id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0712.4027
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz, Plamen Koev
Accurate and Efficient Expression Evaluation and Linear Algebra
49 pages, 6 figures, 1 table
Acta Numerica, Volume 17, May 2008, pp 87-145
10.1017/S0962492906350015
null
math.NA cs.CC cs.DS math.RA
null
We survey and unify recent results on the existence of accurate algorithms for evaluating multivariate polynomials, and more generally for accurate numerical linear algebra with structured matrices. By "accurate" we mean that the computed answer has relative error less than 1, i.e., has some correct leading digits. We also address efficiency, by which we mean algorithms that run in polynomial time in the size of the input. Our results will depend strongly on the model of arithmetic: Most of our results will use the so-called Traditional Model (TM). We give a set of necessary and sufficient conditions to decide whether a high accuracy algorithm exists in the TM, and describe progress toward a decision procedure that will take any problem and provide either a high accuracy algorithm or a proof that none exists. When no accurate algorithm exists in the TM, it is natural to extend the set of available accurate operations by a library of additional operations, such as $x+y+z$, dot products, or indeed any enumerable set which could then be used to build further accurate algorithms. We show how our accurate algorithms and decision procedure for finding them extend to this case. Finally, we address other models of arithmetic, and the relationship between (im)possibility in the TM and (in)efficient algorithms operating on numbers represented as bit strings.
[ { "version": "v1", "created": "Mon, 24 Dec 2007 20:14:50 GMT" } ]
2008-05-21T00:00:00
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ], [ "Koev", "Plamen", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0712.4046
David Harvey
David Harvey
Faster polynomial multiplication via multipoint Kronecker substitution
14 pages, 4 figures
null
null
null
cs.SC cs.DS
null
We give several new algorithms for dense polynomial multiplication based on the Kronecker substitution method. For moderately sized input polynomials, the new algorithms improve on the performance of the standard Kronecker substitution by a sizeable constant, both in theory and in empirical tests.
[ { "version": "v1", "created": "Tue, 25 Dec 2007 04:57:04 GMT" } ]
2007-12-27T00:00:00
[ [ "Harvey", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.4057
Aldar C.-F. Chan
Aldar C-F. Chan
On Compression of Cryptographic Keys
null
Theoretical Computer Science, 2013
10.1016/j.tcs.2013.04.010
null
cs.CR cs.NI
null
Any secured system can be modeled as a capability-based access control system in which each user is given a set of secret keys of the resources he is granted access to. In some large systems with resource-constrained devices, such as sensor networks and RFID systems, the design is sensitive to memory or key storage cost. With a goal to minimize the maximum users' key storage, key compression based on key linking, that is, deriving one key from another without compromising security, is studied. A lower bound on key storage needed for a general access structure with key derivation is derived. This bound demonstrates the theoretic limit of any systems which do not trade off security and can be treated as a negative result to provide ground for designs with security tradeoff. A concrete, provably secure key linking scheme based on pseudorandom functions is given. Using the key linking framework, a number of key pre-distribution schemes in the literature are analyzed.
[ { "version": "v1", "created": "Tue, 25 Dec 2007 09:10:59 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2008 04:26:44 GMT" }, { "version": "v3", "created": "Tue, 19 Feb 2008 05:00:10 GMT" } ]
2021-09-21T00:00:00
[ [ "Chan", "Aldar C-F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4059
Yashodhan Kanoria
Y. Kanoria, D. Manjunath
On Distributed Computation in Noisy Random Planar Networks
5 pages, 2 figures
Proceedings of IEEE International Symposium on Information Theory, 2007
10.1109/ISIT.2007.4557101
null
cs.IT math.IT
null
We consider distributed computation of functions of distributed data in random planar networks with noisy wireless links. We present a new algorithm for computation of the maximum value which is order optimal in the number of transmissions and computation time.We also adapt the histogram computation algorithm of Ying et al to make the histogram computation time optimal.
[ { "version": "v1", "created": "Tue, 25 Dec 2007 10:20:56 GMT" } ]
2016-11-18T00:00:00
[ [ "Kanoria", "Y.", "" ], [ "Manjunath", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4075
Vitaly Skachek
Vitaly Skachek, Mark F. Flanagan, Eimear Byrne, Marcus Greferath
Polytope Representations for Linear-Programming Decoding of Non-Binary Linear Codes
5 pages, to appear in 2008 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2008.4595239
null
cs.IT math.IT
null
In previous work, we demonstrated how decoding of a non-binary linear code could be formulated as a linear-programming problem. In this paper, we study different polytopes for use with linear-programming decoding, and show that for many classes of codes these polytopes yield a complexity advantage for decoding. These representations lead to polynomial-time decoders for a wide variety of classical non-binary linear codes.
[ { "version": "v1", "created": "Tue, 25 Dec 2007 15:44:01 GMT" }, { "version": "v2", "created": "Thu, 17 Apr 2008 17:35:15 GMT" } ]
2016-11-18T00:00:00
[ [ "Skachek", "Vitaly", "" ], [ "Flanagan", "Mark F.", "" ], [ "Byrne", "Eimear", "" ], [ "Greferath", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4096
Eitan Yaakobi
Tuvi Etzion, and Eitan Yaakobi
Error-Correction of Multidimensional Bursts
15 pages
null
null
null
cs.IT math.IT
null
In this paper we present several constructions to generate codes for correcting a multidimensional cluster-error. The goal is to correct a cluster-error whose shape can be a box-error, a Lee sphere error, or an error with an arbitrary shape. Our codes have very low redundancy, close to optimal, and large range of parameters of arrays and clusters. Our main results are summarized as follows: 1) A construction of two-dimensional codes capable to correct a rectangular-error with considerably more flexible parameters from previously known constructions. Another advantage of this construction is that it is easily generalized for D dimensions. 2) A novel method based on D colorings of the D-dimensional space for constructing D-dimensional codes correcting D-dimensional cluster-error of various shapes. This method is applied efficiently to correct a D-dimensional cluster error of parameters not covered efficiently by previous onstructions. 3) A transformation of the D-dimensional space into another D-dimensional space such that a D-dimensional Lee sphere is transformed into a shape located in a D-dimensional box of a relatively small size. We use the previous constructions to correct a D-dimensional error whose shape is a D-dimensional Lee sphere. 4) Applying the coloring method to correct more efficiently a two-dimensional error whose shape is a Lee sphere. The D-dimensional case is also discussed. 5) A construction of one-dimensional codes capable to correct a burst-error of length b in which the number of erroneous positions is relatively small compared to b. This construction is generalized for D-dimensional codes. 6) Applying the constructions correcting a Lee sphere error and a cluster-error with small number of erroneous positions, to correct an arbitrary cluster-error.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 15:01:37 GMT" } ]
2007-12-27T00:00:00
[ [ "Etzion", "Tuvi", "" ], [ "Yaakobi", "Eitan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4099
Gerard Briscoe Mr
G. Briscoe, P. De Wilde
Digital Ecosystems: Optimisation by a Distributed Intelligence
12 pages, 14 figures, conference
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Can intelligence optimise Digital Ecosystems? How could a distributed intelligence interact with the ecosystem dynamics? Can the software components that are part of genetic selection be intelligent in themselves, as in an adaptive technology? We consider the effect of a distributed intelligence mechanism on the evolutionary and ecological dynamics of our Digital Ecosystem, which is the digital counterpart of a biological ecosystem for evolving software services in a distributed network. We investigate Neural Networks and Support Vector Machine for the learning based pattern recognition functionality of our distributed intelligence. Simulation results imply that the Digital Ecosystem performs better with the application of a distributed intelligence, marginally more effectively when powered by Support Vector Machine than Neural Networks, and suggest that it can contribute to optimising the operation of our Digital Ecosystem.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 04:13:20 GMT" }, { "version": "v2", "created": "Sat, 21 Feb 2009 13:38:04 GMT" }, { "version": "v3", "created": "Mon, 21 Sep 2009 00:39:27 GMT" } ]
2009-09-21T00:00:00
[ [ "Briscoe", "G.", "" ], [ "De Wilde", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.4101
Gerard Briscoe Mr
P. De Wilde, G. Briscoe
Digital Ecosystems: Stability of Evolving Agent Populations
8 pages, 6 figures, ACM Management of Emergent Digital EcoSystems (MEDES) 2009
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stability is perhaps one of the most desirable features of any engineered system, given the importance of being able to predict its response to various environmental conditions prior to actual deployment. Engineered systems are becoming ever more complex, approaching the same levels of biological ecosystems, and so their stability becomes ever more important, but taking on more and more differential dynamics can make stability an ever more elusive property. The Chli-DeWilde definition of stability views a Multi-Agent System as a discrete time Markov chain with potentially unknown transition probabilities. With a Multi-Agent System being considered stable when its state, a stochastic process, has converged to an equilibrium distribution, because stability of a system can be understood intuitively as exhibiting bounded behaviour. We investigate an extension to include Multi-Agent Systems with evolutionary dynamics, focusing on the evolving agent populations of our Digital Ecosystem. We then built upon this to construct an entropy-based definition for the degree of instability (entropy of the limit probabilities), which was later used to perform a stability analysis. The Digital Ecosystem is considered to investigate the stability of an evolving agent population through simulations, for which the results were consistent with the original Chli-DeWilde definition.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 04:40:16 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2008 10:38:12 GMT" }, { "version": "v3", "created": "Thu, 19 Feb 2009 18:33:26 GMT" }, { "version": "v4", "created": "Fri, 20 Feb 2009 02:43:08 GMT" }, { "version": "v5", "created": "Mon, 5 Oct 2009 00:31:13 GMT" } ]
2009-10-05T00:00:00
[ [ "De Wilde", "P.", "" ], [ "Briscoe", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.4102
Gerard Briscoe Mr
G. Briscoe, P. De Wilde
Digital Ecosystems: Evolving Service-Oriented Architectures
7 pages, 4 figures, conference
In IEEE First International Conference on Bio Inspired mOdels of NETwork, Information and Computing Systems (BIONETICS) (2006)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We view Digital Ecosystems to be the digital counterparts of biological ecosystems, exploiting the self-organising properties of biological ecosystems, which are considered to be robust, self-organising and scalable architectures that can automatically solve complex, dynamic problems. Digital Ecosystems are a novel optimisation technique where the optimisation works at two levels: a first optimisation, migration of agents (representing services) which are distributed in a decentralised peer-to-peer network, operating continuously in time; this process feeds a second optimisation based on evolutionary computing that operates locally on single peers and is aimed at finding solutions to satisfy locally relevant constraints. We created an Ecosystem-Oriented Architecture of Digital Ecosystems by extending Service-Oriented Architectures with distributed evolutionary computing, allowing services to recombine and evolve over time, constantly seeking to improve their effectiveness for the user base. Individuals within our Digital Ecosystem will be applications (groups of services), created in response to user requests by using evolutionary optimisation to aggregate the services. These individuals will migrate through the Digital Ecosystem and adapt to find niches where they are useful in fulfilling other user requests for applications. Simulation results imply that the Digital Ecosystem performs better at large scales than a comparable Service-Oriented Architecture, suggesting that incorporating ideas from theoretical ecology can contribute to useful self-organising properties in digital ecosystems.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 05:44:31 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2008 08:39:15 GMT" }, { "version": "v3", "created": "Fri, 12 Dec 2008 08:59:13 GMT" }, { "version": "v4", "created": "Fri, 13 Mar 2009 02:21:31 GMT" }, { "version": "v5", "created": "Thu, 26 Mar 2009 08:32:17 GMT" }, { "version": "v6", "created": "Mon, 5 Oct 2009 01:55:06 GMT" } ]
2009-10-05T00:00:00
[ [ "Briscoe", "G.", "" ], [ "De Wilde", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.4103
Vasilios Kapinas
Vasilios M. Kapinas, Sotirios K. Mihos and George K. Karagiannidis
On the Monotonicity of the Generalized Marcum and Nuttall Q-Functions
Published in IEEE Transactions on Information Theory, August 2009. Only slight formatting modifications
IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3701-3710, Aug. 2009
10.1109/TIT.2009.2023710
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monotonicity criteria are established for the generalized Marcum Q-function, $\emph{Q}_{M}$, the standard Nuttall Q-function, $\emph{Q}_{M,N}$, and the normalized Nuttall Q-function, $\mathcal{Q}_{M,N}$, with respect to their real order indices M,N. Besides, closed-form expressions are derived for the computation of the standard and normalized Nuttall Q-functions for the case when M,N are odd multiples of 0.5 and $M\geq N$. By exploiting these results, novel upper and lower bounds for $\emph{Q}_{M,N}$ and $\mathcal{Q}_{M,N}$ are proposed. Furthermore, specific tight upper and lower bounds for $\emph{Q}_{M}$, previously reported in the literature, are extended for real values of M. The offered theoretical results can be efficiently applied in the study of digital communications over fading channels, in the information-theoretic analysis of multiple-input multiple-output systems and in the description of stochastic processes in probability theory, among others.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 05:54:15 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2009 22:20:16 GMT" }, { "version": "v3", "created": "Fri, 24 Apr 2009 15:39:00 GMT" }, { "version": "v4", "created": "Thu, 16 Jul 2009 23:59:05 GMT" }, { "version": "v5", "created": "Sun, 24 Jan 2010 00:16:20 GMT" } ]
2010-01-24T00:00:00
[ [ "Kapinas", "Vasilios M.", "" ], [ "Mihos", "Sotirios K.", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4115
Salah Aly A
Salah A. Aly
A Class of Quantum LDPC Codes Constructed From Finite Geometries
5pages, 2 figures
Proc. of IEEE Globecom 08, New Orleans, LA 2008
10.1109/GLOCOM.2008.ECP.217
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity check (LDPC) codes are a significant class of classical codes with many applications. Several good LDPC codes have been constructed using random, algebraic, and finite geometries approaches, with containing cycles of length at least six in their Tanner graphs. However, it is impossible to design a self-orthogonal parity check matrix of an LDPC code without introducing cycles of length four. In this paper, a new class of quantum LDPC codes based on lines and points of finite geometries is constructed. The parity check matrices of these codes are adapted to be self-orthogonal with containing only one cycle of length four. Also, the column and row weights, and bounds on the minimum distance of these codes are given. As a consequence, the encoding and decoding algorithms of these codes as well as their performance over various quantum depolarizing channels will be investigated.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 19:35:31 GMT" }, { "version": "v2", "created": "Wed, 26 Dec 2007 23:25:12 GMT" }, { "version": "v3", "created": "Wed, 11 Nov 2009 20:58:41 GMT" } ]
2016-11-18T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4124
Michael Singer
Michael F. Singer
Introduction to the Galois Theory of Linear Differential Equations
82 pages; some typos corrected
null
null
null
math.CA cs.SC
null
This is an expanded version of the 10 lectures given as the 2006 London Mathematical Society Invited Lecture Series at the Heriot-Watt University 31 July - 4 August 2006.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 02:40:19 GMT" }, { "version": "v2", "created": "Thu, 10 Jan 2008 00:18:53 GMT" } ]
2008-01-10T00:00:00
[ [ "Singer", "Michael F.", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0712.4126
Chandan Reddy
Chandan K. Reddy
TRUST-TECH based Methods for Optimization and Learning
PHD Thesis
Chandan K. Reddy, TRUST-TECH based Methods for Optimization and Learning, PHD Thesis, Cornell University, February 2007
null
null
cs.AI cs.CE cs.MS cs.NA cs.NE
null
Many problems that arise in machine learning domain deal with nonlinearity and quite often demand users to obtain global optimal solutions rather than local optimal ones. Optimization problems are inherent in machine learning algorithms and hence many methods in machine learning were inherited from the optimization literature. Popularly known as the initialization problem, the ideal set of parameters required will significantly depend on the given initialization values. The recently developed TRUST-TECH (TRansformation Under STability-reTaining Equilibria CHaracterization) methodology systematically explores the subspace of the parameters to obtain a complete set of local optimal solutions. In this thesis work, we propose TRUST-TECH based methods for solving several optimization and machine learning problems. Two stages namely, the local stage and the neighborhood-search stage, are repeated alternatively in the solution space to achieve improvements in the quality of the solutions. Our methods were tested on both synthetic and real datasets and the advantages of using this novel framework are clearly manifested. This framework not only reduces the sensitivity to initialization, but also allows the flexibility for the practitioners to use various global and local methods that work well for a particular problem of interest. Other hierarchical stochastic algorithms like evolutionary algorithms and smoothing algorithms are also studied and frameworks for combining these methods with TRUST-TECH have been proposed and evaluated on several test systems.
