" } ]
2008-03-12T00:00:00
[ [ "Merlet", "Glenn", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.2567
Petros Petrosyan
Rafael R. Kamalian and Petros A. Petrosyan
On Lower Bound for W(K_{2n})
3 pages
Mathematical Problems of Computer Science 23, 2004, 127--129
null
null
cs.DM
null
The lower bound W(K_{2n})>=3n-2 is proved for the greatest possible number of colors in an interval edge coloring of the complete graph K_{2n}.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 10:45:39 GMT" } ]
2007-12-18T00:00:00
[ [ "Kamalian", "Rafael R.", "" ], [ "Petrosyan", "Petros A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.2577
Maurice Margenstern
Margenstern Maurice
Is the injectivity of the global function of a cellular automaton in the hyperbolic plane undecidable?
16 pages, 8 figures. A few words were missing in the initial version
null
null
null
cs.DM cs.LO
null
In this paper, we look at the following question. We consider cellular automata in the hyperbolic plane and we consider the global function defined on all possible configurations. Is the injectivity of this function undecidable? The problem was answered positively in the case of the Euclidean plane by Jarkko Kari, in 1994. In the present paper, we give a partial answer: when the configurations are restricted to a certain condition, the problem is undecidable.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 15:12:45 GMT" }, { "version": "v2", "created": "Thu, 20 Dec 2007 08:33:17 GMT" } ]
2007-12-20T00:00:00
[ [ "Maurice", "Margenstern", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.2579
Hongyi Yao
Hongyi Yao
On the Information of the Second Moments Between Random Variables Using Mutually Unbiased Bases
20pages, no figures. The paper has been submitted to IEEE Transanction on Information Theory
null
null
null
cs.IT math.IT
null
The notation of mutually unbiased bases(MUB) was first introduced by Ivanovic to reconstruct density matrixes\cite{Ivanovic}. The subject about how to use MUB to analyze, process, and utilize the information of the second moments between random variables is studied in this paper. In the first part, the mathematical foundation will be built. It will be shown that the spectra of MUB have complete information for the correlation matrixes of finite discrete signals, and the nice properties of them. Roughly speaking, it will be shown that each spectrum from MUB plays an equal role for finite discrete signals, and the effect between any two spectra can be treated as a global constant shift. These properties will be used to find some important and natural characterizations of random vectors and random discrete operators/filters. For a technical reason, it will be shown that any MUB spectra can be found as fast as Fourier spectrum when the length of the signal is a prime number. In the second part, some applications will be presented. First of all, a protocol about how to increase the number of users in a basic digital communication model will be studied, which has bring some deep insights about how to encode the information into the second moments between random variables. Secondly, the application of signal analysis will be studied. It is suggested that complete "MUB" spectra analysis works well in any case, and people can just choose the spectra they are interested in to do analysis. For instance, single Fourier spectra analysis can be also applied in nonstationary case. Finally, the application of MUB in dimensionality reduction will be considered, when the prior knowledge of the data isn't reliable.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 15:54:37 GMT" }, { "version": "v2", "created": "Wed, 19 Dec 2007 14:53:09 GMT" } ]
2007-12-19T00:00:00
[ [ "Yao", "Hongyi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2585
Petros Petrosyan
Petros A. Petrosyan
Interval Edge Colourings of Complete Graphs and n-cubes
4 pages
Mathematical Problems of Computer Science 25, 2006, 5--8
null
null
cs.DM
null
For complete graphs and n-cubes bounds are found for the possible number of colours in an interval edge colourings.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 10:43:19 GMT" }, { "version": "v2", "created": "Fri, 28 Dec 2007 21:42:42 GMT" } ]
2011-11-10T00:00:00
[ [ "Petrosyan", "Petros A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.2587
Chia-Lung Wu
Chia-Lung Wu, Po-Ning Chen, Yunghsiang S. Han, Ming-Hsin Kuo
Maximum-Likelihood Priority-First Search Decodable Codes for Combined Channel Estimation and Error Protection
13 figures, 2 tables
null
null
null
cs.IT math.IT
null
The code that combines channel estimation and error protection has received general attention recently, and has been considered a promising methodology to compensate multi-path fading effect. It has been shown by simulations that such code design can considerably improve the system performance over the conventional design with separate channel estimation and error protection modules under the same code rate. Nevertheless, the major obstacle that prevents from the practice of the codes is that the existing codes are mostly searched by computers, and hence exhibit no good structure for efficient decoding. Hence, the time-consuming exhaustive search becomes the only decoding choice, and the decoding complexity increases dramatically with the codeword length. In this paper, by optimizing the signal-tonoise ratio, we found a systematic construction for the codes for combined channel estimation and error protection, and confirmed its equivalence in performance to the computer-searched codes by simulations. Moreover, the structural codes that we construct by rules can now be maximum-likelihoodly decodable in terms of a newly derived recursive metric for use of the priority-first search decoding algorithm. Thus,the decoding complexity reduces significantly when compared with that of the exhaustive decoder. The extension code design for fast-fading channels is also presented. Simulations conclude that our constructed extension code is robust in performance even if the coherent period is shorter than the codeword length.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 06:07:05 GMT" } ]
2007-12-18T00:00:00
[ [ "Wu", "Chia-Lung", "" ], [ "Chen", "Po-Ning", "" ], [ "Han", "Yunghsiang S.", "" ], [ "Kuo", "Ming-Hsin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2591
Grenville Croll
Grenville J. Croll
A Typical Model Audit Approach: Spreadsheet Audit Methodologies in the City of London
5 Pages
IFIP, Integrity and Internal Control in Information Systems, Vol 124, pp. 213-219, Kluwer, 2003
null
null
cs.SE cs.CY
null
Spreadsheet audit and review procedures are an essential part of almost all City of London financial transactions. Structured processes are used to discover errors in large financial spreadsheets underpinning major transactions of all types. Serious errors are routinely found and are fed back to model development teams generally under conditions of extreme time urgency. Corrected models form the essence of the completed transaction and firms undertaking model audit and review expose themselves to significant financial liability in the event of any remaining significant error. It is noteworthy that in the United Kingdom, the management of spreadsheet error is almost unheard of outside of the City of London despite the commercial ubiquity of the spreadsheet.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 20:40:57 GMT" } ]
2008-03-10T00:00:00
[ [ "Croll", "Grenville J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0712.2592
Gusztav Morvai
S. Yakowitz, L. Gyorfi, J. Kieffer, G. Morvai
Strongly consistent nonparametric forecasting and regression for stationary ergodic sequences
null
J. Multivariate Anal. 71 (1999), no. 1, 24--41
null
null
math.PR cs.IT math.IT
null
Let $\{(X_i,Y_i)\}$ be a stationary ergodic time series with $(X,Y)$ values in the product space $\R^d\bigotimes \R .$ This study offers what is believed to be the first strongly consistent (with respect to pointwise, least-squares, and uniform distance) algorithm for inferring $m(x)=E[Y_0|X_0=x]$ under the presumption that $m(x)$ is uniformly Lipschitz continuous. Auto-regression, or forecasting, is an important special case, and as such our work extends the literature of nonparametric, nonlinear forecasting by circumventing customary mixing assumptions. The work is motivated by a time series model in stochastic finance and by perspectives of its contribution to the issues of universal time series estimation.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 20:41:19 GMT" } ]
2008-06-19T00:00:00
[ [ "Yakowitz", "S.", "" ], [ "Gyorfi", "L.", "" ], [ "Kieffer", "J.", "" ], [ "Morvai", "G.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2594
Grenville Croll
David Chadwick
Stop That Subversive Spreadsheet!
6 Pages
IFIP, Integrity and Internal Control in Information Systems, Vol 24, pp. 205-211, Kluwer, 2003
null
null
cs.GL
null
This paper documents the formation of the European Spreadsheet Risks Interest Group (EuSpRIG www.eusprig.org) and outlines some of the research undertaken and reported upon by interested parties in EuSpRIG publications
[ { "version": "v1", "created": "Sun, 16 Dec 2007 21:00:02 GMT" } ]
2008-03-10T00:00:00
[ [ "Chadwick", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0712.2595
Bill Rosgen
Bill Rosgen
Distinguishing Short Quantum Computations
12 pages, 4 figures, to be published in the proceedings of STACS 2008
null
10.4230/LIPIcs.STACS.2008.1322
null
quant-ph cs.CC
null
Distinguishing logarithmic depth quantum circuits on mixed states is shown to be complete for QIP, the class of problems having quantum interactive proof systems. Circuits in this model can represent arbitrary quantum processes, and thus this result has implications for the verification of implementations of quantum algorithms. The distinguishability problem is also complete for QIP on constant depth circuits containing the unbounded fan-out gate. These results are shown by reducing a QIP-complete problem to a logarithmic depth version of itself using a parallelization technique.
[ { "version": "v1", "created": "Sun, 16 Dec 2007 21:40:41 GMT" } ]
2010-06-02T00:00:00
[ [ "Rosgen", "Bill", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0712.2605
Grenville Croll
Grenville J. Croll
Some A Priori Torah Decryption Principles
11 Pages. Presented at the 2nd conference of the Int. Torah Codes Society, Jerusalem, Israel, 5th June 2000
Proc. ANPA Cambridge, UK, 2007
null
null
cs.CR
null
The author proposes, a priori, a simple set of principles that can be developed into a range of algorithms by which means the Torah might be decoded. It is assumed that the Torah is some form of transposition cipher with the unusual property that the plain text of the Torah may also be the cipher text of one or more other documents written in Biblical Hebrew. The decryption principles are based upon the use of Equidistant Letter Sequences (ELS) and the notions of Message Length, Dimensionality, Euclidean Dimension, Topology, Read Direction, Skip Distance and offset. The principles can be applied recursively and define numerous large subsets of the 304,807! theoretically possible permutations of the characters of the Torah.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 00:56:32 GMT" } ]
2007-12-18T00:00:00
[ [ "Croll", "Grenville J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.2606
Grenville Croll
Grenville J. Croll
Algorithmic Permutation of part of the Torah
10 Pages. Presented at the Second Conference of the International Torah Codes Society, Jerusalem, Israel, 6th June 2000. Minor updates and added Appendix B in version 2, October 2010
Proc. ANPA 27, Wesley College, Cambridge, UK, September 2005
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A small part of the Torah is arranged into a two dimensional array. The characters are then permuted using a simple recursive deterministic algorithm. The various permutations are then passed through three stochastic filters and one deterministic filter to identify the permutations which most closely approximate readable Biblical Hebrew. Of the 15 Billion sequences available at the second level of recursion, 800 pass the a priori thresholds set for each filter. The resulting "Biblical Hebrew" text is available for inspection and the generation of further material continues.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 01:04:22 GMT" }, { "version": "v2", "created": "Sun, 17 Oct 2010 16:51:03 GMT" }, { "version": "v3", "created": "Tue, 19 Oct 2010 20:16:30 GMT" } ]
2010-10-21T00:00:00
[ [ "Croll", "Grenville J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.2619
Yeow Meng Chee
Yeow Meng Chee
A New Lower Bound for A(17,6,6)
3 pages
Ars Combinatoria, Vol. 83, pp. 361-363, 2007
null
null
cs.IT cs.DM math.CO math.IT
null
We construct a record-breaking binary code of length 17, minimal distance 6, constant weight 6, and containing 113 codewords.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 03:25:52 GMT" } ]
2007-12-18T00:00:00
[ [ "Chee", "Yeow Meng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2629
Toshiya Itoh
Ryoso Hamane, Toshiya Itoh, and Kouhei Tomita
Approximation Algorithms for the Highway Problem under the Coupon Model
13 pages, 5 figures
IEICE Trans. on Fundamentals, E92-A(8), pp.1779-1786, 2009
10.1587/transfun.E92.A.1779
null
cs.DS
null
When a store sells items to customers, the store wishes to determine the prices of the items to maximize its profit. Intuitively, if the store sells the items with low (resp. high) prices, the customers buy more (resp. less) items, which provides less profit to the store. So it would be hard for the store to decide the prices of items. Assume that the store has a set V of n items and there is a set E of m customers who wish to buy those items, and also assume that each item i \in V has the production cost d_i and each customer e_j \in E has the valuation v_j on the bundle e_j \subseteq V of items. When the store sells an item i \in V at the price r_i, the profit for the item i is p_i=r_i-d_i. The goal of the store is to decide the price of each item to maximize its total profit. In most of the previous works, the item pricing problem was considered under the assumption that p_i \geq 0 for each i \in V, however, Balcan, et al. [In Proc. of WINE, LNCS 4858, 2007] introduced the notion of loss-leader, and showed that the seller can get more total profit in the case that p_i < 0 is allowed than in the case that p_i < 0 is not allowed. In this paper, we consider the line and the cycle highway problem, and show approximation algorithms for the line and/or cycle highway problem for which the smallest valuation is s and the largest valuation is \ell or all valuations are identical.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 04:47:38 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2008 05:54:40 GMT" } ]
2011-09-29T00:00:00
[ [ "Hamane", "Ryoso", "" ], [ "Itoh", "Toshiya", "" ], [ "Tomita", "Kouhei", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.2630
Juan J. Merelo Pr.
