id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0801.0857 | Wenfeng Jiang | Lei Hu, Xiangyong Zeng, Nian Li, and Wenfeng Jiang | Period-Different $m$-Sequences With At Most A Four-Valued Cross
Correlation | 9 pages | null | null | null | cs.IT cs.DM math.IT | null | In this paper, we follow the recent work of Helleseth, Kholosha, Johanssen
and Ness to study the cross correlation between an $m$-sequence of period
$2^m-1$ and the $d$-decimation of an $m$-sequence of shorter period $2^{n}-1$
for an even number $m=2n$. Assuming that $d$ satisfies $d(2^l+1)=2^i({\rm mod}
2^n-1)$ for some $l$ and $i$, we prove the cross correlation takes exactly
either three or four values, depending on ${\rm gcd}(l,n)$ is equal to or
larger than 1. The distribution of the correlation values is also completely
determined. Our result confirms the numerical phenomenon Helleseth et al found.
It is conjectured that there are no more other cases of $d$ that give at most a
four-valued cross correlation apart from the ones proved here.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2008 13:31:40 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Hu",
"Lei",
""
],
[
"Zeng",
"Xiangyong",
""
],
[
"Li",
"Nian",
""
],
[
"Jiang",
"Wenfeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0882 | Nina Bohr | Neil D. Jones and Nina Bohr | Call-by-value Termination in the Untyped lambda-calculus | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 17,
2008) lmcs:915 | 10.2168/LMCS-4(1:3)2008 | null | cs.PL | null | A fully-automated algorithm is developed able to show that evaluation of a
given untyped lambda-expression will terminate under CBV (call-by-value). The
``size-change principle'' from first-order programs is extended to arbitrary
untyped lambda-expressions in two steps. The first step suffices to show CBV
termination of a single, stand-alone lambda;-expression. The second suffices to
show CBV termination of any member of a regular set of lambda-expressions,
defined by a tree grammar. (A simple example is a minimum function, when
applied to arbitrary Church numerals.) The algorithm is sound and proven so in
this paper. The Halting Problem's undecidability implies that any sound
algorithm is necessarily incomplete: some lambda-expressions may in fact
terminate under CBV evaluation, but not be recognised as terminating.
The intensional power of the termination algorithm is reasonably high. It
certifies as terminating many interesting and useful general recursive
algorithms including programs with mutual recursion and parameter exchanges,
and Colson's ``minimum'' algorithm. Further, our type-free approach allows use
of the Y combinator, and so can identify as terminating a substantial subset of
PCF.
| [
{
"version": "v1",
"created": "Sun, 6 Jan 2008 19:01:02 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Mar 2008 12:55:44 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Jones",
"Neil D.",
""
],
[
"Bohr",
"Nina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.0931 | Ryuhei Mori | Ryuhei Mori, Kenta Kasai, Tomoharu Shibuya, and Kohichi Sakaniwa | The Asymptotic Bit Error Probability of LDPC Codes for the Binary
Erasure Channel with Finite Iteration Number | 5 pages, 6 figures, correcting errors in Theorem 1 and poor English | null | null | null | cs.IT math.IT | null | We consider communication over the binary erasure channel (BEC) using
low-density parity-check (LDPC) code and belief propagation (BP) decoding. The
bit error probability for infinite block length is known by density evolution
and it is well known that a difference between the bit error probability at
finite iteration number for finite block length $n$ and for infinite block
length is asymptotically $\alpha/n$, where $\alpha$ is a specific constant
depending on the degree distribution, the iteration number and the erasure
probability. Our main result is to derive an efficient algorithm for
calculating $\alpha$ for regular ensembles. The approximation using $\alpha$ is
accurate for $(2,r)$-regular ensembles even in small block length.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 09:40:41 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2008 12:37:13 GMT"
}
] | 2008-01-23T00:00:00 | [
[
"Mori",
"Ryuhei",
""
],
[
"Kasai",
"Kenta",
""
],
[
"Shibuya",
"Tomoharu",
""
],
[
"Sakaniwa",
"Kohichi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0938 | Sang-Woon Jeon | Sang-Woon Jeon, Natasha Devroye, Mai Vu, Sae-Young Chung, Vahid Tarokh | Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network | 28 pages, 12 figures, submitted to IEEE Trans. on Information Theory | IEEE Transactions on Information Theory, vol. 57, no. 8, pp.
5103-5115, Aug. 2011 | 10.1109/TIT.2011.2158874 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study two distinct, but overlapping, networks that operate at the same
time, space, and frequency. The first network consists of $n$ randomly
distributed \emph{primary users}, which form either an ad hoc network, or an
infrastructure-supported ad hoc network with $l$ additional base stations. The
second network consists of $m$ randomly distributed, ad hoc secondary users or
cognitive users. The primary users have priority access to the spectrum and do
not need to change their communication protocol in the presence of secondary
users. The secondary users, however, need to adjust their protocol based on
knowledge about the locations of the primary nodes to bring little loss to the
primary network's throughput. By introducing preservation regions around
primary receivers and avoidance regions around primary base stations, we
propose two modified multihop routing protocols for the cognitive users. Base
on percolation theory, we show that when the secondary network is denser than
the primary network, both networks can simultaneously achieve the same
throughput scaling law as a stand-alone network. Furthermore, the primary
network throughput is subject to only a vanishingly fractional loss.