[ { "version": "v1", "created": "Tue, 25 Dec 2007 03:14:32 GMT" } ]
2007-12-27T00:00:00
[ [ "Reddy", "Chandan K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.4135
Xiaojun Tang
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2013043
null
cs.IT math.IT
null
The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransmission request (HARQ) protocol is revisited for a block-fading wire-tap channel, in which two legitimate users communicate over a block-fading channel in the presence of a passive eavesdropper who intercepts the transmissions through an independent block-fading channel. In this model, the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver via an error-free public channel. Both reliability and confidentiality of secure HARQ protocols are studied by the joint consideration of channel coding, secrecy coding, and retransmission protocols. In particular, the error and secrecy performance of repetition time diversity (RTD) and incremental redundancy (INR) protocols are investigated based on good Wyner code sequences, which ensure that the confidential message is decoded successfully by the legitimate receiver and is kept in total ignorance by the eavesdropper for a given set of channel realizations. This paper first illustrates that there exists a good rate-compatible Wyner code family which ensures a secure INR protocol. Next, two types of outage probabilities, connection outage and secrecy outage probabilities are defined in order to characterize the tradeoff between the reliability of the legitimate communication link and the confidentiality with respect to the eavesdropper's link. For a given connection/secrecy outage probability pair, an achievable throughput of secure HARQ protocols is derived for block-fading channels. Finally, both asymptotic analysis and numerical computations demonstrate the benefits of HARQ protocols to throughput and secrecy.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 17:50:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Tang", "Xiaojun", "" ], [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4148
Petros Petrosyan
Petros A. Petrosyan and Gagik H. Karapetyan
Lower bounds for the greatest possible number of colors in interval edge colorings of bipartite cylinders and bipartite tori
3 pages
Proceedings of the CSIT Conference, Yerevan, 2007, 86-88
null
null
cs.DM
null
An interval edge t-coloring of a graph G is a proper edge coloring of G with colors 1,2...,t such that at least one edge of G is colored by color i,i=1,2...,t, and the edges incident with each vertex v are colored by d_{G}(v) consecutive colors, where d_{G}(v) is the degree of the vertex v in G. In this paper interval edge colorings of bipartite cylinders and bipartite tori are investigated.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 21:03:54 GMT" }, { "version": "v2", "created": "Sun, 30 Dec 2007 20:27:14 GMT" } ]
2007-12-30T00:00:00
[ [ "Petrosyan", "Petros A.", "" ], [ "Karapetyan", "Gagik H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0712.4153
Gerard Briscoe Mr
G. Briscoe, S. Sadedin, G. Paperin
Biology of Applied Digital Ecosystems
9 pages, 4 figure, conference
In IEEE First International Conference on Digital Ecosystems and Technologies, 2007
10.1109/DEST.2007.372015
null
cs.NE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A primary motivation for our research in Digital Ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the biological processes that contribute to these properties have not been made explicit in Digital Ecosystems research. Here, we discuss how biological properties contribute to the self-organising features of biological ecosystems, including population dynamics, evolution, a complex dynamic environment, and spatial distributions for generating local interactions. The potential for exploiting these properties in artificial systems is then considered. We suggest that several key features of biological ecosystems have not been fully explored in existing digital ecosystems, and discuss how mimicking these features may assist in developing robust, scalable self-organising architectures. An example architecture, the Digital Ecosystem, is considered in detail. The Digital Ecosystem is then measured experimentally through simulations, with measures originating from theoretical ecology, to confirm its likeness to a biological ecosystem. Including the responsiveness to requests for applications from the user base, as a measure of the 'ecological succession' (development).
[ { "version": "v1", "created": "Wed, 26 Dec 2007 21:56:52 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2008 09:19:00 GMT" } ]
2016-11-18T00:00:00
[ [ "Briscoe", "G.", "" ], [ "Sadedin", "S.", "" ], [ "Paperin", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0712.4159
Gerard Briscoe Dr
G Briscoe
Creating a Digital Ecosystem: Service-Oriented Architectures with Distributed Evolutionary Computing
This has been withdrawn by the author due to an error in using presentation notes in submission
In JavaOne Conference, 2006, BOF-0759
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We start with a discussion of the relevant literature, including Nature Inspired Computing as a framework in which to understand this work, and the process of biomimicry to be used in mimicking the necessary biological processes to create Digital Ecosystems. We then consider the relevant theoretical ecology in creating the digital counterpart of a biological ecosystem, including the topological structure of ecosystems, and evolutionary processes within distributed environments. This leads to a discussion of the relevant fields from computer science for the creation of Digital Ecosystems, including evolutionary computing, Multi-Agent Systems, and Service-Oriented Architectures. We then define Ecosystem-Oriented Architectures for the creation of Digital Ecosystems, imbibed with the properties of self-organisation and scalability from biological ecosystems, including a novel form of distributed evolutionary computing.
[ { "version": "v1", "created": "Wed, 26 Dec 2007 23:32:10 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2008 08:56:59 GMT" }, { "version": "v3", "created": "Mon, 5 Oct 2009 00:41:53 GMT" }, { "version": "v4", "created": "Sat, 24 Nov 2012 01:18:27 GMT" }, { "version": "v5", "created": "Tue, 27 Nov 2012 15:39:35 GMT" } ]
2012-11-28T00:00:00
[ [ "Briscoe", "G", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0712.4168
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk Ahmed, Choong Seon Hong
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
5 pages
Proceedings of IEEE ICNEWS 2006, January 2-4, Dhaka, Bangladesh, 2006, pp. 282-286
null
null
cs.OH cs.NI
null
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks the easiest solution for their interconnection. This has led to the rapid growth of several wireless systems like wireless ad hoc networks, wireless sensor networks etc. In this paper we have proposed a framework for rural development by providing various e-services to the rural areas with the help of wireless ad hoc and sensor networks. We have discussed how timely and accurate information could be collected from the rural areas using wireless technologies. In addition to this, we have also mentioned the technical and operational challenges that could hinder the implementation of such a framework in the rural areas in the developing countries.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:15:59 GMT" } ]
2007-12-28T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Islam", "Humayun Kadir", "" ], [ "Sayeed", "Sabit Anjum", "" ], [ "Ahmed", "Farruk", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4169
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong
Security in Wireless Sensor Networks: Issues and Challenges
6 pages
Proceedings of 8th IEEE ICACT 2006, Volume II, February 20-22, Phoenix Park, Korea, 2006, pp. 1043-1048
10.1109/ICACT.2006.206151
null
cs.NI
null
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:22:39 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Lee", "Hyung-Woo", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4170
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo Lee
Smartening the Environment using Wireless Sensor Networks in a Developing Country
5 pages
Proceedings of 8th IEEE ICACT 2006, Volume I, February 20-22, Phoenix Park, Korea, 2006, pp. 705-709
10.1109/ICACT.2006.206063
null
cs.NI
null
The miniaturization process of various sensing devices has become a reality by enormous research and advancements accomplished in Micro Electro-Mechanical Systems (MEMS) and Very Large Scale Integration (VLSI) lithography. Regardless of such extensive efforts in optimizing the hardware, algorithm, and protocols for networking, there still remains a lot of scope to explore how these innovations can all be tied together to design Wireless Sensor Networks (WSN) for smartening the surrounding environment for some practical purposes. In this paper we explore the prospects of wireless sensor networks and propose a design level framework for developing a smart environment using WSNs, which could be beneficial for a developing country like Bangladesh. In connection to this, we also discuss the major aspects of wireless sensor networks.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:24:42 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ], [ "Lee", "Hyung-Woo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4172
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong
Developing an Efficient DMCIS with Next-Generation Wireless Networks
6 pages
IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA
10.1109/MILCOM.2006.302515
null
cs.NI
null
The impact of extreme events across the globe is extraordinary which continues to handicap the advancement of the struggling developing societies and threatens most of the industrialized countries in the globe. Various fields of Information and Communication Technology have widely been used for efficient disaster management; but only to a limited extent though, there is a tremendous potential for increasing efficiency and effectiveness in coping with disasters with the utilization of emerging wireless network technologies. Early warning, response to the particular situation and proper recovery are among the main focuses of an efficient disaster management system today. Considering these aspects, in this paper we propose a framework for developing an efficient Disaster Management Communications and Information System (DMCIS) which is basically benefited by the exploitation of the emerging wireless network technologies combined with other networking and data processing technologies.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:28:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4173
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong
Secure Clustering in DSN with Key Predistribution and WCDS
6 pages
IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA
10.1109/MILCOM.2006.302183
null
cs.NI
null
This paper proposes an efficient approach of secure clustering in distributed sensor networks. The clusters or groups in the network are formed based on offline rank assignment and predistribution of secret keys. Our approach uses the concept of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network. The formation of clusters in the network is secured as the secret keys are distributed and used in an efficient way to resist the inclusion of any hostile entity in the clusters. Along with the description of our approach, we present an analysis and comparison of our approach with other schemes. We also mention the limitations of our approach considering the practical implementation of the sensor networks.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:30:56 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4174
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong, Tatsuya Suda
A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards
2 pages
Proceedings of the 2007 IEEE International Conference on Consumer Electronics (IEEE ICCE 2007), January 10-14, Las Vegas, USA, pp. 1-2
10.1109/ICCE.2007.341503
null
cs.CR cs.NI
null
This paper proposes a novel remote user authentication scheme using smart cards which allows both the authentication server (AS) and the user to verify authenticity of each other. Our scheme is efficient enough to resist the known attacks that could be launched against remote user authentication process.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:35:02 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ], [ "Suda", "Tatsuya", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4176
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
6 pages
Proceedings of the 9th IEEE ICACT 2007, Volume I, February 12-14, 2007, Phoenix Park, Korea, pp. 804-809
10.1093/ietisy/e90-d.11.1885
null
cs.CR cs.NI
null
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authentication scheme and improve that scheme to ensure robust security for the remote authentication process, keeping all the advantages that were present in that scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. We present a detailed cryptanalysis of previously proposed Shen et. al scheme and an analysis of the improved scheme to show its improvements and efficiency.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:37:45 GMT" } ]
2015-05-13T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4177
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Gihyuk Heo, Choong Seon Hong
A Secure Lightweight Approach of Node Membership Verification in Dense HDSN
6 pages
IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA
10.1109/MILCOM.2007.4455133
null
cs.NI cs.CR
null
In this paper, we consider a particular type of deployment scenario of a distributed sensor network (DSN), where sensors of different types and categories are densely deployed in the same target area. In this network, the sensors are associated with different groups, based on their functional types and after deployment they collaborate with one another in the same group for doing any assigned task for that particular group. We term this sort of DSN as a heterogeneous distributed sensor network (HDSN). Considering this scenario, we propose a secure membership verification mechanism using one-way accumulator (OWA) which ensures that, before collaborating for a particular task, any pair of nodes in the same deployment group can verify each other-s legitimacy of membership. Our scheme also supports addition and deletion of members (nodes) in a particular group in the HDSN. Our analysis shows that, the proposed scheme could work well in conjunction with other security mechanisms for sensor networks and is very effective to resist any adversary-s attempt to be included in a legitimate group in the network.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:47:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Heo", "Gihyuk", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0712.4178
Al-Sakib Khan Pathan
Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi, Choong Seon Hong
An Efficient PKC-Based Security Architecture for Wireless Sensor Networks
7 pages
IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA
10.1109/MILCOM.2007.4455317
null
cs.CR cs.NI
null