Nestor Zorzano, Daniel Merino, J.L.J. Laredo, J.P. Sevilla, Pablo Garcia, J.J. Merelo
Evolving XSLT stylesheets
First draft, preparing for WCCI 2008
null
null
null
cs.NE cs.PL
null
This paper introduces a procedure based on genetic programming to evolve XSLT programs (usually called stylesheets or logicsheets). XSLT is a general purpose, document-oriented functional language, generally used to transform XML documents (or, in general, solve any problem that can be coded as an XML document). The proposed solution uses a tree representation for the stylesheets as well as diverse specific operators in order to obtain, in the studied cases and a reasonable time, a XSLT stylesheet that performs the transformation. Several types of representation have been compared, resulting in different performance and degree of success.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 19:59:42 GMT" } ]
2007-12-18T00:00:00
[ [ "Zorzano", "Nestor", "" ], [ "Merino", "Daniel", "" ], [ "Laredo", "J. L. J.", "" ], [ "Sevilla", "J. P.", "" ], [ "Garcia", "Pablo", "" ], [ "Merelo", "J. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0712.2638
Steve Oudot
Fr\'ed\'eric Chazal (INRIA Sophia Antipolis), Steve Oudot (INRIA Sophia Antipolis)
Towards Persistence-Based Reconstruction in Euclidean Spaces
null
null
null
null
cs.CG math.AT
null
Manifold reconstruction has been extensively studied for the last decade or so, especially in two and three dimensions. Recently, significant improvements were made in higher dimensions, leading to new methods to reconstruct large classes of compact subsets of Euclidean space $\R^d$. However, the complexities of these methods scale up exponentially with d, which makes them impractical in medium or high dimensions, even for handling low-dimensional submanifolds. In this paper, we introduce a novel approach that stands in-between classical reconstruction and topological estimation, and whose complexity scales up with the intrinsic dimension of the data. Specifically, when the data points are sufficiently densely sampled from a smooth $m$-submanifold of $\R^d$, our method retrieves the homology of the submanifold in time at most $c(m)n^5$, where $n$ is the size of the input and $c(m)$ is a constant depending solely on $m$. It can also provably well handle a wide range of compact subsets of $\R^d$, though with worse complexities. Along the way to proving the correctness of our algorithm, we obtain new results on \v{C}ech, Rips, and witness complex filtrations in Euclidean spaces.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 06:30:08 GMT" }, { "version": "v2", "created": "Tue, 18 Dec 2007 10:26:34 GMT" } ]
2007-12-18T00:00:00
[ [ "Chazal", "Frédéric", "", "INRIA Sophia Antipolis" ], [ "Oudot", "Steve", "", "INRIA\n Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
0712.2640
Yeow Meng Chee
Yeow Meng Chee, Charles J. Colbourn, and Alan C. H. Ling
Optimal Memoryless Encoding for Low Power Off-Chip Data Buses
Proceedings of the 2006 IEEE/ACM international Conference on Computer-Aided Design (San Jose, California, November 05 - 09, 2006). ICCAD '06. ACM, New York, NY, 369-374
null
10.1145/1233501.1233575
null
cs.AR cs.DM cs.IT math.IT
null
Off-chip buses account for a significant portion of the total system power consumed in embedded systems. Bus encoding schemes have been proposed to minimize power dissipation, but none has been demonstrated to be optimal with respect to any measure. In this paper, we give the first provably optimal and explicit (polynomial-time constructible) families of memoryless codes for minimizing bit transitions in off-chip buses. Our results imply that having access to a clock does not make a memoryless encoding scheme that minimizes bit transitions more powerful.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 06:37:11 GMT" } ]
2007-12-18T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Colbourn", "Charles J.", "" ], [ "Ling", "Alan C. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2643
Cyrille Bertelle
Pierrick Tranouez (LITIS), Cyrille Bertelle (LITIS), Damien Olivier (LITIS)
Changing Levels of Description in a Fluid Flow Simulation
null
Emergent Properties in Natural and Artificial Dynamical Systems, Springer (Ed.) (2006) 87-99
null
null
physics.flu-dyn cs.CE
null
We describe here our perception of complex systems, of how we feel the different layers of description are important part of a correct complex system simulation. We describe a rough models categorization between rules based and law based, of how these categories handled the levels of descriptions or scales. We then describe our fluid flow simulation, which combines different fineness of grain in a mixed approach of these categories. This simulation is built keeping in mind an ulterior use inside a more general aquatic ecosystem.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 07:07:06 GMT" } ]
2007-12-18T00:00:00
[ [ "Tranouez", "Pierrick", "", "LITIS" ], [ "Bertelle", "Cyrille", "", "LITIS" ], [ "Olivier", "Damien", "", "LITIS" ] ]
[ { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0712.2644
Cyrille Bertelle
Rawan Ghnemat (LITIS), Saleh Oqeili (IT), Cyrille Bertelle (LITIS), G\'erard Henry Edmond Duchamp (LIPN)
Automata-based Adaptive Behavior for Economical Modelling Using Game Theory
null
Emergent Properties in Natural and Artificial Dynamical Systems, Springer (Ed.) (2006) 171-183
null
null
cs.GT cs.CC
null
In this chapter, we deal with some specific domains of applications to game theory. This is one of the major class of models in the new approaches of modelling in the economic domain. For that, we use genetic automata which allow to build adaptive strategies for the players. We explain how the automata-based formalism proposed - matrix representation of automata with multiplicities - allows to define semi-distance between the strategy behaviors. With that tools, we are able to generate an automatic processus to compute emergent systems of entities whose behaviors are represented by these genetic automata.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 07:07:54 GMT" } ]
2007-12-18T00:00:00
[ [ "Ghnemat", "Rawan", "", "LITIS" ], [ "Oqeili", "Saleh", "", "IT" ], [ "Bertelle", "Cyrille", "", "LITIS" ], [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0712.2661
Gregory Gutin
P. Balister, S. Gerke, G. Gutin, A. Johnstone, J. Reddington, E. Scott, A. Soleimanfallah, A. Yeo
Algorithms for Generating Convex Sets in Acyclic Digraphs
null
null
null
null
cs.DM cs.DS
null
A set $X$ of vertices of an acyclic digraph $D$ is convex if $X\neq \emptyset$ and there is no directed path between vertices of $X$ which contains a vertex not in $X$. A set $X$ is connected if $X\neq \emptyset$ and the underlying undirected graph of the subgraph of $D$ induced by $X$ is connected. Connected convex sets and convex sets of acyclic digraphs are of interest in the area of modern embedded processor technology. We construct an algorithm $\cal A$ for enumeration of all connected convex sets of an acyclic digraph $D$ of order $n$. The time complexity of $\cal A$ is $O(n\cdot cc(D))$, where $cc(D)$ is the number of connected convex sets in $D$. We also give an optimal algorithm for enumeration of all (not just connected) convex sets of an acyclic digraph $D$ of order $n$. In computational experiments we demonstrate that our algorithms outperform the best algorithms in the literature. Using the same approach as for $\cal A$, we design an algorithm for generating all connected sets of a connected undirected graph $G$. The complexity of the algorithm is $O(n\cdot c(G)),$ where $n$ is the order of $G$ and $c(G)$ is the number of connected sets of $G.$ The previously reported algorithm for connected set enumeration is of running time $O(mn\cdot c(G))$, where $m$ is the number of edges in $G.$
[ { "version": "v1", "created": "Mon, 17 Dec 2007 09:18:57 GMT" } ]
2007-12-18T00:00:00
[ [ "Balister", "P.", "" ], [ "Gerke", "S.", "" ], [ "Gutin", "G.", "" ], [ "Johnstone", "A.", "" ], [ "Reddington", "J.", "" ], [ "Scott", "E.", "" ], [ "Soleimanfallah", "A.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.2671
Laurent Buse
Laurent Bus\'e (INRIA Sophia Antipolis)
On the equations of the moving curve ideal of a rational algebraic plane curve
Journal of Algebra (2009)
null
null
null
math.AG cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a parametrization of a rational plane algebraic curve C, some explicit adjoint pencils on C are described in terms of determinants. Moreover, some generators of the Rees algebra associated to this parametrization are presented. The main ingredient developed in this paper is a detailed study of the elimination ideal of two homogeneous polynomials in two homogeneous variables that form a regular sequence.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 10:12:33 GMT" }, { "version": "v2", "created": "Tue, 10 Feb 2009 10:45:19 GMT" } ]
2009-02-10T00:00:00
[ [ "Busé", "Laurent", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0712.2678
Gregory Gutin
P. Balister, S. Gerke, G. Gutin
Convex sets in acyclic digraphs
null
null
null
null
cs.DM
null
A non-empty set $X$ of vertices of an acyclic digraph is called connected if the underlying undirected graph induced by $X$ is connected and it is called convex if no two vertices of $X$ are connected by a directed path in which some vertices are not in $X$. The set of convex sets (connected convex sets) of an acyclic digraph $D$ is denoted by $\sco(D)$ ($\scc(D)$) and its size by $\co(D)$ ($\cc(D)$). Gutin, Johnstone, Reddington, Scott, Soleimanfallah, and Yeo (Proc. ACiD'07) conjectured that the sum of the sizes of all (connected) convex sets in $D$ equals $\Theta(n \cdot \co(D))$ ($\Theta(n \cdot \cc(D))$) where $n$ is the order of $D$. In this paper we exhibit a family of connected acyclic digraphs with $\sum_{C\in \sco(D)}|C| = o(n\cdot \co(D))$ and $\sum_{C\in \scc(D)}|C| = o(n\cdot \cc(D))$. We also show that the number of connected convex sets of order $k$ in any connected acyclic digraph of order $n$ is at least $n-k+1$. This is a strengthening of a theorem by Gutin and Yeo.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 10:52:47 GMT" } ]
2007-12-18T00:00:00
[ [ "Balister", "P.", "" ], [ "Gerke", "S.", "" ], [ "Gutin", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.2682
Kai Puolamaki
Kai Puolam\"aki, Sami Hanhij\"arvi, Gemma C. Garriga
An Approximation Ratio for Biclustering
9 pages, 2 figures; presentation clarified, replaced to match the version to be published in IPL
Information Processing Letters 108 (2008) 45-49
10.1016/j.ipl.2008.03.013
Publications in Computer and Information Science E13
cs.DS stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of biclustering consists of the simultaneous clustering of rows and columns of a matrix such that each of the submatrices induced by a pair of row and column clusters is as uniform as possible. In this paper we approximate the optimal biclustering by applying one-way clustering algorithms independently on the rows and on the columns of the input matrix. We show that such a solution yields a worst-case approximation ratio of 1+sqrt(2) under L1-norm for 0-1 valued matrices, and of 2 under L2-norm for real valued matrices.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 11:45:42 GMT" }, { "version": "v2", "created": "Fri, 22 Aug 2008 07:01:26 GMT" } ]
2008-08-22T00:00:00
[ [ "Puolamäki", "Kai", "" ], [ "Hanhijärvi", "Sami", "" ], [ "Garriga", "Gemma C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0712.2684
Ricardo Lopez-Ruiz
R. Lopez-Ruiz, J. Gonzalez-Estevez, M.G. Cosenza, and J.R. Sanchez
An Economic Model of Coupled Exponential Maps
3 pages, 1 figure ; Presented at NOMA'07 Conference, December 2007, Toulouse (France)
null
null
null
q-fin.GN cs.MA nlin.AO physics.soc-ph
null
In this work, an ensemble of economic interacting agents is considered. The agents are arranged in a linear array where only local couplings are allowed. The deterministic dynamics of each agent is given by a map. This map is expressed by two factors. The first one is a linear term that models the expansion of the agent's economy and that is controlled by the {\it growth capacity parameter}. The second one is an inhibition exponential term that is regulated by the {\it local environmental pressure}. Depending on the parameter setting, the system can display Pareto or Boltzmann-Gibbs behavior in the asymptotic dynamical regime. The regions of parameter space where the system exhibits one of these two statistical behaviors are delimited. Other properties of the system, such as the mean wealth, the standard deviation and the Gini coefficient, are also calculated.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 11:02:58 GMT" } ]
2008-12-02T00:00:00
[ [ "Lopez-Ruiz", "R.", "" ], [ "Gonzalez-Estevez", "J.", "" ], [ "Cosenza", "M. G.", "" ], [ "Sanchez", "J. R.", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.GN", "description": "Development of general quantitative methodologies with applications in finance", "span": "(General Finance)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0712.2737
Wim Vanhoof
Kim Henriksen, Gourinath Banda, John Gallagher
Experiments with a Convex Polyhedral Analysis Tool for Logic Programs
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
Convex polyhedral abstractions of logic programs have been found very useful in deriving numeric relationships between program arguments in order to prove program properties and in other areas such as termination and complexity analysis. We present a tool for constructing polyhedral analyses of (constraint) logic programs. The aim of the tool is to make available, with a convenient interface, state-of-the-art techniques for polyhedral analysis such as delayed widening, narrowing, "widening up-to", and enhanced automatic selection of widening points. The tool is accessible on the web, permits user programs to be uploaded and analysed, and is integrated with related program transformations such as size abstractions and query-answer transformation. We then report some experiments using the tool, showing how it can be conveniently used to analyse transition systems arising from models of embedded systems, and an emulator for a PIC microcontroller which is used for example in wearable computing systems. We discuss issues including scalability, tradeoffs of precision and computation time, and other program transformations that can enhance the results of analysis.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 15:11:36 GMT" } ]
2007-12-18T00:00:00
[ [ "Henriksen", "Kim", "" ], [ "Banda", "Gourinath", "" ], [ "Gallagher", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.2773
Emmanuel Cecchet
Emmanuel Cecchet, George Candea, Anastasia Ailamaki
Middleware-based Database Replication: The Gaps between Theory and Practice
14 pages. Appears in Proc. ACM SIGMOD International Conference on Management of Data, Vancouver, Canada, June 2008
null
null
EPFL technical report DSLAB-REPORT-2007-001