Specifically, for the ad hoc and the infrastructure-supported primary models,
the primary network achieves sum throughputs of order $n^{1/2}$ and
$\max\{n^{1/2},l\}$, respectively. For both primary network models, for any
$\delta>0$, the secondary network can achieve sum throughput of order
$m^{1/2-\delta}$ with an arbitrarily small fraction of outage. Thus, almost all
secondary source-destination pairs can communicate at a rate of order
$m^{-1/2-\delta}$.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 10:52:39 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2009 05:24:13 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Jeon",
"Sang-Woon",
""
],
[
"Devroye",
"Natasha",
""
],
[
"Vu",
"Mai",
""
],
[
"Chung",
"Sae-Young",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.0949 | Jad Saklawi | Paul C. Attie | On the Refinement of Liveness Properties of Distributed Systems | 54 pages, 12 figures | null | null | null | cs.LO | null | We present a new approach for reasoning about liveness properties of
distributed systems, represented as automata. Our approach is based on
simulation relations, and requires reasoning only over finite execution
fragments. Current simulation-relation based methods for reasoning about
liveness properties of automata require reasoning over entire executions, since
they involve a proof obligation of the form: if a concrete and abstract
execution ``correspond'' via the simulation, and the concrete execution is
live, then so is the abstract execution.
Our contribution consists of (1) a formalism for defining liveness
properties, (2) a proof method for liveness properties based on that formalism,
and (3) two expressive completeness results: firstly, our formalism can express
any liveness property which satisfies a natural ``robustness'' condition, and
secondly, our formalism can express any liveness property at all, provided that
history variables can be used
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 11:55:03 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Attie",
"Paul C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.0969 | Javier Gonz\'alez Est\'evez | J. Gonzalez-Estevez, M. G. Cosenza, R. Lopez-Ruiz, and J. R. Sanchez | Pareto and Boltzmann-Gibbs behaviors in a deterministic multi-agent
system | 9 pages, 9 color .eps figures, submitted to Physica A | null | 10.1016/j.physa.2008.03.013 | null | q-fin.GN cond-mat.stat-mech cs.MA nlin.AO nlin.CD physics.comp-ph physics.soc-ph | null | A deterministic system of interacting agents is considered as a model for
economic dynamics. The dynamics of the system is described by a coupled map
lattice with near neighbor interactions. The evolution of each agent results
from the competition between two factors: the agent's own tendency to grow and
the environmental influence that moderates this growth. Depending on the values
of the parameters that control these factors, the system can display Pareto or
Boltzmann-Gibbs statistical behaviors in its asymptotic dynamical regime. The
regions where these behaviors appear are calculated on the space of parameters
of the system. Other statistical properties, such as the mean wealth, the
standard deviation, and the Gini coefficient characterizing the degree of
equity in the wealth distribution are also calculated on the space of
parameters of the system.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 13:15:16 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Gonzalez-Estevez",
"J.",
""
],
[
"Cosenza",
"M. G.",
""
],
[
"Lopez-Ruiz",
"R.",
""
],
[
"Sanchez",
"J. R.",
""
]
] | [
{
"class": "Quantitative Finance",
"code": "q-fin.GN",
"description": "Development of general quantitative methodologies with applications in finance",
"span": "(General Finance)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0801.1002 | Ulrich Schuster | Ulrich G. Schuster and Giuseppe Durisi and Helmut B\"olcskei and H.
Vincent Poor | Capacity Bounds for Peak-Constrained Multiantenna Wideband Channels | Submitted to the IEEE Transactions on Communications | null | null | null | cs.IT math.IT | null | We derive bounds on the noncoherent capacity of a very general class of
multiple-input multiple-output channels that allow for selectivity in time and
frequency as well as for spatial correlation. The bounds apply to
peak-constrained inputs; they are explicit in the channel's scattering
function, are useful for a large range of bandwidth, and allow to coarsely
identify the capacity-optimal combination of bandwidth and number of transmit
antennas. Furthermore, we obtain a closed-form expression for the first-order
Taylor series expansion of capacity in the limit of infinite bandwidth. From
this expression, we conclude that in the wideband regime: (i) it is optimal to
use only one transmit antenna when the channel is spatially uncorrelated; (ii)
rank-one statistical beamforming is optimal if the channel is spatially
correlated; and (iii) spatial correlation, be it at the transmitter, the
receiver, or both, is beneficial.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 15:04:36 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jan 2008 09:51:58 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Schuster",
"Ulrich G.",
""
],
[
"Durisi",
"Giuseppe",
""
],
[
"Bölcskei",
"Helmut",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1033 | George Tsibidis | George Tsibidis, Theodoros N. Arvanitis and Chris Baber | The What, Who, Where, When, Why and How of Context-Awareness | Accepted manuscript at the CHI 2000, April 3-2000, The Hague, The
Netherlands | null | null | null | cs.HC | null | The understanding of context and context-awareness is very important for the
areas of handheld and ubiquitous computing. Unfortunately, at present, there
has not been a satisfactory definition of these two concepts that would lead to
a more effective communication in humancomputer interaction. As a result, on
the one hand, application designers are not able to choose what context to use
in their applications and on the other, they cannot determine the type of
context-awareness behaviours their applications should exhibit. In this work,
we aim to provide answers to some fundamental questions that could enlighten us
on the definition of context and its functionality.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 16:05:46 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Tsibidis",
"George",
""
],
[
"Arvanitis",
"Theodoros N.",
""
],
[
"Baber",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.1060 | Navin Kashyap | Akiko Manada and Navin Kashyap | On the Period of a Periodic-Finite-Type Shift | revised version; 5 pages; to appear in the Proceedings of the 2008
IEEE International Symposium on Information Theory (ISIT'08), Toronto, Canada | null | null | null | cs.IT math.IT | null | Periodic-finite-type shifts (PFT's) form a class of sofic shifts that
strictly contains the class of shifts of finite type (SFT's). In this paper, we
investigate how the notion of "period" inherent in the definition of a PFT
causes it to differ from an SFT, and how the period influences the properties
of a PFT.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 16:53:32 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2008 15:19:23 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Manada",
"Akiko",
""
],
[
"Kashyap",
"Navin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1063 | Ivan Titov | Ivan Titov and Ryan McDonald | Modeling Online Reviews with Multi-grain Topic Models | null | null | null | null | cs.IR cs.DB | null | In this paper we present a novel framework for extracting the ratable aspects
of objects from online user reviews. Extracting such aspects is an important
challenge in automatically mining product opinions from the web and in
generating opinion-based summaries of user reviews. Our models are based on
extensions to standard topic modeling methods such as LDA and PLSA to induce
multi-grain topics. We argue that multi-grain models are more appropriate for
our task since standard models tend to produce topics that correspond to global
properties of objects (e.g., the brand of a product type) rather than the
aspects of an object that tend to be rated by a user. The models we present not
only extract ratable aspects, but also cluster them into coherent topics, e.g.,
`waitress' and `bartender' are part of the same topic `staff' for restaurants.
