id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0712.4027 | Olga Holtz | James Demmel, Ioana Dumitriu, Olga Holtz, Plamen Koev | Accurate and Efficient Expression Evaluation and Linear Algebra | 49 pages, 6 figures, 1 table | Acta Numerica, Volume 17, May 2008, pp 87-145 | 10.1017/S0962492906350015 | null | math.NA cs.CC cs.DS math.RA | null | We survey and unify recent results on the existence of accurate algorithms
for evaluating multivariate polynomials, and more generally for accurate
numerical linear algebra with structured matrices. By "accurate" we mean that
the computed answer has relative error less than 1, i.e., has some correct
leading digits. We also address efficiency, by which we mean algorithms that
run in polynomial time in the size of the input. Our results will depend
strongly on the model of arithmetic: Most of our results will use the so-called
Traditional Model (TM). We give a set of necessary and sufficient conditions to
decide whether a high accuracy algorithm exists in the TM, and describe
progress toward a decision procedure that will take any problem and provide
either a high accuracy algorithm or a proof that none exists. When no accurate
algorithm exists in the TM, it is natural to extend the set of available
accurate operations by a library of additional operations, such as $x+y+z$, dot
products, or indeed any enumerable set which could then be used to build
further accurate algorithms. We show how our accurate algorithms and decision
procedure for finding them extend to this case. Finally, we address other
models of arithmetic, and the relationship between (im)possibility in the TM
and (in)efficient algorithms operating on numbers represented as bit strings.
| [
{
"version": "v1",
"created": "Mon, 24 Dec 2007 20:14:50 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Demmel",
"James",
""
],
[
"Dumitriu",
"Ioana",
""
],
[
"Holtz",
"Olga",
""
],
[
"Koev",
"Plamen",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0712.4046 | David Harvey | David Harvey | Faster polynomial multiplication via multipoint Kronecker substitution | 14 pages, 4 figures | null | null | null | cs.SC cs.DS | null | We give several new algorithms for dense polynomial multiplication based on
the Kronecker substitution method. For moderately sized input polynomials, the
new algorithms improve on the performance of the standard Kronecker
substitution by a sizeable constant, both in theory and in empirical tests.
| [
{
"version": "v1",
"created": "Tue, 25 Dec 2007 04:57:04 GMT"
}
] | 2007-12-27T00:00:00 | [
[
"Harvey",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0712.4057 | Aldar C.-F. Chan | Aldar C-F. Chan | On Compression of Cryptographic Keys | null | Theoretical Computer Science, 2013 | 10.1016/j.tcs.2013.04.010 | null | cs.CR cs.NI | null | Any secured system can be modeled as a capability-based access control system
in which each user is given a set of secret keys of the resources he is granted
access to. In some large systems with resource-constrained devices, such as
sensor networks and RFID systems, the design is sensitive to memory or key
storage cost. With a goal to minimize the maximum users' key storage, key
compression based on key linking, that is, deriving one key from another
without compromising security, is studied. A lower bound on key storage needed
for a general access structure with key derivation is derived. This bound
demonstrates the theoretic limit of any systems which do not trade off security
and can be treated as a negative result to provide ground for designs with
security tradeoff. A concrete, provably secure key linking scheme based on
pseudorandom functions is given. Using the key linking framework, a number of
key pre-distribution schemes in the literature are analyzed.
| [
{
"version": "v1",
"created": "Tue, 25 Dec 2007 09:10:59 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2008 04:26:44 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Feb 2008 05:00:10 GMT"
}
] | 2021-09-21T00:00:00 | [
[
"Chan",
"Aldar C-F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4059 | Yashodhan Kanoria | Y. Kanoria, D. Manjunath | On Distributed Computation in Noisy Random Planar Networks | 5 pages, 2 figures | Proceedings of IEEE International Symposium on Information Theory,
2007 | 10.1109/ISIT.2007.4557101 | null | cs.IT math.IT | null | We consider distributed computation of functions of distributed data in
random planar networks with noisy wireless links. We present a new algorithm
for computation of the maximum value which is order optimal in the number of
transmissions and computation time.We also adapt the histogram computation
algorithm of Ying et al to make the histogram computation time optimal.
| [
{
"version": "v1",
"created": "Tue, 25 Dec 2007 10:20:56 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Kanoria",
"Y.",
""
],
[
"Manjunath",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4075 | Vitaly Skachek | Vitaly Skachek, Mark F. Flanagan, Eimear Byrne, Marcus Greferath | Polytope Representations for Linear-Programming Decoding of Non-Binary
Linear Codes | 5 pages, to appear in 2008 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2008.4595239 | null | cs.IT math.IT | null | In previous work, we demonstrated how decoding of a non-binary linear code
could be formulated as a linear-programming problem. In this paper, we study
different polytopes for use with linear-programming decoding, and show that for
many classes of codes these polytopes yield a complexity advantage for
decoding. These representations lead to polynomial-time decoders for a wide
variety of classical non-binary linear codes.
| [
{
"version": "v1",
"created": "Tue, 25 Dec 2007 15:44:01 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2008 17:35:15 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Skachek",
"Vitaly",
""
],
[
"Flanagan",
"Mark F.",
""
],
[
"Byrne",
"Eimear",
""
],
[
"Greferath",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4096 | Eitan Yaakobi | Tuvi Etzion, and Eitan Yaakobi | Error-Correction of Multidimensional Bursts | 15 pages | null | null | null | cs.IT math.IT | null | In this paper we present several constructions to generate codes for
correcting a multidimensional cluster-error. The goal is to correct a
cluster-error whose shape can be a box-error, a Lee sphere error, or an error
with an arbitrary shape. Our codes have very low redundancy, close to optimal,
and large range of parameters of arrays and clusters. Our main results are
summarized as follows: 1) A construction of two-dimensional codes capable to
correct a rectangular-error with considerably more flexible parameters from
previously known constructions. Another advantage of this construction is that
it is easily generalized for D dimensions. 2) A novel method based on D
colorings of the D-dimensional space for constructing D-dimensional codes
correcting D-dimensional cluster-error of various shapes. This method is
applied efficiently to correct a D-dimensional cluster error of parameters not
covered efficiently by previous onstructions. 3) A transformation of the
D-dimensional space into another D-dimensional space such that a D-dimensional
Lee sphere is transformed into a shape located in a D-dimensional box of a
relatively small size. We use the previous constructions to correct a
D-dimensional error whose shape is a D-dimensional Lee sphere. 4) Applying the
coloring method to correct more efficiently a two-dimensional error whose shape
is a Lee sphere. The D-dimensional case is also discussed. 5) A construction of
one-dimensional codes capable to correct a burst-error of length b in which the
number of erroneous positions is relatively small compared to b. This
construction is generalized for D-dimensional codes. 6) Applying the
constructions correcting a Lee sphere error and a cluster-error with small
number of erroneous positions, to correct an arbitrary cluster-error.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 15:01:37 GMT"
}
] | 2007-12-27T00:00:00 | [
[
"Etzion",
"Tuvi",
""
],
[
"Yaakobi",
"Eitan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4099 | Gerard Briscoe Mr | G. Briscoe, P. De Wilde | Digital Ecosystems: Optimisation by a Distributed Intelligence | 12 pages, 14 figures, conference | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Can intelligence optimise Digital Ecosystems? How could a distributed
intelligence interact with the ecosystem dynamics? Can the software components
that are part of genetic selection be intelligent in themselves, as in an
adaptive technology? We consider the effect of a distributed intelligence
mechanism on the evolutionary and ecological dynamics of our Digital Ecosystem,
which is the digital counterpart of a biological ecosystem for evolving
software services in a distributed network. We investigate Neural Networks and
Support Vector Machine for the learning based pattern recognition functionality
of our distributed intelligence. Simulation results imply that the Digital
Ecosystem performs better with the application of a distributed intelligence,
marginally more effectively when powered by Support Vector Machine than Neural
Networks, and suggest that it can contribute to optimising the operation of our
Digital Ecosystem.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 04:13:20 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Feb 2009 13:38:04 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Sep 2009 00:39:27 GMT"
}
] | 2009-09-21T00:00:00 | [
[
"Briscoe",
"G.",
""
],
[
"De Wilde",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0712.4101 | Gerard Briscoe Mr | P. De Wilde, G. Briscoe | Digital Ecosystems: Stability of Evolving Agent Populations | 8 pages, 6 figures, ACM Management of Emergent Digital EcoSystems
(MEDES) 2009 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stability is perhaps one of the most desirable features of any engineered
system, given the importance of being able to predict its response to various
environmental conditions prior to actual deployment. Engineered systems are
becoming ever more complex, approaching the same levels of biological
ecosystems, and so their stability becomes ever more important, but taking on
more and more differential dynamics can make stability an ever more elusive
property. The Chli-DeWilde definition of stability views a Multi-Agent System
as a discrete time Markov chain with potentially unknown transition
probabilities. With a Multi-Agent System being considered stable when its
state, a stochastic process, has converged to an equilibrium distribution,
because stability of a system can be understood intuitively as exhibiting
bounded behaviour. We investigate an extension to include Multi-Agent Systems
with evolutionary dynamics, focusing on the evolving agent populations of our
Digital Ecosystem. We then built upon this to construct an entropy-based
definition for the degree of instability (entropy of the limit probabilities),
which was later used to perform a stability analysis. The Digital Ecosystem is
considered to investigate the stability of an evolving agent population through
simulations, for which the results were consistent with the original
Chli-DeWilde definition.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 04:40:16 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 10:38:12 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Feb 2009 18:33:26 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Feb 2009 02:43:08 GMT"
},
{
"version": "v5",
"created": "Mon, 5 Oct 2009 00:31:13 GMT"
}
] | 2009-10-05T00:00:00 | [
[
"De Wilde",
"P.",
""
],
[
"Briscoe",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0712.4102 | Gerard Briscoe Mr | G. Briscoe, P. De Wilde | Digital Ecosystems: Evolving Service-Oriented Architectures | 7 pages, 4 figures, conference | In IEEE First International Conference on Bio Inspired mOdels of
NETwork, Information and Computing Systems (BIONETICS) (2006) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We view Digital Ecosystems to be the digital counterparts of biological
ecosystems, exploiting the self-organising properties of biological ecosystems,
which are considered to be robust, self-organising and scalable architectures
that can automatically solve complex, dynamic problems. Digital Ecosystems are
a novel optimisation technique where the optimisation works at two levels: a
first optimisation, migration of agents (representing services) which are
distributed in a decentralised peer-to-peer network, operating continuously in
time; this process feeds a second optimisation based on evolutionary computing
that operates locally on single peers and is aimed at finding solutions to
satisfy locally relevant constraints. We created an Ecosystem-Oriented
Architecture of Digital Ecosystems by extending Service-Oriented Architectures
with distributed evolutionary computing, allowing services to recombine and
evolve over time, constantly seeking to improve their effectiveness for the
user base. Individuals within our Digital Ecosystem will be applications
(groups of services), created in response to user requests by using
evolutionary optimisation to aggregate the services. These individuals will
migrate through the Digital Ecosystem and adapt to find niches where they are
useful in fulfilling other user requests for applications. Simulation results
imply that the Digital Ecosystem performs better at large scales than a
comparable Service-Oriented Architecture, suggesting that incorporating ideas
from theoretical ecology can contribute to useful self-organising properties in
digital ecosystems.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 05:44:31 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 08:39:15 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Dec 2008 08:59:13 GMT"
},
{
"version": "v4",
"created": "Fri, 13 Mar 2009 02:21:31 GMT"
},
{
"version": "v5",
"created": "Thu, 26 Mar 2009 08:32:17 GMT"
},
{
"version": "v6",
"created": "Mon, 5 Oct 2009 01:55:06 GMT"
}
] | 2009-10-05T00:00:00 | [
[
"Briscoe",
"G.",
""
],
[
"De Wilde",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0712.4103 | Vasilios Kapinas | Vasilios M. Kapinas, Sotirios K. Mihos and George K. Karagiannidis | On the Monotonicity of the Generalized Marcum and Nuttall Q-Functions | Published in IEEE Transactions on Information Theory, August 2009.
Only slight formatting modifications | IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3701-3710, Aug. 2009 | 10.1109/TIT.2009.2023710 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Monotonicity criteria are established for the generalized Marcum Q-function,
$\emph{Q}_{M}$, the standard Nuttall Q-function, $\emph{Q}_{M,N}$, and the
normalized Nuttall Q-function, $\mathcal{Q}_{M,N}$, with respect to their real
order indices M,N. Besides, closed-form expressions are derived for the
computation of the standard and normalized Nuttall Q-functions for the case
when M,N are odd multiples of 0.5 and $M\geq N$. By exploiting these results,
novel upper and lower bounds for $\emph{Q}_{M,N}$ and $\mathcal{Q}_{M,N}$ are
proposed. Furthermore, specific tight upper and lower bounds for
$\emph{Q}_{M}$, previously reported in the literature, are extended for real
values of M. The offered theoretical results can be efficiently applied in the
study of digital communications over fading channels, in the
information-theoretic analysis of multiple-input multiple-output systems and in
the description of stochastic processes in probability theory, among others.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 05:54:15 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 22:20:16 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Apr 2009 15:39:00 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Jul 2009 23:59:05 GMT"
},
{
"version": "v5",
"created": "Sun, 24 Jan 2010 00:16:20 GMT"
}
] | 2010-01-24T00:00:00 | [
[
"Kapinas",
"Vasilios M.",
""
],
[
"Mihos",
"Sotirios K.",
""
],
[
"Karagiannidis",
"George K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4115 | Salah Aly A | Salah A. Aly | A Class of Quantum LDPC Codes Constructed From Finite Geometries | 5pages, 2 figures | Proc. of IEEE Globecom 08, New Orleans, LA 2008 | 10.1109/GLOCOM.2008.ECP.217 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-density parity check (LDPC) codes are a significant class of classical
codes with many applications. Several good LDPC codes have been constructed
using random, algebraic, and finite geometries approaches, with containing
cycles of length at least six in their Tanner graphs. However, it is impossible
to design a self-orthogonal parity check matrix of an LDPC code without
introducing cycles of length four.