cs.DB cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However, academic groups often attack replication problems in isolation, overlooking the need for completeness in their solutions, while commercial teams take a holistic approach that often misses opportunities for fundamental innovation. This has created over time a gap between academic research and industrial practice. This paper aims to characterize the gap along three axes: performance, availability, and administration. We build on our own experience developing and deploying replication systems in commercial and academic settings, as well as on a large body of prior related work. We sift through representative examples from the last decade of open-source, academic, and commercial database replication systems and combine this material with case studies from real systems deployed at Fortune 500 customers. We propose two agendas, one for academic research and one for industrial R&D, which we believe can bridge the gap within 5-10 years. This way, we hope to both motivate and help researchers in making the theory and practice of middleware-based database replication more relevant to each other.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 18:42:15 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2008 20:53:51 GMT" } ]
2008-11-05T00:00:00
[ [ "Cecchet", "Emmanuel", "" ], [ "Candea", "George", "" ], [ "Ailamaki", "Anastasia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0712.2789
Lester Ingber
Lester Ingber
Trading in Risk Dimensions (TRD)
This 2005 report has been withdrawn by the author as requested by the publisher of "Handbook of Technical Trading Analysis" (Wiley, 2009) in which an updated version appears
null
null
null
cs.CE cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous work, mostly published, developed two-shell recursive trading systems. An inner-shell of Canonical Momenta Indicators (CMI) is adaptively fit to incoming market data. A parameterized trading-rule outer-shell uses the global optimization code Adaptive Simulated Annealing (ASA) to fit the trading system to historical data. A simple fitting algorithm, usually not requiring ASA, is used for the inner-shell fit. An additional risk-management middle-shell has been added to create a three-shell recursive optimization/sampling/fitting algorithm. Portfolio-level distributions of copula-transformed multivariate distributions (with constituent markets possessing different marginal distributions in returns space) are generated by Monte Carlo samplings. ASA is used to importance-sample weightings of these markets. The core code, Trading in Risk Dimensions (TRD), processes Training and Testing trading systems on historical data, and consistently interacts with RealTime trading platforms at minute resolutions, but this scale can be modified. This approach transforms constituent probability distributions into a common space where it makes sense to develop correlations to further develop probability distributions and risk/uncertainty analyses of the full portfolio. ASA is used for importance-sampling these distributions and for optimizing system parameters.
[ { "version": "v1", "created": "Mon, 17 Dec 2007 18:11:52 GMT" }, { "version": "v2", "created": "Wed, 4 Nov 2009 03:32:16 GMT" } ]
2009-11-04T00:00:00
[ [ "Ingber", "Lester", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0712.2857
Junsheng Han
Junsheng Han, Paul H. Siegel and Ron M. Roth
Single-Exclusion Number and the Stopping Redundancy of MDS Codes
12 pages, 1 figure. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2025578
null
cs.IT cs.DM math.CO math.IT
null
For a linear block code C, its stopping redundancy is defined as the smallest number of check nodes in a Tanner graph for C, such that there exist no stopping sets of size smaller than the minimum distance of C. Schwartz and Vardy conjectured that the stopping redundancy of an MDS code should only depend on its length and minimum distance. We define the (n,t)-single-exclusion number, S(n,t) as the smallest number of t-subsets of an n-set, such that for each i-subset of the n-set, i=1,...,t+1, there exists a t-subset that contains all but one element of the i-subset. New upper bounds on the single-exclusion number are obtained via probabilistic methods, recurrent inequalities, as well as explicit constructions. The new bounds are used to better understand the stopping redundancy of MDS codes. In particular, it is shown that for [n,k=n-d+1,d] MDS codes, as n goes to infinity, the stopping redundancy is asymptotic to S(n,d-2), if d=o(\sqrt{n}), or if k=o(\sqrt{n}) and k goes to infinity, thus giving partial confirmation of the Schwartz-Vardy conjecture in the asymptotic sense.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 00:53:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Han", "Junsheng", "" ], [ "Siegel", "Paul H.", "" ], [ "Roth", "Ron M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2869
Daniel \v{S}tefankovi\v{c}
Satyaki Mahalanabis, Daniel Stefankovic
Density estimation in linear time
11 pages
null
null
null
cs.LG
null
We consider the problem of choosing a density estimate from a set of distributions F, minimizing the L1-distance to an unknown distribution (Devroye, Lugosi 2001). Devroye and Lugosi analyze two algorithms for the problem: Scheffe tournament winner and minimum distance estimate. The Scheffe tournament estimate requires fewer computations than the minimum distance estimate, but has strictly weaker guarantees than the latter. We focus on the computational aspect of density estimation. We present two algorithms, both with the same guarantee as the minimum distance estimate. The first one, a modification of the minimum distance estimate, uses the same number (quadratic in |F|) of computations as the Scheffe tournament. The second one, called ``efficient minimum loss-weight estimate,'' uses only a linear number of computations, assuming that F is preprocessed. We also give examples showing that the guarantees of the algorithms cannot be improved and explore randomized algorithms for density estimation.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 03:30:05 GMT" } ]
2007-12-19T00:00:00
[ [ "Mahalanabis", "Satyaki", "" ], [ "Stefankovic", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0712.2870
Hari Palaiyanur
Hari Palaiyanur, Cheng Chang and Anant Sahai
The source coding game with a cheating switcher
27 pages, 11 figures. Submitted to IT Transactions
null
null
EECS-2007-155
cs.IT cs.CV math.IT
null
Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) composed of a finite number of subsources with known distributions. Berger's paper `The Source Coding Game', \emph{IEEE Trans. Inform. Theory}, 1971, solves this problem under the condition that the adversary is allowed only strictly causal access to the subsource realizations. We consider the case when the adversary has access to the subsource realizations non-causally. Using the type-covering lemma, this new rate-distortion function is determined to be the maximum of the IID rate-distortion function over a set of source distributions attainable by the adversary. We then extend the results to allow for partial or noisy observations of subsource realizations. We further explore the model by attempting to find the rate-distortion function when the adversary is actually helpful. Finally, a bound is developed on the uniform continuity of the IID rate-distortion function for finite-alphabet sources. The bound is used to give a sufficient number of distributions that need to be sampled to compute the rate-distortion function of an AVS to within a certain accuracy. The bound is also used to give a rate of convergence for the estimate of the rate-distortion function for an unknown IID finite-alphabet source .
[ { "version": "v1", "created": "Tue, 18 Dec 2007 03:31:32 GMT" } ]
2016-09-08T00:00:00
[ [ "Palaiyanur", "Hari", "" ], [ "Chang", "Cheng", "" ], [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2872
Vignesh Sethuraman
Vignesh Sethuraman, Ligong Wang, Bruce Hajek and Amos Lapidoth
Low SNR Capacity of Noncoherent Fading Channels
submitted to IEEE IT
null
10.1109/TIT.2009.2012995
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete-time Rayleigh fading single-input single-output (SISO) and multiple-input multiple-output (MIMO) channels are considered, with no channel state information at the transmitter or the receiver. The fading is assumed to be stationary and correlated in time, but independent from antenna to antenna. Peak-power and average-power constraints are imposed on the transmit antennas. For MIMO channels, these constraints are either imposed on the sum over antennas, or on each individual antenna. For SISO channels and MIMO channels with sum power constraints, the asymptotic capacity as the peak signal-to-noise ratio tends to zero is identified; for MIMO channels with individual power constraints, this asymptotic capacity is obtained for a class of channels called transmit separable channels. The results for MIMO channels with individual power constraints are carried over to SISO channels with delay spread (i.e. frequency selective fading).
[ { "version": "v1", "created": "Tue, 18 Dec 2007 04:28:36 GMT" }, { "version": "v2", "created": "Mon, 15 Dec 2008 07:42:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Wang", "Ligong", "" ], [ "Hajek", "Bruce", "" ], [ "Lapidoth", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.2923
Roumen Anguelov
Roumen Anguelov, Inger Plaskitt
A Class of LULU Operators on Multi-Dimensional Arrays
null
null
null
null
cs.CV
null
The LULU operators for sequences are extended to multi-dimensional arrays via the morphological concept of connection in a way which preserves their essential properties, e.g. they are separators and form a four element fully ordered semi-group. The power of the operators is demonstrated by deriving a total variation preserving discrete pulse decomposition of images.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 10:43:23 GMT" } ]
2007-12-19T00:00:00
[ [ "Anguelov", "Roumen", "" ], [ "Plaskitt", "Inger", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0712.2943
Bob Diertens
Bob Diertens
Software (Re-)Engineering with PSF
null
null
null
PRG0505
cs.SE
null
This paper investigates the usefulness of PSF in software engineering and reengineering. PSF is based on ACP (Algebra of Communicating Processes) and as some architectural description languages are based on process algebra, we investigate whether PSF can be used at the software architecture level, but we also use PSF at lower abstract levels. As a case study we reengineer the compiler from the Toolkit of PSF.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 12:25:02 GMT" } ]
2007-12-19T00:00:00
[ [ "Diertens", "Bob", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.2952
Zoltan Esik
S. L. Bloom, Z. Esik, W. Kuich
Partial Conway and iteration semirings
null
null
null
null
cs.DM cs.LO
null
A Conway semiring is a semiring $S$ equipped with a unary operation $^*:S \to S$, always called 'star', satisfying the sum star and product star identities. It is known that these identities imply a Kleene type theorem. Some computationally important semirings, such as $N$ or $N^{\rat}\llangle \Sigma^* \rrangle$ of rational power series of words on $\Sigma$ with coefficients in $N$, cannot have a total star operation satisfying the Conway identities. We introduce here partial Conway semirings, which are semirings $S$ which have a star operation defined only on an ideal of $S$; when the arguments are appropriate, the operation satisfies the above identities. We develop the general theory of partial Conway semirings and prove a Kleene theorem for this generalization.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 13:14:38 GMT" } ]
2015-03-13T00:00:00
[ [ "Bloom", "S. L.", "" ], [ "Esik", "Z.", "" ], [ "Kuich", "W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.2958
Joel Goossens
Vincent N\'elis, Jo\"el Goossens, Nicolas Navet, Raymond Devillers and Dragomir Milojevic
Power-Aware Real-Time Scheduling upon Identical Multiprocessor Platforms
The manuscript corresponds to the final version of SUTC 2008 conference
null
null
null
cs.OS
null
In this paper, we address the power-aware scheduling of sporadic constrained-deadline hard real-time tasks using dynamic voltage scaling upon multiprocessor platforms. We propose two distinct algorithms. Our first algorithm is an off-line speed determination mechanism which provides an identical speed for each processor. That speed guarantees that all deadlines are met if the jobs are scheduled using EDF. The second algorithm is an on-line and adaptive speed adjustment mechanism which reduces the energy consumption while the system is running.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 13:42:45 GMT" }, { "version": "v2", "created": "Mon, 10 Mar 2008 16:10:50 GMT" } ]
2008-03-10T00:00:00
[ [ "Nélis", "Vincent", "" ], [ "Goossens", "Joël", "" ], [ "Navet", "Nicolas", "" ], [ "Devillers", "Raymond", "" ], [ "Milojevic", "Dragomir", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0712.2959
Te Sun Han
Te Sun Han
Joint Source-Channel Coding Revisited: Information-Spectrum Approach
null
null
null
null
cs.IT math.IT
null
Given a general source with countably infinite source alphabet and a general channel with arbitrary abstract channel input/channel output alphabets, we study the joint source-channel coding problem from the information-spectrum point of view. First, we generalize Feinstein's lemma (direct part) and Verdu-Han's lemma (converse part) so as to be applicable to the general joint source-channel coding problem. Based on these lemmas, we establish a sufficient condition as well as a necessary condition for the source to be reliably transmissible over the channel with asymptotically vanishing probability of error. It is shown that our sufficient condition is equivalent to the sufficient condition derived by Vembu, Verdu and Steinberg, whereas our necessary condition is shown to be stronger than or equivalent to the necessary condition derived by them. It turns out, as a direct consequence, that separation principle in a relevantly generalized sense holds for a wide class of sources and channels, as was shown in a quite dfifferent manner by Vembu, Verdu and Steinberg. It should also be remarked that a nice duality is found between our necessary and sufficient conditions, whereas we cannot fully enjoy such a duality between the necessary condition and the sufficient condition by Vembu, Verdu and Steinberg. In addition, we demonstrate a sufficient condition as well as a necessary condition for the epsilon-transmissibility. Finally, the separation theorem of the traditional standard form is shown to hold for the class of sources and channels that satisfy the semi-strong converse property.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 13:33:58 GMT" } ]
2007-12-19T00:00:00
[ [ "Han", "Te Sun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3037
Manik Lal Das
Manik Lal Das
Comments on "Improved Efficient Remote User Authentication Schemes"
null
International Journal of Network Security, Vol. 6, No. 3, pp. 282-284, 2008
null
null
cs.CR
null
Recently, Tian et al presented an article, in which they discussed some security weaknesses of Yoon et al's scheme and subsequently proposed two ``improved'' schemes. In this paper, we show that the Tian et al's schemes are insecure and vulnerable than the Yoon et al's scheme.