This differentiates it from much of the previous work which extracts aspects
through term frequency analysis with minimal clustering. We evaluate the
multi-grain models both qualitatively and quantitatively to show that they
improve significantly upon standard topic models.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 17:01:34 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Titov",
"Ivan",
""
],
[
"McDonald",
"Ryan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0801.1067 | Thorsten Hehn | Johannes B. Huber and Thorsten Hehn | The lowest-possible BER and FER for any discrete memoryless channel with
given capacity | Accepted as a Transactions on Communications Letter,9 Pages, 4
Figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate properties of a channel coding scheme leading to the
minimum-possible frame error ratio when transmitting over a memoryless channel
with rate R>C. The results are compared to the well-known properties of a
channel coding scheme leading to minimum bit error ratio. It is concluded that
these two optimization requests are contradicting. A valuable application of
the derived results is presented.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 17:12:54 GMT"
},
{
"version": "v2",
"created": "Tue, 20 May 2008 09:22:16 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Mar 2009 21:27:40 GMT"
},
{
"version": "v4",
"created": "Fri, 20 Mar 2009 23:30:23 GMT"
}
] | 2009-03-21T00:00:00 | [
[
"Huber",
"Johannes B.",
""
],
[
"Hehn",
"Thorsten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1126 | Ido Tal | Ido Tal, Ron M. Roth | Concave Programming Upper Bounds on the Capacity of 2-D Constraints | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity of 1-D constraints is given by the entropy of a corresponding
stationary maxentropic Markov chain. Namely, the entropy is maximized over a
set of probability distributions, which is defined by some linear requirements.
In this paper, certain aspects of this characterization are extended to 2-D
constraints. The result is a method for calculating an upper bound on the
capacity of 2-D constraints.
The key steps are: The maxentropic stationary probability distribution on
square configurations is considered. A set of linear equalities and
inequalities is derived from this stationarity. The result is a concave
program, which can be easily solved numerically. Our method improves upon
previous upper bounds for the capacity of the 2-D ``no independent bits''
constraint, as well as certain 2-D RLL constraints.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 22:19:48 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2009 17:57:44 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Jun 2009 17:04:58 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Tal",
"Ido",
""
],
[
"Roth",
"Ron M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1136 | Wenyi Zhang | Wenyi Zhang, Satish Vedantam, and Urbashi Mitra | A Constrained Channel Coding Approach to Joint Communication and Channel
Estimation | Submitted to ISIT 2008 | null | null | null | cs.IT math.IT | null | A joint communication and channel state estimation problem is investigated,
in which reliable information transmission over a noisy channel, and
high-fidelity estimation of the channel state, are simultaneously sought. The
tradeoff between the achievable information rate and the estimation distortion
is quantified by formulating the problem as a constrained channel coding
problem, and the resulting capacity-distortion function characterizes the
fundamental limit of the joint communication and channel estimation problem.
The analytical results are illustrated through case studies, and further issues
such as multiple cost constraints, channel uncertainty, and capacity per unit
distortion are also briefly discussed.