In this paper, a new class of quantum LDPC codes based on lines and points of
finite geometries is constructed. The parity check matrices of these codes are
adapted to be self-orthogonal with containing only one cycle of length four.
Also, the column and row weights, and bounds on the minimum distance of these
codes are given. As a consequence, the encoding and decoding algorithms of
these codes as well as their performance over various quantum depolarizing
channels will be investigated.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 19:35:31 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Dec 2007 23:25:12 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Nov 2009 20:58:41 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4124 | Michael Singer | Michael F. Singer | Introduction to the Galois Theory of Linear Differential Equations | 82 pages; some typos corrected | null | null | null | math.CA cs.SC | null | This is an expanded version of the 10 lectures given as the 2006 London
Mathematical Society Invited Lecture Series at the Heriot-Watt University 31
July - 4 August 2006.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 02:40:19 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jan 2008 00:18:53 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Singer",
"Michael F.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0712.4126 | Chandan Reddy | Chandan K. Reddy | TRUST-TECH based Methods for Optimization and Learning | PHD Thesis | Chandan K. Reddy, TRUST-TECH based Methods for Optimization and
Learning, PHD Thesis, Cornell University, February 2007 | null | null | cs.AI cs.CE cs.MS cs.NA cs.NE | null | Many problems that arise in machine learning domain deal with nonlinearity
and quite often demand users to obtain global optimal solutions rather than
local optimal ones. Optimization problems are inherent in machine learning
algorithms and hence many methods in machine learning were inherited from the
optimization literature. Popularly known as the initialization problem, the
ideal set of parameters required will significantly depend on the given
initialization values. The recently developed TRUST-TECH (TRansformation Under
STability-reTaining Equilibria CHaracterization) methodology systematically
explores the subspace of the parameters to obtain a complete set of local
optimal solutions. In this thesis work, we propose TRUST-TECH based methods for
solving several optimization and machine learning problems. Two stages namely,
the local stage and the neighborhood-search stage, are repeated alternatively
in the solution space to achieve improvements in the quality of the solutions.
Our methods were tested on both synthetic and real datasets and the advantages
of using this novel framework are clearly manifested. This framework not only
reduces the sensitivity to initialization, but also allows the flexibility for
the practitioners to use various global and local methods that work well for a
particular problem of interest. Other hierarchical stochastic algorithms like
evolutionary algorithms and smoothing algorithms are also studied and
frameworks for combining these methods with TRUST-TECH have been proposed and
evaluated on several test systems.
| [
{
"version": "v1",
"created": "Tue, 25 Dec 2007 03:14:32 GMT"
}
] | 2007-12-27T00:00:00 | [
[
"Reddy",
"Chandan K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0712.4135 | Xiaojun Tang | Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor | On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian
Block-Fading Channels | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2013043 | null | cs.IT math.IT | null | The focus of this paper is an information-theoretic study of retransmission
protocols for reliable packet communication under a secrecy constraint. The
hybrid automatic retransmission request (HARQ) protocol is revisited for a
block-fading wire-tap channel, in which two legitimate users communicate over a
block-fading channel in the presence of a passive eavesdropper who intercepts
the transmissions through an independent block-fading channel. In this model,
the transmitter obtains a 1-bit ACK/NACK feedback from the legitimate receiver
via an error-free public channel. Both reliability and confidentiality of
secure HARQ protocols are studied by the joint consideration of channel coding,
secrecy coding, and retransmission protocols. In particular, the error and
secrecy performance of repetition time diversity (RTD) and incremental
redundancy (INR) protocols are investigated based on good Wyner code sequences,
which ensure that the confidential message is decoded successfully by the
legitimate receiver and is kept in total ignorance by the eavesdropper for a
given set of channel realizations. This paper first illustrates that there
exists a good rate-compatible Wyner code family which ensures a secure INR
protocol. Next, two types of outage probabilities, connection outage and
secrecy outage probabilities are defined in order to characterize the tradeoff
between the reliability of the legitimate communication link and the
confidentiality with respect to the eavesdropper's link. For a given
connection/secrecy outage probability pair, an achievable throughput of secure
HARQ protocols is derived for block-fading channels. Finally, both asymptotic
analysis and numerical computations demonstrate the benefits of HARQ protocols
to throughput and secrecy.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 17:50:31 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Tang",
"Xiaojun",
""
],
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4148 | Petros Petrosyan | Petros A. Petrosyan and Gagik H. Karapetyan | Lower bounds for the greatest possible number of colors in interval edge
colorings of bipartite cylinders and bipartite tori | 3 pages | Proceedings of the CSIT Conference, Yerevan, 2007, 86-88 | null | null | cs.DM | null | An interval edge t-coloring of a graph G is a proper edge coloring of G with
colors 1,2...,t such that at least one edge of G is colored by color
i,i=1,2...,t, and the edges incident with each vertex v are colored by d_{G}(v)
consecutive colors, where d_{G}(v) is the degree of the vertex v in G. In this
paper interval edge colorings of bipartite cylinders and bipartite tori are
investigated.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 21:03:54 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Dec 2007 20:27:14 GMT"
}
] | 2007-12-30T00:00:00 | [
[
"Petrosyan",
"Petros A.",
""
],
[
"Karapetyan",
"Gagik H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0712.4153 | Gerard Briscoe Mr | G. Briscoe, S. Sadedin, G. Paperin | Biology of Applied Digital Ecosystems | 9 pages, 4 figure, conference | In IEEE First International Conference on Digital Ecosystems and
Technologies, 2007 | 10.1109/DEST.2007.372015 | null | cs.NE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A primary motivation for our research in Digital Ecosystems is the desire to
exploit the self-organising properties of biological ecosystems. Ecosystems are
thought to be robust, scalable architectures that can automatically solve
complex, dynamic problems. However, the biological processes that contribute to
these properties have not been made explicit in Digital Ecosystems research.
Here, we discuss how biological properties contribute to the self-organising
features of biological ecosystems, including population dynamics, evolution, a
complex dynamic environment, and spatial distributions for generating local
interactions. The potential for exploiting these properties in artificial
systems is then considered. We suggest that several key features of biological
ecosystems have not been fully explored in existing digital ecosystems, and
discuss how mimicking these features may assist in developing robust, scalable
self-organising architectures. An example architecture, the Digital Ecosystem,
is considered in detail. The Digital Ecosystem is then measured experimentally
through simulations, with measures originating from theoretical ecology, to
confirm its likeness to a biological ecosystem. Including the responsiveness to
requests for applications from the user base, as a measure of the 'ecological
succession' (development).
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 21:56:52 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 09:19:00 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Briscoe",
"G.",
""
],
[
"Sadedin",
"S.",
""
],
[
"Paperin",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0712.4159 | Gerard Briscoe Dr | G Briscoe | Creating a Digital Ecosystem: Service-Oriented Architectures with
Distributed Evolutionary Computing | This has been withdrawn by the author due to an error in using
presentation notes in submission | In JavaOne Conference, 2006, BOF-0759 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We start with a discussion of the relevant literature, including Nature
Inspired Computing as a framework in which to understand this work, and the
process of biomimicry to be used in mimicking the necessary biological
processes to create Digital Ecosystems. We then consider the relevant
theoretical ecology in creating the digital counterpart of a biological
ecosystem, including the topological structure of ecosystems, and evolutionary
processes within distributed environments. This leads to a discussion of the
relevant fields from computer science for the creation of Digital Ecosystems,
including evolutionary computing, Multi-Agent Systems, and Service-Oriented
Architectures. We then define Ecosystem-Oriented Architectures for the creation
of Digital Ecosystems, imbibed with the properties of self-organisation and
scalability from biological ecosystems, including a novel form of distributed
evolutionary computing.
| [
{
"version": "v1",
"created": "Wed, 26 Dec 2007 23:32:10 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 08:56:59 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Oct 2009 00:41:53 GMT"
},
{
"version": "v4",
"created": "Sat, 24 Nov 2012 01:18:27 GMT"
},
{
"version": "v5",
"created": "Tue, 27 Nov 2012 15:39:35 GMT"
}
] | 2012-11-28T00:00:00 | [
[
"Briscoe",
"G",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0712.4168 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk
Ahmed, Choong Seon Hong | A Framework for Providing E-Services to the Rural Areas using Wireless
Ad Hoc and Sensor Networks | 5 pages | Proceedings of IEEE ICNEWS 2006, January 2-4, Dhaka, Bangladesh,
2006, pp. 282-286 | null | null | cs.OH cs.NI | null | In recent years, the proliferation of mobile computing devices has driven a
revolutionary change in the computing world. The nature of ubiquitous devices
makes wireless networks the easiest solution for their interconnection. This
has led to the rapid growth of several wireless systems like wireless ad hoc
networks, wireless sensor networks etc. In this paper we have proposed a
framework for rural development by providing various e-services to the rural
areas with the help of wireless ad hoc and sensor networks. We have discussed
how timely and accurate information could be collected from the rural areas
using wireless technologies. In addition to this, we have also mentioned the
technical and operational challenges that could hinder the implementation of
such a framework in the rural areas in the developing countries.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:15:59 GMT"
}
] | 2007-12-28T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Islam",
"Humayun Kadir",
""
],
[
"Sayeed",
"Sabit Anjum",
""
],
[
"Ahmed",
"Farruk",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4169 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong | Security in Wireless Sensor Networks: Issues and Challenges | 6 pages | Proceedings of 8th IEEE ICACT 2006, Volume II, February 20-22,
Phoenix Park, Korea, 2006, pp. 1043-1048 | 10.1109/ICACT.2006.206151 | null | cs.NI | null | Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:22:39 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Lee",
"Hyung-Woo",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4170 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo Lee | Smartening the Environment using Wireless Sensor Networks in a
Developing Country | 5 pages | Proceedings of 8th IEEE ICACT 2006, Volume I, February 20-22,
Phoenix Park, Korea, 2006, pp. 705-709 | 10.1109/ICACT.2006.206063 | null | cs.NI | null | The miniaturization process of various sensing devices has become a reality
by enormous research and advancements accomplished in Micro Electro-Mechanical
Systems (MEMS) and Very Large Scale Integration (VLSI) lithography. Regardless
of such extensive efforts in optimizing the hardware, algorithm, and protocols
for networking, there still remains a lot of scope to explore how these
innovations can all be tied together to design Wireless Sensor Networks (WSN)
for smartening the surrounding environment for some practical purposes. In this
paper we explore the prospects of wireless sensor networks and propose a design
level framework for developing a smart environment using WSNs, which could be
beneficial for a developing country like Bangladesh. In connection to this, we
also discuss the major aspects of wireless sensor networks.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:24:42 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
],
[
"Lee",
"Hyung-Woo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4172 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Choong Seon Hong | Developing an Efficient DMCIS with Next-Generation Wireless Networks | 6 pages | IEEE Military Communications Conference (IEEE MILCOM 2006),
October 23-25, Washington, DC, USA | 10.1109/MILCOM.2006.302515 | null | cs.NI | null | The impact of extreme events across the globe is extraordinary which
continues to handicap the advancement of the struggling developing societies
and threatens most of the industrialized countries in the globe. Various fields
of Information and Communication Technology have widely been used for efficient
disaster management; but only to a limited extent though, there is a tremendous
potential for increasing efficiency and effectiveness in coping with disasters
with the utilization of emerging wireless network technologies. Early warning,
response to the particular situation and proper recovery are among the main
focuses of an efficient disaster management system today. Considering these
aspects, in this paper we propose a framework for developing an efficient
Disaster Management Communications and Information System (DMCIS) which is
basically benefited by the exploitation of the emerging wireless network
technologies combined with other networking and data processing technologies.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:28:45 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4173 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Choong Seon Hong | Secure Clustering in DSN with Key Predistribution and WCDS | 6 pages | IEEE Military Communications Conference (IEEE MILCOM 2006),
October 23-25, Washington, DC, USA | 10.1109/MILCOM.2006.302183 | null | cs.NI | null | This paper proposes an efficient approach of secure clustering in distributed
sensor networks. The clusters or groups in the network are formed based on
offline rank assignment and predistribution of secret keys. Our approach uses
the concept of weakly connected dominating set (WCDS) to reduce the number of
cluster-heads in the network. The formation of clusters in the network is
secured as the secret keys are distributed and used in an efficient way to
resist the inclusion of any hostile entity in the clusters. Along with the
description of our approach, we present an analysis and comparison of our
approach with other schemes. We also mention the limitations of our approach
considering the practical implementation of the sensor networks.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:30:56 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4174 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Choong Seon Hong, Tatsuya Suda | A Novel and Efficient Bilateral Remote User Authentication Scheme Using
Smart Cards | 2 pages | Proceedings of the 2007 IEEE International Conference on Consumer
Electronics (IEEE ICCE 2007), January 10-14, Las Vegas, USA, pp. 1-2 | 10.1109/ICCE.2007.341503 | null | cs.CR cs.NI | null | This paper proposes a novel remote user authentication scheme using smart
cards which allows both the authentication server (AS) and the user to verify
authenticity of each other. Our scheme is efficient enough to resist the known
attacks that could be launched against remote user authentication process.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:35:02 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
],
[
"Suda",
"Tatsuya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4176 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Choong Seon Hong | An Improved Timestamp-Based Password Authentication Scheme Using Smart
Cards | 6 pages | Proceedings of the 9th IEEE ICACT 2007, Volume I, February 12-14,
2007, Phoenix Park, Korea, pp. 804-809 | 10.1093/ietisy/e90-d.11.1885 | null | cs.CR cs.NI | null | With the recent proliferation of distributed systems and networking, remote
authentication has become a crucial task in many networking applications.