In spite of previous widely held belief of the incompatibility of public key cryptography (PKC) schemes for wireless sensor networks (WSNs), some recent works have shown that, PKC based schemes could be implemented for such networks in some ways. The major challenge of employing a PKC scheme in wireless sensor network is posed by the limitations of resources of the tiny sensors. Considering this feature of the sensors, in this paper, we propose an efficient PKC based security architecture with relatively less resource requirements than those of the other previously proposed PKC schemes for WSN. Our security architecture comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node. Our architecture allows both base-station-to-node or node-to-base-station secure communications, and node-to-node secure communications. Analysis and simulation results show that, our proposed architecture ensures a good level of security for communications in the network and could effectively be implemented using the limited computation, memory and energy budgets of the current generation sensor nodes.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:49:41 GMT" } ]
2016-11-18T00:00:00
[ [ "Haque", "Md. Mokammel", "" ], [ "Pathan", "Al-Sakib Khan", "" ], [ "Choi", "Byung Goo", "" ], [ "Hong", "Choong Seon", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0712.4183
Daoshun Wang
Dao-Shun Wang, Feng Yi and Xiaobo Li
Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images
null
null
null
null
cs.CR cs.CV
null
Visual secrete sharing (VSS) is an encryption technique that utilizes human visual system in the recovering of the secret image and it does not require any complex calculation. Pixel expansion has been a major issue of VSS schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for binary secret images. This paper presents a general probabilistic (k, n)-VSS scheme for gray-scale images and another scheme for color images. With our schemes, the pixel expansion can be set to a user-defined value. When this value is 1, there is no pixel expansion at all. The quality of reconstructed secret images, measured by Average Relative Difference, is equivalent to Relative Difference of existing deterministic schemes. Previous probabilistic VSS schemes for black-and-white images with respect to pixel expansion can be viewed as special cases of the schemes proposed here
[ { "version": "v1", "created": "Thu, 27 Dec 2007 03:27:10 GMT" } ]
2007-12-28T00:00:00
[ [ "Wang", "Dao-Shun", "" ], [ "Yi", "Feng", "" ], [ "Li", "Xiaobo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0712.4209
Neri Merhav
Neri Merhav
The Generalized Random Energy Model and its Application to the Statistical Physics of Ensembles of Hierarchical Codes
43 pages, 1 figure, submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2008.2011445
null
cs.IT math.IT
null
In an earlier work, the statistical physics associated with finite--temperature decoding of code ensembles, along with the relation to their random coding error exponents, were explored in a framework that is analogous to Derrida's random energy model (REM) of spin glasses, according to which the energy levels of the various spin configurations are independent random variables. The generalized REM (GREM) extends the REM in that it introduces correlations between energy levels in an hierarchical structure. In this paper, we explore some analogies between the behavior of the GREM and that of code ensembles which have parallel hierarchical structures. In particular, in analogy to the fact that the GREM may have different types of phase transition effects, depending on the parameters of the model, then the above--mentioned hierarchical code ensembles behave substantially differently in the various domains of the design parameters of these codes. We make an attempt to explore the insights that can be imported from the statistical mechanics of the GREM and be harnessed to serve for code design considerations and guidelines.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 10:11:02 GMT" } ]
2016-11-15T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4213
Seiichiro Tani
Seiichiro Tani, Hirotada Kobayashi, Keiji Matsumoto
Exact Quantum Algorithms for the Leader Election Problem
47 pages, preliminary version in Proceedings of STACS 2005
ACM TOCT 4 (2012): Article 1; IEEE TPDS 23 (2012): 255 - 262
null
null
quant-ph cs.DC cs.DS
null
This paper gives the first separation of quantum and classical pure (i.e., non-cryptographic) computing abilities with no restriction on the amount of available computing resources, by considering the exact solvability of a celebrated unsolvable problem in classical distributed computing, the ``leader election problem'' on anonymous networks. The goal of the leader election problem is to elect a unique leader from among distributed parties. The paper considers this problem for anonymous networks, in which each party has the same identifier. It is well-known that no classical algorithm can solve exactly (i.e., in bounded time without error) the leader election problem in anonymous networks, even if it is given the number of parties. This paper gives two quantum algorithms that, given the number of parties, can exactly solve the problem for any network topology in polynomial rounds and polynomial communication/time complexity with respect to the number of parties, when the parties are connected by quantum communication links.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 10:52:52 GMT" } ]
2012-10-10T00:00:00
[ [ "Tani", "Seiichiro", "" ], [ "Kobayashi", "Hirotada", "" ], [ "Matsumoto", "Keiji", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0712.4215
Sahbi Sidhom
Bel G. Raggad (PU - Seidenberg School of CS & IS), Sahbi Sidhom (LORIA)
Cyberspace security: How to develop a security strategy
null
Dans V. International conference Cyberspace 2007 (2007)
null
null
cs.OH
null
Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should be barred from the partnership. This concept also applies to the cyber space or the electronic society. In order to clean our society from cyber crimes and cyber terrorism we need to impose strict security policies and enforce them in a cooperative manner. The paper discusses a country's effort in the development of a national security strategy given its security economic intelligence position, its security readiness, and its adverse exposure.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 11:05:51 GMT" } ]
2007-12-28T00:00:00
[ [ "Raggad", "Bel G.", "", "PU - Seidenberg School of CS & IS" ], [ "Sidhom", "Sahbi", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0712.4222
Luca Roversi
Luca Roversi
Weak Affine Light Typing: Polytime intensional expressivity, soundness and completeness
Updating: *) pag.29, line 527: index j --> index k. *) pag.29, line 544: point 6 canged. *) pag.30, line 547: p=max{m_1... --> p=max{m,m_1... *) pag.30, line 548: the definition of the mapping of the linear composition of QlSRN has been updated. *) pag.30, line 544: arguments of the iterator changed. *) pag.30,31 occurences of wg: every occurrence of rho erased
null
null
null
cs.LO
null
Weak affine light typing (WALT) assigns light affine linear formulae as types to a subset of lambda-terms in System F. WALT is poly-time sound: if a lambda-term M has type in WALT, M can be evaluated with a polynomial cost in the dimension of the derivation that gives it a type. In particular, the evaluation can proceed under any strategy of a rewriting relation, obtained as a mix of both call-by-name/call-by-value beta-reductions. WALT is poly-time complete since it can represent any poly-time Turing machine. WALT weakens, namely generalizes, the notion of stratification of deductions common to some Light Systems -- we call as such those logical systems, derived from Linear logic, to characterize FP, the set of Polynomial functions -- . A weaker stratification allows to define a compositional embedding of the Quasi-linear fragment QlSRN of Safe recursion on notation (SRN) into WALT. QlSRN is SRN, which is a recursive-theoretical system characterizing FP, where only the composition scheme is restricted to linear safe variables. So, the expressivity of WALT is stronger, as compared to the known Light Systems. In particular, using the types, the embedding puts in evidence the stratification of normal and safe arguments hidden in QlSRN: the less an argument is impredicative, the deeper, in a formal, proof-theoretical sense, gets its representation in WALT.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 14:35:16 GMT" }, { "version": "v2", "created": "Mon, 31 Mar 2008 16:00:54 GMT" } ]
2008-03-31T00:00:00
[ [ "Roversi", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.4248
Reinhard Laubenbacher
Reinhard Laubenbacher and Bernd Sturmfels
Computer algebra in systems biology
to appear in American Mathematical Monthly
null
null
null
cs.SC q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Systems biology focuses on the study of entire biological systems rather than on their individual components. With the emergence of high-throughput data generation technologies for molecular biology and the development of advanced mathematical modeling techniques, this field promises to provide important new insights. At the same time, with the availability of increasingly powerful computers, computer algebra has developed into a useful tool for many applications. This article illustrates the use of computer algebra in systems biology by way of a well-known gene regulatory network, the Lac Operon in the bacterium E. coli.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 16:01:35 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 02:53:23 GMT" } ]
2008-12-19T00:00:00
[ [ "Laubenbacher", "Reinhard", "" ], [ "Sturmfels", "Bernd", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0712.4273
Olivier Cappe
Olivier Capp\'e (LTCI), Eric Moulines (LTCI)
Online EM Algorithm for Latent Data Models
Version that includes the corrigendum published in volume 73, part 5 (2011), of the Journal of the Royal Statistical Society, Series B + the correction of a typo in Eqs. (32-33)
Journal of the Royal Statistical Society: Series B, Royal Statistical Society, 2009, 71 (3), pp.593-613
10.1111/j.1467-9868.2009.00698.x
null
stat.CO cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this contribution, we propose a generic online (also sometimes called adaptive or recursive) version of the Expectation-Maximisation (EM) algorithm applicable to latent variable models of independent observations. Compared to the algorithm of Titterington (1984), this approach is more directly connected to the usual EM algorithm and does not rely on integration with respect to the complete data distribution. The resulting algorithm is usually simpler and is shown to achieve convergence to the stationary points of the Kullback-Leibler divergence between the marginal distribution of the observation and the model distribution at the optimal rate, i.e., that of the maximum likelihood estimator. In addition, the proposed approach is also suitable for conditional (or regression) models, as illustrated in the case of the mixture of linear regressions model.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 19:44:34 GMT" }, { "version": "v2", "created": "Thu, 4 Sep 2008 14:36:55 GMT" }, { "version": "v3", "created": "Fri, 2 Dec 2011 14:59:41 GMT" }, { "version": "v4", "created": "Wed, 1 Mar 2017 13:40:32 GMT" } ]
2017-03-02T00:00:00
[ [ "Cappé", "Olivier", "", "LTCI" ], [ "Moulines", "Eric", "", "LTCI" ] ]
[ { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0712.4279
Troy Lee
Troy Lee, Adi Shraibman
Disjointness is hard in the multi-party number on the forehead model
23 pages. Added background to method and references to more recent work. Journal version to appear in Computational Complexity
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that disjointness requires randomized communication Omega(n^{1/(k+1)}/2^{2^k}) in the general k-party number-on-the-forehead model of complexity. The previous best lower bound for k >= 3 was log(n)/(k-1). Our results give a separation between nondeterministic and randomized multiparty number-on-the-forehead communication complexity for up to k=log log n - O(log log log n) many players. Also by a reduction of Beame, Pitassi, and Segerlind, these results imply subexponential lower bounds on the size of proofs needed to refute certain unsatisfiable CNFs in a broad class of proof systems, including tree-like Lovasz-Schrijver proofs.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 20:45:53 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 12:15:09 GMT" } ]
2009-06-09T00:00:00
[ [ "Lee", "Troy", "" ], [ "Shraibman", "Adi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0712.4318
Peter de Blanc
Peter de Blanc
Convergence of Expected Utilities with Algorithmic Probability Distributions
2 pages + title page, references
null
null
null
cs.AI
null
We consider an agent interacting with an unknown environment. The environment is a function which maps natural numbers to natural numbers; the agent's set of hypotheses about the environment contains all such functions which are computable and compatible with a finite set of known input-output pairs, and the agent assigns a positive probability to each such hypothesis. We do not require that this probability distribution be computable, but it must be bounded below by a positive computable function. The agent has a utility function on outputs from the environment. We show that if this utility function is bounded below in absolute value by an unbounded computable function, then the expected utility of any input is undefined. This implies that a computable utility function will have convergent expected utilities iff that function is bounded.
[ { "version": "v1", "created": "Fri, 28 Dec 2007 07:50:00 GMT" } ]
2007-12-31T00:00:00
[ [ "de Blanc", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0712.4321
Salah A. Aly
Salah A. Aly and Andreas Klappenecker
Subsystem Code Constructions
5 pages, trading dimensions of subsystem codes, MDS subsystem codes, and propagation rules. All stabilizer codes are converted to subsystem codes. A talk given at QEC07, and submitted to IEEE ISIT 2008
Proc. of IEEE ISIT 08, Toronto, CA, 2008
null
null
quant-ph cs.IT math.IT
null
Subsystem codes are the most versatile class of quantum error-correcting codes known to date that combine the best features of all known passive and active error-control schemes. The subsystem code is a subspace of the quantum state space that is decomposed into a tensor product of two vector spaces: the subsystem and the co-subsystem. A generic method to derive subsystem codes from existing subsystem codes is given that allows one to trade the dimensions of subsystem and co-subsystem while maintaining or improving the minimum distance. As a consequence, it is shown that all pure MDS subsystem codes are derived from MDS stabilizer codes. The existence of numerous families of MDS subsystem codes is established. Propagation rules are derived that allow one to obtain longer and shorter subsystem codes from given subsystem codes. Furthermore, propagation rules are derived that allow one to construct a new subsystem code by combining two given subsystem codes.