| [
{
"version": "v1",
"created": "Mon, 7 Jan 2008 23:55:18 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Zhang",
"Wenyi",
""
],
[
"Vedantam",
"Satish",
""
],
[
"Mitra",
"Urbashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1138 | Wenyi Zhang | Wenyi Zhang | An Addendum to "How Good is PSK for Peak-Limited Fading Channels in the
Low-SNR Regime?" | Submitted as an addendum to the paper appearing in the title | null | null | null | cs.IT math.IT | null | A proof is provided of the operational achievability of $R_\mathrm{rt}$ by
the recursive training scheme in \cite{zhang07:it}, for general wide-sense
stationary and ergodic Rayleigh fading processes.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 00:00:14 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Zhang",
"Wenyi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1141 | Tobias Lutz | Tobias Lutz, Christoph Hausl, Ralf K\"otter | Coding Strategies for Noise-Free Relay Cascades with Half-Duplex
Constraint | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595418 | null | cs.IT math.IT | null | Two types of noise-free relay cascades are investigated. Networks where a
source communicates with a distant receiver via a cascade of half-duplex
constrained relays, and networks where not only the source but also a single
relay node intends to transmit information to the same destination. We
introduce two relay channel models, capturing the half-duplex constraint, and
within the framework of these models capacity is determined for the first
network type. It turns out that capacity is significantly higher than the rates
which are achievable with a straightforward time-sharing approach. A capacity
achieving coding strategy is presented based on allocating the transmit and
receive time slots of a node in dependence of the node's previously received
data. For the networks of the second type, an upper bound to the rate region is
derived from the cut-set bound. Further, achievability of the cut-set bound in
the single relay case is shown given that the source rate exceeds a certain
minimum value.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 16:55:35 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2008 13:42:04 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Lutz",
"Tobias",
""
],
[
"Hausl",
"Christoph",
""
],
[
"Kötter",
"Ralf",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1179 | Bernard Jacquemin | Bernard Jacquemin (ISC, UMR 7044, GERIICO), Sabine Ploux (ISC) | Corpus sp{\'e}cialis{\'e} et ressource de sp{\'e}cialit{\'e} | 16 pages, in French | Appears in Fran\c{c}ois Maniez; Pascaline Dury; Nathalie Arlin;
Claire Rougemont. Corpus et dictionnaires de langues de sp{\'e}cialit{\'e},
Presses Universitaires de Granoble, pp.197-212, 2008 | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | "Semantic Atlas" is a mathematic and statistic model to visualise word senses
according to relations between words. The model, that has been applied to
proximity relations from a corpus, has shown its ability to distinguish word
senses as the corpus' contributors comprehend them. We propose to use the model
and a specialised corpus in order to create automatically a specialised
dictionary relative to the corpus' domain. A morpho-syntactic analysis
performed on the corpus makes it possible to create the dictionary from
syntactic relations between lexical units. The semantic resource can be used to
navigate semantically - and not only lexically - through the corpus, to create
classical dictionaries or for diachronic studies of the language.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 08:21:26 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Jun 2015 12:22:39 GMT"
}
] | 2015-06-22T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"ISC, UMR 7044, GERIICO"
],
[
"Ploux",
"Sabine",
"",
"ISC"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0801.1185 | Jaspreet Singh | Jaspreet Singh, Onkar Dabeer and Upamanyu Madhow | Capacity of the Discrete-Time AWGN Channel Under Output Quantization | To appear at ISIT 2008. (Some changes in the content (in Section IV)
compared to the first version uploaded on Jan 08, 2008.) | null | null | null | cs.IT math.IT | null | We investigate the limits of communication over the discrete-time Additive
White Gaussian Noise (AWGN) channel, when the channel output is quantized using
a small number of bits. We first provide a proof of our recent conjecture on
the optimality of a discrete input distribution in this scenario. Specifically,
we show that for any given output quantizer choice with K quantization bins
(i.e., a precision of log2 K bits), the input distribution, under an average
power constraint, need not have any more than K + 1 mass points to achieve the
channel capacity. The cutting-plane algorithm is employed to compute this
capacity and to generate optimum input distributions. Numerical optimization
over the choice of the quantizer is then performed (for 2-bit and 3-bit
symmetric quantization), and the results we obtain show that the loss due to
low-precision output quantization, which is small at low signal-to-noise ratio
(SNR) as expected, can be quite acceptable even for moderate to high SNR
values. For example, at SNRs up to 20 dB, 2-3 bit quantization achieves 80-90%
of the capacity achievable using infinite-precision quantization.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 08:39:04 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2008 20:54:16 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Singh",
"Jaspreet",
""
],
[
"Dabeer",
"Onkar",
""
],
[
"Madhow",
"Upamanyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1208 | Guangwen Li | Guangwen Li, Dashe Li, Yuling Wang, Wenyan Sun | Hybrid Decoding of Finite Geometry LDPC Codes | 19 pages, 5 figures, 5 tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For finite geometry low-density parity-check codes, heavy row and column
weights in their parity check matrix make the decoding with even Min-Sum (MS)
variants computationally expensive. To alleviate it, we present a class of
hybrid schemes by concatenating a parallel bit flipping (BF) variant with an
Min-Sum (MS) variant. In most SNR region of interest, without compromising
performance or convergence rate, simulation results show that the proposed
hybrid schemes can save substantial computational complexity with respect to MS
variant decoding alone. Specifically, the BF variant, with much less
computational complexity, bears most decoding load before resorting to MS
variant. Computational and hardware complexity is also elaborated to justify
the feasibility of the hybrid schemes.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 11:29:44 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Oct 2008 14:51:48 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Jan 2009 06:38:30 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Jul 2009 18:24:34 GMT"
}
] | 2009-07-02T00:00:00 | [
[
"Li",
"Guangwen",
""
],
[
"Li",
"Dashe",
""
],
[
"Wang",
"Yuling",
""
],
[
"Sun",
"Wenyan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1210 | Daniel Lombra\~na Gonz\'alez | Daniel Lombrana Gonzalez, Francisco Fernandez de Vega, L. Trujillo, G.
Olague, F. Chavez de la O, M. Cardenas, L. Araujo, P. Castillo, K. Sharman | Increasing GP Computing Power via Volunteer Computing | First draft, preparing for PPSN 2008 | null | null | null | cs.DC | null | This paper describes how it is possible to increase GP Computing Power via
Volunteer Computing (VC) using the BOINC framework. Two experiments using
well-known GP tools -Lil-gp & ECJ- are performed in order to demonstrate the
benefit of using VC in terms of computing power and speed up. Finally we
present an extension of the model where any GP tool or framework can be used
inside BOINC regardless of its programming language, complexity or required
operating system.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 11:36:35 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Gonzalez",
"Daniel Lombrana",
""
],
[
"de Vega",
"Francisco Fernandez",
""
],
[
"Trujillo",
"L.",
""
],
[
"Olague",
"G.",
""
],
[
"de la O",
"F. Chavez",
""
],
[
"Cardenas",
"M.",
""
],
[
"Araujo",
"L.",
""
],
[
"Castillo",
"P.",
""
],
[
"Sharman",
"K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.1219 | Andrey Breslav | Andrey Breslav | DSL development based on target meta-models. Using AST transformations
for automating semantic analysis in a textual DSL framework | 15 pages, 3 figures | null | null | null | cs.PL | null | This paper describes an approach to creating textual syntax for Do-
main-Specific Languages (DSL). We consider target meta-model to be the main
artifact and hence to be developed first. The key idea is to represent analysis
of textual syntax as a sequence of transformations. This is made by explicit
opera- tions on abstract syntax trees (ATS), for which a simple language is
proposed. Text-to-model transformation is divided into two parts: text-to-AST
(developed by openArchitectureWare [1]) and AST-to-model (proposed by this
paper). Our approach simplifies semantic analysis and helps to generate as much
as possi- ble.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 12:28:18 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Breslav",
"Andrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.1245 | Pedro Pablo P\'erez Velasco | Pedro Pablo Perez Velasco | Matrix Graph Grammars | 321 pages, 75 figures. This book has is publisehd by VDM verlag, ISBN
978-3639212556 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This book objective is to develop an algebraization of graph grammars.