Various schemes have been proposed so far for the two-party remote
authentication; however, some of them have been proved to be insecure. In this
paper, we propose an efficient timestamp-based password authentication scheme
using smart cards. We show various types of forgery attacks against a
previously proposed timestamp-based password authentication scheme and improve
that scheme to ensure robust security for the remote authentication process,
keeping all the advantages that were present in that scheme. Our scheme
successfully defends the attacks that could be launched against other related
previous schemes. We present a detailed cryptanalysis of previously proposed
Shen et. al scheme and an analysis of the improved scheme to show its
improvements and efficiency.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:37:45 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4177 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan, Gihyuk Heo, Choong Seon Hong | A Secure Lightweight Approach of Node Membership Verification in Dense
HDSN | 6 pages | IEEE Military Communications Conference (IEEE MILCOM 2007),
October 29-31, Orlando, Florida, USA | 10.1109/MILCOM.2007.4455133 | null | cs.NI cs.CR | null | In this paper, we consider a particular type of deployment scenario of a
distributed sensor network (DSN), where sensors of different types and
categories are densely deployed in the same target area. In this network, the
sensors are associated with different groups, based on their functional types
and after deployment they collaborate with one another in the same group for
doing any assigned task for that particular group. We term this sort of DSN as
a heterogeneous distributed sensor network (HDSN). Considering this scenario,
we propose a secure membership verification mechanism using one-way accumulator
(OWA) which ensures that, before collaborating for a particular task, any pair
of nodes in the same deployment group can verify each other-s legitimacy of
membership. Our scheme also supports addition and deletion of members (nodes)
in a particular group in the HDSN. Our analysis shows that, the proposed scheme
could work well in conjunction with other security mechanisms for sensor
networks and is very effective to resist any adversary-s attempt to be included
in a legitimate group in the network.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:47:37 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Heo",
"Gihyuk",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0712.4178 | Al-Sakib Khan Pathan | Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi, Choong Seon
Hong | An Efficient PKC-Based Security Architecture for Wireless Sensor
Networks | 7 pages | IEEE Military Communications Conference (IEEE MILCOM 2007),
October 29-31, Orlando, Florida, USA | 10.1109/MILCOM.2007.4455317 | null | cs.CR cs.NI | null | In spite of previous widely held belief of the incompatibility of public key
cryptography (PKC) schemes for wireless sensor networks (WSNs), some recent
works have shown that, PKC based schemes could be implemented for such networks
in some ways. The major challenge of employing a PKC scheme in wireless sensor
network is posed by the limitations of resources of the tiny sensors.
Considering this feature of the sensors, in this paper, we propose an efficient
PKC based security architecture with relatively less resource requirements than
those of the other previously proposed PKC schemes for WSN. Our security
architecture comprises basically of two parts; a key handshaking scheme based
on simple linear operations and the derivation of decryption key by a receiver
node. Our architecture allows both base-station-to-node or node-to-base-station
secure communications, and node-to-node secure communications. Analysis and
simulation results show that, our proposed architecture ensures a good level of
security for communications in the network and could effectively be implemented
using the limited computation, memory and energy budgets of the current
generation sensor nodes.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 01:49:41 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Haque",
"Md. Mokammel",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Choi",
"Byung Goo",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0712.4183 | Daoshun Wang | Dao-Shun Wang, Feng Yi and Xiaobo Li | Probabilistic Visual Secret Sharing Schemes for Gray-scale images and
Color images | null | null | null | null | cs.CR cs.CV | null | Visual secrete sharing (VSS) is an encryption technique that utilizes human
visual system in the recovering of the secret image and it does not require any
complex calculation. Pixel expansion has been a major issue of VSS schemes. A
number of probabilistic VSS schemes with minimum pixel expansion have been
proposed for binary secret images. This paper presents a general probabilistic
(k, n)-VSS scheme for gray-scale images and another scheme for color images.
With our schemes, the pixel expansion can be set to a user-defined value. When
this value is 1, there is no pixel expansion at all. The quality of
reconstructed secret images, measured by Average Relative Difference, is
equivalent to Relative Difference of existing deterministic schemes. Previous
probabilistic VSS schemes for black-and-white images with respect to pixel
expansion can be viewed as special cases of the schemes proposed here
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 03:27:10 GMT"
}
] | 2007-12-28T00:00:00 | [
[
"Wang",
"Dao-Shun",
""
],
[
"Yi",
"Feng",
""
],
[
"Li",
"Xiaobo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0712.4209 | Neri Merhav | Neri Merhav | The Generalized Random Energy Model and its Application to the
Statistical Physics of Ensembles of Hierarchical Codes | 43 pages, 1 figure, submitted to the IEEE Transactions on Information
Theory | null | 10.1109/TIT.2008.2011445 | null | cs.IT math.IT | null | In an earlier work, the statistical physics associated with
finite--temperature decoding of code ensembles, along with the relation to
their random coding error exponents, were explored in a framework that is
analogous to Derrida's random energy model (REM) of spin glasses, according to
which the energy levels of the various spin configurations are independent
random variables. The generalized REM (GREM) extends the REM in that it
introduces correlations between energy levels in an hierarchical structure. In
this paper, we explore some analogies between the behavior of the GREM and that
of code ensembles which have parallel hierarchical structures. In particular,
in analogy to the fact that the GREM may have different types of phase
transition effects, depending on the parameters of the model, then the
above--mentioned hierarchical code ensembles behave substantially differently
in the various domains of the design parameters of these codes. We make an
attempt to explore the insights that can be imported from the statistical
mechanics of the GREM and be harnessed to serve for code design considerations
and guidelines.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 10:11:02 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Merhav",
"Neri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4213 | Seiichiro Tani | Seiichiro Tani, Hirotada Kobayashi, Keiji Matsumoto | Exact Quantum Algorithms for the Leader Election Problem | 47 pages, preliminary version in Proceedings of STACS 2005 | ACM TOCT 4 (2012): Article 1; IEEE TPDS 23 (2012): 255 - 262 | null | null | quant-ph cs.DC cs.DS | null | This paper gives the first separation of quantum and classical pure (i.e.,
non-cryptographic) computing abilities with no restriction on the amount of
available computing resources, by considering the exact solvability of a
celebrated unsolvable problem in classical distributed computing, the ``leader
election problem'' on anonymous networks. The goal of the leader election
problem is to elect a unique leader from among distributed parties. The paper
considers this problem for anonymous networks, in which each party has the same
identifier. It is well-known that no classical algorithm can solve exactly
(i.e., in bounded time without error) the leader election problem in anonymous
networks, even if it is given the number of parties. This paper gives two
quantum algorithms that, given the number of parties, can exactly solve the
problem for any network topology in polynomial rounds and polynomial
communication/time complexity with respect to the number of parties, when the
parties are connected by quantum communication links.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 10:52:52 GMT"
}
] | 2012-10-10T00:00:00 | [
[
"Tani",
"Seiichiro",
""
],
[
"Kobayashi",
"Hirotada",
""
],
[
"Matsumoto",
"Keiji",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0712.4215 | Sahbi Sidhom | Bel G. Raggad (PU - Seidenberg School of CS & IS), Sahbi Sidhom
(LORIA) | Cyberspace security: How to develop a security strategy | null | Dans V. International conference Cyberspace 2007 (2007) | null | null | cs.OH | null | Despite all visible dividers, the Internet is getting us closer and closer,
but with a great price. Our security is the price. The international community
is fully aware of the urgent need to secure the cyberspace as you see the
multiplication of security standards and national schemes interpreting them
beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some
countries, including the Security Big Six (SB6), are equipped with their
security books and may feel relatively safe; this remains a wrong sense of
security as long as they share their networks with entities of less security.
The standards impose security best practices and system specifications for the
development of information security management systems. Partners beyond borders
have to be secure as this is only possible if all entities connected to the
partnership remain secure. Unfortunately, there is no way to verify the
continuous security of partners without periodic security auditing and
certification, and members who do not comply should be barred from the
partnership. This concept also applies to the cyber space or the electronic
society. In order to clean our society from cyber crimes and cyber terrorism we
need to impose strict security policies and enforce them in a cooperative
manner. The paper discusses a country's effort in the development of a national
security strategy given its security economic intelligence position, its
security readiness, and its adverse exposure.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 11:05:51 GMT"
}
] | 2007-12-28T00:00:00 | [
[
"Raggad",
"Bel G.",
"",
"PU - Seidenberg School of CS & IS"
],
[
"Sidhom",
"Sahbi",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0712.4222 | Luca Roversi | Luca Roversi | Weak Affine Light Typing: Polytime intensional expressivity, soundness
and completeness | Updating: *) pag.29, line 527: index j --> index k. *) pag.29, line
544: point 6 canged. *) pag.30, line 547: p=max{m_1... --> p=max{m,m_1... *)
pag.30, line 548: the definition of the mapping of the linear composition of
QlSRN has been updated. *) pag.30, line 544: arguments of the iterator
changed. *) pag.30,31 occurences of wg: every occurrence of rho erased | null | null | null | cs.LO | null | Weak affine light typing (WALT) assigns light affine linear formulae as types
to a subset of lambda-terms in System F. WALT is poly-time sound: if a
lambda-term M has type in WALT, M can be evaluated with a polynomial cost in
the dimension of the derivation that gives it a type. In particular, the
evaluation can proceed under any strategy of a rewriting relation, obtained as
a mix of both call-by-name/call-by-value beta-reductions. WALT is poly-time
complete since it can represent any poly-time Turing machine. WALT weakens,
namely generalizes, the notion of stratification of deductions common to some
Light Systems -- we call as such those logical systems, derived from Linear
logic, to characterize FP, the set of Polynomial functions -- . A weaker
stratification allows to define a compositional embedding of the Quasi-linear
fragment QlSRN of Safe recursion on notation (SRN) into WALT. QlSRN is SRN,
which is a recursive-theoretical system characterizing FP, where only the
composition scheme is restricted to linear safe variables. So, the expressivity
of WALT is stronger, as compared to the known Light Systems. In particular,
using the types, the embedding puts in evidence the stratification of normal
and safe arguments hidden in QlSRN: the less an argument is impredicative, the
deeper, in a formal, proof-theoretical sense, gets its representation in WALT.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 14:35:16 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2008 16:00:54 GMT"
}
] | 2008-03-31T00:00:00 | [
[
"Roversi",
"Luca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0712.4248 | Reinhard Laubenbacher | Reinhard Laubenbacher and Bernd Sturmfels | Computer algebra in systems biology | to appear in American Mathematical Monthly | null | null | null | cs.SC q-bio.MN q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Systems biology focuses on the study of entire biological systems rather than
on their individual components. With the emergence of high-throughput data
generation technologies for molecular biology and the development of advanced
mathematical modeling techniques, this field promises to provide important new
insights. At the same time, with the availability of increasingly powerful
computers, computer algebra has developed into a useful tool for many
applications. This article illustrates the use of computer algebra in systems
biology by way of a well-known gene regulatory network, the Lac Operon in the
bacterium E. coli.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 16:01:35 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 02:53:23 GMT"
}
] | 2008-12-19T00:00:00 | [
[
"Laubenbacher",
"Reinhard",
""
],
[
"Sturmfels",
"Bernd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0712.4273 | Olivier Cappe | Olivier Capp\'e (LTCI), Eric Moulines (LTCI) | Online EM Algorithm for Latent Data Models | Version that includes the corrigendum published in volume 73, part 5
(2011), of the Journal of the Royal Statistical Society, Series B + the
correction of a typo in Eqs. (32-33) | Journal of the Royal Statistical Society: Series B, Royal
Statistical Society, 2009, 71 (3), pp.593-613 | 10.1111/j.1467-9868.2009.00698.x | null | stat.CO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this contribution, we propose a generic online (also sometimes called
adaptive or recursive) version of the Expectation-Maximisation (EM) algorithm
applicable to latent variable models of independent observations. Compared to
the algorithm of Titterington (1984), this approach is more directly connected
to the usual EM algorithm and does not rely on integration with respect to the
complete data distribution. The resulting algorithm is usually simpler and is
shown to achieve convergence to the stationary points of the Kullback-Leibler
divergence between the marginal distribution of the observation and the model
distribution at the optimal rate, i.e., that of the maximum likelihood
estimator. In addition, the proposed approach is also suitable for conditional
(or regression) models, as illustrated in the case of the mixture of linear
regressions model.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 19:44:34 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Sep 2008 14:36:55 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Dec 2011 14:59:41 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Mar 2017 13:40:32 GMT"
}
] | 2017-03-02T00:00:00 | [
[
"Cappé",
"Olivier",
"",
"LTCI"
],
[
"Moulines",
"Eric",
"",
"LTCI"
]
] | [
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0712.4279 | Troy Lee | Troy Lee, Adi Shraibman | Disjointness is hard in the multi-party number on the forehead model | 23 pages. Added background to method and references to more recent
work. Journal version to appear in Computational Complexity | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that disjointness requires randomized communication
Omega(n^{1/(k+1)}/2^{2^k}) in the general k-party number-on-the-forehead model
of complexity. The previous best lower bound for k >= 3 was log(n)/(k-1). Our
results give a separation between nondeterministic and randomized multiparty
number-on-the-forehead communication complexity for up to k=log log n - O(log
log log n) many players. Also by a reduction of Beame, Pitassi, and Segerlind,
these results imply subexponential lower bounds on the size of proofs needed to
refute certain unsatisfiable CNFs in a broad class of proof systems, including
tree-like Lovasz-Schrijver proofs.
| [
{
"version": "v1",
"created": "Thu, 27 Dec 2007 20:45:53 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 12:15:09 GMT"
}
] | 2009-06-09T00:00:00 | [
[
"Lee",
"Troy",
""
],
[
"Shraibman",
"Adi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0712.4318 | Peter de Blanc | Peter de Blanc | Convergence of Expected Utilities with Algorithmic Probability
Distributions | 2 pages + title page, references | null | null | null | cs.AI | null | We consider an agent interacting with an unknown environment. The environment
is a function which maps natural numbers to natural numbers; the agent's set of
hypotheses about the environment contains all such functions which are
computable and compatible with a finite set of known input-output pairs, and
the agent assigns a positive probability to each such hypothesis. We do not
require that this probability distribution be computable, but it must be
bounded below by a positive computable function. The agent has a utility
function on outputs from the environment. We show that if this utility function
is bounded below in absolute value by an unbounded computable function, then
the expected utility of any input is undefined. This implies that a computable
utility function will have convergent expected utilities iff that function is
bounded.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2007 07:50:00 GMT"
}
] | 2007-12-31T00:00:00 | [
[
"de Blanc",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0712.4321 | Salah A. Aly | Salah A. Aly and Andreas Klappenecker | Subsystem Code Constructions | 5 pages, trading dimensions of subsystem codes, MDS subsystem codes,
and propagation rules. All stabilizer codes are converted to subsystem codes.