[ { "version": "v1", "created": "Fri, 28 Dec 2007 09:26:40 GMT" }, { "version": "v2", "created": "Sun, 30 Dec 2007 21:29:21 GMT" }, { "version": "v3", "created": "Wed, 9 Jan 2008 02:28:10 GMT" } ]
2008-12-05T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Klappenecker", "Andreas", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0712.4341
Yongming Li
Yongming Li
Finite Automata Based on Quantum Logic and Their Determinization
null
null
null
null
cs.LO
null
We give the quantum subset construction of orthomodular lattice-valued finite automata, then we show the equivalence between orthomodular lattice-valued finite automata, orthomodular lattice-valued deterministic finite automata and orthomodular lattice-valued finite automata with empty string-moves. Based on these equivalences, we study the algebraic operations on orthomodular lattice-valued regular languages, then we establish Kleene theorem in the frame of quantum logic.
[ { "version": "v1", "created": "Fri, 28 Dec 2007 11:48:44 GMT" } ]
2007-12-31T00:00:00
[ [ "Li", "Yongming", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0712.4402
Ruadhan O'Flanagan
Ruadhan O'Flanagan
Judgment
20 pages; minor changes; references added; submitted
null
null
null
math.PR cs.AI math.LO
null
The concept of a judgment as a logical action which introduces new information into a deductive system is examined. This leads to a way of mathematically representing implication which is distinct from the familiar material implication, according to which "If A then B" is considered to be equivalent to "B or not-A". This leads, in turn, to a resolution of the paradox of the raven.
[ { "version": "v1", "created": "Fri, 28 Dec 2007 21:00:01 GMT" }, { "version": "v2", "created": "Sat, 29 Dec 2007 03:57:26 GMT" }, { "version": "v3", "created": "Fri, 18 Jan 2008 21:30:57 GMT" } ]
2011-11-10T00:00:00
[ [ "O'Flanagan", "Ruadhan", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0801.0061
Danilo Silva
Danilo Silva, Frank R. Kschischang
Security for Wiretap Networks via Rank-Metric Codes
5 pages, to be published at the 2008 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2008.4594971
null
cs.IT cs.CR math.IT
null
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver $n$ packets from source to each receiver, and the wiretapper can eavesdrop on $\mu$ arbitrarily chosen links. A coding scheme is proposed that can achieve the maximum possible rate of $k=n-\mu$ packets that are information-theoretically secure from the adversary. A distinctive feature of our scheme is that it is universal: it can be applied on top of any communication network without requiring knowledge of or any modifications on the underlying network code. In fact, even a randomized network code can be used. Our approach is based on Rouayheb-Soljanin's formulation of a wiretap network as a generalization of the Ozarow-Wyner wiretap channel of type II. Essentially, the linear MDS code in Ozarow-Wyner's coset coding scheme is replaced by a maximum-rank-distance code over an extension of the field in which linear network coding operations are performed.
[ { "version": "v1", "created": "Sat, 29 Dec 2007 12:50:14 GMT" }, { "version": "v2", "created": "Fri, 2 May 2008 02:45:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Kschischang", "Frank R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0092
Kerry Soileau
Kerry Michael Soileau
Nash bargaining with a nondeterministic threat
Added solution algorithm
null
null
null
cs.GT
null
We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.
[ { "version": "v1", "created": "Sat, 29 Dec 2007 21:39:31 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2008 00:58:21 GMT" } ]
2008-01-04T00:00:00
[ [ "Soileau", "Kerry Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0801.0102
Michael Baer
Michael B. Baer
Reserved-Length Prefix Coding
5 pages, submitted to ISIT 2008
null
null
null
cs.IT cs.DS math.IT
null
Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).
[ { "version": "v1", "created": "Sun, 30 Dec 2007 00:14:24 GMT" } ]
2008-01-03T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0131
Alexandr Savinov
Alexandr Savinov
Two-Level Concept-Oriented Data Model
null
Institute of Mathematics and Computer Science, Academy of Sciences of Moldova, Technical Report RT0006, 2007
null
Technical Report RT0006
cs.DB
null
In this paper we describe a new approach to data modelling called the concept-oriented model (CoM). This model is based on the formalism of nested ordered sets which uses inclusion relation to produce hierarchical structure of sets and ordering relation to produce multi-dimensional structure among its elements. Nested ordered set is defined as an ordered set where an each element can be itself an ordered set. Ordering relation in CoM is used to define data semantics and operations with data such as projection and de-projection. This data model can be applied to very different problems and the paper describes some its uses such grouping with aggregation and multi-dimensional analysis.
[ { "version": "v1", "created": "Sun, 30 Dec 2007 14:29:17 GMT" } ]
2008-01-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0801.0133
Alexandr Savinov
Alexandr Savinov
An Approach to Programming Based on Concepts
49 pages. Related papers: http://conceptoriented.com
Institute of Mathematics and Computer Science, Academy of Sciences of Moldova, Technical Report RT0005, 2007
null
Technical Report RT0005
cs.PL
null
In this paper we describe a new approach to programming which generalizes object-oriented programming. It is based on using a new programming construct, called concept, which generalizes classes. Concept is defined as a pair of two classes: one reference class and one object class. Each concept has a parent concept which is specified using inclusion relation generalizing inheritance. We describe several important mechanisms such as reference resolution, context stack, dual methods and life-cycle management, inheritance and polymorphism. This approach to programming is positioned as a new programming paradigm and therefore we formulate its main principles and rules.
[ { "version": "v1", "created": "Sun, 30 Dec 2007 14:43:27 GMT" } ]
2008-01-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0801.0135
Alexandr Savinov
Alexandr Savinov
Concepts and their Use for Modelling Objects and References in Programming Languages
43 pages. Related papers: http://conceptoriented.com/
Institute of Mathematics and Computer Science, Academy of Sciences of Moldova, Technical Report RT0004, 2007
null
Technical Report RT0004
cs.PL
null
In the paper a new programming construct, called concept, is introduced. Concept is pair of two classes: a reference class and an object class. Instances of the reference classes are passed-by-value and are intended to represent objects. Instances of the object class are passed-by-reference. An approach to programming where concepts are used instead of classes is called concept-oriented programming (CoP). In CoP objects are represented and accessed indirectly by means of references. The structure of concepts describes a hierarchical space with a virtual address system. The paper describes this new approach to programming including such mechanisms as reference resolution, complex references, method interception, dual methods, life-cycle management inheritance and polymorphism.
[ { "version": "v1", "created": "Sun, 30 Dec 2007 14:50:01 GMT" } ]
2008-01-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0801.0136
Alexandr Savinov
Alexandr Savinov
Indirect Object Representation and Access by Means of Concepts
8 pages. Related papers: http://conceptoriented.com/
Institute of Mathematics and Computer Science, Academy of Sciences of Moldova, Technical Report, 2006
null
null
cs.PL
null
The paper describes a mechanism for indirect object representation and access (ORA) in programming languages. The mechanism is based on using a new programming construct which is referred to as concept. Concept consists of one object class and one reference class both having their fields and methods. The object class is the conventional class as defined in OOP with instances passed by reference. Instances of the reference class are passed by value and are intended to represent objects. The reference classes are used to describe how objects have to be represented and accessed by providing custom format for their identifiers and custom access procedures. Such an approach to programming where concepts are used instead of classes is referred to as concept-oriented programming. It generalizes OOP and its main advantage is that it allows the programmer to describe not only the functionality of target objects but also intermediate functions which are executed behind the scenes as an object is being accessed.
[ { "version": "v1", "created": "Sun, 30 Dec 2007 14:56:05 GMT" } ]
2008-01-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0801.0139
Alexandr Savinov
Alexandr Savinov
Principles of the Concept-Oriented Data Model
54 pages. Related papers: http://conceptoriented.com/
Institute of Mathematics and Computer Science, Academy of Sciences of Moldova, Technical Report, 2004
null
null
cs.DB
null
In the paper a new approach to data representation and manipulation is described, which is called the concept-oriented data model (CODM). It is supposed that items represent data units, which are stored in concepts. A concept is a combination of superconcepts, which determine the concept's dimensionality or properties. An item is a combination of superitems taken by one from all the superconcepts. An item stores a combination of references to its superitems. The references implement inclusion relation or attribute-value relation among items. A concept-oriented database is defined by its concept structure called syntax or schema and its item structure called semantics. The model defines formal transformations of syntax and semantics including the canonical semantics where all concepts are merged and the data semantics is represented by one set of items. The concept-oriented data model treats relations as subconcepts where items are instances of the relations. Multi-valued attributes are defined via subconcepts as a view on the database semantics rather than as a built-in mechanism. The model includes concept-oriented query language, which is based on collection manipulations. It also has such mechanisms as aggregation and inference based on semantics propagation through the database schema.
[ { "version": "v1", "created": "Sun, 30 Dec 2007 15:04:25 GMT" } ]
2008-01-03T00:00:00
[ [ "Savinov", "Alexandr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0801.0159
Petros Petrosyan
P.A. Petrosyan
Interval Edge Colorings of Mobius Ladders
5 pages (in Russian)
Proceedings of the CSIT Conference, Yerevan, 2005, 146-149
null
null
cs.DM
null
An interval edge t-coloring of a graph G is a proper edge coloring of G with colors 1,2...,t such that at least one edge of G is colored by color i,i=1,2...,t, and the edges incident with each vertex x are colored by d_{G}(x) consecutive colors, where d_{G}(x) is the degree of the vertex x in G. For Mobius ladders the existence of this coloring is proved and all possible numbers of colors in such colorings are found.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 09:59:07 GMT" } ]
2008-01-03T00:00:00
[ [ "Petrosyan", "P. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.0184
Ryan Hutchinson
Ryan Hutchinson
The Existence of Strongly-MDS Convolutional Codes
17 pages
null
null
null
math.OC cs.IT math.IT
null
It is known that maximum distance separable and maximum distance profile convolutional codes exist over large enough finite fields of any characteristic for all parameters $(n,k,\delta)$. It has been conjectured that the same is true for convolutional codes that are strongly maximum distance separable. Using methods from linear systems theory, we resolve this conjecture by showing that, over a large enough finite field of any characteristic, codes which are simultaneously maximum distance profile and strongly maximum distance separable exist for all parameters $(n,k,\delta)$.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 04:11:46 GMT" } ]
2008-01-03T00:00:00
[ [ "Hutchinson", "Ryan", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0209
Stefano Galatolo
Stefano Galatolo, Mathieu Hoyrup and Cristobal Rojas
Effective symbolic dynamics, random points, statistical behavior, complexity and entropy
null
null
null
null
math.DS cs.IT math.IT math.PR
null
We consider the dynamical behavior of Martin-L\"of random points in dynamical systems over metric spaces with a computable dynamics and a computable invariant measure. We use computable partitions to define a sort of effective symbolic model for the dynamics. Through this construction we prove that such points have typical statistical behavior (the behavior which is typical in the Birkhoff ergodic theorem) and are recurrent. We introduce and compare some notions of complexity for orbits in dynamical systems and prove: (i) that the complexity of the orbits of random points equals the Kolmogorov-Sina\"i entropy of the system, (ii) that the supremum of the complexity of orbits equals the topological entropy.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 14:38:57 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2008 14:56:19 GMT" } ]
2008-04-29T00:00:00
[ [ "Galatolo", "Stefano", "" ], [ "Hoyrup", "Mathieu", "" ], [ "Rojas", "Cristobal", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0801.0232
Patrizio Frosini
Patrizio Frosini
Does intelligence imply contradiction?
39 pages, 6 figures; added Remark 9 (page 19) and Remark 12 (page 25); changed some comments after Definition 13 and in Section 5; some minor changes
null
null
null
cs.AI cs.LO
null
Contradiction is often seen as a defect of intelligent systems and a dangerous limitation on efficiency. In this paper we raise the question of whether, on the contrary, it could be considered a key tool in increasing intelligence in biological structures. A possible way of answering this question in a mathematical context is shown, formulating a proposition that suggests a link between intelligence and contradiction. A concrete approach is presented in the well-defined setting of cellular automata. Here we define the models of ``observer'', ``entity'', ``environment'', ``intelligence'' and ``contradiction''. These definitions, which roughly correspond to the common meaning of these words, allow us to deduce a simple but strong result about these concepts in an unbiased, mathematical manner. Evidence for a real-world counterpart to the demonstrated formal link between intelligence and contradiction is provided by three computational experiments.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 19:07:22 GMT" }, { "version": "v2", "created": "Tue, 18 Mar 2008 11:16:24 GMT" } ]
2008-03-18T00:00:00
[ [ "Frosini", "Patrizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0249
Reinhard Laubenbacher
Reinhard Laubenbacher, Abdul S. Jarrah, Henning Mortveit, and S.S. Ravi
A mathematical formalism for agent-based modeling
Prepared for the Encyclopedia of Complexity and System Science, Springer Verlag, 2008
null
null
null
cs.MA cs.DM math.CO
null
Many complex systems can be modeled as multiagent systems in which the constituent entities (agents) interact with each other. The global dynamics of such a system is determined by the nature of the local interactions among the agents. Since it is difficult to formally analyze complex multiagent systems, they are often studied through computer simulations. While computer simulations can be very useful, results obtained through simulations do not formally validate the observed behavior. Thus, there is a need for a mathematical framework which one can use to represent multiagent systems and formally establish their properties. This work contains a brief exposition of some known mathematical frameworks that can model multiagent systems. The focus is on one such framework, namely that of finite dynamical systems. Both, deterministic and stochastic versions of this framework are discussed. The paper contains a sampling of the mathematical results from the literature to show how finite dynamical systems can be used to carry out a rigorous study of the properties of multiagent systems and it is shown how the framework can also serve as a universal model for computation.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 23:22:50 GMT" } ]
2011-11-10T00:00:00
[ [ "Laubenbacher", "Reinhard", "" ], [ "Jarrah", "Abdul S.", "" ], [ "Mortveit", "Henning", "" ], [ "Ravi", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0801.0253
William Bialek
Greg J. Stephens and William Bialek
Toward a statistical mechanics of four letter words
null
null
10.1103/PhysRevE.81.066119
null
q-bio.NC cs.CL physics.data-an physics.soc-ph
null
We consider words as a network of interacting letters, and approximate the probability distribution of states taken on by this network. Despite the intuition that the rules of English spelling are highly combinatorial (and arbitrary), we find that maximum entropy models consistent with pairwise correlations among letters provide a surprisingly good approximation to the full statistics of four letter words, capturing ~92% of the multi-information among letters and even "discovering" real words that were not represented in the data from which the pairwise correlations were estimated. The maximum entropy model defines an energy landscape on the space of possible words, and local minima in this landscape account for nearly two-thirds of words used in written English.