Equivalently, we study graph dynamics. From the point of view of a computer
scientist, graph grammars are a natural generalization of Chomsky grammars for
which a purely algebraic approach does not exist up to now. A Chomsky (or
string) grammar is, roughly speaking, a precise description of a formal
language (which in essence is a set of strings). On a more discrete
mathematical style, it can be said that graph grammars -- Matrix Graph Grammars
in particular -- study dynamics of graphs. Ideally, this algebraization would
enforce our understanding of grammars in general, providing new analysis
techniques and generalizations of concepts, problems and results known so far.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 06:04:37 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Nov 2009 20:52:12 GMT"
}
] | 2009-11-17T00:00:00 | [
[
"Velasco",
"Pedro Pablo Perez",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1251 | Andrew Pitts | Andrew M. Pitts and Mark R. Shinwell | Generative Unbinding of Names | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 18,
2008) lmcs:916 | 10.2168/LMCS-4(1:4)2008 | null | cs.PL cs.LO | null | This paper is concerned with the form of typed name binding used by the
FreshML family of languages. Its characteristic feature is that a name binding
is represented by an abstract (name,value)-pair that may only be deconstructed
via the generation of fresh bound names. The paper proves a new result about
what operations on names can co-exist with this construct. In FreshML the only
observation one can make of names is to test whether or not they are equal.
This restricted amount of observation was thought necessary to ensure that
there is no observable difference between alpha-equivalent name binders. Yet
from an algorithmic point of view it would be desirable to allow other
operations and relations on names, such as a total ordering. This paper shows
that, contrary to expectations, one may add not just ordering, but almost any
relation or numerical function on names without disturbing the fundamental
correctness result about this form of typed name binding (that object-level
alpha-equivalence precisely corresponds to contextual equivalence at the
programming meta-level), so long as one takes the state of dynamically created
names into account.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 15:04:56 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Mar 2008 18:23:41 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Pitts",
"Andrew M.",
""
],
[
"Shinwell",
"Mark R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.1253 | Damiano Mazza | Patrick Baillot and Damiano Mazza | Linear Logic by Levels and Bounded Time Complexity | 63 pages. To appear in Theoretical Computer Science. This version
corrects minor fonts problems from v2 | Theoretical Computer Science 411 (2010) 470-503 | 10.1016/j.tcs.2009.09.015 | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a new characterization of elementary and deterministic polynomial
time computation in linear logic through the proofs-as-programs correspondence.
Girard's seminal results, concerning elementary and light linear logic, achieve
this characterization by enforcing a stratification principle on proofs, using
the notion of depth in proof nets. Here, we propose a more general form of
stratification, based on inducing levels in proof nets by means of indexes,
which allows us to extend Girard's systems while keeping the same complexity
properties. In particular, it turns out that Girard's systems can be recovered
by forcing depth and level to coincide. A consequence of the higher flexibility
of levels with respect to depth is the absence of boxes for handling the
paragraph modality. We use this fact to propose a variant of our polytime
system in which the paragraph modality is only allowed on atoms, and which may
thus serve as a basis for developing lambda-calculus type assignment systems
with more efficient typing algorithms than existing ones.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 15:08:20 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jul 2009 19:00:04 GMT"
},
{
"version": "v3",
"created": "Sun, 26 Jul 2009 13:07:48 GMT"
}
] | 2012-07-17T00:00:00 | [
[
"Baillot",
"Patrick",
""
],
[
"Mazza",
"Damiano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.1275 | Christophe Roche | Christophe Roche (LISTIC) | Le terme et le concept : fondements d'une ontoterminologie | 22 pages | Dans TOTh 2007 : Terminologie et Ontologie : Th\'eories et
Applications - TOTh 2007 : Terminologie et Ontologie : Th\'eories et
Applications, Annecy : France (2007) | null | null | cs.AI | null | Most definitions of ontology, viewed as a "specification of a
conceptualization", agree on the fact that if an ontology can take different
forms, it necessarily includes a vocabulary of terms and some specification of
their meaning in relation to the domain's conceptualization. And as domain
knowledge is mainly conveyed through scientific and technical texts, we can
hope to extract some useful information from them for building ontology. But is
it as simple as this? In this article we shall see that the lexical structure,
i.e. the network of words linked by linguistic relationships, does not
necessarily match the domain conceptualization. We have to bear in mind that
writing documents is the concern of textual linguistics, of which one of the
principles is the incompleteness of text, whereas building ontology - viewed as
task-independent knowledge - is concerned with conceptualization based on
formal and not natural languages. Nevertheless, the famous Sapir and Whorf
hypothesis, concerning the interdependence of thought and language, is also
applicable to formal languages. This means that the way an ontology is built
and a concept is defined depends directly on the formal language which is used;
and the results will not be the same. The introduction of the notion of
ontoterminology allows to take into account epistemological principles for
formal ontology building.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 20:12:02 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Roche",
"Christophe",
"",
"LISTIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.1276 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane Vasic, Michael
Marcellin | On the guaranteed error correction capability of LDPC codes | 5 pages, submitted to IEEE International Symposium on Information
Theory (ISIT), 2008 | null | 10.1109/ISIT.2008.4595023 | null | cs.IT math.IT | null | We investigate the relation between the girth and the guaranteed error
correction capability of $\gamma$-left regular LDPC codes when decoded using