A talk given at QEC07, and submitted to IEEE ISIT 2008 | Proc. of IEEE ISIT 08, Toronto, CA, 2008 | null | null | quant-ph cs.IT math.IT | null | Subsystem codes are the most versatile class of quantum error-correcting
codes known to date that combine the best features of all known passive and
active error-control schemes. The subsystem code is a subspace of the quantum
state space that is decomposed into a tensor product of two vector spaces: the
subsystem and the co-subsystem. A generic method to derive subsystem codes from
existing subsystem codes is given that allows one to trade the dimensions of
subsystem and co-subsystem while maintaining or improving the minimum distance.
As a consequence, it is shown that all pure MDS subsystem codes are derived
from MDS stabilizer codes. The existence of numerous families of MDS subsystem
codes is established. Propagation rules are derived that allow one to obtain
longer and shorter subsystem codes from given subsystem codes. Furthermore,
propagation rules are derived that allow one to construct a new subsystem code
by combining two given subsystem codes.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2007 09:26:40 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Dec 2007 21:29:21 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jan 2008 02:28:10 GMT"
}
] | 2008-12-05T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Klappenecker",
"Andreas",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0712.4341 | Yongming Li | Yongming Li | Finite Automata Based on Quantum Logic and Their Determinization | null | null | null | null | cs.LO | null | We give the quantum subset construction of orthomodular lattice-valued finite
automata, then we show the equivalence between orthomodular lattice-valued
finite automata, orthomodular lattice-valued deterministic finite automata and
orthomodular lattice-valued finite automata with empty string-moves. Based on
these equivalences, we study the algebraic operations on orthomodular
lattice-valued regular languages, then we establish Kleene theorem in the frame
of quantum logic.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2007 11:48:44 GMT"
}
] | 2007-12-31T00:00:00 | [
[
"Li",
"Yongming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0712.4402 | Ruadhan O'Flanagan | Ruadhan O'Flanagan | Judgment | 20 pages; minor changes; references added; submitted | null | null | null | math.PR cs.AI math.LO | null | The concept of a judgment as a logical action which introduces new
information into a deductive system is examined. This leads to a way of
mathematically representing implication which is distinct from the familiar
material implication, according to which "If A then B" is considered to be
equivalent to "B or not-A". This leads, in turn, to a resolution of the paradox
of the raven.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2007 21:00:01 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Dec 2007 03:57:26 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Jan 2008 21:30:57 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"O'Flanagan",
"Ruadhan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.0061 | Danilo Silva | Danilo Silva, Frank R. Kschischang | Security for Wiretap Networks via Rank-Metric Codes | 5 pages, to be published at the 2008 IEEE International Symposium on
Information Theory | null | 10.1109/ISIT.2008.4594971 | null | cs.IT cs.CR math.IT | null | The problem of securing a network coding communication system against a
wiretapper adversary is considered. The network implements linear network
coding to deliver $n$ packets from source to each receiver, and the wiretapper
can eavesdrop on $\mu$ arbitrarily chosen links. A coding scheme is proposed
that can achieve the maximum possible rate of $k=n-\mu$ packets that are
information-theoretically secure from the adversary. A distinctive feature of
our scheme is that it is universal: it can be applied on top of any
communication network without requiring knowledge of or any modifications on
the underlying network code. In fact, even a randomized network code can be
used. Our approach is based on Rouayheb-Soljanin's formulation of a wiretap
network as a generalization of the Ozarow-Wyner wiretap channel of type II.
Essentially, the linear MDS code in Ozarow-Wyner's coset coding scheme is
replaced by a maximum-rank-distance code over an extension of the field in
which linear network coding operations are performed.
| [
{
"version": "v1",
"created": "Sat, 29 Dec 2007 12:50:14 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2008 02:45:13 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Silva",
"Danilo",
""
],
[
"Kschischang",
"Frank R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0092 | Kerry Soileau | Kerry Michael Soileau | Nash bargaining with a nondeterministic threat | Added solution algorithm | null | null | null | cs.GT | null | We consider bargaining problems which involve two participants, with a
nonempty closed, bounded convex bargaining set of points in the real plane
representing all realizable bargains. We also assume that there is no definite
threat or disagreement point which will provide the default bargain if the
players cannot agree on some point in the bargaining set. However, there is a
nondeterministic threat: if the players fail to agree on a bargain, one of them
will be chosen at random with equal probability, and that chosen player will
select any realizable bargain as the solution, subject to a reasonable
restriction.
| [
{
"version": "v1",
"created": "Sat, 29 Dec 2007 21:39:31 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jan 2008 00:58:21 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Soileau",
"Kerry Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0801.0102 | Michael Baer | Michael B. Baer | Reserved-Length Prefix Coding | 5 pages, submitted to ISIT 2008 | null | null | null | cs.IT cs.DS math.IT | null | Huffman coding finds an optimal prefix code for a given probability mass
function. Consider situations in which one wishes to find an optimal code with
the restriction that all codewords have lengths that lie in a user-specified
set of lengths (or, equivalently, no codewords have lengths that lie in a
complementary set). This paper introduces a polynomial-time dynamic programming
algorithm that finds optimal codes for this reserved-length prefix coding
problem. This has applications to quickly encoding and decoding lossless codes.
In addition, one modification of the approach solves any quasiarithmetic prefix
coding problem, while another finds optimal codes restricted to the set of
codes with g codeword lengths for user-specified g (e.g., g=2).
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 00:14:24 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Baer",
"Michael B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0131 | Alexandr Savinov | Alexandr Savinov | Two-Level Concept-Oriented Data Model | null | Institute of Mathematics and Computer Science, Academy of Sciences
of Moldova, Technical Report RT0006, 2007 | null | Technical Report RT0006 | cs.DB | null | In this paper we describe a new approach to data modelling called the
concept-oriented model (CoM). This model is based on the formalism of nested
ordered sets which uses inclusion relation to produce hierarchical structure of
sets and ordering relation to produce multi-dimensional structure among its
elements. Nested ordered set is defined as an ordered set where an each element
can be itself an ordered set. Ordering relation in CoM is used to define data
semantics and operations with data such as projection and de-projection. This
data model can be applied to very different problems and the paper describes
some its uses such grouping with aggregation and multi-dimensional analysis.
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 14:29:17 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0801.0133 | Alexandr Savinov | Alexandr Savinov | An Approach to Programming Based on Concepts | 49 pages. Related papers: http://conceptoriented.com | Institute of Mathematics and Computer Science, Academy of Sciences
of Moldova, Technical Report RT0005, 2007 | null | Technical Report RT0005 | cs.PL | null | In this paper we describe a new approach to programming which generalizes
object-oriented programming. It is based on using a new programming construct,
called concept, which generalizes classes. Concept is defined as a pair of two
classes: one reference class and one object class. Each concept has a parent
concept which is specified using inclusion relation generalizing inheritance.
We describe several important mechanisms such as reference resolution, context
stack, dual methods and life-cycle management, inheritance and polymorphism.
This approach to programming is positioned as a new programming paradigm and
therefore we formulate its main principles and rules.
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 14:43:27 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.0135 | Alexandr Savinov | Alexandr Savinov | Concepts and their Use for Modelling Objects and References in
Programming Languages | 43 pages. Related papers: http://conceptoriented.com/ | Institute of Mathematics and Computer Science, Academy of Sciences
of Moldova, Technical Report RT0004, 2007 | null | Technical Report RT0004 | cs.PL | null | In the paper a new programming construct, called concept, is introduced.
Concept is pair of two classes: a reference class and an object class.
Instances of the reference classes are passed-by-value and are intended to
represent objects. Instances of the object class are passed-by-reference. An
approach to programming where concepts are used instead of classes is called
concept-oriented programming (CoP). In CoP objects are represented and accessed
indirectly by means of references. The structure of concepts describes a
hierarchical space with a virtual address system. The paper describes this new
approach to programming including such mechanisms as reference resolution,
complex references, method interception, dual methods, life-cycle management
inheritance and polymorphism.
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 14:50:01 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.0136 | Alexandr Savinov | Alexandr Savinov | Indirect Object Representation and Access by Means of Concepts | 8 pages. Related papers: http://conceptoriented.com/ | Institute of Mathematics and Computer Science, Academy of Sciences
of Moldova, Technical Report, 2006 | null | null | cs.PL | null | The paper describes a mechanism for indirect object representation and access
(ORA) in programming languages. The mechanism is based on using a new
programming construct which is referred to as concept. Concept consists of one
object class and one reference class both having their fields and methods. The
object class is the conventional class as defined in OOP with instances passed
by reference. Instances of the reference class are passed by value and are
intended to represent objects. The reference classes are used to describe how
objects have to be represented and accessed by providing custom format for
their identifiers and custom access procedures. Such an approach to programming
where concepts are used instead of classes is referred to as concept-oriented
programming. It generalizes OOP and its main advantage is that it allows the
programmer to describe not only the functionality of target objects but also
intermediate functions which are executed behind the scenes as an object is
being accessed.
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 14:56:05 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.0139 | Alexandr Savinov | Alexandr Savinov | Principles of the Concept-Oriented Data Model | 54 pages. Related papers: http://conceptoriented.com/ | Institute of Mathematics and Computer Science, Academy of Sciences
of Moldova, Technical Report, 2004 | null | null | cs.DB | null | In the paper a new approach to data representation and manipulation is
described, which is called the concept-oriented data model (CODM). It is
supposed that items represent data units, which are stored in concepts. A
concept is a combination of superconcepts, which determine the concept's
dimensionality or properties. An item is a combination of superitems taken by
one from all the superconcepts. An item stores a combination of references to
its superitems. The references implement inclusion relation or attribute-value
relation among items. A concept-oriented database is defined by its concept
structure called syntax or schema and its item structure called semantics. The
model defines formal transformations of syntax and semantics including the
canonical semantics where all concepts are merged and the data semantics is
represented by one set of items. The concept-oriented data model treats
relations as subconcepts where items are instances of the relations.
Multi-valued attributes are defined via subconcepts as a view on the database
semantics rather than as a built-in mechanism. The model includes
concept-oriented query language, which is based on collection manipulations. It
also has such mechanisms as aggregation and inference based on semantics
propagation through the database schema.
| [
{
"version": "v1",
"created": "Sun, 30 Dec 2007 15:04:25 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Savinov",
"Alexandr",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0801.0159 | Petros Petrosyan | P.A. Petrosyan | Interval Edge Colorings of Mobius Ladders | 5 pages (in Russian) | Proceedings of the CSIT Conference, Yerevan, 2005, 146-149 | null | null | cs.DM | null | An interval edge t-coloring of a graph G is a proper edge coloring of G with
colors 1,2...,t such that at least one edge of G is colored by color
i,i=1,2...,t, and the edges incident with each vertex x are colored by d_{G}(x)
consecutive colors, where d_{G}(x) is the degree of the vertex x in G. For
Mobius ladders the existence of this coloring is proved and all possible
numbers of colors in such colorings are found.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 09:59:07 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Petrosyan",
"P. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.0184 | Ryan Hutchinson | Ryan Hutchinson | The Existence of Strongly-MDS Convolutional Codes | 17 pages | null | null | null | math.OC cs.IT math.IT | null | It is known that maximum distance separable and maximum distance profile
convolutional codes exist over large enough finite fields of any characteristic
for all parameters $(n,k,\delta)$. It has been conjectured that the same is
true for convolutional codes that are strongly maximum distance separable.
Using methods from linear systems theory, we resolve this conjecture by showing
that, over a large enough finite field of any characteristic, codes which are
simultaneously maximum distance profile and strongly maximum distance separable
exist for all parameters $(n,k,\delta)$.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 04:11:46 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Hutchinson",
"Ryan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0209 | Stefano Galatolo | Stefano Galatolo, Mathieu Hoyrup and Cristobal Rojas | Effective symbolic dynamics, random points, statistical behavior,
complexity and entropy | null | null | null | null | math.DS cs.IT math.IT math.PR | null | We consider the dynamical behavior of Martin-L\"of random points in dynamical
systems over metric spaces with a computable dynamics and a computable
invariant measure. We use computable partitions to define a sort of effective
symbolic model for the dynamics. Through this construction we prove that such
points have typical statistical behavior (the behavior which is typical in the
Birkhoff ergodic theorem) and are recurrent. We introduce and compare some
notions of complexity for orbits in dynamical systems and prove: (i) that the
complexity of the orbits of random points equals the Kolmogorov-Sina\"i entropy
of the system, (ii) that the supremum of the complexity of orbits equals the
topological entropy.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 14:38:57 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2008 14:56:19 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Galatolo",
"Stefano",
""
],
[
"Hoyrup",
"Mathieu",
""
],
[
"Rojas",
"Cristobal",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0801.0232 | Patrizio Frosini | Patrizio Frosini | Does intelligence imply contradiction? | 39 pages, 6 figures; added Remark 9 (page 19) and Remark 12 (page
25); changed some comments after Definition 13 and in Section 5; some minor
changes | null | null | null | cs.AI cs.LO | null | Contradiction is often seen as a defect of intelligent systems and a
dangerous limitation on efficiency. In this paper we raise the question of
whether, on the contrary, it could be considered a key tool in increasing
intelligence in biological structures. A possible way of answering this
question in a mathematical context is shown, formulating a proposition that
suggests a link between intelligence and contradiction.