[ { "version": "v1", "created": "Mon, 31 Dec 2007 23:51:51 GMT" } ]
2013-05-29T00:00:00
[ [ "Stephens", "Greg J.", "" ], [ "Bialek", "William", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0801.0258
Joseph O'Rourke
Nadia Benbernou, Joseph O'Rourke
On the Maximum Span of Fixed-Angle Chains
28 pages, 21 figures. Preliminary version appeared in Proc. 18th Canad. Conf. Comput. Geom., pages 93-96, 2006. This paper has been withdrawn by the authors. Lemma 15 as stated is incorrect, and although we believe the main theorems following (Thms. 17 & 18) are true, the proofs relying on Lem.15 are not valid
null
null
Smith Computer Science 088
cs.CG
null
Soss proved that it is NP-hard to find the maximum 2D span of a fixed-angle polygonal chain: the largest distance achievable between the endpoints in a planar embedding. These fixed-angle chains can serve as models of protein backbones. The corresponding problem in 3D is open. We show that three special cases of particular relevance to the protein model are solvable in polynomial time. When all link lengths and all angles are equal, the maximum 3D span is achieved in a flat configuration and can be computed in constant time. When all angles are equal and the chain is simple (non-self-crossing), the maximum flat span can be found in linear time. In 3D, when all angles are equal to 90 deg (but the link lengths arbitrary), the maximum 3D span is in general nonplanar but can be found in quadratic time.
[ { "version": "v1", "created": "Tue, 1 Jan 2008 04:17:20 GMT" }, { "version": "v2", "created": "Wed, 2 Jun 2010 12:02:30 GMT" } ]
2010-06-03T00:00:00
[ [ "Benbernou", "Nadia", "" ], [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0801.0275
Vincent Tan
Vincent Y. F. Tan, Vivek K. Goyal
Estimating Signals with Finite Rate of Innovation from Noisy Samples: A Stochastic Algorithm
Submitted to IEEE Transactions on Signal Processing
IEEE Trans. on Signal Processing, vol. 56, no. 10, pp. 5135-5146, October 2008
10.1109/TSP.2008.928510
null
stat.AP cs.IT math.IT
null
As an example of the recently-introduced concept of rate of innovation, signals that are linear combinations of a finite number of Diracs per unit time can be acquired by linear filtering followed by uniform sampling. However, in reality, samples are rarely noiseless. In this paper, we introduce a novel stochastic algorithm to reconstruct a signal with finite rate of innovation from its noisy samples. Even though variants of this problem has been approached previously, satisfactory solutions are only available for certain classes of sampling kernels, for example kernels which satisfy the Strang-Fix condition. In this paper, we consider the infinite-support Gaussian kernel, which does not satisfy the Strang-Fix condition. Other classes of kernels can be employed. Our algorithm is based on Gibbs sampling, a Markov chain Monte Carlo (MCMC) method. Extensive numerical simulations demonstrate the accuracy and robustness of our algorithm.
[ { "version": "v1", "created": "Tue, 1 Jan 2008 05:19:35 GMT" }, { "version": "v2", "created": "Thu, 3 Jan 2008 01:09:41 GMT" } ]
2009-03-09T00:00:00
[ [ "Tan", "Vincent Y. F.", "" ], [ "Goyal", "Vivek K.", "" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0289
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Is Randomness "Native" to Computer Science?
43 pages
Current Trends in Theoretical Computer Science. Vol2, World Scientific (Ed.) (2004) 141-180
null
null
math.LO cs.CC
null
We survey the Kolmogorov's approach to the notion of randomness through the Kolmogorov complexity theory. The original motivation of Kolmogorov was to give up a quantitative definition of information. In this theory, an object is randomness in the sense that it has a large information content. Afterwards, we present parts of the work of Martin-Lof, Schnorr, Chaitin and Levin which supply a mathematical notion of randomness throughout diverse theories from the the 60' up to recently.
[ { "version": "v1", "created": "Tue, 1 Jan 2008 10:26:55 GMT" } ]
2008-01-03T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.0337
Brian Whitworth
Brian Whitworth
The Physical World as a Virtual Reality
The argument that virtual reality information simulations may be relevant to modern physics theory is a little outside the mainstream, but even people in Physics now consider this possibility, e.g. Svozil
null
null
CDMTCS0316
cs.OH
null
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the physical world. The virtual reality concept is familiar to us from online worlds, but our world as a virtual reality is usually a subject for science fiction rather than science. Yet logically the world could be an information simulation running on a multi-dimensional space-time screen. Indeed, if the essence of the universe is information, matter, charge, energy and movement could be aspects of information, and the many conservation laws could be a single law of information conservation. If the universe were a virtual reality, its creation at the big bang would no longer be paradoxical, as every virtual system must be booted up. It is suggested that whether the world is an objective reality or a virtual reality is a matter for science to resolve. Modern information science can suggest how core physical properties like space, time, light, matter and movement could derive from information processing. Such an approach could reconcile relativity and quantum theories, with the former being how information processing creates space-time, and the latter how it creates energy and matter.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 05:04:27 GMT" }, { "version": "v2", "created": "Sat, 5 Jan 2008 08:00:28 GMT" } ]
2008-01-05T00:00:00
[ [ "Whitworth", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0801.0340
Adam Tenenbaum
Adam J. Tenenbaum and Raviraj S. Adve
Sum Rate Maximization using Linear Precoding and Decoding in the Multiuser MIMO Downlink
6 pages, 4 figures, uses ieeetran.cls
null
null
null
cs.IT math.IT
null
We propose an algorithm to maximize the instantaneous sum data rate transmitted by a base station in the downlink of a multiuser multiple-input, multiple-output system. The transmitter and the receivers may each be equipped with multiple antennas and each user may receive more than one data stream. We show that maximizing the sum rate is closely linked to minimizing the product of mean squared errors (PMSE). The algorithm employs an uplink/downlink duality to iteratively design transmit-receive linear precoders, decoders, and power allocations that minimize the PMSE for all data streams under a sum power constraint. Numerical simulations illustrate the effectiveness of the algorithm and support the use of the PMSE criterion in maximizing the overall instantaneous data rate.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 05:54:33 GMT" } ]
2008-01-03T00:00:00
[ [ "Tenenbaum", "Adam J.", "" ], [ "Adve", "Raviraj S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0341
Michael Chertkov
Michael Chertkov (Los Alamos)
Exactness of Belief Propagation for Some Graphical Models with Loops
12 pages, 1 figure, submitted to JSTAT
J. Stat. Mech. (2008) P10016
10.1088/1742-5468/2008/10/P10016
LANL LA-UR-07-8441
cond-mat.stat-mech cond-mat.other cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that an arbitrary graphical model of statistical inference defined on a tree, i.e. on a graph without loops, is solved exactly and efficiently by an iterative Belief Propagation (BP) algorithm convergent to unique minimum of the so-called Bethe free energy functional. For a general graphical model on a loopy graph the functional may show multiple minima, the iterative BP algorithm may converge to one of the minima or may not converge at all, and the global minimum of the Bethe free energy functional is not guaranteed to correspond to the optimal Maximum-Likelihood (ML) solution in the zero-temperature limit. However, there are exceptions to this general rule, discussed in \cite{05KW} and \cite{08BSS} in two different contexts, where zero-temperature version of the BP algorithm finds ML solution for special models on graphs with loops. These two models share a key feature: their ML solutions can be found by an efficient Linear Programming (LP) algorithm with a Totally-Uni-Modular (TUM) matrix of constraints. Generalizing the two models we consider a class of graphical models reducible in the zero temperature limit to LP with TUM constraints. Assuming that a gedanken algorithm, g-BP, funding the global minimum of the Bethe free energy is available we show that in the limit of zero temperature g-BP outputs the ML solution. Our consideration is based on equivalence established between gapless Linear Programming (LP) relaxation of the graphical model in the $T\to 0$ limit and respective LP version of the Bethe-Free energy minimization.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 06:07:07 GMT" }, { "version": "v2", "created": "Sun, 15 Jun 2008 15:00:41 GMT" }, { "version": "v3", "created": "Thu, 24 Jul 2008 23:35:51 GMT" }, { "version": "v4", "created": "Tue, 2 Sep 2008 21:25:37 GMT" } ]
2009-11-13T00:00:00
[ [ "Chertkov", "Michael", "", "Los Alamos" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0349
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Church, Cardinal and Ordinal Representations of Integers and Kolmogorov complexity
16 pages
Dans Denis Richard's 60th Biirthday Conference - Denis Richard's 60th Biirthday Conference, France (2002)
null
null
math.LO cs.CC cs.LO
null
We consider classical representations of integers: Church's function iterators, cardinal equivalence classes of sets, ordinal equivalence classes of totally ordered sets. Since programs do not work on abstract entities and require formal representations of objects, we effectivize these abstract notions in order to allow them to be computed by programs. To any such effectivized representation is then associated a notion of Kolmogorov complexity. We prove that these Kolmogorov complexities form a strict hierarchy which coincides with that obtained by relativization to jump oracles and/or allowance of infinite computations.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:35:27 GMT" } ]
2008-01-03T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0350
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Refinment of the "up to a constant" ordering using contructive co-immunity and alike. Application to the Min/Max hierarchy of Kolmogorov complexities
41 pages
null
null
null
math.LO cs.CC
null
We introduce orderings between total functions f,g: N -> N which refine the pointwise "up to a constant" ordering <=cte and also insure that f(x) is often much less thang(x). With such orderings, we prove a strong hierarchy theorem for Kolmogorov complexities obtained with jump oracles and/or Max or Min of partial recursive functions. We introduce a notion of second order conditional Kolmogorov complexity which yields a uniform bound for the "up to a constant" comparisons involved in the hierarchy theorem.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:35:59 GMT" } ]
2008-01-07T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.0351
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Kolmogorov complexities Kmax, Kmin on computable partially ordered sets
35 pages
Theoretical Computer Science 352 (2006) 159-180
null
null
math.LO cs.LO
null
We introduce a machine free mathematical framework to get a natural formalization of some general notions of infinite computation in the context of Kolmogorov complexity. Namely, the classes Max^{X\to D}_{PR} and Max^{X\to D}_{Rec} of functions X \to D which are pointwise maximum of partial or total computable sequences of functions where D = (D,<) is some computable partially ordered set. The enumeration theorem and the invariance theorem always hold for Max^{X\to D}_{PR}, leading to a variant KD;max of Kolmogorov complexity. We characterize the orders D such that the enumeration theorem (resp. the invariance theorem) also holds for Max^{X\to D}_{Rec} . It turns out that Max^{X\to D}_{Rec} may satisfy the invariance theorem but not the enumeration theorem. Also, when Max^{X\to D}_{Rec} satisfies the invariance theorem then the Kolmogorov complexities associated to Max^{X\to D}_{Rec} and Max^{X\to D}_{PR} are equal (up to a constant). Letting K^D_{min} = K^{D^{rev}}_{max}, where D^{rev} is the reverse order, we prove that either K^D_{min} =_{ct} K^D_{max} =_{ct} K^D (=_{ct} is equality up to a constant) or K^D_{min}, K^D_{max} are <=_{ct} incomparable and <_{ct} K^D and >_{ct} K^{0',D}. We characterize the orders leading to each case. We also show that K^D_{min}, K^D_{max} cannot be both much smaller than K^D at any point. These results are proved in a more general setting with two orders on D, one extending the other.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:36:29 GMT" } ]
2008-01-07T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0352
Anant Sahai
Anant Sahai and Pulkit Grover
The price of certainty: "waterslide curves" and the gap to capacity
37 pages, 13 figures. Submitted to IEEE Transactions on Information Theory. This version corrects a subtle bug in the proofs of the original submission and improves the bounds significantly
null
null
UCB/EECS-2008-1
cs.IT math.IT
null
The classical problem of reliable point-to-point digital communication is to achieve a low probability of error while keeping the rate high and the total power consumption small. Traditional information-theoretic analysis uses `waterfall' curves to convey the revolutionary idea that unboundedly low probabilities of bit-error are attainable using only finite transmit power. However, practitioners have long observed that the decoder complexity, and hence the total power consumption, goes up when attempting to use sophisticated codes that operate close to the waterfall curve. This paper gives an explicit model for power consumption at an idealized decoder that allows for extreme parallelism in implementation. The decoder architecture is in the spirit of message passing and iterative decoding for sparse-graph codes. Generalized sphere-packing arguments are used to derive lower bounds on the decoding power needed for any possible code given only the gap from the Shannon limit and the desired probability of error. As the gap goes to zero, the energy per bit spent in decoding is shown to go to infinity. This suggests that to optimize total power, the transmitter should operate at a power that is strictly above the minimum demanded by the Shannon capacity. The lower bound is plotted to show an unavoidable tradeoff between the average bit-error probability and the total power used in transmission and decoding. In the spirit of conventional waterfall curves, we call these `waterslide' curves.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:36:34 GMT" } ]
2008-01-03T00:00:00
[ [ "Sahai", "Anant", "" ], [ "Grover", "Pulkit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0353
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Set theoretical Representations of Integers, I
56 pages
Mathematical Logic Quaterly 52, Number 4 (2006) 375-403
10.1002/malq.200510040
null
math.LO cs.CC
null
We reconsider some classical natural semantics of integers (namely iterators of functions, cardinals of sets, index of equivalence relations), in the perspective of Kolmogorov complexity. To each such semantics one can attach a simple representation of integers that we suitably effectivize in order to develop an associated Kolmogorov theory. Such effectivizations are particular instances of a general notion of "self-enumerated system" that we introduce in this paper. Our main result asserts that, with such effectivizations, Kolmogorov theory allows to quantitatively distinguish the underlying semantics. We characterize the families obtained by such effectivizations and prove that the associated Kolmogorov complexities constitute a hierarchy which coincides with that of Kolmogorov complexities defined via jump oracles and/or infinite computations. This contrasts with the well-known fact that usual Kolmogorov complexity does not depend (up to a constant) on the chosen arithmetic representation of integers, let it be in any base unary, binary et so on. Also, in a conceptual point of view, our result can be seen as a mean to measure the degree of abstraction of these diverse semantics.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:37:01 GMT" } ]
2008-01-03T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.0354
Marie Ferbus-Zanda
Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA)
Kolmogorov complexity in perspective
37 pages
null
null
null
math.LO cs.CC cs.IT math.IT
null
We survey the diverse approaches to the notion of information content: from Shannon entropy to Kolmogorov complexity. The main applications of Kolmogorov complexity are presented namely, the mathematical notion of randomness (which goes back to the 60's with the work of Martin-Lof, Schnorr, Chaitin, Levin), and classification, which is a recent idea with provocative implementation by Vitanyi and Cilibrasi.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 08:38:18 GMT" } ]
2008-01-03T00:00:00
[ [ "Ferbus-Zanda", "Marie", "", "LIAFA" ], [ "Grigorieff", "Serge", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0386
Dimitrios Katsaros
Dimitrios Katsaros, Leonidas Akritidis, Panayiotis Bozanis
Spam: It's Not Just for Inboxes and Search Engines! Making Hirsch h-index Robust to Scientospam
2 figures, 3 tables
null
null
null
cs.DL cs.IR
null
What is the 'level of excellence' of a scientist and the real impact of his/her work upon the scientific thinking and practising? How can we design a fair, an unbiased metric -- and most importantly -- a metric robust to manipulation?