[ { "version": "v1", "created": "Tue, 18 Dec 2007 20:26:39 GMT" } ]
2007-12-19T00:00:00
[ [ "Das", "Manik Lal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.3084
Manik Lal Das
Manik Lal Das, Ashutosh Saxena, Deepak B Phatak
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
null
International Journal of Network Security, Vol. 4, No.3, pp.312-317, 2007
null
null
cs.CR
null
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage. With this technique, the signer receives a partial private key from a trusted authority and unblinds it to get his private key, in turn, overcomes the key escrow problem which is a constraint in most of the pairing-based proxy signature schemes. The scheme fulfills the necessary security requirements of proxy signature and resists other possible threats.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 01:06:12 GMT" } ]
2007-12-20T00:00:00
[ [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ], [ "Phatak", "Deepak B", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.3088
Zhaohua Luo
Zhaohua Luo
Clones and Genoids in Lambda Calculus and First Order Logic
null
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A genoid is a category of two objects such that one is the product of itself with the other. A genoid may be viewed as an abstract substitution algebra. It is a remarkable fact that such a simple concept can be applied to present a unified algebraic approach to lambda calculus and first order logic.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 20:52:48 GMT" }, { "version": "v2", "created": "Wed, 19 Dec 2007 22:00:20 GMT" }, { "version": "v3", "created": "Fri, 7 Sep 2012 19:46:32 GMT" } ]
2012-09-10T00:00:00
[ [ "Luo", "Zhaohua", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0712.3113
Wim Vanhoof
Andr\'as Gyorgy B\'ek\'es, P\'eter Szeredi
Optimizing Queries in a Logic-based Information Integration System
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
The SINTAGMA information integration system is an infrastructure for accessing several different information sources together. Besides providing a uniform interface to the information sources (databases, web services, web sites, RDF resources, XML files), semantic integration is also needed. Semantic integration is carried out by providing a high-level model and the mappings to the models of the sources. When executing a query of the high level model, a query is transformed to a low-level query plan, which is a piece of Prolog code that answers the high-level query. This transformation is done in two phases. First, the Query Planner produces a plan as a logic formula expressing the low-level query. Next, the Query Optimizer transforms this formula to executable Prolog code and optimizes it according to structural and statistical information about the information sources. This article discusses the main ideas of the optimization algorithm and its implementation.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 08:07:30 GMT" } ]
2007-12-20T00:00:00
[ [ "Békés", "András Gyorgy", "" ], [ "Szeredi", "Péter", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.3115
Bob Diertens
Bob Diertens
Software (Re-)Engineering with PSF II: from architecture to implementation
null
null
null
prg0609
cs.SE
null
This paper presents ongoing research on the application of PSF in the field of software engineering and reengineering. We build a new implementation for the simulator of the PSF Toolkit starting from the specification in PSF of the architecture of a simple simulator and extend it with features to obtain the architecture of a full simulator. We apply refining and constraining techniques on the specification of the architecture to obtain a specification low enough to build an implementation from.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 08:11:37 GMT" } ]
2007-12-20T00:00:00
[ [ "Diertens", "Bob", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.3116
Wim Vanhoof
Patricia Hill, Wim Vanhoof
Proceedings of the 17th Workshop on Logic-based methods in Programming Environments (WLPE 2007)
null
null
null
null
cs.PL cs.SE
null
This volume contains the papers presented at WLPE 2007: the 17th Workshop on Logic-based Methods in Programming Environments on 13th September, 2007 in Porto, Portugal. It was held as a satellite workshop of ICLP 2007, the 23th International Conference on Logic Programming.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 08:28:12 GMT" } ]
2007-12-20T00:00:00
[ [ "Hill", "Patricia", "" ], [ "Vanhoof", "Wim", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.3128
Bob Diertens
Bob Diertens
Software (Re-)Engineering with PSF III: an IDE for PSF
null
null
null
prg0708
cs.SE
null
We describe the design of an integrated development environment (IDE) for PSF. In the software engineering process we used process algebra in the form of PSF for the specification of the architecture of the IDE. This specification is refined to a PSF specification of the IDE system as a ToolBus application, by applying vertical and horizontal implementation techniques. We implemented the various tools as specified and connected them with a ToolBus script extracted from the system specification.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 09:46:23 GMT" } ]
2007-12-20T00:00:00
[ [ "Diertens", "Bob", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0712.3137
Lucas Lacasa
Lucas Lacasa, Bartolo Luque, Octavio Miramontes
Phase transition and computational complexity in a stochastic prime number generator
Submitted to New Journal of Physics
New Journal of Physics 10 (2008) 023009
10.1088/1367-2630/10/2/023009
null
cs.CC physics.comp-ph
null
We introduce a prime number generator in the form of a stochastic algorithm. The character of such algorithm gives rise to a continuous phase transition which distinguishes a phase where the algorithm is able to reduce the whole system of numbers into primes and a phase where the system reaches a frozen state with low prime density. In this paper we firstly pretend to give a broad characterization of this phase transition, both in terms of analytical and numerical analysis. Critical exponents are calculated, and data collapse is provided. Further on we redefine the model as a search problem, fitting it in the hallmark of computational complexity theory. We suggest that the system belongs to the class NP. The computational cost is maximal around the threshold, as common in many algorithmic phase transitions, revealing the presence of an easy-hard-easy pattern. We finally relate the nature of the phase transition to an average-case classification of the problem.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 10:00:32 GMT" } ]
2009-11-13T00:00:00
[ [ "Lacasa", "Lucas", "" ], [ "Luque", "Bartolo", "" ], [ "Miramontes", "Octavio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0712.3146
Pierre Lescanne
Pierre Lescanne (LIP), J\'er\^ome Puiss\'egur (LIP)
Dynamic Logic of Common Knowledge in a Proof Assistant
15 p
null
null
null
cs.GT
null
Common Knowledge Logic is meant to describe situations of the real world where a group of agents is involved. These agents share knowledge and make strong statements on the knowledge of the other agents (the so called \emph{common knowledge}). But as we know, the real world changes and overall information on what is known about the world changes as well. The changes are described by dynamic logic. To describe knowledge changes, dynamic logic should be combined with logic of common knowledge. In this paper we describe experiments which we have made about the integration in a unique framework of common knowledge logic and dynamic logic in the proof assistant \Coq. This results in a set of fully checked proofs for readable statements. We describe the framework and how a proof can be
[ { "version": "v1", "created": "Wed, 19 Dec 2007 10:23:14 GMT" } ]
2007-12-20T00:00:00
[ [ "Lescanne", "Pierre", "", "LIP" ], [ "Puisségur", "Jérôme", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0712.3147
Pierre Lescanne
Pierre Lescanne (LIP)
Common knowledge logic in a higher order proof assistant?
11 p
null
null
null
cs.AI cs.LO
null
This paper presents experiments on common knowledge logic, conducted with the help of the proof assistant Coq. The main feature of common knowledge logic is the eponymous modality that says that a group of agents shares a knowledge about a certain proposition in a inductive way. This modality is specified by using a fixpoint approach. Furthermore, from these experiments, we discuss and compare the structure of theorems that can be proved in specific theories that use common knowledge logic. Those structures manifests the interplay between the theory (as implemented in the proof assistant Coq) and the metatheory.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 10:25:34 GMT" }, { "version": "v2", "created": "Tue, 15 Jan 2008 16:12:50 GMT" } ]
2008-01-16T00:00:00
[ [ "Lescanne", "Pierre", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.3150
Petros Petrosyan
Rafael R. Kamalian and Petros A. Petrosyan
Interval Colourings of Some Regular Graphs
4 pages
Mathematical Problems of Computer Science 25, 2006, 53--56
null
null
cs.DM
null
A lower bound is obtained for the greatest possible number of colors in an interval colourings of some regular graphs.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 20:18:06 GMT" } ]
2007-12-20T00:00:00
[ [ "Kamalian", "Rafael R.", "" ], [ "Petrosyan", "Petros A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.3155
Petros Petrosyan
Rafael R. Kamalian and Petros A. Petrosyan
On Interval Colorings of Complete k-partite Graphs K_{n}^{k}
6 pages
Mathematical Problems of Computer Science 26, 2006, 28--32
null
null
cs.DM
null
Problems of existence, construction and estimation of parameters of interval colorings of complete k-partite graphs K_{n}^{k} are investigated.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 20:52:16 GMT" }, { "version": "v2", "created": "Wed, 19 Dec 2007 21:01:40 GMT" }, { "version": "v3", "created": "Fri, 28 Dec 2007 21:16:40 GMT" } ]
2011-11-10T00:00:00
[ [ "Kamalian", "Rafael R.", "" ], [ "Petrosyan", "Petros A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.3203
Wan ChangLin
Changlin Wan, Zhongzhi Shi
Solving Medium-Density Subset Sum Problems in Expected Polynomial Time: An Enumeration Approach
11 pages, 1 figure
Changlin Wan, Zhongzhi Shi: Solving Medium-Density Subset Sum Problems in Expected Polynomial Time: An Enumeration Approach. FAW 2008: 300-310
10.1007/978-3-540-69311-6_31
null
cs.DS cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The subset sum problem (SSP) can be briefly stated as: given a target integer $E$ and a set $A$ containing $n$ positive integer $a_j$, find a subset of $A$ summing to $E$. The \textit{density} $d$ of an SSP instance is defined by the ratio of $n$ to $m$, where $m$ is the logarithm of the largest integer within $A$. Based on the structural and statistical properties of subset sums, we present an improved enumeration scheme for SSP, and implement it as a complete and exact algorithm (EnumPlus). The algorithm always equivalently reduces an instance to be low-density, and then solve it by enumeration. Through this approach, we show the possibility to design a sole algorithm that can efficiently solve arbitrary density instance in a uniform way. Furthermore, our algorithm has considerable performance advantage over previous algorithms. Firstly, it extends the density scope, in which SSP can be solved in expected polynomial time. Specifically, It solves SSP in expected $O(n\log{n})$ time when density $d \geq c\cdot \sqrt{n}/\log{n}$, while the previously best density scope is $d \geq c\cdot n/(\log{n})^{2}$. In addition, the overall expected time and space requirement in the average case are proven to be $O(n^5\log n)$ and $O(n^5)$ respectively. Secondly, in the worst case, it slightly improves the previously best time complexity of exact algorithms for SSP. Specifically, the worst-case time complexity of our algorithm is proved to be $O((n-6)2^{n/2}+n)$, while the previously best result is $O(n2^{n/2})$.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 14:43:50 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2008 02:00:12 GMT" } ]
2008-06-23T00:00:00
[ [ "Wan", "Changlin", "" ], [ "Shi", "Zhongzhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.3215
Francoise Sandoz-Guermond
Fran\c{c}oise Sandoz-Guermond (LIESP), Marc-Eric Bobiller-Chaumon (GRePS)
L'accessibilit\'e des E-services aux personnes non-voyantes : difficult\'es d'usage et recommandations
4 pages
Dans International Conference Proceedings of IHM'2006 - IIHM : Interaction Homme Machine, Montr\'eal : Canada (2006)
null
null
cs.HC
null
While taking into account handicapped people in the design of technologies represents a social and political stake that becomes important (in particular with the recent law on equal rights for all the citizens, March 2004), this paper aims at evaluating the level of accessibility of two sites of E-services thanks to tests of use and proposing a set of recommendations in order to increase usability for the largest amount of people.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 15:54:07 GMT" } ]
2007-12-20T00:00:00
[ [ "Sandoz-Guermond", "Françoise", "", "LIESP" ], [ "Bobiller-Chaumon", "Marc-Eric", "", "GRePS" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0712.3220
Viviana Sica
Michael Gurstein
What is Community Informatics (and Why Does It Matter)?