the bit flipping (serial and parallel) algorithms. A lower bound on the number
of variable nodes which expand by a factor of at least $3 \gamma/4$ is found
based on the Moore bound. An upper bound on the guaranteed correction
capability is established by studying the sizes of smallest possible trapping
sets.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 16:53:08 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Nguyen",
"Dung Viet",
""
],
[
"Vasic",
"Bane",
""
],
[
"Marcellin",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1282 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic | LDPC Codes Which Can Correct Three Errors Under Iterative Decoding | 5 pages, 3 figures, submitted to IEEE Information Theory Workshop
(ITW), 2008 | null | 10.1109/ITW.2008.4578696 | null | cs.IT math.IT | null | In this paper, we provide necessary and sufficient conditions for a
column-weight-three LDPC code to correct three errors when decoded using
Gallager A algorithm. We then provide a construction technique which results in
a code satisfying the above conditions. We also provide numerical assessment of
code performance via simulation results.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 17:12:21 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Krishnan",
"Anantha Raman",
""
],
[
"Vasic",
"Bane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1300 | Igor Razgon | Igor Razgon and Barry O'Sullivan | Almost 2-SAT is Fixed-Parameter Tractable | This new version fixes the bug found by Somnath Sikdar in the proof
of Claim 8. In the repaired version the modification of the Almost 2-SAT
problem called 2-SLASAT is no longer needed and only the modification called
2-ASLASAT remains relevant. Hence the whole manuscript is updated so that the
2-SLASAT problem is not mentioned there anymore | null | null | null | cs.DS cs.CG cs.LO | null | We consider the following problem. Given a 2-CNF formula, is it possible to
remove at most $k$ clauses so that the resulting 2-CNF formula is satisfiable?
This problem is known to different research communities in Theoretical Computer
Science under the names 'Almost 2-SAT', 'All-but-$k$ 2-SAT', '2-CNF deletion',
'2-SAT deletion'. The status of fixed-parameter tractability of this problem is
a long-standing open question in the area of Parameterized Complexity. We
resolve this open question by proposing an algorithm which solves this problem
in $O(15^k*k*m^3)$ and thus we show that this problem is fixed-parameter
tractable.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 19:04:14 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jan 2008 19:24:05 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Feb 2008 15:14:49 GMT"
},
{
"version": "v4",
"created": "Fri, 18 Apr 2008 14:07:04 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Razgon",
"Igor",
""
],
[
"O'Sullivan",
"Barry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.1306 | Seyed Abolfazl Motahari | Abolfazl S. Motahari, Amir K. Khandani | Capacity Bounds for the Gaussian Interference Channel | 35 pages, 14 figures, submitted to IEEE Trans. on Inf. Theory | null | null | null | cs.IT math.IT | null | The capacity region of the two-user Gaussian Interference Channel (IC) is
studied. Three classes of channels are considered: weak, one-sided, and mixed
Gaussian IC. For the weak Gaussian IC, a new outer bound on the capacity region
is obtained that outperforms previously known outer bounds. The sum capacity
for a certain range of channel parameters is derived. For this range, it is
proved that using Gaussian codebooks and treating interference as noise is
optimal. It is shown that when Gaussian codebooks are used, the full
Han-Kobayashi achievable rate region can be obtained by using the naive
Han-Kobayashi achievable scheme over three frequency bands (equivalently, three
subspaces). For the one-sided Gaussian IC, an alternative proof for the Sato's
outer bound is presented. We derive the full Han-Kobayashi achievable rate
region when Gaussian codebooks are utilized. For the mixed Gaussian IC, a new
outer bound is obtained that outperforms previously known outer bounds. For
this case, the sum capacity for the entire range of channel parameters is
derived. It is proved that the full Han-Kobayashi achievable rate region using
Gaussian codebooks is equivalent to that of the one-sided Gaussian IC for a
particular range of channel parameters.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 19:56:00 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1307 | Chris Pollett | Chris Pollett and Eric Miles | Alternating Hierarchies for Time-Space Tradeoffs | 14 pages | null | null | null | cs.CC cs.LO | null | Nepomnjascii's Theorem states that for all 0 <= \epsilon < 1 and k > 0 the
class of languages recognized in nondeterministic time n^k and space
n^\epsilon, NTISP[n^k, n^\epsilon ], is contained in the linear time hierarchy.
By considering restrictions on the size of the universal quantifiers in the
linear time hierarchy, this paper refines Nepomnjascii's result to give a sub-
hierarchy, Eu-LinH, of the linear time hierarchy that is contained in NP and
which contains NTISP[n^k, n^\epsilon ]. Hence, Eu-LinH contains NL and SC. This
paper investigates basic structural properties of Eu-LinH. Then the
relationships between Eu-LinH and the classes NL, SC, and NP are considered to
see if they can shed light on the NL = NP or SC = NP questions. Finally, a new
hierarchy, zeta -LinH, is defined to reduce the space requirements needed for
the upper bound on Eu-LinH.
| [
{
"version": "v1",
"created": "Tue, 8 Jan 2008 19:59:05 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Pollett",
"Chris",
""
],
[
"Miles",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.1336 | Subhash Kak | Subhash Kak | Stream Computing | 7 pages, 4 figures | null | null | null | cs.AI | null | Stream computing is the use of multiple autonomic and parallel modules
together with integrative processors at a higher level of abstraction to embody
"intelligent" processing. The biological basis of this computing is sketched
and the matter of learning is examined.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 14:59:31 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Kak",
"Subhash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.1341 | Sergey Tsarev P. | S.P. Tsarev | Factorization in categories of systems of linear partial differential
equations | LaTeX, 23 pages | null | null | null | cs.SC | null | We start with elementary algebraic theory of factorization of linear ordinary
differential equations developed in the period 1880-1930. After exposing these
classical results we sketch more sophisticated algorithmic approaches developed
in the last 20 years.