A concrete approach is presented in the well-defined setting of cellular
automata. Here we define the models of ``observer'', ``entity'',
``environment'', ``intelligence'' and ``contradiction''. These definitions,
which roughly correspond to the common meaning of these words, allow us to
deduce a simple but strong result about these concepts in an unbiased,
mathematical manner. Evidence for a real-world counterpart to the demonstrated
formal link between intelligence and contradiction is provided by three
computational experiments.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 19:07:22 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Mar 2008 11:16:24 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Frosini",
"Patrizio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0249 | Reinhard Laubenbacher | Reinhard Laubenbacher, Abdul S. Jarrah, Henning Mortveit, and S.S.
Ravi | A mathematical formalism for agent-based modeling | Prepared for the Encyclopedia of Complexity and System Science,
Springer Verlag, 2008 | null | null | null | cs.MA cs.DM math.CO | null | Many complex systems can be modeled as multiagent systems in which the
constituent entities (agents) interact with each other. The global dynamics of
such a system is determined by the nature of the local interactions among the
agents. Since it is difficult to formally analyze complex multiagent systems,
they are often studied through computer simulations. While computer simulations
can be very useful, results obtained through simulations do not formally
validate the observed behavior. Thus, there is a need for a mathematical
framework which one can use to represent multiagent systems and formally
establish their properties. This work contains a brief exposition of some known
mathematical frameworks that can model multiagent systems. The focus is on one
such framework, namely that of finite dynamical systems. Both, deterministic
and stochastic versions of this framework are discussed. The paper contains a
sampling of the mathematical results from the literature to show how finite
dynamical systems can be used to carry out a rigorous study of the properties
of multiagent systems and it is shown how the framework can also serve as a
universal model for computation.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 23:22:50 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Laubenbacher",
"Reinhard",
""
],
[
"Jarrah",
"Abdul S.",
""
],
[
"Mortveit",
"Henning",
""
],
[
"Ravi",
"S. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0801.0253 | William Bialek | Greg J. Stephens and William Bialek | Toward a statistical mechanics of four letter words | null | null | 10.1103/PhysRevE.81.066119 | null | q-bio.NC cs.CL physics.data-an physics.soc-ph | null | We consider words as a network of interacting letters, and approximate the
probability distribution of states taken on by this network. Despite the
intuition that the rules of English spelling are highly combinatorial (and
arbitrary), we find that maximum entropy models consistent with pairwise
correlations among letters provide a surprisingly good approximation to the
full statistics of four letter words, capturing ~92% of the multi-information
among letters and even "discovering" real words that were not represented in
the data from which the pairwise correlations were estimated. The maximum
entropy model defines an energy landscape on the space of possible words, and
local minima in this landscape account for nearly two-thirds of words used in
written English.
| [
{
"version": "v1",
"created": "Mon, 31 Dec 2007 23:51:51 GMT"
}
] | 2013-05-29T00:00:00 | [
[
"Stephens",
"Greg J.",
""
],
[
"Bialek",
"William",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0801.0258 | Joseph O'Rourke | Nadia Benbernou, Joseph O'Rourke | On the Maximum Span of Fixed-Angle Chains | 28 pages, 21 figures. Preliminary version appeared in Proc. 18th
Canad. Conf. Comput. Geom., pages 93-96, 2006. This paper has been withdrawn
by the authors. Lemma 15 as stated is incorrect, and although we believe the
main theorems following (Thms. 17 & 18) are true, the proofs relying on
Lem.15 are not valid | null | null | Smith Computer Science 088 | cs.CG | null | Soss proved that it is NP-hard to find the maximum 2D span of a fixed-angle
polygonal chain: the largest distance achievable between the endpoints in a
planar embedding. These fixed-angle chains can serve as models of protein
backbones. The corresponding problem in 3D is open. We show that three special
cases of particular relevance to the protein model are solvable in polynomial
time. When all link lengths and all angles are equal, the maximum 3D span is
achieved in a flat configuration and can be computed in constant time. When all
angles are equal and the chain is simple (non-self-crossing), the maximum flat
span can be found in linear time. In 3D, when all angles are equal to 90 deg
(but the link lengths arbitrary), the maximum 3D span is in general nonplanar
but can be found in quadratic time.
| [
{
"version": "v1",
"created": "Tue, 1 Jan 2008 04:17:20 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jun 2010 12:02:30 GMT"
}
] | 2010-06-03T00:00:00 | [
[
"Benbernou",
"Nadia",
""
],
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0801.0275 | Vincent Tan | Vincent Y. F. Tan, Vivek K. Goyal | Estimating Signals with Finite Rate of Innovation from Noisy Samples: A
Stochastic Algorithm | Submitted to IEEE Transactions on Signal Processing | IEEE Trans. on Signal Processing, vol. 56, no. 10, pp. 5135-5146,
October 2008 | 10.1109/TSP.2008.928510 | null | stat.AP cs.IT math.IT | null | As an example of the recently-introduced concept of rate of innovation,
signals that are linear combinations of a finite number of Diracs per unit time
can be acquired by linear filtering followed by uniform sampling. However, in
reality, samples are rarely noiseless. In this paper, we introduce a novel
stochastic algorithm to reconstruct a signal with finite rate of innovation
from its noisy samples. Even though variants of this problem has been
approached previously, satisfactory solutions are only available for certain
classes of sampling kernels, for example kernels which satisfy the Strang-Fix
condition. In this paper, we consider the infinite-support Gaussian kernel,
which does not satisfy the Strang-Fix condition. Other classes of kernels can
be employed. Our algorithm is based on Gibbs sampling, a Markov chain Monte
Carlo (MCMC) method. Extensive numerical simulations demonstrate the accuracy
and robustness of our algorithm.
| [
{
"version": "v1",
"created": "Tue, 1 Jan 2008 05:19:35 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jan 2008 01:09:41 GMT"
}
] | 2009-03-09T00:00:00 | [
[
"Tan",
"Vincent Y. F.",
""
],
[
"Goyal",
"Vivek K.",
""
]
] | [
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0289 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Is Randomness "Native" to Computer Science? | 43 pages | Current Trends in Theoretical Computer Science. Vol2, World
Scientific (Ed.) (2004) 141-180 | null | null | math.LO cs.CC | null | We survey the Kolmogorov's approach to the notion of randomness through the
Kolmogorov complexity theory. The original motivation of Kolmogorov was to give
up a quantitative definition of information. In this theory, an object is
randomness in the sense that it has a large information content. Afterwards, we
present parts of the work of Martin-Lof, Schnorr, Chaitin and Levin which
supply a mathematical notion of randomness throughout diverse theories from the
the 60' up to recently.
| [
{
"version": "v1",
"created": "Tue, 1 Jan 2008 10:26:55 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.0337 | Brian Whitworth | Brian Whitworth | The Physical World as a Virtual Reality | The argument that virtual reality information simulations may be
relevant to modern physics theory is a little outside the mainstream, but
even people in Physics now consider this possibility, e.g. Svozil | null | null | CDMTCS0316 | cs.OH | null | This paper explores the idea that the universe is a virtual reality created
by information processing, and relates this strange idea to the findings of
modern physics about the physical world. The virtual reality concept is
familiar to us from online worlds, but our world as a virtual reality is
usually a subject for science fiction rather than science. Yet logically the
world could be an information simulation running on a multi-dimensional
space-time screen. Indeed, if the essence of the universe is information,
matter, charge, energy and movement could be aspects of information, and the
many conservation laws could be a single law of information conservation. If
the universe were a virtual reality, its creation at the big bang would no
longer be paradoxical, as every virtual system must be booted up. It is
suggested that whether the world is an objective reality or a virtual reality
is a matter for science to resolve. Modern information science can suggest how
core physical properties like space, time, light, matter and movement could
derive from information processing. Such an approach could reconcile relativity
and quantum theories, with the former being how information processing creates
space-time, and the latter how it creates energy and matter.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 05:04:27 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jan 2008 08:00:28 GMT"
}
] | 2008-01-05T00:00:00 | [
[
"Whitworth",
"Brian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.0340 | Adam Tenenbaum | Adam J. Tenenbaum and Raviraj S. Adve | Sum Rate Maximization using Linear Precoding and Decoding in the
Multiuser MIMO Downlink | 6 pages, 4 figures, uses ieeetran.cls | null | null | null | cs.IT math.IT | null | We propose an algorithm to maximize the instantaneous sum data rate
transmitted by a base station in the downlink of a multiuser multiple-input,
multiple-output system. The transmitter and the receivers may each be equipped
with multiple antennas and each user may receive more than one data stream. We
show that maximizing the sum rate is closely linked to minimizing the product
of mean squared errors (PMSE). The algorithm employs an uplink/downlink duality
to iteratively design transmit-receive linear precoders, decoders, and power
allocations that minimize the PMSE for all data streams under a sum power
constraint. Numerical simulations illustrate the effectiveness of the algorithm
and support the use of the PMSE criterion in maximizing the overall
instantaneous data rate.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 05:54:33 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Tenenbaum",
"Adam J.",
""
],
[
"Adve",
"Raviraj S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0341 | Michael Chertkov | Michael Chertkov (Los Alamos) | Exactness of Belief Propagation for Some Graphical Models with Loops | 12 pages, 1 figure, submitted to JSTAT | J. Stat. Mech. (2008) P10016 | 10.1088/1742-5468/2008/10/P10016 | LANL LA-UR-07-8441 | cond-mat.stat-mech cond-mat.other cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that an arbitrary graphical model of statistical inference
defined on a tree, i.e. on a graph without loops, is solved exactly and
efficiently by an iterative Belief Propagation (BP) algorithm convergent to
unique minimum of the so-called Bethe free energy functional. For a general
graphical model on a loopy graph the functional may show multiple minima, the
iterative BP algorithm may converge to one of the minima or may not converge at
all, and the global minimum of the Bethe free energy functional is not
guaranteed to correspond to the optimal Maximum-Likelihood (ML) solution in the
zero-temperature limit. However, there are exceptions to this general rule,
discussed in \cite{05KW} and \cite{08BSS} in two different contexts, where
zero-temperature version of the BP algorithm finds ML solution for special
models on graphs with loops. These two models share a key feature: their ML
solutions can be found by an efficient Linear Programming (LP) algorithm with a
Totally-Uni-Modular (TUM) matrix of constraints. Generalizing the two models we
consider a class of graphical models reducible in the zero temperature limit to
LP with TUM constraints. Assuming that a gedanken algorithm, g-BP, funding the
global minimum of the Bethe free energy is available we show that in the limit
of zero temperature g-BP outputs the ML solution. Our consideration is based on
equivalence established between gapless Linear Programming (LP) relaxation of
the graphical model in the $T\to 0$ limit and respective LP version of the
Bethe-Free energy minimization.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 06:07:07 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jun 2008 15:00:41 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2008 23:35:51 GMT"
},
{
"version": "v4",
"created": "Tue, 2 Sep 2008 21:25:37 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Chertkov",
"Michael",
"",
"Los Alamos"
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0349 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Church, Cardinal and Ordinal Representations of Integers and Kolmogorov
complexity | 16 pages | Dans Denis Richard's 60th Biirthday Conference - Denis Richard's
60th Biirthday Conference, France (2002) | null | null | math.LO cs.CC cs.LO | null | We consider classical representations of integers: Church's function
iterators, cardinal equivalence classes of sets, ordinal equivalence classes of
totally ordered sets. Since programs do not work on abstract entities and
require formal representations of objects, we effectivize these abstract
notions in order to allow them to be computed by programs. To any such
effectivized representation is then associated a notion of Kolmogorov
complexity. We prove that these Kolmogorov complexities form a strict hierarchy
which coincides with that obtained by relativization to jump oracles and/or
allowance of infinite computations.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:35:27 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0350 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Refinment of the "up to a constant" ordering using contructive
co-immunity and alike. Application to the Min/Max hierarchy of Kolmogorov
complexities | 41 pages | null | null | null | math.LO cs.CC | null | We introduce orderings between total functions f,g: N -> N which refine the
pointwise "up to a constant" ordering <=cte and also insure that f(x) is often
much less thang(x). With such orderings, we prove a strong hierarchy theorem
for Kolmogorov complexities obtained with jump oracles and/or Max or Min of
partial recursive functions. We introduce a notion of second order conditional
Kolmogorov complexity which yields a uniform bound for the "up to a constant"
comparisons involved in the hierarchy theorem.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:35:59 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.0351 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Kolmogorov complexities Kmax, Kmin on computable partially ordered sets | 35 pages | Theoretical Computer Science 352 (2006) 159-180 | null | null | math.LO cs.LO | null | We introduce a machine free mathematical framework to get a natural
formalization of some general notions of infinite computation in the context of
Kolmogorov complexity. Namely, the classes Max^{X\to D}_{PR} and Max^{X\to
D}_{Rec} of functions X \to D which are pointwise maximum of partial or total
computable sequences of functions where D = (D,<) is some computable partially
ordered set. The enumeration theorem and the invariance theorem always hold for
Max^{X\to D}_{PR}, leading to a variant KD;max of Kolmogorov complexity. We
characterize the orders D such that the enumeration theorem (resp. the
invariance theorem) also holds for Max^{X\to D}_{Rec} . It turns out that
Max^{X\to D}_{Rec} may satisfy the invariance theorem but not the enumeration
theorem. Also, when Max^{X\to D}_{Rec} satisfies the invariance theorem then
the Kolmogorov complexities associated to Max^{X\to D}_{Rec} and Max^{X\to
D}_{PR} are equal (up to a constant).