109 pages, ISBN 978-88-7699-097-7 (Printed edition), ISBN 978-88-7699-098-4 (Electronic edition), printed edition available at http://www.amazon.com and on http://www.lulu.com
"Publishing studies" book series, edited by Giandomenico Sica, ISSN 1973-6061 (Printed edition), ISSN 1973-6053 (Electronic edition)
null
null
cs.CY
null
Community Informatics (CI) is the application of information and communications technologies (ICTs) to enable community processes and the achievement of community objectives. CI goes beyond the "Digital Divide" to making ICT access usable and useful to excluded populations and communities for local economic development, social justice, and political empowerment. CI approaches ICTs from a "community" perspective and develops strategies and techniques for managing their use by communities both virtual and physical including the variety of Community Networking applications. CI assumes that both communities have characteristics, requirements, and opportunities that require different strategies for ICT intervention and development from individual access and use. Also, CI addresses ICT use in Developing Countries as well as among the poor, the marginalized, the elderly, or those living in remote locations in Developed Countries. CI is of interest both to ICT practitioners and academic researchers and addresses the connections between the policy and pragmatic issues arising from the tens of thousands of Community Networks, Community Technology Centres, Telecentres, Community Communications Centres, and Telecottages globally along with the rapidly emerging field of electronically based virtual "communities". Michael Gurstein, Ph.D. is Executive Director of the Centre for Community Informatics Research, Development and Training (Vancouver BC), a Director of The Information Society Institute, Cape Peninsula University of Technology, Cape Town South Africa; and Research Professor in the School of Computer and Information Systems at the New Jersey Institute of Technology, Newark.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 16:07:49 GMT" } ]
2007-12-20T00:00:00
[ [ "Gurstein", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0712.3277
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
On the Capacity and Energy Efficiency of Training-Based Transmissions over Fading Channels
null
null
null
null
cs.IT math.IT
null
In this paper, the capacity and energy efficiency of training-based communication schemes employed for transmission over a-priori unknown Rayleigh block fading channels are studied. In these schemes, periodically transmitted training symbols are used at the receiver to obtain the minimum mean-square-error (MMSE) estimate of the channel fading coefficients. Initially, the case in which the product of the estimate error and transmitted signal is assumed to be Gaussian noise is considered. In this case, it is shown that bit energy requirements grow without bound as the signal-to-noise ratio (SNR) goes to zero, and the minimum bit energy is achieved at a nonzero SNR value below which one should not operate. The effect of the block length on both the minimum bit energy and the SNR value at which the minimum is achieved is investigated. Flash training and transmission schemes are analyzed and shown to improve the energy efficiency in the low-SNR regime. In the second part of the paper, the capacity and energy efficiency of training-based schemes are investigated when the channel input is subject to peak power constraints. The capacity-achieving input structure is characterized and the magnitude distribution of the optimal input is shown to be discrete with a finite number of mass points. The capacity, bit energy requirements, and optimal resource allocation strategies are obtained through numerical analysis. The bit energy is again shown to grow without bound as SNR decreases to zero due to the presence of peakedness constraints. The improvements in energy efficiency when on-off keying with fixed peak power and vanishing duty cycle is employed are studied. Comparisons of the performances of training-based and noncoherent transmission schemes are provided.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 20:55:29 GMT" } ]
2007-12-20T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3286
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
Error Rate Analysis for Peaky Signaling over Fading Channels
null
null
null
null
cs.IT math.IT
null
In this paper, the performance of signaling strategies with high peak-to-average power ratio is analyzed over both coherent and noncoherent fading channels. Two modulation schemes, namely on-off phase-shift keying (OOPSK) and on-off frequency-shift keying (OOFSK), are considered. Initially, uncoded systems are analyzed. For OOPSK and OOFSK, the optimal detector structures are identified and analytical expressions for the error probabilities are obtained for arbitrary constellation sizes. Numerical techniques are employed to compute the error probabilities. It is concluded that increasing the peakedness of the signals results in reduced error rates for a given power level and hence equivalently improves the energy efficiency for fixed error probabilities. The coded performance is also studied by analyzing the random coding error exponents achieved by OOPSK and OOFSK signaling.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 21:09:49 GMT" } ]
2007-12-21T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3298
Bryan Gibson
Dragomir Radev, Mark Hodges, Anthony Fader, Mark Joseph, Joshua Gerrish, Mark Schaller, Jonathan dePeri, Bryan Gibson
CLAIRLIB Documentation v1.03
for download and additional information, please see http://www.clairlib.org
null
null
CSE-TR-536-07
cs.IR cs.CL
null
The Clair library is intended to simplify a number of generic tasks in Natural Language Processing (NLP), Information Retrieval (IR), and Network Analysis. Its architecture also allows for external software to be plugged in with very little effort. Functionality native to Clairlib includes Tokenization, Summarization, LexRank, Biased LexRank, Document Clustering, Document Indexing, PageRank, Biased PageRank, Web Graph Analysis, Network Generation, Power Law Distribution Analysis, Network Analysis (clustering coefficient, degree distribution plotting, average shortest path, diameter, triangles, shortest path matrices, connected components), Cosine Similarity, Random Walks on Graphs, Statistics (distributions, tests), Tf, Idf, Community Finding.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 22:20:40 GMT" } ]
2007-12-21T00:00:00
[ [ "Radev", "Dragomir", "" ], [ "Hodges", "Mark", "" ], [ "Fader", "Anthony", "" ], [ "Joseph", "Mark", "" ], [ "Gerrish", "Joshua", "" ], [ "Schaller", "Mark", "" ], [ "dePeri", "Jonathan", "" ], [ "Gibson", "Bryan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0712.3299
Jocelyne Troccaz
Jocelyne Troccaz (TIMC)
Computer- and robot-assisted urological surgery
null
Progr\`es en urologie : journal de l'Association fran\c{c}aise d'urologie et de la Soci\'et\'e fran\c{c}aise d'urologie 16, 2 (2006) 112-20
null
null
cs.OH cs.RO
null
The author reviews the computer and robotic tools available to urologists to help in diagnosis and technical procedures. The first part concerns the contribution of robotics and presents several systems at various stages of development (laboratory prototypes, systems under validation or marketed systems). The second part describes image fusion tools and navigation systems currently under development or evaluation. Several studies on computerized simulation of urological procedures are also presented.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 22:09:18 GMT" } ]
2007-12-21T00:00:00
[ [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0712.3327
Chandra Nair
Chandra Nair and Abbas El Gamal
The capacity of a class of 3-receiver broadcast channels with degraded message sets
Submitted to IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
null
Korner and Marton established the capacity region for the 2-receiver broadcast channel with degraded message sets. Recent results and conjectures suggest that a straightforward extension of the Korner-Marton region to more than 2 receivers is optimal. This paper shows that this is not the case. We establish the capacity region for a class of 3-receiver broadcast channels with 2 degraded message sets and show that it can be strictly larger than the straightforward extension of the Korner-Marton region. The key new idea is indirect decoding, whereby a receiver who cannot directly decode a cloud center, finds it indirectly by decoding satellite codewords. This idea is then used to establish new inner and outer bounds on the capacity region of the general 3-receiver broadcast channel with 2 and 3 degraded message sets. We show that these bounds are tight for some nontrivial cases. The results suggest that the capacity of the 3-receiver broadcast channel with degraded message sets is as at least as hard to find as the capacity of the general 2-receiver broadcast channel with common and private message.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 04:59:47 GMT" }, { "version": "v2", "created": "Thu, 10 Jan 2008 00:14:18 GMT" } ]
2008-01-10T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Gamal", "Abbas El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3329
Marcus Hutter
Shane Legg and Marcus Hutter
Universal Intelligence: A Definition of Machine Intelligence
50 gentle pages
Minds & Machines, 17:4 (2007) pages 391-444
null
IDSIA-10-07
cs.AI
null
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure of intelligence for arbitrary machines. We believe that this equation formally captures the concept of machine intelligence in the broadest reasonable sense. We then show how this formal definition is related to the theory of universal optimal learning agents. Finally, we survey the many other tests and definitions of intelligence that have been proposed for machines.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 05:50:54 GMT" } ]
2008-06-26T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0712.3331
Kunal Talwar
Anupam Gupta and Kunal Talwar
How to Complete a Doubling Metric
An extended abstract will appear in proceedings of LATIN 2008
null
null
null
cs.DM cs.CG
null
In recent years, considerable advances have been made in the study of properties of metric spaces in terms of their doubling dimension. This line of research has not only enhanced our understanding of finite metrics, but has also resulted in many algorithmic applications. However, we still do not understand the interaction between various graph-theoretic (topological) properties of graphs, and the doubling (geometric) properties of the shortest-path metrics induced by them. For instance, the following natural question suggests itself: \emph{given a finite doubling metric $(V,d)$, is there always an \underline{unweighted} graph $(V',E')$ with $V\subseteq V'$ such that the shortest path metric $d'$ on $V'$ is still doubling, and which agrees with $d$ on $V$.} This is often useful, given that unweighted graphs are often easier to reason about. We show that for any metric space $(V,d)$, there is an \emph{unweighted} graph $(V',E')$ with shortest-path metric $d':V'\times V' \to \R_{\geq 0}$ such that -- for all $x,y \in V$, the distances $d(x,y) \leq d'(x,y) \leq (1+\eps) \cdot d(x,y)$, and -- the doubling dimension for $d'$ is not much more than that of $d$, where this change depends only on $\e$ and not on the size of the graph. We show a similar result when both $(V,d)$ and $(V',E')$ are restricted to be trees: this gives a simpler proof that doubling trees embed into constant dimensional Euclidean space with constant distortion. We also show that our results are tight in terms of the tradeoff between distortion and dimension blowup.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 06:12:15 GMT" }, { "version": "v2", "created": "Thu, 27 Dec 2007 12:32:23 GMT" } ]
2007-12-27T00:00:00
[ [ "Gupta", "Anupam", "" ], [ "Talwar", "Kunal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0712.3333
Abraham Punnen
Qiaoming Han and Abraham P. Punnen
On the approximability of the vertex cover and related problems
null
null
null
null
cs.DS cs.DM
null
In this paper we show that the problem of identifying an edge $(i,j)$ in a graph $G$ such that there exists an optimal vertex cover $S$ of $G$ containing exactly one of the nodes $i$ and $j$ is NP-hard. Such an edge is called a weak edge. We then develop a polynomial time approximation algorithm for the vertex cover problem with performance guarantee $2-\frac{1}{1+\sigma}$, where $\sigma$ is an upper bound on a measure related to a weak edge of a graph. Further, we discuss a new relaxation of the vertex cover problem which is used in our approximation algorithm to obtain smaller values of $\sigma$. We also obtain linear programming representations of the vertex cover problem for special graphs. Our results provide new insights into the approximability of the vertex cover problem - a long standing open problem.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 06:35:05 GMT" } ]
2007-12-21T00:00:00
[ [ "Han", "Qiaoming", "" ], [ "Punnen", "Abraham P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.3335
Abraham Punnen
Qiaoming Han, Abraham P. Punnen, and Yinyu Ye
A polynomial time $\frac 3 2$ -approximation algorithm for the vertex cover problem on a class of graphs
null
null
null
null
cs.DS cs.DM
null
We develop a polynomial time 3/2-approximation algorithm to solve the vertex cover problem on a class of graphs satisfying a property called ``active edge hypothesis''. The algorithm also guarantees an optimal solution on specially structured graphs. Further, we give an extended algorithm which guarantees a vertex cover $S_1$ on an arbitrary graph such that $|S_1|\leq {3/2} |S^*|+\xi$ where $S^*$ is an optimal vertex cover and $\xi$ is an error bound identified by the algorithm. We obtained $\xi = 0$ for all the test problems we have considered which include specially constructed instances that were expected to be hard. So far we could not construct a graph that gives $\xi \not= 0$.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 06:53:30 GMT" } ]
2007-12-21T00:00:00
[ [ "Han", "Qiaoming", "" ], [ "Punnen", "Abraham P.", "" ], [ "Ye", "Yinyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.3348
Xin Li
Xin Li, Tian Liu
On Exponential Time Lower Bound of Knapsack under Backtracking
This paper supersedes the result of arXiv:cs/0606064
null
null
null
cs.CC
null
M.Aleknovich et al. have recently proposed a model of algorithms, called BT model, which generalizes both the priority model of Borodin, Nielson and Rackoff, as well as a simple dynamic programming model by Woeginger. BT model can be further divided into three kinds of fixed, adaptive and fully adaptive ones. They have proved exponential time lower bounds of exact and approximation algorithms under adaptive BT model for Knapsack problem. Their exact lower bound is $\Omega(2^{0.5n}/\sqrt{n})$, in this paper, we slightly improve the exact lower bound to about $\Omega(2^{0.69n}/\sqrt{n})$, by the same technique, with related parameters optimized.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 09:15:17 GMT" }, { "version": "v2", "created": "Tue, 25 Dec 2007 13:46:53 GMT" } ]
2007-12-25T00:00:00
[ [ "Li", "Xin", "" ], [ "Liu", "Tian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0712.3360
Rossano Venturini
Paolo Ferragina (1), Rodrigo Gonzalez (2), Gonzalo Navarro (2), Rossano Venturini (2) ((1) Dept. of Computer Science, University of Pisa, (2) Dept. of Computer Science, University of Chile)
Compressed Text Indexes:From Theory to Practice!