The main part of this paper is devoted to modern generalizations of the
notion of factorization to the case of systems of linear partial differential
equations and their relation with explicit solvability of nonlinear partial
differential equations based on some constructions from the theory of abelian
categories.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 00:50:20 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Tsarev",
"S. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0801.1362 | An-Ping Li | An-Ping Li | A new key exchange cryptosystem | A revision | null | null | null | cs.CR | null | In this paper, we will present a new key exchange cryptosystem based on
linear algebra, which take less operations but weaker in security than
Diffie-Hellman's one.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 11:16:25 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jan 2008 01:34:15 GMT"
},
{
"version": "v3",
"created": "Sun, 20 Jan 2008 07:15:00 GMT"
}
] | 2008-01-20T00:00:00 | [
[
"Li",
"An-Ping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.1364 | Robert McKilliam | Robby G. McKilliam, I. Vaughan L. Clarkson, Barry G. Quinn | An Algorithm to Compute the Nearest Point in the Lattice $A_{n}^*$ | 3 pages | IEEE Transactions on Information Theory, Vol. 54, No. 9, pp
4378-4381, Sept. 2008 | 10.1109/TIT.2008.928280 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The lattice $A_n^*$ is an important lattice because of its covering
properties in low dimensions. Clarkson \cite{Clarkson1999:Anstar} described an
algorithm to compute the nearest lattice point in $A_n^*$ that requires
$O(n\log{n})$ arithmetic operations. In this paper, we describe a new
algorithm. While the complexity is still $O(n\log{n})$, it is significantly
simpler to describe and verify. In practice, we find that the new algorithm
also runs faster.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 07:08:56 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2008 03:28:27 GMT"
}
] | 2008-09-30T00:00:00 | [
[
"McKilliam",
"Robby G.",
""
],
[
"Clarkson",
"I. Vaughan L.",
""
],
[
"Quinn",
"Barry G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1410 | Shmuel Onn | Shmuel Onn | Two graph isomorphism polytopes | null | Discrete Mathematics, 309:2934--2936, 2009 | null | null | cs.CC cs.DM math.CO math.OC | null | The convex hull $\psi_{n,n}$ of certain $(n!)^2$ tensors was considered
recently in connection with graph isomorphism. We consider the convex hull
$\psi_n$ of the $n!$ diagonals among these tensors. We show: 1. The polytope
$\psi_n$ is a face of $\psi_{n,n}$. 2. Deciding if a graph $G$ has a subgraph
isomorphic to $H$ reduces to optimization over $\psi_n$. 3. Optimization over
$\psi_n$ reduces to optimization over $\psi_{n,n}$. In particular, this implies
that the subgraph isomorphism problem reduces to optimization over
$\psi_{n,n}$.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 13:34:26 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jan 2008 11:25:35 GMT"
}
] | 2009-08-22T00:00:00 | [
[
"Onn",
"Shmuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0801.1415 | Dietrich Stauffer | S. Wichmann | The emerging field of language dynamics | null | null | null | null | cs.CL physics.soc-ph | null | A simple review by a linguist, citing many articles by physicists:
Quantitative methods, agent-based computer simulations, language dynamics,
language typology, historical linguistics
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 12:34:40 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Wichmann",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0801.1416 | Piyush Kurur | Anindya De, Piyush P Kurur, Chandan Saha and Ramprasad Saptharishi | Fast Integer Multiplication using Modular Arithmetic | fixed some typos and references | null | null | null | cs.SC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an $O(N\cdot \log N\cdot 2^{O(\log^*N)})$ algorithm for multiplying
two $N$-bit integers that improves the $O(N\cdot \log N\cdot \log\log N)$
algorithm by Sch\"{o}nhage-Strassen. Both these algorithms use modular
arithmetic. Recently, F\"{u}rer gave an $O(N\cdot \log N\cdot 2^{O(\log^*N)})$
algorithm which however uses arithmetic over complex numbers as opposed to
modular arithmetic. In this paper, we use multivariate polynomial
multiplication along with ideas from F\"{u}rer's algorithm to achieve this
improvement in the modular setting. Our algorithm can also be viewed as a
$p$-adic version of F\"{u}rer's algorithm. Thus, we show that the two seemingly
different approaches to integer multiplication, modular and complex arithmetic,
are similar.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 12:44:55 GMT"
},
{
"version": "v2",
"created": "Tue, 6 May 2008 07:05:09 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Sep 2008 06:45:16 GMT"
}
] | 2008-09-19T00:00:00 | [
[
"De",
"Anindya",
""
],
[
"Kurur",
"Piyush P",
""
],
[
"Saha",
"Chandan",
""
],
[
"Saptharishi",
"Ramprasad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.1419 | Vincent Gramoli | Vincent Gramoli (IRISA), Anne-Marie Kermarrec (IRISA), Achour
Mostefaoui (IRISA), Michel Raynal (IRISA), Bruno Sericola (IRISA) | Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime | null | Dans Proceedings of the Workshop on Reliability in Decentralized
Distributed Systems 4278 (2006) 1470--1479 | null | null | cs.DC | null | Distributed systems are now both very large and highly dynamic. Peer to peer
overlay networks have been proved efficient to cope with this new deal that
traditional approaches can no longer accommodate. While the challenge of
organizing peers in an overlay network has generated a lot of interest leading
to a large number of solutions, maintaining critical data in such a network
remains an open issue. In this paper, we are interested in defining the portion
of nodes and frequency one has to probe, given the churn observed in the
system, in order to achieve a given probability of maintaining the persistence
of some critical data. More specifically, we provide a clear result relating