[ { "version": "v1", "created": "Wed, 2 Jan 2008 13:06:37 GMT" } ]
2008-01-03T00:00:00
[ [ "Katsaros", "Dimitrios", "" ], [ "Akritidis", "Leonidas", "" ], [ "Bozanis", "Panayiotis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0801.0390
Richard Nock
Richard Nock, Nicolas Sanz, Fred Celimene, Frank Nielsen
Staring at Economic Aggregators through Information Lenses
18 pages, 2 tables, 3 figures
null
null
null
cs.IT cs.LG math.IT math.OC
null
It is hard to exaggerate the role of economic aggregators -- functions that summarize numerous and / or heterogeneous data -- in economic models since the early XX$^{th}$ century. In many cases, as witnessed by the pioneering works of Cobb and Douglas, these functions were information quantities tailored to economic theories, i.e. they were built to fit economic phenomena. In this paper, we look at these functions from the complementary side: information. We use a recent toolbox built on top of a vast class of distortions coined by Bregman, whose application field rivals metrics' in various subfields of mathematics. This toolbox makes it possible to find the quality of an aggregator (for consumptions, prices, labor, capital, wages, etc.), from the standpoint of the information it carries. We prove a rather striking result. From the informational standpoint, well-known economic aggregators do belong to the \textit{optimal} set. As common economic assumptions enter the analysis, this large set shrinks, and it essentially ends up \textit{exactly fitting} either CES, or Cobb-Douglas, or both. To summarize, in the relevant economic contexts, one could not have crafted better some aggregator from the information standpoint. We also discuss global economic behaviors of optimal information aggregators in general, and present a brief panorama of the links between economic and information aggregators. Keywords: Economic Aggregators, CES, Cobb-Douglas, Bregman divergences
[ { "version": "v1", "created": "Wed, 2 Jan 2008 13:23:04 GMT" } ]
2008-01-03T00:00:00
[ [ "Nock", "Richard", "" ], [ "Sanz", "Nicolas", "" ], [ "Celimene", "Fred", "" ], [ "Nielsen", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0801.0398
Shmuel Friedland
Shmuel Friedland
On the graph isomorphism problem
12 pages
null
null
null
cs.CC cs.DM
null
We relate the graph isomorphism problem to the solvability of certain systems of linear equations with nonnegative variables. This version replaces the two previous versions of this paper.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 14:40:02 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2008 16:36:12 GMT" }, { "version": "v3", "created": "Thu, 10 Jan 2008 09:41:35 GMT" } ]
2008-01-10T00:00:00
[ [ "Friedland", "Shmuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.0426
Daniel Lucani
Daniel E. Lucani, Milica Stojanovic, Muriel M\'edard
On the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel
6 pages, 9 Figures, Awaiting acceptance to IEEE Oceans 08 (Conference), Kobe, Japan
null
10.1109/OCEANSKOBE.2008.4531073
null
cs.IT math.IT
null
The underwater acoustic channel is characterized by a path loss that depends not only on the transmission distance, but also on the signal frequency. As a consequence, transmission bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio system. The exact relationship between power, transmission band, distance and capacity for the Gaussian noise scenario is a complicated one. This work provides a closed-form approximate model for 1) power consumption, 2) band-edge frequency and 3) bandwidth as functions of distance and capacity required for a data link. This approximate model is obtained by numerical evaluation of analytical results which takes into account physical models of acoustic propagation loss and ambient noise. The closed-form approximations may become useful tools in the design and analysis of underwater acoustic networks.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 19:52:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Lucani", "Daniel E.", "" ], [ "Stojanovic", "Milica", "" ], [ "Médard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0452
V. Sreekanth Annapureddy
V. Sreekanth Annapureddy and Venugopal V. Veeravalli
Sum Capacity of the Gaussian Interference Channel in the Low Interference Regime
6 pages, 4 figures, Proceedings of ITA Workshop, San Diego, CA, Jan-Feb, 2008
null
null
null
cs.IT math.IT
null
New upper bounds on the sum capacity of the two-user Gaussian interference channel are derived. Using these bounds, it is shown that treating interference as noise achieves the sum capacity if the interference levels are below certain thresholds.
[ { "version": "v1", "created": "Wed, 2 Jan 2008 23:11:39 GMT" } ]
2008-01-04T00:00:00
[ [ "Annapureddy", "V. Sreekanth", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0455
Jorg Liebeherr
Jorg Liebeherr, Markus Fidler, Shahrokh Valaee
A System Theoretic Approach to Bandwidth Estimation
23 pages
null
null
null
cs.NI cs.PF
null
It is shown that bandwidth estimation in packet networks can be viewed in terms of min-plus linear system theory. The available bandwidth of a link or complete path is expressed in terms of a {\em service curve}, which is a function that appears in the network calculus to express the service available to a traffic flow. The service curve is estimated based on measurements of a sequence of probing packets or passive measurements of a sample path of arrivals. It is shown that existing bandwidth estimation methods can be derived in the min-plus algebra of the network calculus, thus providing further mathematical justification for these methods. Principal difficulties of estimating available bandwidth from measurement of network probes are related to potential non-linearities of the underlying network. When networks are viewed as systems that operate either in a linear or in a non-linear regime, it is argued that probing schemes extract the most information at a point when the network crosses from a linear to a non-linear regime. Experiments on the Emulab testbed at the University of Utah evaluate the robustness of the system theoretic interpretation of networks in practice. Multi-node experiments evaluate how well the convolution operation of the min-plus algebra provides estimates for the available bandwidth of a path from estimates of individual links.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 00:11:26 GMT" } ]
2008-01-04T00:00:00
[ [ "Liebeherr", "Jorg", "" ], [ "Fidler", "Markus", "" ], [ "Valaee", "Shahrokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0801.0474
Christopher Clingerman
Christopher Clingerman, Jeremiah Hemphill, Corey Proscia
Analysis and Counterexamples Regarding Yatsenko's Polynomial-Time Algorithm for Solving the Traveling Salesman Problem
10 pages, 8 figures, references arXiv:cs/0702133
null
null
null
cs.CC
null
Yatsenko gives a polynomial-time algorithm for solving the traveling salesman problem. We examine the correctness of the algorithm and its construction. We also comment on Yatsenko's evaluation of the algorithm.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 04:46:16 GMT" } ]
2008-01-04T00:00:00
[ [ "Clingerman", "Christopher", "" ], [ "Hemphill", "Jeremiah", "" ], [ "Proscia", "Corey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.0514
Partha Mukhopadhyay
V. Arvind, Partha Mukhopadhyay, and Srikanth Srinivasan
New results on Noncommutative and Commutative Polynomial Identity Testing
23 pages, no figure
null
null
null
cs.CC
null
Using ideas from automata theory we design a new efficient (deterministic) identity test for the \emph{noncommutative} polynomial identity testing problem (first introduced and studied in \cite{RS05,BW05}). We also apply this idea to the reconstruction of black-box noncommuting algebraic branching programs. Assuming the black-box model allows us to query the ABP for the output at any given gate, we can reconstruct an (equivalent) ABP in deterministic polynomial time. Finally, we explore commutative identity testing when the coefficients of the input polynomial come from an arbitrary finite commutative ring with unity.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 12:32:41 GMT" } ]
2008-01-04T00:00:00
[ [ "Arvind", "V.", "" ], [ "Mukhopadhyay", "Partha", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.0523
Florent De Dinechin
Florent De Dinechin (LIP), Christoph Quirin Lauter (LIP), Guillaume Melquiond (LIP)
Certifying floating-point implementations using Gappa
null
null
null
null
cs.NA cs.MS
null
High confidence in floating-point programs requires proving numerical properties of final and intermediate values. One may need to guarantee that a value stays within some range, or that the error relative to some ideal value is well bounded. Such work may require several lines of proof for each line of code, and will usually be broken by the smallest change to the code (e.g. for maintenance or optimization purpose). Certifying these programs by hand is therefore very tedious and error-prone. This article discusses the use of the Gappa proof assistant in this context. Gappa has two main advantages over previous approaches: Its input format is very close to the actual C code to validate, and it automates error evaluation and propagation using interval arithmetic. Besides, it can be used to incrementally prove complex mathematical properties pertaining to the C code. Yet it does not require any specific knowledge about automatic theorem proving, and thus is accessible to a wide community. Moreover, Gappa may generate a formal proof of the results that can be checked independently by a lower-level proof assistant like Coq, hence providing an even higher confidence in the certification of the numerical code. The article demonstrates the use of this tool on a real-size example, an elementary function with correctly rounded output.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 13:34:03 GMT" } ]
2008-01-04T00:00:00
[ [ "De Dinechin", "Florent", "", "LIP" ], [ "Lauter", "Christoph Quirin", "", "LIP" ], [ "Melquiond", "Guillaume", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0801.0533
Olivier Finkel
Olivier Finkel (ELM), Pierre Simonnet (SPE)
Topology and Ambiguity in Omega Context Free Languages
null
Bulletin of the Belgian Mathematical Society 10 (5) (2003) 707-722
null
null
cs.LO math.LO
null
We study the links between the topological complexity of an omega context free language and its degree of ambiguity. In particular, using known facts from classical descriptive set theory, we prove that non Borel omega context free languages which are recognized by B\"uchi pushdown automata have a maximum degree of ambiguity. This result implies that degrees of ambiguity are really not preserved by the operation of taking the omega power of a finitary context free language. We prove also that taking the adherence or the delta-limit of a finitary language preserves neither unambiguity nor inherent ambiguity. On the other side we show that methods used in the study of omega context free languages can also be applied to study the notion of ambiguity in infinitary rational relations accepted by B\"uchi 2-tape automata and we get first results in that direction.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 14:47:36 GMT" } ]
2008-01-04T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ], [ "Simonnet", "Pierre", "", "SPE" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0801.0534
Olivier Finkel
Olivier Finkel (ELM)
On the Length of the Wadge Hierarchy of Omega Context Free Languages
null
Journal of Automata, Languages and Combinatorics 10 (4) (2005) 439-464
null
null
cs.LO cs.CC cs.GT math.LO
null
We prove in this paper that the length of the Wadge hierarchy of omega context free languages is greater than the Cantor ordinal epsilon_omega, which is the omega-th fixed point of the ordinal exponentiation of base omega. The same result holds for the conciliating Wadge hierarchy, defined by J. Duparc, of infinitary context free languages, studied by D. Beauquier. We show also that there exist some omega context free languages which are Sigma^0_omega-complete Borel sets, improving previous results on omega context free languages and the Borel hierarchy.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 14:48:48 GMT" } ]
2008-01-04T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0801.0535
Olivier Finkel
Olivier Finkel (ELM)
An omega-Power of a Finitary Language Which is a Borel Set of Infinite Rank
null
Fundamenta Informaticae 62 (3-4) (2004) 333-342
null
null
cs.LO math.LO
null
Omega-powers of finitary languages are omega languages in the form V^omega, where V is a finitary language over a finite alphabet X. Since the set of infinite words over X can be equipped with the usual Cantor topology, the question of the topological complexity of omega-powers naturally arises and has been raised by Niwinski, by Simonnet, and by Staiger. It has been recently proved that for each integer n > 0, there exist some omega-powers of context free languages which are Pi^0_n-complete Borel sets, and that there exists a context free language L such that L^omega is analytic but not Borel. But the question was still open whether there exists a finitary language V such that V^omega is a Borel set of infinite rank. We answer this question in this paper, giving an example of a finitary language whose omega-power is Borel of infinite rank.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 14:49:23 GMT" } ]
2008-01-04T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0801.0537
Olivier Finkel
Olivier Finkel (ELM), Jean-Pierre Ressayre (ELM), Pierre Simonnet (SPE)
On Infinite Real Trace Rational Languages of Maximum Topological Complexity
null
Zapiski Nauchnyh Seminarov POMI 316 (2004) 205-223
null
null
cs.LO math.LO
null
We consider the set of infinite real traces, over a dependence alphabet (Gamma, D) with no isolated letter, equipped with the topology induced by the prefix metric. We then prove that all rational languages of infinite real traces are analytic sets and that there exist some rational languages of infinite real traces which are analytic but non Borel sets, and even Sigma^1_1-complete, hence of maximum possible topological complexity.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 14:51:16 GMT" } ]