Letting K^D_{min} = K^{D^{rev}}_{max}, where D^{rev} is the reverse order, we
prove that either K^D_{min} =_{ct} K^D_{max} =_{ct} K^D (=_{ct} is equality up
to a constant) or K^D_{min}, K^D_{max} are <=_{ct} incomparable and <_{ct} K^D
and >_{ct} K^{0',D}. We characterize the orders leading to each case. We also
show that K^D_{min}, K^D_{max} cannot be both much smaller than K^D at any
point.
These results are proved in a more general setting with two orders on D, one
extending the other.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:36:29 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0352 | Anant Sahai | Anant Sahai and Pulkit Grover | The price of certainty: "waterslide curves" and the gap to capacity | 37 pages, 13 figures. Submitted to IEEE Transactions on Information
Theory. This version corrects a subtle bug in the proofs of the original
submission and improves the bounds significantly | null | null | UCB/EECS-2008-1 | cs.IT math.IT | null | The classical problem of reliable point-to-point digital communication is to
achieve a low probability of error while keeping the rate high and the total
power consumption small. Traditional information-theoretic analysis uses
`waterfall' curves to convey the revolutionary idea that unboundedly low
probabilities of bit-error are attainable using only finite transmit power.
However, practitioners have long observed that the decoder complexity, and
hence the total power consumption, goes up when attempting to use sophisticated
codes that operate close to the waterfall curve.
This paper gives an explicit model for power consumption at an idealized
decoder that allows for extreme parallelism in implementation. The decoder
architecture is in the spirit of message passing and iterative decoding for
sparse-graph codes. Generalized sphere-packing arguments are used to derive
lower bounds on the decoding power needed for any possible code given only the
gap from the Shannon limit and the desired probability of error. As the gap
goes to zero, the energy per bit spent in decoding is shown to go to infinity.
This suggests that to optimize total power, the transmitter should operate at a
power that is strictly above the minimum demanded by the Shannon capacity.
The lower bound is plotted to show an unavoidable tradeoff between the
average bit-error probability and the total power used in transmission and
decoding. In the spirit of conventional waterfall curves, we call these
`waterslide' curves.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:36:34 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Sahai",
"Anant",
""
],
[
"Grover",
"Pulkit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0353 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Set theoretical Representations of Integers, I | 56 pages | Mathematical Logic Quaterly 52, Number 4 (2006) 375-403 | 10.1002/malq.200510040 | null | math.LO cs.CC | null | We reconsider some classical natural semantics of integers (namely iterators
of functions, cardinals of sets, index of equivalence relations), in the
perspective of Kolmogorov complexity. To each such semantics one can attach a
simple representation of integers that we suitably effectivize in order to
develop an associated Kolmogorov theory. Such effectivizations are particular
instances of a general notion of "self-enumerated system" that we introduce in
this paper. Our main result asserts that, with such effectivizations,
Kolmogorov theory allows to quantitatively distinguish the underlying
semantics. We characterize the families obtained by such effectivizations and
prove that the associated Kolmogorov complexities constitute a hierarchy which
coincides with that of Kolmogorov complexities defined via jump oracles and/or
infinite computations. This contrasts with the well-known fact that usual
Kolmogorov complexity does not depend (up to a constant) on the chosen
arithmetic representation of integers, let it be in any base unary, binary et
so on. Also, in a conceptual point of view, our result can be seen as a mean to
measure the degree of abstraction of these diverse semantics.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:37:01 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.0354 | Marie Ferbus-Zanda | Marie Ferbus-Zanda (LIAFA), Serge Grigorieff (LIAFA) | Kolmogorov complexity in perspective | 37 pages | null | null | null | math.LO cs.CC cs.IT math.IT | null | We survey the diverse approaches to the notion of information content: from
Shannon entropy to Kolmogorov complexity. The main applications of Kolmogorov
complexity are presented namely, the mathematical notion of randomness (which
goes back to the 60's with the work of Martin-Lof, Schnorr, Chaitin, Levin),
and classification, which is a recent idea with provocative implementation by
Vitanyi and Cilibrasi.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 08:38:18 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Ferbus-Zanda",
"Marie",
"",
"LIAFA"
],
[
"Grigorieff",
"Serge",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0386 | Dimitrios Katsaros | Dimitrios Katsaros, Leonidas Akritidis, Panayiotis Bozanis | Spam: It's Not Just for Inboxes and Search Engines! Making Hirsch
h-index Robust to Scientospam | 2 figures, 3 tables | null | null | null | cs.DL cs.IR | null | What is the 'level of excellence' of a scientist and the real impact of
his/her work upon the scientific thinking and practising? How can we design a
fair, an unbiased metric -- and most importantly -- a metric robust to
manipulation?
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 13:06:37 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Katsaros",
"Dimitrios",
""
],
[
"Akritidis",
"Leonidas",
""
],
[
"Bozanis",
"Panayiotis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0801.0390 | Richard Nock | Richard Nock, Nicolas Sanz, Fred Celimene, Frank Nielsen | Staring at Economic Aggregators through Information Lenses | 18 pages, 2 tables, 3 figures | null | null | null | cs.IT cs.LG math.IT math.OC | null | It is hard to exaggerate the role of economic aggregators -- functions that
summarize numerous and / or heterogeneous data -- in economic models since the
early XX$^{th}$ century. In many cases, as witnessed by the pioneering works of
Cobb and Douglas, these functions were information quantities tailored to
economic theories, i.e. they were built to fit economic phenomena. In this
paper, we look at these functions from the complementary side: information. We
use a recent toolbox built on top of a vast class of distortions coined by
Bregman, whose application field rivals metrics' in various subfields of
mathematics. This toolbox makes it possible to find the quality of an
aggregator (for consumptions, prices, labor, capital, wages, etc.), from the
standpoint of the information it carries. We prove a rather striking result.
From the informational standpoint, well-known economic aggregators do belong
to the \textit{optimal} set. As common economic assumptions enter the analysis,
this large set shrinks, and it essentially ends up \textit{exactly fitting}
either CES, or Cobb-Douglas, or both. To summarize, in the relevant economic
contexts, one could not have crafted better some aggregator from the
information standpoint. We also discuss global economic behaviors of optimal
information aggregators in general, and present a brief panorama of the links
between economic and information aggregators.
Keywords: Economic Aggregators, CES, Cobb-Douglas, Bregman divergences
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 13:23:04 GMT"
}
] | 2008-01-03T00:00:00 | [
[
"Nock",
"Richard",
""
],
[
"Sanz",
"Nicolas",
""
],
[
"Celimene",
"Fred",
""
],
[
"Nielsen",
"Frank",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0801.0398 | Shmuel Friedland | Shmuel Friedland | On the graph isomorphism problem | 12 pages | null | null | null | cs.CC cs.DM | null | We relate the graph isomorphism problem to the solvability of certain systems
of linear equations with nonnegative variables. This version replaces the two
previous versions of this paper.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 14:40:02 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jan 2008 16:36:12 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Jan 2008 09:41:35 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Friedland",
"Shmuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.0426 | Daniel Lucani | Daniel E. Lucani, Milica Stojanovic, Muriel M\'edard | On the Relationship between Transmission Power and Capacity of an
Underwater Acoustic Communication Channel | 6 pages, 9 Figures, Awaiting acceptance to IEEE Oceans 08
(Conference), Kobe, Japan | null | 10.1109/OCEANSKOBE.2008.4531073 | null | cs.IT math.IT | null | The underwater acoustic channel is characterized by a path loss that depends
not only on the transmission distance, but also on the signal frequency. As a
consequence, transmission bandwidth depends on the transmission distance, a
feature that distinguishes an underwater acoustic system from a terrestrial
radio system. The exact relationship between power, transmission band, distance
and capacity for the Gaussian noise scenario is a complicated one. This work
provides a closed-form approximate model for 1) power consumption, 2) band-edge
frequency and 3) bandwidth as functions of distance and capacity required for a
data link. This approximate model is obtained by numerical evaluation of
analytical results which takes into account physical models of acoustic
propagation loss and ambient noise. The closed-form approximations may become
useful tools in the design and analysis of underwater acoustic networks.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 19:52:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Stojanovic",
"Milica",
""
],
[
"Médard",
"Muriel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0452 | V. Sreekanth Annapureddy | V. Sreekanth Annapureddy and Venugopal V. Veeravalli | Sum Capacity of the Gaussian Interference Channel in the Low
Interference Regime | 6 pages, 4 figures, Proceedings of ITA Workshop, San Diego, CA,
Jan-Feb, 2008 | null | null | null | cs.IT math.IT | null | New upper bounds on the sum capacity of the two-user Gaussian interference
channel are derived. Using these bounds, it is shown that treating interference
as noise achieves the sum capacity if the interference levels are below certain
thresholds.
| [
{
"version": "v1",
"created": "Wed, 2 Jan 2008 23:11:39 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Annapureddy",
"V. Sreekanth",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0455 | Jorg Liebeherr | Jorg Liebeherr, Markus Fidler, Shahrokh Valaee | A System Theoretic Approach to Bandwidth Estimation | 23 pages | null | null | null | cs.NI cs.PF | null | It is shown that bandwidth estimation in packet networks can be viewed in
terms of min-plus linear system theory. The available bandwidth of a link or
complete path is expressed in terms of a {\em service curve}, which is a
function that appears in the network calculus to express the service available
to a traffic flow. The service curve is estimated based on measurements of a
sequence of probing packets or passive measurements of a sample path of
arrivals. It is shown that existing bandwidth estimation methods can be derived
in the min-plus algebra of the network calculus, thus providing further
mathematical justification for these methods. Principal difficulties of
estimating available bandwidth from measurement of network probes are related
to potential non-linearities of the underlying network. When networks are
viewed as systems that operate either in a linear or in a non-linear regime, it
is argued that probing schemes extract the most information at a point when the
network crosses from a linear to a non-linear regime. Experiments on the Emulab
testbed at the University of Utah evaluate the robustness of the system
theoretic interpretation of networks in practice. Multi-node experiments
evaluate how well the convolution operation of the min-plus algebra provides
estimates for the available bandwidth of a path from estimates of individual
links.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 00:11:26 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Liebeherr",
"Jorg",
""
],
[
"Fidler",
"Markus",
""
],
[
"Valaee",
"Shahrokh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0801.0474 | Christopher Clingerman | Christopher Clingerman, Jeremiah Hemphill, Corey Proscia | Analysis and Counterexamples Regarding Yatsenko's Polynomial-Time
Algorithm for Solving the Traveling Salesman Problem | 10 pages, 8 figures, references arXiv:cs/0702133 | null | null | null | cs.CC | null | Yatsenko gives a polynomial-time algorithm for solving the traveling salesman
problem. We examine the correctness of the algorithm and its construction. We
also comment on Yatsenko's evaluation of the algorithm.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 04:46:16 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Clingerman",
"Christopher",
""
],
[
"Hemphill",
"Jeremiah",
""
],
[
"Proscia",
"Corey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.0514 | Partha Mukhopadhyay | V. Arvind, Partha Mukhopadhyay, and Srikanth Srinivasan | New results on Noncommutative and Commutative Polynomial Identity
Testing | 23 pages, no figure | null | null | null | cs.CC | null | Using ideas from automata theory we design a new efficient (deterministic)
identity test for the \emph{noncommutative} polynomial identity testing problem
(first introduced and studied in \cite{RS05,BW05}). We also apply this idea to
the reconstruction of black-box noncommuting algebraic branching programs.
Assuming the black-box model allows us to query the ABP for the output at any
given gate, we can reconstruct an (equivalent) ABP in deterministic polynomial
time. Finally, we explore commutative identity testing when the coefficients of
the input polynomial come from an arbitrary finite commutative ring with unity.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 12:32:41 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Mukhopadhyay",
"Partha",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.0523 | Florent De Dinechin | Florent De Dinechin (LIP), Christoph Quirin Lauter (LIP), Guillaume
Melquiond (LIP) | Certifying floating-point implementations using Gappa | null | null | null | null | cs.NA cs.MS | null | High confidence in floating-point programs requires proving numerical
properties of final and intermediate values. One may need to guarantee that a
value stays within some range, or that the error relative to some ideal value
is well bounded. Such work may require several lines of proof for each line of
code, and will usually be broken by the smallest change to the code (e.g. for
maintenance or optimization purpose). Certifying these programs by hand is
therefore very tedious and error-prone. This article discusses the use of the
Gappa proof assistant in this context. Gappa has two main advantages over
previous approaches: Its input format is very close to the actual C code to
validate, and it automates error evaluation and propagation using interval
arithmetic. Besides, it can be used to incrementally prove complex mathematical
properties pertaining to the C code. Yet it does not require any specific
knowledge about automatic theorem proving, and thus is accessible to a wide
community. Moreover, Gappa may generate a formal proof of the results that can
be checked independently by a lower-level proof assistant like Coq, hence
providing an even higher confidence in the certification of the numerical code.