null
null
null
null
cs.DS
null
A compressed full-text self-index represents a text in a compressed form and still answers queries efficiently. This technology represents a breakthrough over the text indexing techniques of the previous decade, whose indexes required several times the size of the text. Although it is relatively new, this technology has matured up to a point where theoretical research is giving way to practical developments. Nonetheless this requires significant programming skills, a deep engineering effort, and a strong algorithmic background to dig into the research results. To date only isolated implementations and focused comparisons of compressed indexes have been reported, and they missed a common API, which prevented their re-use or deployment within other applications. The goal of this paper is to fill this gap. First, we present the existing implementations of compressed indexes from a practitioner's point of view. Second, we introduce the Pizza&Chili site, which offers tuned implementations and a standardized API for the most successful compressed full-text self-indexes, together with effective testbeds and scripts for their automatic validation and test. Third, we show the results of our extensive experiments on these codes with the aim of demonstrating the practical relevance of this novel and exciting technology.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 10:42:54 GMT" } ]
2007-12-21T00:00:00
[ [ "Ferragina", "Paolo", "" ], [ "Gonzalez", "Rodrigo", "" ], [ "Navarro", "Gonzalo", "" ], [ "Venturini", "Rossano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.3380
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom
Extending the Overlap Graph for Gene Assembly in Ciliates
12 pages, 9 figures
null
null
LIACS Technical Report 2007-05
cs.LO
null
Gene assembly is an intricate biological process that has been studied formally and modeled through string and graph rewriting systems. Recently, a restriction of the general (intramolecular) model, called simple gene assembly, has been introduced. This restriction has subsequently been defined as a string rewriting system. We show that by extending the notion of overlap graph it is possible to define a graph rewriting system for two of the three types of rules that make up simple gene assembly. It turns out that this graph rewriting system is less involved than its corresponding string rewriting system. Finally, we give characterizations of the `power' of both types of graph rewriting rules. Because of the equivalence of these string and graph rewriting systems, the given characterizations can be carried over to the string rewriting system.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 12:08:33 GMT" } ]
2007-12-21T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.3389
Georg Hager
Georg Hager, Holger Stengel, Thomas Zeiser, Gerhard Wellein
RZBENCH: Performance evaluation of current HPC architectures using low-level and application benchmarks
Contribution to the HLRB/KONWIHR results and review workshop, Dec 3rd/4th 2007, LRZ Munich, Germany
null
null
null
cs.DC cs.PF
null
RZBENCH is a benchmark suite that was specifically developed to reflect the requirements of scientific supercomputer users at the University of Erlangen-Nuremberg (FAU). It comprises a number of application and low-level codes under a common build infrastructure that fosters maintainability and expandability. This paper reviews the structure of the suite and briefly introduces the most relevant benchmarks. In addition, some widely known standard benchmark codes are reviewed in order to emphasize the need for a critical review of often-cited performance results. Benchmark data is presented for the HLRB-II at LRZ Munich and a local InfiniBand Woodcrest cluster as well as two uncommon system architectures: A bandwidth-optimized InfiniBand cluster based on single socket nodes ("Port Townsend") and an early version of Sun's highly threaded T2 architecture ("Niagara 2").
[ { "version": "v1", "created": "Thu, 20 Dec 2007 12:15:26 GMT" } ]
2007-12-21T00:00:00
[ [ "Hager", "Georg", "" ], [ "Stengel", "Holger", "" ], [ "Zeiser", "Thomas", "" ], [ "Wellein", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0712.3402
Francis Bach
Francis Bach (WILLOW Project - Inria/Ens)
Graph kernels between point clouds
null
null
null
null
cs.LG
null
Point clouds are sets of points in two or three dimensions. Most kernel methods for learning on sets of points have not yet dealt with the specific geometrical invariances and practical constraints associated with point clouds in computer vision and graphics. In this paper, we present extensions of graph kernels for point clouds, which allow to use kernel methods for such ob jects as shapes, line drawings, or any three-dimensional point clouds. In order to design rich and numerically efficient kernels with as few free parameters as possible, we use kernels between covariance matrices and their factorizations on graphical models. We derive polynomial time dynamic programming recursions and present applications to recognition of handwritten digits and Chinese characters from few training examples.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 13:06:50 GMT" } ]
2007-12-21T00:00:00
[ [ "Bach", "Francis", "", "WILLOW Project - Inria/Ens" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0712.3423
Alban Ponse
J.A. Bergstra, A. Ponse, M.B. van der Zwaag
Tuplix Calculus
22 pages
Scientific Annals of Computer Science, 18:35--61, 2008
null
PRG0713
cs.LO cs.CE
null
We introduce a calculus for tuplices, which are expressions that generalize matrices and vectors. Tuplices have an underlying data type for quantities that are taken from a zero-totalized field. We start with the core tuplix calculus CTC for entries and tests, which are combined using conjunctive composition. We define a standard model and prove that CTC is relatively complete with respect to it. The core calculus is extended with operators for choice, information hiding, scalar multiplication, clearing and encapsulation. We provide two examples of applications; one on incremental financial budgeting, and one on modular financial budget design.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 13:58:14 GMT" } ]
2009-03-03T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Ponse", "A.", "" ], [ "van der Zwaag", "M. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0712.3433
Vadim Zaliva
Vadim Zaliva
AccelKey Selection Method for Mobile Devices
15 pages, 12 figures
null
null
null
cs.HC
null
Portable Electronic Devices usually utilize a small screen with limited viewing area and a keyboard with a limited number of keys. This makes it difficult to perform quick searches in data arrays containing more than dozen items such an address book or song list. In this article we present a new data selection method which allows the user to quickly select an entry from a list using 4-way navigation device such as joystick, trackball or 4-way key pad. This method allows for quick navigation using just one hand, without looking at the screen.
[ { "version": "v1", "created": "Wed, 19 Dec 2007 23:31:55 GMT" } ]
2007-12-21T00:00:00
[ [ "Zaliva", "Vadim", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0712.3501
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
The Impact of Hard-Decision Detection on the Energy Efficiency of Phase and Frequency Modulation
To appear in the IEEE Transactions on Wireless Communications
null
10.1109/TWC.2009.080998
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The central design challenge in next generation wireless systems is to have these systems operate at high bandwidths and provide high data rates while being cognizant of the energy consumption levels especially in mobile applications. Since communicating at very high data rates prohibits obtaining high bit resolutions from the analog-to-digital (A/D) converters, analysis of the energy efficiency under the assumption of hard-decision detection is called for to accurately predict the performance levels. In this paper, transmission over the additive white Gaussian noise (AWGN) channel, and coherent and noncoherent fading channels is considered, and the impact of hard-decision detection on the energy efficiency of phase and frequency modulations is investigated. Energy efficiency is analyzed by studying the capacity of these modulation schemes and the energy required to send one bit of information reliably in the low signal-to-noise ratio (SNR) regime. The capacity of hard-decision-detected phase and frequency modulations is characterized at low SNR levels through closed-form expressions for the first and second derivatives of the capacity at zero SNR. Subsequently, bit energy requirements in the low-SNR regime are identified. The increases in the bit energy incurred by hard-decision detection and channel fading are quantified. Moreover, practical design guidelines for the selection of the constellation size are drawn from the analysis of the spectral efficiency--bit energy tradeoff.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 17:15:09 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 16:55:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3568
David Pritchard
Jochen Konemann, David Pritchard, Kunlun Tan
A Partition-Based Relaxation For Steiner Trees
Submitted to Math. Prog
null
null
null
cs.DS
null
The Steiner tree problem is a classical NP-hard optimization problem with a wide range of practical applications. In an instance of this problem, we are given an undirected graph G=(V,E), a set of terminals R, and non-negative costs c_e for all edges e in E. Any tree that contains all terminals is called a Steiner tree; the goal is to find a minimum-cost Steiner tree. The nodes V R are called Steiner nodes. The best approximation algorithm known for the Steiner tree problem is due to Robins and Zelikovsky (SIAM J. Discrete Math, 2005); their greedy algorithm achieves a performance guarantee of 1+(ln 3)/2 ~ 1.55. The best known linear (LP)-based algorithm, on the other hand, is due to Goemans and Bertsimas (Math. Programming, 1993) and achieves an approximation ratio of 2-2/|R|. In this paper we establish a link between greedy and LP-based approaches by showing that Robins and Zelikovsky's algorithm has a natural primal-dual interpretation with respect to a novel partition-based linear programming relaxation. We also exhibit surprising connections between the new formulation and existing LPs and we show that the new LP is stronger than the bidirected cut formulation. An instance is b-quasi-bipartite if each connected component of G R has at most b vertices. We show that Robins' and Zelikovsky's algorithm has an approximation ratio better than 1+(ln 3)/2 for such instances, and we prove that the integrality gap of our LP is between 8/7 and (2b+1)/(b+1).