2008-01-04T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ], [ "Ressayre", "Jean-Pierre", "", "ELM" ], [ "Simonnet", "Pierre", "", "SPE" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0801.0540
L\'or\'ant Farkas
L\'or\'ant Farkas
Blind decoding of Linear Gaussian channels with ISI, capacity, error exponent, universality
7 pages, 1 figure
null
null
null
cs.IT math.IT
null
A new straightforward universal blind detection algorithm for linear Gaussian channel with ISI is given. A new error exponent is derived, which is better than Gallager's random coding error exponent.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 14:56:17 GMT" } ]
2008-01-04T00:00:00
[ [ "Farkas", "Lóránt", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0558
Fabien Durand
Fabien Durand (LAMFA), Adel Guerziz (LAMFA), Michel Koskas (LAMFA)
Words and morphisms with Sturmian erasures
null
Bulletin of the Belgian Mathematical Society 11, 4 (2004) 575-588
null
null
math.CO cs.DM
null
We say $x \in \{0,1,2 \}^{\NN}$ is a word with Sturmian erasures if for any $a\in \{0,1,2 \}$ the word obtained erasing all $a$ in $x$ is a Sturmian word. A large family of such words is given coding trajectories of balls in the game of billiards in the cube. We prove that the monoid of morphisms mapping all words with Sturmian erasures to words with Sturmian erasures is not finitely generated.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 16:16:53 GMT" } ]
2008-01-04T00:00:00
[ [ "Durand", "Fabien", "", "LAMFA" ], [ "Guerziz", "Adel", "", "LAMFA" ], [ "Koskas", "Michel", "", "LAMFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.0575
Manik Lal Das
Manik Lal Das
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards
null
Published in the Transactions on Electronics, Computer and Communication, 1(2):78-82, 2006
null
null
cs.CR
null
The paper presents an authentication scheme for remote systems using smart card. The scheme prevents the scenario of many logged in users with the same login identity, and does not require password/verifier table to validate the users' login request. The scheme provides a user-friendly password change option, and withstands the replay, impersonation, stolen-verifier, guessing, and denial-of-service attacks.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 18:21:35 GMT" } ]
2008-01-04T00:00:00
[ [ "Das", "Manik Lal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.0581
Zouheir Rezki Mr.
Z. Rezki, David Haccoun and Fran\c{c}ois Gagnon
Capacity of The Discrete-Time Non-Coherent Memoryless Rayleigh Fading Channels at Low SNR
26 pages, 5 figues, submitted to IEEE Trans. on Information Theory, Septembre 2007
null
null
null
cs.IT math.IT
null
The capacity of a discrete-time memoryless channel, in which successive symbols fade independently, and where the channel state information (CSI) is neither available at the transmitter nor at the receiver, is considered at low SNR. We derive a closed form expression of the optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) and give the exact capacity of a non-coherent channel at low SNR. The derived relations allow to better understanding the capacity of non-coherent channels at low SNR and bring an analytical answer to the peculiar behavior of the optimal input distribution observed in a previous work by Abou Faycal, Trott and Shamai. Then, we compute the non-coherence penalty and give a more precise characterization of the sub-linear term in SNR. Finally, in order to better understand how the optimal input varies with SNR, upper and lower bounds on the capacity-achieving input are given.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 19:37:47 GMT" } ]
2008-01-04T00:00:00
[ [ "Rezki", "Z.", "" ], [ "Haccoun", "David", "" ], [ "Gagnon", "François", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0586
Daniel Perrucci
Gabriela Jeronimo, Daniel Perrucci, Juan Sabia
On sign conditions over real multivariate polynomials
extended version
null
null
null
math.AG cs.CG cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new probabilistic algorithm to find a finite set of points intersecting the closure of each connected component of the realization of every sign condition over a family of real polynomials defining regular hypersurfaces that intersect transversally. This enables us to show a probabilistic procedure to list all feasible sign conditions over the polynomials. In addition, we extend these results to the case of closed sign conditions over an arbitrary family of real multivariate polynomials. The complexity bounds for these procedures improve the known ones.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 20:03:05 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2008 19:58:32 GMT" } ]
2008-12-18T00:00:00
[ [ "Jeronimo", "Gabriela", "" ], [ "Perrucci", "Daniel", "" ], [ "Sabia", "Juan", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0801.0590
Kettani Omar
Omar Kettani
An algorithm for finding the Independence Number of a graph
15 pages; a corrected proof for the second method is added
null
null
null
cs.DM cs.DS
null
In this paper, we prove that for every connected graph G, there exists a split graph H with the same independence number and the same order. Then we propose a first algorithm for finding this graph, given the degree sequence of the input graph G. Further, we propose a second algorithm for finding the independence number of G, given the adjacency matrix of G.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 20:51:38 GMT" }, { "version": "v2", "created": "Fri, 4 Jan 2008 16:00:32 GMT" }, { "version": "v3", "created": "Sun, 6 Jan 2008 20:50:20 GMT" }, { "version": "v4", "created": "Wed, 9 Jan 2008 13:51:59 GMT" } ]
2008-01-09T00:00:00
[ [ "Kettani", "Omar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0801.0597
Min Chen
Min Chen, Semih Serbetli and Aylin Yener
Distributed Power Allocation Strategies for Parallel Relay Networks
IEEE Transactions on Wireless Communications, accepted for publication. 10 pages, 7 figures
null
null
null
cs.IT math.IT
null
We consider a source-destination pair assisted by parallel regenerative decode-and-forward relays operating in orthogonal channels. We investigate distributed power allocation strategies for this system with limited channel state information at the source and the relay nodes. We first propose a distributed decision mechanism for each relay to individually make its decision on whether to forward the source data. The decision mechanism calls for each relay that is able to decode the information from the source to compare its relay-to-destination channel gain with a given threshold. We identify the optimum distributed power allocation strategy that minimizes the total transmit power while providing a target signal-to-noise ratio at the destination with a target outage probability. The strategy dictates the optimum choices for the source power as well as the threshold value at the relays. Next, we consider two simpler distributed power allocation strategies, namely the passive source model where the source power and the relay threshold are fixed, and the single relay model where only one relay is allowed to forward the source data. These models are motivated by limitations on the available channel state information as well as ease of implementation as compared to the optimum distributed strategy. Simulation results are presented to demonstrate the performance of the proposed distributed power allocation schemes. Specifically, we observe significant power savings with proposed methods as compared to random relay selection.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 21:01:48 GMT" } ]
2008-01-07T00:00:00
[ [ "Chen", "Min", "" ], [ "Serbetli", "Semih", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0609
Grenville Croll
Raymond J. Butler
Applying the CobiT Control Framework to Spreadsheet Developments
6 Pages
Proc. European Spreadsheet Risks Int. Grp. 2001 7-13 ISBN:1 86166 179 7
null
null
cs.SE cs.CY
null
One of the problems reported by researchers and auditors in the field of spreadsheet risks is that of getting and keeping managements attention to the problem. Since 1996, the Information Systems Audit & Control Foundation and the IT Governance Institute have published CobiT which brings mainstream IT control issues into the corporate governance arena. This paper illustrates how spreadsheet risk and control issues can be mapped onto the CobiT framework and thus brought to managers attention in a familiar format.
[ { "version": "v1", "created": "Thu, 3 Jan 2008 22:09:15 GMT" } ]
2008-03-10T00:00:00
[ [ "Butler", "Raymond J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.0625
Shiguo Lian
Shiguo Lian
On the Robustness of the Delay-Based Fingerprint Embedding Scheme
9 pages,6 figures
null
null
null
cs.MM cs.SD
null
The delay-based fingerprint embedding was recently proposed to support more users in secure media distribution scenario. In this embedding scheme, some users are assigned the same fingerprint code with only different embedding delay. The algorithm's robustness against collusion attacks is investigated. However, its robustness against common desynchronization attacks, e.g., cropping and time shifting, is not considered. In this paper, desynchronization attacks are used to break the delay-based fingerprint embedding algorithm. To improve the robustness, two means are proposed to keep the embedded fingerprint codes synchronized, i.e., adding a synchronization fingerprint and adopting the relative delay to detect users. Analyses and experiments are given to show the improvements.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 03:15:56 GMT" } ]
2008-01-07T00:00:00
[ [ "Lian", "Shiguo", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0801.0649
Frederic Prost
F. Prost and C. Zerrari
A logical analysis of entanglement and separability in quantum higher-order functions
19 pages
null
10.1007/978-3-642-03745-0_25
null
cs.LO
null
We present a logical separability analysis for a functional quantum computation language. This logic is inspired by previous works on logical analysis of aliasing for imperative functional programs. Both analyses share similarities notably because they are highly non-compositional. Quantum setting is harder to deal with since it introduces non determinism and thus considerably modifies semantics and validity of logical assertions. This logic is the first proposal of entanglement/separability analysis dealing with a functional quantum programming language with higher-order functions.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 10:12:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Prost", "F.", "" ], [ "Zerrari", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0665
Fabien Durand
Fabien Durand (LAMFA)
A theorem of Cobham for non-primitive substitutions
null
Acta Arithmetica 104, 3 (2002) 225-241
null
null
math.CO cs.DM
null
In this article we generalize Cobham theorem to a large class of substitutions including non primitive and non constant length substitutions.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 11:57:20 GMT" } ]
2008-01-08T00:00:00
[ [ "Durand", "Fabien", "", "LAMFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.0672
Tobias Koch
Tobias Koch and Amos Lapidoth
On Multipath Fading Channels at High SNR
To be presented at the 2008 IEEE Symposium on Information Theory (ISIT), Toronto, Canada; replaced with version that appears in the proceedings
null
null
null
cs.IT math.IT
null
This paper studies the capacity of discrete-time multipath fading channels. It is assumed that the number of paths is finite, i.e., that the channel output is influenced by the present and by the L previous channel inputs. A noncoherent channel model is considered where neither transmitter nor receiver are cognizant of the fading's realization, but both are aware of its statistic. The focus is on capacity at high signal-to-noise ratios (SNR). In particular, the capacity pre-loglog - defined as the limiting ratio of the capacity to loglog SNR as SNR tends to infinity - is studied. It is shown that, irrespective of the number paths L, the capacity pre-loglog is 1.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 12:40:05 GMT" }, { "version": "v2", "created": "Thu, 1 May 2008 14:16:17 GMT" } ]
2008-05-01T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0677
Jad Saklawi
Paul C. Attie
Finite-state concurrent programs can be expressed pairwise
14 pages
null
null
null
cs.LO
null
We present a \emph{pairwise normal form} for finite-state shared memory concurrent programs: all variables are shared between exactly two processes, and the guards on transitions are conjunctions of conditions over this pairwise shared state. This representation has been used to efficiently (in polynomial time) synthesize and model-check correctness properties of concurrent programs. Our main result is that any finite state concurrent program can be transformed into pairwise normal form. Specifically, if $Q$ is an arbitrary finite-state shared memory concurrent program, then there exists a finite-state shared memory concurrent program $P$ expressed in pairwise normal form such that $P$ is strongly bisimilar to $Q$. Our result is constructive: we give an algorithm for producing $P$, given $Q$.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 13:14:31 GMT" } ]
2008-01-07T00:00:00
[ [ "Attie", "Paul C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0678
Joel Chevrier
Sylvain Marli\`ere (ICA), Jean Loup Florens (ICA), Florence Marchi (ESRF, NEEL), Annie Luciani (ICA), Joel Chevrier (ESRF, NEEL)
Implementation of perception and action at nanoscale
Proceedings of ENACTIVE/07 4th International Conference on Enactive Interfaces Grenoble, France, November 19th-22nd, 2007
null
null
null
cs.RO cs.HC
null
Real time combination of nanosensors and nanoactuators with virtual reality environment and multisensorial interfaces enable us to efficiently act and perceive at nanoscale. Advanced manipulation of nanoobjects and new strategies for scientific education are the key motivations. We have no existing intuitive representation of the nanoworld ruled by laws foreign to our experience. A central challenge is then the construction of nanoworld simulacrum that we can start to visit and to explore. In this nanoworld simulacrum, object identifications will be based on probed entity physical and chemical intrinsic properties, on their interactions with sensors and on the final choices made in building a multisensorial interface so that these objects become coherent elements of the human sphere of action and perception. Here we describe a 1D virtual nanomanipulator, part of the Cit\'e des Sciences EXPO NANO in Paris, that is the first realization based on this program.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 13:38:39 GMT" } ]