The article demonstrates the use of this tool on a real-size example, an
elementary function with correctly rounded output.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 13:34:03 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"De Dinechin",
"Florent",
"",
"LIP"
],
[
"Lauter",
"Christoph Quirin",
"",
"LIP"
],
[
"Melquiond",
"Guillaume",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0801.0533 | Olivier Finkel | Olivier Finkel (ELM), Pierre Simonnet (SPE) | Topology and Ambiguity in Omega Context Free Languages | null | Bulletin of the Belgian Mathematical Society 10 (5) (2003) 707-722 | null | null | cs.LO math.LO | null | We study the links between the topological complexity of an omega context
free language and its degree of ambiguity. In particular, using known facts
from classical descriptive set theory, we prove that non Borel omega context
free languages which are recognized by B\"uchi pushdown automata have a maximum
degree of ambiguity. This result implies that degrees of ambiguity are really
not preserved by the operation of taking the omega power of a finitary context
free language. We prove also that taking the adherence or the delta-limit of a
finitary language preserves neither unambiguity nor inherent ambiguity. On the
other side we show that methods used in the study of omega context free
languages can also be applied to study the notion of ambiguity in infinitary
rational relations accepted by B\"uchi 2-tape automata and we get first results
in that direction.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:47:36 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
],
[
"Simonnet",
"Pierre",
"",
"SPE"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.0534 | Olivier Finkel | Olivier Finkel (ELM) | On the Length of the Wadge Hierarchy of Omega Context Free Languages | null | Journal of Automata, Languages and Combinatorics 10 (4) (2005)
439-464 | null | null | cs.LO cs.CC cs.GT math.LO | null | We prove in this paper that the length of the Wadge hierarchy of omega
context free languages is greater than the Cantor ordinal epsilon_omega, which
is the omega-th fixed point of the ordinal exponentiation of base omega. The
same result holds for the conciliating Wadge hierarchy, defined by J. Duparc,
of infinitary context free languages, studied by D. Beauquier. We show also
that there exist some omega context free languages which are
Sigma^0_omega-complete Borel sets, improving previous results on omega context
free languages and the Borel hierarchy.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:48:48 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.0535 | Olivier Finkel | Olivier Finkel (ELM) | An omega-Power of a Finitary Language Which is a Borel Set of Infinite
Rank | null | Fundamenta Informaticae 62 (3-4) (2004) 333-342 | null | null | cs.LO math.LO | null | Omega-powers of finitary languages are omega languages in the form V^omega,
where V is a finitary language over a finite alphabet X. Since the set of
infinite words over X can be equipped with the usual Cantor topology, the
question of the topological complexity of omega-powers naturally arises and has
been raised by Niwinski, by Simonnet, and by Staiger. It has been recently
proved that for each integer n > 0, there exist some omega-powers of context
free languages which are Pi^0_n-complete Borel sets, and that there exists a
context free language L such that L^omega is analytic but not Borel. But the
question was still open whether there exists a finitary language V such that
V^omega is a Borel set of infinite rank. We answer this question in this paper,
giving an example of a finitary language whose omega-power is Borel of infinite
rank.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:49:23 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.0537 | Olivier Finkel | Olivier Finkel (ELM), Jean-Pierre Ressayre (ELM), Pierre Simonnet
(SPE) | On Infinite Real Trace Rational Languages of Maximum Topological
Complexity | null | Zapiski Nauchnyh Seminarov POMI 316 (2004) 205-223 | null | null | cs.LO math.LO | null | We consider the set of infinite real traces, over a dependence alphabet
(Gamma, D) with no isolated letter, equipped with the topology induced by the
prefix metric. We then prove that all rational languages of infinite real
traces are analytic sets and that there exist some rational languages of
infinite real traces which are analytic but non Borel sets, and even
Sigma^1_1-complete, hence of maximum possible topological complexity.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:51:16 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
],
[
"Ressayre",
"Jean-Pierre",
"",
"ELM"
],
[
"Simonnet",
"Pierre",
"",
"SPE"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.0540 | L\'or\'ant Farkas | L\'or\'ant Farkas | Blind decoding of Linear Gaussian channels with ISI, capacity, error
exponent, universality | 7 pages, 1 figure | null | null | null | cs.IT math.IT | null | A new straightforward universal blind detection algorithm for linear Gaussian
channel with ISI is given. A new error exponent is derived, which is better
than Gallager's random coding error exponent.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:56:17 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Farkas",
"Lóránt",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0558 | Fabien Durand | Fabien Durand (LAMFA), Adel Guerziz (LAMFA), Michel Koskas (LAMFA) | Words and morphisms with Sturmian erasures | null | Bulletin of the Belgian Mathematical Society 11, 4 (2004) 575-588 | null | null | math.CO cs.DM | null | We say $x \in \{0,1,2 \}^{\NN}$ is a word with Sturmian erasures if for any
$a\in \{0,1,2 \}$ the word obtained erasing all $a$ in $x$ is a Sturmian word.
A large family of such words is given coding trajectories of balls in the game
of billiards in the cube. We prove that the monoid of morphisms mapping all
words with Sturmian erasures to words with Sturmian erasures is not finitely
generated.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 16:16:53 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Durand",
"Fabien",
"",
"LAMFA"
],
[
"Guerziz",
"Adel",
"",
"LAMFA"
],
[
"Koskas",
"Michel",
"",
"LAMFA"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.0575 | Manik Lal Das | Manik Lal Das | A Flexible and Secure Remote Systems Authentication Scheme Using Smart
Cards | null | Published in the Transactions on Electronics, Computer and
Communication, 1(2):78-82, 2006 | null | null | cs.CR | null | The paper presents an authentication scheme for remote systems using smart
card. The scheme prevents the scenario of many logged in users with the same
login identity, and does not require password/verifier table to validate the
users' login request. The scheme provides a user-friendly password change
option, and withstands the replay, impersonation, stolen-verifier, guessing,
and denial-of-service attacks.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 18:21:35 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Das",
"Manik Lal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.0581 | Zouheir Rezki Mr. | Z. Rezki, David Haccoun and Fran\c{c}ois Gagnon | Capacity of The Discrete-Time Non-Coherent Memoryless Rayleigh Fading
Channels at Low SNR | 26 pages, 5 figues, submitted to IEEE Trans. on Information Theory,
Septembre 2007 | null | null | null | cs.IT math.IT | null | The capacity of a discrete-time memoryless channel, in which successive
symbols fade independently, and where the channel state information (CSI) is
neither available at the transmitter nor at the receiver, is considered at low
SNR. We derive a closed form expression of the optimal capacity-achieving input
distribution at low signal-to-noise ratio (SNR) and give the exact capacity of
a non-coherent channel at low SNR. The derived relations allow to better
understanding the capacity of non-coherent channels at low SNR and bring an
analytical answer to the peculiar behavior of the optimal input distribution
observed in a previous work by Abou Faycal, Trott and Shamai. Then, we compute
the non-coherence penalty and give a more precise characterization of the
sub-linear term in SNR. Finally, in order to better understand how the optimal
input varies with SNR, upper and lower bounds on the capacity-achieving input
are given.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 19:37:47 GMT"
}
] | 2008-01-04T00:00:00 | [
[
"Rezki",
"Z.",
""
],
[
"Haccoun",
"David",
""
],
[
"Gagnon",
"François",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0586 | Daniel Perrucci | Gabriela Jeronimo, Daniel Perrucci, Juan Sabia | On sign conditions over real multivariate polynomials | extended version | null | null | null | math.AG cs.CG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new probabilistic algorithm to find a finite set of points
intersecting the closure of each connected component of the realization of
every sign condition over a family of real polynomials defining regular
hypersurfaces that intersect transversally. This enables us to show a
probabilistic procedure to list all feasible sign conditions over the
polynomials. In addition, we extend these results to the case of closed sign
conditions over an arbitrary family of real multivariate polynomials. The
complexity bounds for these procedures improve the known ones.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 20:03:05 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2008 19:58:32 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Jeronimo",
"Gabriela",
""
],
[
"Perrucci",
"Daniel",
""
],
[
"Sabia",
"Juan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0801.0590 | Kettani Omar | Omar Kettani | An algorithm for finding the Independence Number of a graph | 15 pages; a corrected proof for the second method is added | null | null | null | cs.DM cs.DS | null | In this paper, we prove that for every connected graph G, there exists a
split graph H with the same independence number and the same order. Then we
propose a first algorithm for finding this graph, given the degree sequence of
the input graph G. Further, we propose a second algorithm for finding the
independence number of G, given the adjacency matrix of G.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 20:51:38 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jan 2008 16:00:32 GMT"
},
{
"version": "v3",
"created": "Sun, 6 Jan 2008 20:50:20 GMT"
},
{
"version": "v4",
"created": "Wed, 9 Jan 2008 13:51:59 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Kettani",
"Omar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.0597 | Min Chen | Min Chen, Semih Serbetli and Aylin Yener | Distributed Power Allocation Strategies for Parallel Relay Networks | IEEE Transactions on Wireless Communications, accepted for
publication. 10 pages, 7 figures | null | null | null | cs.IT math.IT | null | We consider a source-destination pair assisted by parallel regenerative
decode-and-forward relays operating in orthogonal channels. We investigate
distributed power allocation strategies for this system with limited channel
state information at the source and the relay nodes. We first propose a
distributed decision mechanism for each relay to individually make its decision
on whether to forward the source data. The decision mechanism calls for each
relay that is able to decode the information from the source to compare its
relay-to-destination channel gain with a given threshold. We identify the
optimum distributed power allocation strategy that minimizes the total transmit
power while providing a target signal-to-noise ratio at the destination with a
target outage probability. The strategy dictates the optimum choices for the
source power as well as the threshold value at the relays. Next, we consider
two simpler distributed power allocation strategies, namely the passive source
model where the source power and the relay threshold are fixed, and the single
relay model where only one relay is allowed to forward the source data. These
models are motivated by limitations on the available channel state information
as well as ease of implementation as compared to the optimum distributed
strategy. Simulation results are presented to demonstrate the performance of
the proposed distributed power allocation schemes. Specifically, we observe
significant power savings with proposed methods as compared to random relay
selection.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 21:01:48 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Chen",
"Min",
""
],
[
"Serbetli",
"Semih",
""
],
[
"Yener",
"Aylin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0609 | Grenville Croll | Raymond J. Butler | Applying the CobiT Control Framework to Spreadsheet Developments | 6 Pages | Proc. European Spreadsheet Risks Int. Grp. 2001 7-13 ISBN:1 86166
179 7 | null | null | cs.SE cs.CY | null | One of the problems reported by researchers and auditors in the field of
spreadsheet risks is that of getting and keeping managements attention to the
problem. Since 1996, the Information Systems Audit & Control Foundation and the
IT Governance Institute have published CobiT which brings mainstream IT control
issues into the corporate governance arena. This paper illustrates how
spreadsheet risk and control issues can be mapped onto the CobiT framework and
thus brought to managers attention in a familiar format.
| [
{
"version": "v1",
"created": "Thu, 3 Jan 2008 22:09:15 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Butler",
"Raymond J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.0625 | Shiguo Lian | Shiguo Lian | On the Robustness of the Delay-Based Fingerprint Embedding Scheme | 9 pages,6 figures | null | null | null | cs.MM cs.SD | null | The delay-based fingerprint embedding was recently proposed to support more
users in secure media distribution scenario. In this embedding scheme, some
users are assigned the same fingerprint code with only different embedding
delay. The algorithm's robustness against collusion attacks is investigated.
However, its robustness against common desynchronization attacks, e.g.,
cropping and time shifting, is not considered. In this paper, desynchronization
attacks are used to break the delay-based fingerprint embedding algorithm. To
improve the robustness, two means are proposed to keep the embedded fingerprint
codes synchronized, i.e., adding a synchronization fingerprint and adopting the
relative delay to detect users. Analyses and experiments are given to show the
improvements.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 03:15:56 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Lian",
"Shiguo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0801.0649 | Frederic Prost | F. Prost and C. Zerrari | A logical analysis of entanglement and separability in quantum
higher-order functions | 19 pages | null | 10.1007/978-3-642-03745-0_25 | null | cs.LO | null | We present a logical separability analysis for a functional quantum
computation language. This logic is inspired by previous works on logical
analysis of aliasing for imperative functional programs. Both analyses share
similarities notably because they are highly non-compositional. Quantum setting
is harder to deal with since it introduces non determinism and thus
considerably modifies semantics and validity of logical assertions. This logic
is the first proposal of entanglement/separability analysis dealing with a
functional quantum programming language with higher-order functions.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 10:12:59 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Prost",
"F.",
""
],
[
"Zerrari",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0665 | Fabien Durand | Fabien Durand (LAMFA) | A theorem of Cobham for non-primitive substitutions | null | Acta Arithmetica 104, 3 (2002) 225-241 | null | null | math.CO cs.DM | null | In this article we generalize Cobham theorem to a large class of
substitutions including non primitive and non constant length substitutions.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 11:57:20 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Durand",
"Fabien",
"",
"LAMFA"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.0672 | Tobias Koch | Tobias Koch and Amos Lapidoth | On Multipath Fading Channels at High SNR | To be presented at the 2008 IEEE Symposium on Information Theory
(ISIT), Toronto, Canada; replaced with version that appears in the
proceedings | null | null | null | cs.IT math.IT | null | This paper studies the capacity of discrete-time multipath fading channels.
It is assumed that the number of paths is finite, i.e., that the channel output
is influenced by the present and by the L previous channel inputs. A
noncoherent channel model is considered where neither transmitter nor receiver
are cognizant of the fading's realization, but both are aware of its statistic.
The focus is on capacity at high signal-to-noise ratios (SNR). In particular,
the capacity pre-loglog - defined as the limiting ratio of the capacity to
loglog SNR as SNR tends to infinity - is studied. It is shown that,
irrespective of the number paths L, the capacity pre-loglog is 1.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 12:40:05 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2008 14:16:17 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0677 | Jad Saklawi | Paul C. Attie | Finite-state concurrent programs can be expressed pairwise | 14 pages | null | null | null | cs.LO | null | We present a \emph{pairwise normal form} for finite-state shared memory
concurrent programs: all variables are shared between exactly two processes,
and the guards on transitions are conjunctions of conditions over this pairwise
shared state. This representation has been used to efficiently (in polynomial
time) synthesize and model-check correctness properties of concurrent programs.