[ { "version": "v1", "created": "Thu, 20 Dec 2007 21:06:35 GMT" } ]
2007-12-24T00:00:00
[ [ "Konemann", "Jochen", "" ], [ "Pritchard", "David", "" ], [ "Tan", "Kunlun", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.3576
Peter Rost
P. Rost and G. Fettweis
Protocols For Half-Duplex Multiple Relay Networks
submitted to IEEE ISIT 2008
null
null
null
cs.IT math.IT
null
In this paper we present several strategies for multiple relay networks which are constrained by a half-duplex operation, i. e., each node either transmits or receives on a particular resource. Using the discrete memoryless multiple relay channel we present achievable rates for a multilevel partial decode-and-forward approach which generalizes previous results presented by Kramer and Khojastepour et al.. Furthermore, we derive a compress-and-forward approach using a regular encoding scheme which simplifies the encoding and decoding scheme and improves the achievable rates in general. Finally, we give achievable rates for a mixed strategy used in a four-terminal network with alternately transmitting relay nodes.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 16:01:07 GMT" } ]
2007-12-24T00:00:00
[ [ "Rost", "P.", "" ], [ "Fettweis", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3587
Po-Hsiang Lai
Po-Hsiang Lai and Joseph A. O'Sullivan
Pattern Recognition System Design with Linear Encoding for Discrete Patterns
Submitted and accepted to ISIT 2007
null
null
null
cs.IT cs.CV math.IT
null
In this paper, designs and analyses of compressive recognition systems are discussed, and also a method of establishing a dual connection between designs of good communication codes and designs of recognition systems is presented. Pattern recognition systems based on compressed patterns and compressed sensor measurements can be designed using low-density matrices. We examine truncation encoding where a subset of the patterns and measurements are stored perfectly while the rest is discarded. We also examine the use of LDPC parity check matrices for compressing measurements and patterns. We show how more general ensembles of good linear codes can be used as the basis for pattern recognition system design, yielding system design strategies for more general noise models.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 22:46:29 GMT" } ]
2007-12-24T00:00:00
[ [ "Lai", "Po-Hsiang", "" ], [ "O'Sullivan", "Joseph A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3617
Erhan Bayraktar
Erhan Bayraktar, Bo Yang
A Unified Framework for Pricing Credit and Equity Derivatives
Keywords: Credit Default Swap, Defaultable Bond, Defaultable Stock, Equity Options, Stochastic Interest Rate, Implied Volatility, Multiscale Perturbation Method
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a model which can be jointly calibrated to the corporate bond term structure and equity option volatility surface of the same company. Our purpose is to obtain explicit bond and equity option pricing formulas that can be calibrated to find a risk neutral model that matches a set of observed market prices. This risk neutral model can then be used to price more exotic, illiquid or over-the-counter derivatives. We observe that the model implied credit default swap (CDS) spread matches the market CDS spread and that our model produces a very desirable CDS spread term structure. This is observation is worth noticing since without calibrating any parameter to the CDS spread data, it is matched by the CDS spread that our model generates using the available information from the equity options and corporate bond markets. We also observe that our model matches the equity option implied volatility surface well since we properly account for the default risk premium in the implied volatility surface. We demonstrate the importance of accounting for the default risk and stochastic interest rate in equity option pricing by comparing our results to Fouque, Papanicolaou, Sircar and Solna (2003), which only accounts for stochastic volatility.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 02:53:38 GMT" }, { "version": "v2", "created": "Sat, 20 Sep 2008 21:44:00 GMT" } ]
2008-09-21T00:00:00
[ [ "Bayraktar", "Erhan", "" ], [ "Yang", "Bo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0712.3641
Dawei Ding
Dawei Ding, Jie Zhu, Xiaoshu Luo, Yuliang Liu
Controlling Delay-induced Hopf bifurcation in Internet congestion control system
20 pages, 8 figures
null
null
null
cs.NI
null
This paper focuses on Hopf bifurcation control in a dual model of Internet congestion control algorithms which is modeled as a delay differential equation (DDE). By choosing communication delay as a bifurcation parameter, it has been demonstrated that the system loses stability and a Hopf bifurcation occurs when communication delay passes through a critical value. Therefore, a time-delayed feedback control method is applied to the system for delaying the onset of undesirable Hopf bifurcation. Theoretical analysis and numerical simulations confirm that the delayed feedback controller is efficient in controlling Hopf bifurcation in Internet congestion control system. Moreover, the direction of the Hopf bifurcation and the stability of the bifurcating periodic solutions are determinated by applying the center manifold theorem and the normal form theory.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 08:30:23 GMT" } ]
2007-12-24T00:00:00
[ [ "Ding", "Dawei", "" ], [ "Zhu", "Jie", "" ], [ "Luo", "Xiaoshu", "" ], [ "Liu", "Yuliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.3654
Alejandro Chinea Manrique De Lara
Alejandro Chinea Manrique De Lara, Juan Manuel Moreno, Arostegui Jordi Madrenas, Joan Cabestany
Improving the Performance of PieceWise Linear Separation Incremental Algorithms for Practical Hardware Implementations
10 pages, 1 figure, 3 tables
Biological and Artificial Computation: From Neuroscience to Technology, J.Mira, R.Moreno-Diaz, J.Cabestany (eds.), pp. 607-616, Springer-Verlag, 1997
null
null
cs.NE cs.AI cs.LG
null
In this paper we shall review the common problems associated with Piecewise Linear Separation incremental algorithms. This kind of neural models yield poor performances when dealing with some classification problems, due to the evolving schemes used to construct the resulting networks. So as to avoid this undesirable behavior we shall propose a modification criterion. It is based upon the definition of a function which will provide information about the quality of the network growth process during the learning phase. This function is evaluated periodically as the network structure evolves, and will permit, as we shall show through exhaustive benchmarks, to considerably improve the performance(measured in terms of network complexity and generalization capabilities) offered by the networks generated by these incremental models.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 10:05:52 GMT" } ]
2007-12-24T00:00:00
[ [ "De Lara", "Alejandro Chinea Manrique", "" ], [ "Moreno", "Juan Manuel", "" ], [ "Madrenas", "Arostegui Jordi", "" ], [ "Cabestany", "Joan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0712.3705
Tuomo Kakkonen
Tuomo Kakkonen
Framework and Resources for Natural Language Parser Evaluation
PhD dissertation. 264 pages
null
null
University of Joensuu, Computer Science Dissertations 19
cs.CL
null
Because of the wide variety of contemporary practices used in the automatic syntactic parsing of natural languages, it has become necessary to analyze and evaluate the strengths and weaknesses of different approaches. This research is all the more necessary because there are currently no genre- and domain-independent parsers that are able to analyze unrestricted text with 100% preciseness (I use this term to refer to the correctness of analyses assigned by a parser). All these factors create a need for methods and resources that can be used to evaluate and compare parsing systems. This research describes: (1) A theoretical analysis of current achievements in parsing and parser evaluation. (2) A framework (called FEPa) that can be used to carry out practical parser evaluations and comparisons. (3) A set of new evaluation resources: FiEval is a Finnish treebank under construction, and MGTS and RobSet are parser evaluation resources in English. (4) The results of experiments in which the developed evaluation framework and the two resources for English were used for evaluating a set of selected parsers.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 08:55:17 GMT" } ]
2007-12-24T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0712.3757
Alexander Kholosha
Tor Helleseth and Alexander Kholosha and Aina Johanssen
$m$-Sequences of Different Lengths with Four-Valued Cross Correlation
26 pages
null
null
null
cs.DM cs.CR
null
{\bf Abstract.} Considered is the distribution of the cross correlation between $m$-sequences of length $2^m-1$, where $m$ is even, and $m$-sequences of shorter length $2^{m/2}-1$. The infinite family of pairs of $m$-sequences with four-valued cross correlation is constructed and the complete correlation distribution of this family is determined.
[ { "version": "v1", "created": "Fri, 21 Dec 2007 17:31:27 GMT" } ]
2007-12-24T00:00:00
[ [ "Helleseth", "Tor", "" ], [ "Kholosha", "Alexander", "" ], [ "Johanssen", "Aina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.3807
Jianguo Liu
Jian-Guo Liu, Bing-Hong Wang, Qiang Guo
Improved Collaborative Filtering Algorithm via Information Transformation
5 pages, 4 figures
Int. J. Mod. Phys. C 20(2), 285-293 (2009)
10.1142/S0129183109013613
null
cs.LG cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a spreading activation approach for collaborative filtering (SA-CF). By using the opinion spreading process, the similarity between any users can be obtained. The algorithm has remarkably higher accuracy than the standard collaborative filtering (CF) using Pearson correlation. Furthermore, we introduce a free parameter $\beta$ to regulate the contributions of objects to user-user correlations. The numerical results indicate that decreasing the influence of popular objects can further improve the algorithmic accuracy and personality. We argue that a better algorithm should simultaneously require less computation and generate higher accuracy. Accordingly, we further propose an algorithm involving only the top-$N$ similar neighbors for each target user, which has both less computational complexity and higher algorithmic accuracy.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 14:25:18 GMT" }, { "version": "v2", "created": "Fri, 12 Dec 2008 16:31:13 GMT" }, { "version": "v3", "created": "Wed, 14 Oct 2009 15:30:56 GMT" } ]
2015-05-13T00:00:00
[ [ "Liu", "Jian-Guo", "" ], [ "Wang", "Bing-Hong", "" ], [ "Guo", "Qiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0712.3823
Anthony Leverrier
Anthony Leverrier, Romain All\'eaume, Joseph Boutros, Gilles Z\'emor, Philippe Grangier
Multidimensional reconciliation for continuous-variable quantum key distribution
8 pages, 3 figures
Phys. Rev. A 77, 042325 (2008)
10.1103/PhysRevA.77.042325
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for extracting an errorless secret key in a continuous-variable quantum key distribution protocol, which is based on Gaussian modulation of coherent states and homodyne detection. The crucial feature is an eight-dimensional reconciliation method, based on the algebraic properties of octonions. Since the protocol does not use any postselection, it can be proven secure against arbitrary collective attacks, by using well-established theorems on the optimality of Gaussian attacks. By using this new coding scheme with an appropriate signal to noise ratio, the distance for secure continuous-variable quantum key distribution can be significantly extended.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 00:41:54 GMT" }, { "version": "v2", "created": "Thu, 3 Jul 2008 10:37:27 GMT" } ]
2009-11-13T00:00:00
[ [ "Leverrier", "Anthony", "" ], [ "Alléaume", "Romain", "" ], [ "Boutros", "Joseph", "" ], [ "Zémor", "Gilles", "" ], [ "Grangier", "Philippe", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3825
Marcus Hutter
Shane Legg and Marcus Hutter
Tests of Machine Intelligence
12 pages; 1 table. Turing test and derivatives; Compression tests; Linguistic complexity; Multiple cognitive abilities; Competitive games; Psychometric tests; Smith's test; C-test; Universal intelligence
50 Years of Artificial Intelligence (2007) pages 232-242
null
IDSIA-11-07
cs.AI
null
Although the definition and measurement of intelligence is clearly of fundamental importance to the field of artificial intelligence, no general survey of definitions and tests of machine intelligence exists. Indeed few researchers are even aware of alternatives to the Turing test and its many derivatives. In this paper we fill this gap by providing a short survey of the many tests of machine intelligence that have been proposed.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 01:17:24 GMT" } ]
2008-06-26T00:00:00
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0712.3829
Francois Le Gall
Yoshifumi Inui and Francois Le Gall
Quantum Property Testing of Group Solvability
11 pages; supersedes arXiv:quant-ph/0610013
Algorithmica 59(1): 35-47 (2011)
10.1007/s00453-009-9338-8
null
quant-ph cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Testing efficiently whether a finite set with a binary operation over it, given as an oracle, is a group is a well-known open problem in the field of property testing. Recently, Friedl, Ivanyos and Santha have made a significant step in the direction of solving this problem by showing that it it possible to test efficiently whether the input is an Abelian group or is far, with respect to some distance, from any Abelian group. In this paper, we make a step further and construct an efficient quantum algorithm that tests whether the input is a solvable group, or is far from any solvable group. More precisely, the number of queries used by our algorithm is polylogarithmic in the size of the set.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 04:47:03 GMT" }, { "version": "v2", "created": "Sun, 3 Jan 2010 08:29:30 GMT" } ]
2021-10-05T00:00:00
[ [ "Inui", "Yoshifumi", "" ], [ "Gall", "Francois Le", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.3830
Tom Schrijvers
Tom Schrijvers, Bart Demoen, David S. Warren
TCHR: a framework for tabled CLP
Accepted for publication in Theory and Practice of Logic Programming
null
null
null
cs.PL
null
Tabled Constraint Logic Programming is a powerful execution mechanism for dealing with Constraint Logic Programming without worrying about fixpoint computation. Various applications, e.g in the fields of program analysis and model checking, have been proposed. Unfortunately, a high-level system for developing new applications is lacking, and programmers are forced to resort to complicated ad hoc solutions. This papers presents TCHR, a high-level framework for tabled Constraint Logic Programming. It integrates in a light-weight manner Constraint Handling Rules (CHR), a high-level language for constraint solvers, with tabled Logic Programming. The framework is easily instantiated with new application-specific constraint domains. Various high-level operations can be instantiated to control performance. In particular, we propose a novel, generalized technique for compacting answer sets.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 15:28:16 GMT" } ]
2007-12-27T00:00:00
[ [ "Schrijvers", "Tom", "" ], [ "Demoen", "Bart", "" ], [ "Warren", "David S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0712.3831
Dawei Ding
Dawei Ding, Jie Zhu, Xiaoshu Luo, Yuliang Liu
Hopf bifurcation analysis in a dual model of Internet congestion control algorithm with communication delay
18 pages, 6 figures
null
null
null
cs.NI
null
This paper focuses on the delay induced Hopf bifurcation in a dual model of Internet congestion control algorithms which can be modeled as a time-delay system described by a one-order delay differential equation (DDE). By choosing communication delay as the bifurcation parameter, we demonstrate that the system loses its stability and a Hopf bifurcation occurs when communication delay passes through a critical value. Moreover, the bifurcating periodic solution of system is calculated by means of perturbation methods. Discussion of stability of the periodic solutions involves the computation of Floquet exponents by considering the corresponding Poincare -Lindstedt series expansion. Finally, numerical simulations for verify the theoretical analysis are provided.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 06:16:26 GMT" } ]
2007-12-27T00:00:00
[ [ "Ding", "Dawei", "" ], [ "Zhu", "Jie", "" ], [ "Luo", "Xiaoshu", "" ], [ "Liu", "Yuliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.3858
Abraham Punnen
Abraham P. Punnen and Ruonan Zhang
Bottleneck flows in networks
null
null
null
null
cs.DS
null
The bottleneck network flow problem (BNFP) is a generalization of several well-studied bottleneck problems such as the bottleneck transportation problem (BTP), bottleneck assignment problem (BAP), bottleneck path problem (BPP), and so on. In this paper we provide a review of important results on this topic and its various special cases. We observe that the BNFP can be solved as a sequence of $O(\log n)$ maximum flow problems. However, special augmenting path based algorithms for the maximum flow problem can be modified to obtain algorithms for the BNFP with the property that these variations and the corresponding maximum flow algorithms have identical worst case time complexity. On unit capacity network we show that BNFP can be solved in $O(\min \{{m(n\log n)}^{{2/3}}, m^{{3/2}}\sqrt{\log n}\})$. This improves the best available algorithm by a factor of $\sqrt{\log n}$. On unit capacity simple graphs, we show that BNFP can be solved in $O(m \sqrt {n \log n})$ time. As a consequence we have an $O(m \sqrt {n \log n})$ algorithm for the BTP with unit arc capacities.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 13:49:45 GMT" } ]
2007-12-27T00:00:00
[ [ "Punnen", "Abraham P.", "" ], [ "Zhang", "Ruonan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.3870
Bruce Hajek
Bruce Hajek
Substitute Valuations: Generation and Structure
Revision includes more background and explanations
null
10.1016/j.peva.2008.07.001
null
cs.GT cs.PF
null
Substitute valuations (in some contexts called gross substitute valuations) are prominent in combinatorial auction theory. An algorithm is given in this paper for generating a substitute valuation through Monte Carlo simulation. In addition, the geometry of the set of all substitute valuations for a fixed number of goods K is investigated. The set consists of a union of polyhedrons, and the maximal polyhedrons are identified for K=4. It is shown that the maximum dimension of the maximal polyhedrons increases with K nearly as fast as two to the power K. Consequently, under broad conditions, if a combinatorial algorithm can present an arbitrary substitute valuation given a list of input numbers, the list must grow nearly as fast as two to the power K.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 16:52:39 GMT" }, { "version": "v2", "created": "Thu, 13 Mar 2008 16:14:03 GMT" }, { "version": "v3", "created": "Mon, 19 May 2008 14:50:58 GMT" } ]
2014-08-15T00:00:00
[ [ "Hajek", "Bruce", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0712.3876
Amir Rothschild
Ely Porat and Amir Rothschild
Explicit Non-Adaptive Combinatorial Group Testing Schemes
15 pages, accepted to ICALP 2008
null
null
null
cs.DS
null
Group testing is a long studied problem in combinatorics: A small set of $r$ ill people should be identified out of the whole ($n$ people) by using only queries (tests) of the form "Does set X contain an ill human?". In this paper we provide an explicit construction of a testing scheme which is better (smaller) than any known explicit construction. This scheme has $\bigT{\min[r^2 \ln n,n]}$ tests which is as many as the best non-explicit schemes have. In our construction we use a fact that may have a value by its own right: Linear error-correction codes with parameters $[m,k,\delta m]_q$ meeting the Gilbert-Varshamov bound may be constructed quite efficiently, in $\bigT{q^km}$ time.