2008-01-07T00:00:00
[ [ "Marlière", "Sylvain", "", "ICA" ], [ "Florens", "Jean Loup", "", "ICA" ], [ "Marchi", "Florence", "", "ESRF, NEEL" ], [ "Luciani", "Annie", "", "ICA" ], [ "Chevrier", "Joel", "", "ESRF, NEEL" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0801.0701
Leah Nutman
Leah Nutman and Michael Langberg
Adversarial Models and Resilient Schemes for Network Coding
Second version includes minor editing
null
null
null
cs.IT cs.DC cs.NI math.IT
null
In a recent paper, Jaggi et al. (INFOCOM 2007), presented a distributed polynomial-time rate-optimal network-coding scheme that works in the presence of Byzantine faults. We revisit their adversarial models and augment them with three, arguably realistic, models. In each of the models, we present a distributed scheme that demonstrates the usefulness of the model. In particular, all of the schemes obtain optimal rate $C-z$, where $C$ is the network capacity and $z$ is a bound on the number of links controlled by the adversary.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 16:17:49 GMT" }, { "version": "v2", "created": "Wed, 6 Feb 2008 16:49:31 GMT" } ]
2008-02-06T00:00:00
[ [ "Nutman", "Leah", "" ], [ "Langberg", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0714
James Cheney
James Cheney
Regular Expression Subtyping for XML Query and Update Languages
ESOP 2008. Companion technical report with proofs
null
null
null
cs.PL cs.DB
null
XML database query languages such as XQuery employ regular expression types with structural subtyping. Subtyping systems typically have two presentations, which should be equivalent: a declarative version in which the subsumption rule may be used anywhere, and an algorithmic version in which the use of subsumption is limited in order to make typechecking syntax-directed and decidable. However, the XQuery standard type system circumvents this issue by using imprecise typing rules for iteration constructs and defining only algorithmic typechecking, and another extant proposal provides more precise types for iteration constructs but ignores subtyping. In this paper, we consider a core XQuery-like language with a subsumption rule and prove the completeness of algorithmic typechecking; this is straightforward for XQuery proper but requires some care in the presence of more precise iteration typing disciplines. We extend this result to an XML update language we have introduced in earlier work.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 18:13:48 GMT" } ]
2008-01-07T00:00:00
[ [ "Cheney", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0801.0715
Grenville Croll
Stephen G. Powell, Barry Lawson, and Kenneth R. Baker
Impact of Errors in Operational Spreadsheets
12 pages including references
Proc. European Spreadsheet Risks Int. Grp. 2007 57-68 ISBN 978-905617-58-6
null
null
cs.CY
null
All users of spreadsheets struggle with the problem of errors. Errors are thought to be prevalent in spreadsheets, and in some instances they have cost organizations millions of dollars. In a previous study of 50 operational spreadsheets we found errors in 0.8% to 1.8% of all formula cells, depending on how errors are defined. In the current study we estimate the quantitative impacts of errors in 25 operational spreadsheets from five different organizations. We find that many errors have no quantitative impact on the spreadsheet. Those that have an impact often affect unimportant portions of the spreadsheet. The remaining errors do sometimes have substantial impacts on key aspects of the spreadsheet. This paper provides the first fully-documented evidence on the quantitative impact of errors in operational spreadsheets.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 18:26:10 GMT" } ]
2008-03-10T00:00:00
[ [ "Powell", "Stephen G.", "" ], [ "Lawson", "Barry", "" ], [ "Baker", "Kenneth R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.0756
Nan Ma
Nan Ma, Prakash Ishwar
Distributed Source Coding for Interactive Function Computation
30 pages, 6 figures. This work has been submitted to the IEEE for possible publication. Parts of this work were presented at 2008 IEEE International Symposium on Information Theory (ISIT'08)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A two-terminal interactive distributed source coding problem with alternating messages for function computation at both locations is studied. For any number of messages, a computable characterization of the rate region is provided in terms of single-letter information measures. While interaction is useless in terms of the minimum sum-rate for lossless source reproduction at one or both locations, the gains can be arbitrarily large for function computation even when the sources are independent. For a class of sources and functions, interaction is shown to be useless, even with infinite messages, when a function has to be computed at only one location, but is shown to be useful, if functions have to be computed at both locations. For computing the Boolean AND function of two independent Bernoulli sources at both locations, an achievable infinite-message sum-rate with infinitesimal-rate messages is derived in terms of a two-dimensional definite integral and a rate-allocation curve. A general framework for multiterminal interactive function computation based on an information exchange protocol which successively switches among different distributed source coding configurations is developed. For networks with a star topology, multiple rounds of interactive coding is shown to decrease the scaling law of the total network rate by an order of magnitude as the network grows.
[ { "version": "v1", "created": "Fri, 4 Jan 2008 22:37:47 GMT" }, { "version": "v2", "created": "Sun, 17 Feb 2008 22:59:24 GMT" }, { "version": "v3", "created": "Tue, 19 Feb 2008 22:31:24 GMT" }, { "version": "v4", "created": "Wed, 12 Nov 2008 22:20:42 GMT" } ]
2008-11-13T00:00:00
[ [ "Ma", "Nan", "" ], [ "Ishwar", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0813
Beno\^it Valiron
Peter Selinger (1), Beno\^it Valiron (2) ((1) Dalhousie University, (2) University of Ottawa)
A linear-non-linear model for a computational call-by-value lambda calculus (extended abstract)
15 pages. Preprint, to appear in the proceedings of FOSSACS'08
null
null
null
cs.LO
null
We give a categorical semantics for a call-by-value linear lambda calculus. Such a lambda calculus was used by Selinger and Valiron as the backbone of a functional programming language for quantum computation. One feature of this lambda calculus is its linear type system, which includes a duplicability operator "!" as in linear logic. Another main feature is its call-by-value reduction strategy, together with a side-effect to model probabilistic measurements. The "!" operator gives rise to a comonad, as in the linear logic models of Seely, Bierman, and Benton. The side-effects give rise to a monad, as in Moggi's computational lambda calculus. It is this combination of a monad and a comonad that makes the present paper interesting. We show that our categorical semantics is sound and complete.
[ { "version": "v1", "created": "Sat, 5 Jan 2008 15:21:17 GMT" } ]
2008-01-08T00:00:00
[ [ "Selinger", "Peter", "" ], [ "Valiron", "Benoît", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.0815
Yuval Kochman
Yuval Kochman and Ram Zamir
Joint Wyner-Ziv/Dirty Paper coding by modulo-lattice modulation
Submitted to IEEE Transactions on Information Theory. Presented in part in ISIT-2006, Seattle. New version after review
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The combination of source coding with decoder side-information (Wyner-Ziv problem) and channel coding with encoder side-information (Gel'fand-Pinsker problem) can be optimally solved using the separation principle. In this work we show an alternative scheme for the quadratic-Gaussian case, which merges source and channel coding. This scheme achieves the optimal performance by a applying modulo-lattice modulation to the analog source. Thus it saves the complexity of quantization and channel decoding, and remains with the task of "shaping" only. Furthermore, for high signal-to-noise ratio (SNR), the scheme approaches the optimal performance using an SNR-independent encoder, thus it is robust to unknown SNR at the encoder.
[ { "version": "v1", "created": "Sat, 5 Jan 2008 15:40:57 GMT" }, { "version": "v2", "created": "Mon, 21 Jan 2008 09:10:35 GMT" }, { "version": "v3", "created": "Wed, 17 Dec 2008 13:01:40 GMT" } ]
2008-12-17T00:00:00
[ [ "Kochman", "Yuval", "" ], [ "Zamir", "Ram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0821
Mark Wilde
Mark M. Wilde and Todd A. Brun
Unified Quantum Convolutional Coding
5 pages, 1 figure, Accepted for publication in the Proceedings of the 2008 IEEE International Symposium on Information Theory (ISIT 2008)
Proceedings of the 2008 International Symposium on Information Theory, pp. 359-363, Toronto, Ontario, Canada, July 2008.
10.1109/ISIT.2008.4595008
CSI-08-01-01
quant-ph cs.IT math.IT
null
We outline a quantum convolutional coding technique for protecting a stream of classical bits and qubits. Our goal is to provide a framework for designing codes that approach the ``grandfather'' capacity of an entanglement-assisted quantum channel for sending classical and quantum information simultaneously. Our method incorporates several resources for quantum redundancy: fresh ancilla qubits, entangled bits, and gauge qubits. The use of these diverse resources gives our technique the benefits of both active and passive quantum error correction. We can encode a classical-quantum bit stream with periodic quantum gates because our codes possess a convolutional structure. We end with an example of a ``grandfather'' quantum convolutional code that protects one qubit and one classical bit per frame by encoding them with one fresh ancilla qubit, one entangled bit, and one gauge qubit per frame. We explicitly provide the encoding and decoding circuits for this example.
[ { "version": "v1", "created": "Sun, 6 Jan 2008 16:22:33 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2008 19:50:13 GMT" } ]
2008-10-20T00:00:00
[ [ "Wilde", "Mark M.", "" ], [ "Brun", "Todd A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.0830
Atilim Gunes Baydin
Atilim Gunes Baydin
Evolution of central pattern generators for the control of a five-link bipedal walking mechanism
11 pages, 9 figures; substantial revision of content, organization, and quantitative results
Paladyn. Journal of Behavioral Robotics 3(1), 45-53 (2012)
10.2478/s13230-012-0019-y
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Central pattern generators (CPGs), with a basis is neurophysiological studies, are a type of neural network for the generation of rhythmic motion. While CPGs are being increasingly used in robot control, most applications are hand-tuned for a specific task and it is acknowledged in the field that generic methods and design principles for creating individual networks for a given task are lacking. This study presents an approach where the connectivity and oscillatory parameters of a CPG network are determined by an evolutionary algorithm with fitness evaluations in a realistic simulation with accurate physics. We apply this technique to a five-link planar walking mechanism to demonstrate its feasibility and performance. In addition, to see whether results from simulation can be acceptably transferred to real robot hardware, the best evolved CPG network is also tested on a real mechanism. Our results also confirm that the biologically inspired CPG model is well suited for legged locomotion, since a diverse manifestation of networks have been observed to succeed in fitness simulations during evolution.
[ { "version": "v1", "created": "Sun, 6 Jan 2008 00:20:25 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2008 19:28:42 GMT" }, { "version": "v3", "created": "Thu, 6 Mar 2008 17:37:29 GMT" }, { "version": "v4", "created": "Sat, 21 Nov 2009 00:04:19 GMT" }, { "version": "v5", "created": "Sat, 30 Jul 2011 02:01:05 GMT" }, { "version": "v6", "created": "Mon, 10 Oct 2011 17:37:47 GMT" }, { "version": "v7", "created": "Tue, 11 Oct 2011 02:42:44 GMT" }, { "version": "v8", "created": "Wed, 12 Oct 2011 00:42:10 GMT" }, { "version": "v9", "created": "Thu, 29 Mar 2012 02:02:45 GMT" } ]
2015-03-13T00:00:00
[ [ "Baydin", "Atilim Gunes", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0801.0841
Saikat Guha
Saikat Guha, Jeffrey H. Shapiro, Baris I. Erkmen
Capacity of the Bosonic Wiretap Channel and the Entropy Photon-Number Inequality
5 pages, 1 figure, submitted to ISIT 2008
null
null
null
quant-ph cs.IT math.IT
null
Determining the ultimate classical information carrying capacity of electromagnetic waves requires quantum-mechanical analysis to properly account for the bosonic nature of these waves. Recent work has established capacity theorems for bosonic single-user and broadcast channels, under the presumption of two minimum output entropy conjectures. Despite considerable accumulated evidence that supports the validity of these conjectures, they have yet to be proven. In this paper, it is shown that the second conjecture suffices to prove the classical capacity of the bosonic wiretap channel, which in turn would also prove the quantum capacity of the lossy bosonic channel. The preceding minimum output entropy conjectures are then shown to be simple consequences of an Entropy Photon-Number Inequality (EPnI), which is a conjectured quantum-mechanical analog of the Entropy Power Inequality (EPI) form classical information theory.
[ { "version": "v1", "created": "Sun, 6 Jan 2008 06:49:55 GMT" } ]
2008-02-10T00:00:00
[ [ "Guha", "Saikat", "" ], [ "Shapiro", "Jeffrey H.", "" ], [ "Erkmen", "Baris I.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]