Our main result is that any finite state concurrent program can be transformed
into pairwise normal form. Specifically, if $Q$ is an arbitrary finite-state
shared memory concurrent program, then there exists a finite-state shared
memory concurrent program $P$ expressed in pairwise normal form such that $P$
is strongly bisimilar to $Q$. Our result is constructive: we give an algorithm
for producing $P$, given $Q$.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 13:14:31 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Attie",
"Paul C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0678 | Joel Chevrier | Sylvain Marli\`ere (ICA), Jean Loup Florens (ICA), Florence Marchi
(ESRF, NEEL), Annie Luciani (ICA), Joel Chevrier (ESRF, NEEL) | Implementation of perception and action at nanoscale | Proceedings of ENACTIVE/07 4th International Conference on Enactive
Interfaces Grenoble, France, November 19th-22nd, 2007 | null | null | null | cs.RO cs.HC | null | Real time combination of nanosensors and nanoactuators with virtual reality
environment and multisensorial interfaces enable us to efficiently act and
perceive at nanoscale. Advanced manipulation of nanoobjects and new strategies
for scientific education are the key motivations. We have no existing intuitive
representation of the nanoworld ruled by laws foreign to our experience. A
central challenge is then the construction of nanoworld simulacrum that we can
start to visit and to explore. In this nanoworld simulacrum, object
identifications will be based on probed entity physical and chemical intrinsic
properties, on their interactions with sensors and on the final choices made in
building a multisensorial interface so that these objects become coherent
elements of the human sphere of action and perception. Here we describe a 1D
virtual nanomanipulator, part of the Cit\'e des Sciences EXPO NANO in Paris,
that is the first realization based on this program.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 13:38:39 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Marlière",
"Sylvain",
"",
"ICA"
],
[
"Florens",
"Jean Loup",
"",
"ICA"
],
[
"Marchi",
"Florence",
"",
"ESRF, NEEL"
],
[
"Luciani",
"Annie",
"",
"ICA"
],
[
"Chevrier",
"Joel",
"",
"ESRF, NEEL"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.0701 | Leah Nutman | Leah Nutman and Michael Langberg | Adversarial Models and Resilient Schemes for Network Coding | Second version includes minor editing | null | null | null | cs.IT cs.DC cs.NI math.IT | null | In a recent paper, Jaggi et al. (INFOCOM 2007), presented a distributed
polynomial-time rate-optimal network-coding scheme that works in the presence
of Byzantine faults. We revisit their adversarial models and augment them with
three, arguably realistic, models. In each of the models, we present a
distributed scheme that demonstrates the usefulness of the model. In
particular, all of the schemes obtain optimal rate $C-z$, where $C$ is the
network capacity and $z$ is a bound on the number of links controlled by the
adversary.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 16:17:49 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Feb 2008 16:49:31 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Nutman",
"Leah",
""
],
[
"Langberg",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0714 | James Cheney | James Cheney | Regular Expression Subtyping for XML Query and Update Languages | ESOP 2008. Companion technical report with proofs | null | null | null | cs.PL cs.DB | null | XML database query languages such as XQuery employ regular expression types
with structural subtyping. Subtyping systems typically have two presentations,
which should be equivalent: a declarative version in which the subsumption rule
may be used anywhere, and an algorithmic version in which the use of
subsumption is limited in order to make typechecking syntax-directed and
decidable. However, the XQuery standard type system circumvents this issue by
using imprecise typing rules for iteration constructs and defining only
algorithmic typechecking, and another extant proposal provides more precise
types for iteration constructs but ignores subtyping. In this paper, we
consider a core XQuery-like language with a subsumption rule and prove the
completeness of algorithmic typechecking; this is straightforward for XQuery
proper but requires some care in the presence of more precise iteration typing
disciplines. We extend this result to an XML update language we have introduced
in earlier work.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 18:13:48 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Cheney",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0801.0715 | Grenville Croll | Stephen G. Powell, Barry Lawson, and Kenneth R. Baker | Impact of Errors in Operational Spreadsheets | 12 pages including references | Proc. European Spreadsheet Risks Int. Grp. 2007 57-68 ISBN
978-905617-58-6 | null | null | cs.CY | null | All users of spreadsheets struggle with the problem of errors. Errors are
thought to be prevalent in spreadsheets, and in some instances they have cost
organizations millions of dollars. In a previous study of 50 operational
spreadsheets we found errors in 0.8% to 1.8% of all formula cells, depending on
how errors are defined. In the current study we estimate the quantitative
impacts of errors in 25 operational spreadsheets from five different
organizations. We find that many errors have no quantitative impact on the
spreadsheet. Those that have an impact often affect unimportant portions of the
spreadsheet. The remaining errors do sometimes have substantial impacts on key
aspects of the spreadsheet. This paper provides the first fully-documented
evidence on the quantitative impact of errors in operational spreadsheets.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 18:26:10 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Powell",
"Stephen G.",
""
],
[
"Lawson",
"Barry",
""
],
[
"Baker",
"Kenneth R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.0756 | Nan Ma | Nan Ma, Prakash Ishwar | Distributed Source Coding for Interactive Function Computation | 30 pages, 6 figures. This work has been submitted to the IEEE for
possible publication. Parts of this work were presented at 2008 IEEE
International Symposium on Information Theory (ISIT'08) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A two-terminal interactive distributed source coding problem with alternating
messages for function computation at both locations is studied. For any number
of messages, a computable characterization of the rate region is provided in
terms of single-letter information measures. While interaction is useless in
terms of the minimum sum-rate for lossless source reproduction at one or both
locations, the gains can be arbitrarily large for function computation even
when the sources are independent. For a class of sources and functions,
interaction is shown to be useless, even with infinite messages, when a
function has to be computed at only one location, but is shown to be useful, if
functions have to be computed at both locations. For computing the Boolean AND
function of two independent Bernoulli sources at both locations, an achievable
infinite-message sum-rate with infinitesimal-rate messages is derived in terms
of a two-dimensional definite integral and a rate-allocation curve. A general
framework for multiterminal interactive function computation based on an
information exchange protocol which successively switches among different
distributed source coding configurations is developed. For networks with a star
topology, multiple rounds of interactive coding is shown to decrease the
scaling law of the total network rate by an order of magnitude as the network
grows.
| [
{
"version": "v1",
"created": "Fri, 4 Jan 2008 22:37:47 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Feb 2008 22:59:24 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Feb 2008 22:31:24 GMT"
},
{
"version": "v4",
"created": "Wed, 12 Nov 2008 22:20:42 GMT"
}
] | 2008-11-13T00:00:00 | [
[
"Ma",
"Nan",
""
],
[
"Ishwar",
"Prakash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0813 | Beno\^it Valiron | Peter Selinger (1), Beno\^it Valiron (2) ((1) Dalhousie University,
(2) University of Ottawa) | A linear-non-linear model for a computational call-by-value lambda
calculus (extended abstract) | 15 pages. Preprint, to appear in the proceedings of FOSSACS'08 | null | null | null | cs.LO | null | We give a categorical semantics for a call-by-value linear lambda calculus.
Such a lambda calculus was used by Selinger and Valiron as the backbone of a
functional programming language for quantum computation. One feature of this
lambda calculus is its linear type system, which includes a duplicability
operator "!" as in linear logic. Another main feature is its call-by-value
reduction strategy, together with a side-effect to model probabilistic
measurements. The "!" operator gives rise to a comonad, as in the linear logic
models of Seely, Bierman, and Benton. The side-effects give rise to a monad, as
in Moggi's computational lambda calculus. It is this combination of a monad and
a comonad that makes the present paper interesting. We show that our
categorical semantics is sound and complete.
| [
{
"version": "v1",
"created": "Sat, 5 Jan 2008 15:21:17 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Selinger",
"Peter",
""
],
[
"Valiron",
"Benoît",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0815 | Yuval Kochman | Yuval Kochman and Ram Zamir | Joint Wyner-Ziv/Dirty Paper coding by modulo-lattice modulation | Submitted to IEEE Transactions on Information Theory. Presented in
part in ISIT-2006, Seattle. New version after review | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The combination of source coding with decoder side-information (Wyner-Ziv
problem) and channel coding with encoder side-information (Gel'fand-Pinsker
problem) can be optimally solved using the separation principle. In this work
we show an alternative scheme for the quadratic-Gaussian case, which merges
source and channel coding. This scheme achieves the optimal performance by a
applying modulo-lattice modulation to the analog source. Thus it saves the
complexity of quantization and channel decoding, and remains with the task of
"shaping" only. Furthermore, for high signal-to-noise ratio (SNR), the scheme
approaches the optimal performance using an SNR-independent encoder, thus it is
robust to unknown SNR at the encoder.
| [
{
"version": "v1",
"created": "Sat, 5 Jan 2008 15:40:57 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jan 2008 09:10:35 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Dec 2008 13:01:40 GMT"
}
] | 2008-12-17T00:00:00 | [
[
"Kochman",
"Yuval",
""
],
[
"Zamir",
"Ram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0821 | Mark Wilde | Mark M. Wilde and Todd A. Brun | Unified Quantum Convolutional Coding | 5 pages, 1 figure, Accepted for publication in the Proceedings of the
2008 IEEE International Symposium on Information Theory (ISIT 2008) | Proceedings of the 2008 International Symposium on Information
Theory, pp. 359-363, Toronto, Ontario, Canada, July 2008. | 10.1109/ISIT.2008.4595008 | CSI-08-01-01 | quant-ph cs.IT math.IT | null | We outline a quantum convolutional coding technique for protecting a stream
of classical bits and qubits. Our goal is to provide a framework for designing
codes that approach the ``grandfather'' capacity of an entanglement-assisted
quantum channel for sending classical and quantum information simultaneously.
Our method incorporates several resources for quantum redundancy: fresh ancilla
qubits, entangled bits, and gauge qubits. The use of these diverse resources
gives our technique the benefits of both active and passive quantum error
correction. We can encode a classical-quantum bit stream with periodic quantum
gates because our codes possess a convolutional structure. We end with an
example of a ``grandfather'' quantum convolutional code that protects one qubit
and one classical bit per frame by encoding them with one fresh ancilla qubit,
one entangled bit, and one gauge qubit per frame. We explicitly provide the
encoding and decoding circuits for this example.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2008 16:22:33 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2008 19:50:13 GMT"
}
] | 2008-10-20T00:00:00 | [
[
"Wilde",
"Mark M.",
""
],
[
"Brun",
"Todd A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0830 | Atilim Gunes Baydin | Atilim Gunes Baydin | Evolution of central pattern generators for the control of a five-link
bipedal walking mechanism | 11 pages, 9 figures; substantial revision of content, organization,
and quantitative results | Paladyn. Journal of Behavioral Robotics 3(1), 45-53 (2012) | 10.2478/s13230-012-0019-y | null | cs.NE cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Central pattern generators (CPGs), with a basis is neurophysiological
studies, are a type of neural network for the generation of rhythmic motion.
While CPGs are being increasingly used in robot control, most applications are
hand-tuned for a specific task and it is acknowledged in the field that generic
methods and design principles for creating individual networks for a given task
are lacking. This study presents an approach where the connectivity and
oscillatory parameters of a CPG network are determined by an evolutionary
algorithm with fitness evaluations in a realistic simulation with accurate
physics. We apply this technique to a five-link planar walking mechanism to
demonstrate its feasibility and performance. In addition, to see whether
results from simulation can be acceptably transferred to real robot hardware,
the best evolved CPG network is also tested on a real mechanism. Our results
also confirm that the biologically inspired CPG model is well suited for legged
locomotion, since a diverse manifestation of networks have been observed to
succeed in fitness simulations during evolution.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2008 00:20:25 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2008 19:28:42 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Mar 2008 17:37:29 GMT"
},
{
"version": "v4",
"created": "Sat, 21 Nov 2009 00:04:19 GMT"
},
{
"version": "v5",
"created": "Sat, 30 Jul 2011 02:01:05 GMT"
},
{
"version": "v6",
"created": "Mon, 10 Oct 2011 17:37:47 GMT"
},
{
"version": "v7",
"created": "Tue, 11 Oct 2011 02:42:44 GMT"
},
{
"version": "v8",
"created": "Wed, 12 Oct 2011 00:42:10 GMT"
},
{
"version": "v9",
"created": "Thu, 29 Mar 2012 02:02:45 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Baydin",
"Atilim Gunes",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0801.0841 | Saikat Guha | Saikat Guha, Jeffrey H. Shapiro, Baris I. Erkmen | Capacity of the Bosonic Wiretap Channel and the Entropy Photon-Number
Inequality | 5 pages, 1 figure, submitted to ISIT 2008 | null | null | null | quant-ph cs.IT math.IT | null | Determining the ultimate classical information carrying capacity of
electromagnetic waves requires quantum-mechanical analysis to properly account
for the bosonic nature of these waves. Recent work has established capacity
theorems for bosonic single-user and broadcast channels, under the presumption
of two minimum output entropy conjectures. Despite considerable accumulated
evidence that supports the validity of these conjectures, they have yet to be
proven. In this paper, it is shown that the second conjecture suffices to prove
the classical capacity of the bosonic wiretap channel, which in turn would also
prove the quantum capacity of the lossy bosonic channel. The preceding minimum
output entropy conjectures are then shown to be simple consequences of an
Entropy Photon-Number Inequality (EPnI), which is a conjectured
quantum-mechanical analog of the Entropy Power Inequality (EPI) form classical
information theory.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2008 06:49:55 GMT"
}
] | 2008-02-10T00:00:00 | [
[
"Guha",
"Saikat",
""
],
[
"Shapiro",
"Jeffrey H.",
""
],
[
"Erkmen",
"Baris I.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.