[ { "version": "v1", "created": "Sat, 22 Dec 2007 21:04:34 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2008 22:30:43 GMT" }, { "version": "v3", "created": "Sun, 27 Apr 2008 20:32:13 GMT" }, { "version": "v4", "created": "Tue, 29 Apr 2008 19:55:32 GMT" }, { "version": "v5", "created": "Tue, 29 Apr 2008 20:02:41 GMT" } ]
2008-04-29T00:00:00
[ [ "Porat", "Ely", "" ], [ "Rothschild", "Amir", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.3896
Jiangping Wang
Jiangping Wang
Tighter and Stable Bounds for Marcum Q-Function
7 pages. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper proposes new bounds for Marcum Q-function, which prove extremely tight and outperform all the bounds previously proposed in the literature. What is more, the proposed bounds are good and stable both for large values and small values of the parameters of the Marcum Q-function, where the previously introduced bounds are bad and even useless under some conditions. The new bounds are derived by refined approximations for the 0th order modified Bessel function in the integration region of the Marcum Q-function. They should be useful since they are always tight no matter the parameters are large or small.
[ { "version": "v1", "created": "Sun, 23 Dec 2007 07:50:15 GMT" } ]
2007-12-27T00:00:00
[ [ "Wang", "Jiangping", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.3916
Andreas Enge
Andreas Enge (INRIA Futurs)
Discrete logarithms in curves over finite fields
null
null
null
null
cs.CR cs.DM math.AG
null
A survey on algorithms for computing discrete logarithms in Jacobians of curves over finite fields.
[ { "version": "v1", "created": "Sun, 23 Dec 2007 14:21:12 GMT" } ]
2007-12-27T00:00:00
[ [ "Enge", "Andreas", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0712.3925
Pascal Heus
Pascal Heus, Richard Gomez
QIS-XML: A metadata specification for Quantum Information Science
26 pages, 22 figures
null
null
null
cs.SE cs.DB quant-ph
null
While Quantum Information Science (QIS) is still in its infancy, the ability for quantum based hardware or computers to communicate and integrate with their classical counterparts will be a major requirement towards their success. Little attention however has been paid to this aspect of QIS. To manage and exchange information between systems, today's classic Information Technology (IT) commonly uses the eXtensible Markup Language (XML) and its related tools. XML is composed of numerous specifications related to various fields of expertise. No such global specification however has been defined for quantum computers. QIS-XML is a proposed XML metadata specification for the description of fundamental components of QIS (gates & circuits) and a platform for the development of a hardware independent low level pseudo-code for quantum algorithms. This paper lays out the general characteristics of the QIS-XML specification and outlines practical applications through prototype use cases.
[ { "version": "v1", "created": "Sun, 23 Dec 2007 15:24:35 GMT" } ]
2011-11-10T00:00:00
[ [ "Heus", "Pascal", "" ], [ "Gomez", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0712.3936
Juli\'an Mestre
Juli\'an Mestre
Lagrangian Relaxation and Partial Cover
20 pages, extended abstract appeared in STACS 2008
null
null
null
cs.DS cs.DM
null
Lagrangian relaxation has been used extensively in the design of approximation algorithms. This paper studies its strengths and limitations when applied to Partial Cover.
[ { "version": "v1", "created": "Sun, 23 Dec 2007 18:33:36 GMT" } ]
2007-12-27T00:00:00
[ [ "Mestre", "Julián", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.3964
Chengqing Li
Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence
11 pages, 2 figures
null
10.1016/j.imavis.2008.09.004
null
cs.CR cs.MM
null
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number resource.
[ { "version": "v1", "created": "Mon, 24 Dec 2007 04:02:35 GMT" }, { "version": "v2", "created": "Mon, 31 Dec 2007 06:08:43 GMT" } ]
2009-12-21T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Chen", "Guanrong", "" ], [ "Halang", "Wolfgang A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0712.3973
Marc Schoenauer
Pierre Collet (LIL), Marc Schoenauer (INRIA Rocquencourt)
GUIDE: Unifying Evolutionary Engines through a Graphical User Interface
null
Dans Evolution Artificielle 2936 (2003) 203-215
null
null
cs.NE
null
Many kinds of Evolutionary Algorithms (EAs) have been described in the literature since the last 30 years. However, though most of them share a common structure, no existing software package allows the user to actually shift from one model to another by simply changing a few parameters, e.g. in a single window of a Graphical User Interface. This paper presents GUIDE, a Graphical User Interface for DREAM Experiments that, among other user-friendly features, unifies all kinds of EAs into a single panel, as far as evolution parameters are concerned. Such a window can be used either to ask for one of the well known ready-to-use algorithms, or to very easily explore new combinations that have not yet been studied. Another advantage of grouping all necessary elements to describe virtually all kinds of EAs is that it creates a fantastic pedagogic tool to teach EAs to students and newcomers to the field.
[ { "version": "v1", "created": "Mon, 24 Dec 2007 07:31:58 GMT" } ]
2011-11-10T00:00:00
[ [ "Collet", "Pierre", "", "LIL" ], [ "Schoenauer", "Marc", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.3980
Vincent Gramoli
Antonio Fernandez (LADyR), Vincent Gramoli (INRIA Futurs, IRISA), Ernesto Jimenez (EUI), Anne-Marie Kermarrec (IRISA), Michel Raynal (IRISA)
Distributed Slicing in Dynamic Systems
null
Dans The 27th International Conference on Distributed Computing Systems (ICDCS'07) (2007) 66
null
ICDCS07
cs.DC
null
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. The slicing service, has been proposed to allow for an automatic partitioning of P2P networks into groups (slices) that represent a controllable amount of some resource and that are also relatively homogeneous with respect to that resource. In this paper we propose two gossip-based algorithms to solve the distributed slicing problem. The first algorithm speeds up an existing algorithm sorting a set of uniform random numbers. The second algorithm statistically approximates the rank of nodes in the ordering. The scalability, efficiency and resilience to dynamics of both algorithms rely on their gossip-based models. These algorithms are proved viable theoretically and experimentally.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 13:55:47 GMT" } ]
2007-12-27T00:00:00
[ [ "Fernandez", "Antonio", "", "LADyR" ], [ "Gramoli", "Vincent", "", "INRIA Futurs, IRISA" ], [ "Jimenez", "Ernesto", "", "EUI" ], [ "Kermarrec", "Anne-Marie", "", "IRISA" ], [ "Raynal", "Michel", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0712.4011
Giorgio Taricco
Giorgio Taricco
Asymptotic Mutual Information Statistics of Separately-Correlated Rician Fading MIMO Channels
- submitted to the IEEE Transactions on Information Theory on Nov. 19, 2006 - revised and submitted to the IEEE Transactions on Information Theory on Dec. 19, 2007
null
10.1109/TIT.2008.926415
null
cs.IT math.IT
null
Precise characterization of the mutual information of MIMO systems is required to assess the throughput of wireless communication channels in the presence of Rician fading and spatial correlation. Here, we present an asymptotic approach allowing to approximate the distribution of the mutual information as a Gaussian distribution in order to provide both the average achievable rate and the outage probability. More precisely, the mean and variance of the mutual information of the separatelycorrelated Rician fading MIMO channel are derived when the number of transmit and receive antennas grows asymptotically large and their ratio approaches a finite constant. The derivation is based on the replica method, an asymptotic technique widely used in theoretical physics and, more recently, in the performance analysis of communication (CDMA and MIMO) systems. The replica method allows to analyze very difficult system cases in a comparatively simple way though some authors pointed out that its assumptions are not always rigorous. Being aware of this, we underline the key assumptions made in this setting, quite similar to the assumptions made in the technical literature using the replica method in their asymptotic analyses. As far as concerns the convergence of the mutual information to the Gaussian distribution, it is shown that it holds under some mild technical conditions, which are tantamount to assuming that the spatial correlation structure has no asymptotically dominant eigenmodes. The accuracy of the asymptotic approach is assessed by providing a sizeable number of numerical results. It is shown that the approximation is very accurate in a wide variety of system settings even when the number of transmit and receive antennas is as small as a few units.
[ { "version": "v1", "created": "Mon, 24 Dec 2007 16:00:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Taricco", "Giorgio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4015
Jayadev Acharya
Sreechakra Goparaju, Jayadev Acharya, Ajoy K. Ray, Jaideva C. Goswami
A Fast Hierarchical Multilevel Image Segmentation Method using Unbiased Estimators
10 pages, 5 figures, submitted to "IEEE Transactions on Pattern Analysis and Machine Intelligence"
null
null
null
cs.CV
null
This paper proposes a novel method for segmentation of images by hierarchical multilevel thresholding. The method is global, agglomerative in nature and disregards pixel locations. It involves the optimization of the ratio of the unbiased estimators of within class to between class variances. We obtain a recursive relation at each step for the variances which expedites the process. The efficacy of the method is shown in a comparison with some well-known methods.
[ { "version": "v1", "created": "Mon, 24 Dec 2007 17:11:56 GMT" } ]
2007-12-27T00:00:00
[ [ "Goparaju", "Sreechakra", "" ], [ "Acharya", "Jayadev", "" ], [ "Ray", "Ajoy K.", "" ], [ "Goswami", "Jaideva C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]