the size and the frequency of the probing set along with its proof as well as
an analysis of the way of leveraging such an information in a large scale
dynamic distributed system.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 12:41:15 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"Gramoli",
"Vincent",
"",
"IRISA"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
],
[
"Mostefaoui",
"Achour",
"",
"IRISA"
],
[
"Raynal",
"Michel",
"",
"IRISA"
],
[
"Sericola",
"Bruno",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.1500 | Michael McGuigan | Michael McGuigan | Toward the Graphics Turing Scale on a Blue Gene Supercomputer | 9 pages, 4 figures, 6 tables | null | null | null | cs.GR | null | We investigate raytracing performance that can be achieved on a class of Blue
Gene supercomputers. We measure a 822 times speedup over a Pentium IV on a 6144
processor Blue Gene/L. We measure the computational performance as a function
of number of processors and problem size to determine the scaling performance
of the raytracing calculation on the Blue Gene. We find nontrivial scaling
behavior at large number of processors. We discuss applications of this
technology to scientific visualization with advanced lighting and high
resolution. We utilize three racks of a Blue Gene/L in our calculations which
is less than three percent of the the capacity of the worlds largest Blue Gene
computer.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 20:51:02 GMT"
}
] | 2008-01-10T00:00:00 | [
[
"McGuigan",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0801.1514 | Grenville Croll | David Chadwick, Rodney E. Sue | Teaching spreadsheet development using peer audit and self-audit methods
for reducing error | 9 Pages, includes references | European Spreadsheet Risks Int. Grp. 2001 95-105 ISBN:1 86166 179
7 | null | null | cs.CY | null | Recent research has highlighted the high incidence of errors in spreadsheet
models used in industry. In an attempt to reduce the incidence of such errors,
a teaching approach has been devised which aids students to reduce their
likelihood of making common errors during development. The approach comprises
of spreadsheet checking methods based on the commonly accepted educational
paradigms of peer assessment and self-assessment. However, these paradigms are
here based upon practical techniques commonly used by the internal audit
function such as peer audit and control and risk self-assessment. The result of
this symbiosis between educational assessment and professional audit is a
method that educates students in a set of structured, transferable skills for
spreadsheet error-checking which are useful for increasing error-awareness in
the classroom and for reducing business risk in the workplace.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 21:58:45 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Chadwick",
"David",
""
],
[
"Sue",
"Rodney E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.1516 | Grenville Croll | Kamalasen Rajalingham, David Chadwick, Brian Knight | An Evaluation of a Structured Spreadsheet Development Methodology | 17 pages including references | European Spreadsheet Risks Int. Grp. 2001 39-59 ISBN:1 86166 179 | null | null | cs.CY | null | This paper presents the results of an empirical evaluation of the quality of
a structured methodology for the development of spreadsheet models, proposed in
numerous previous papers by Rajalingham K, Knight B and Chadwick D et al. This
paper also describes an improved version of their methodology, supported by
appropriate examples. The principal objective of a structured and disciplined
methodology for the construction of spreadsheet models is to reduce the
occurrence of user-generated errors in the models. The evaluation of the
effectiveness of the methodology has been carried out based on a number of
real-life experiments. The results of these experiments demonstrate the
methodology's potential for improved integrity control and enhanced
comprehensibility of spreadsheet models.
| [
{
"version": "v1",
"created": "Wed, 9 Jan 2008 22:12:13 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Rajalingham",
"Kamalasen",
""
],
[
"Chadwick",
"David",
""
],
[
"Knight",
"Brian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.1573 | Damien Challet | Christina Matzke and Damien Challet | Taking a shower in Youth Hostels: risks and delights of heterogeneity | 13 pages, 7 figures | null | 10.1103/PhysRevE.84.016107 | null | physics.soc-ph cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tuning one's shower in some hotels may turn into a challenging coordination
game with imperfect information. The temperature sensitivity increases with the
number of agents, making the problem possibly unlearnable. Because there is in
practice a finite number of possible tap positions, identical agents are
unlikely to reach even approximately their favorite water temperature. We show
that a population of agents with homogeneous strategies is evolutionary
unstable, which gives insights into the emergence of heterogeneity, the latter
being tempting but risky.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 10:32:41 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Dec 2010 13:28:00 GMT"
}
] | 2013-05-29T00:00:00 | [
[
"Matzke",
"Christina",
""
],
[
"Challet",
"Damien",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0801.1600 | Christian Hoffmann | Christian Hoffmann | A Most General Edge Elimination Polynomial - Thickening of Edges | 5 pages | null | null | null | math.CO cs.CC | null | We consider a graph polynomial \xi(G;x,y,z) introduced by Averbouch, Godlin,
and Makowsky (2007). This graph polynomial simultaneously generalizes the Tutte
polynomial as well as a bivariate chromatic polynomial defined by Dohmen,
Poenitz and Tittmann (2003). We derive an identity which relates the graph
polynomial of a thicked graph (i.e. a graph with each edge replaced by k copies
of it) to the graph polynomial of the original graph. As a consequence, we
observe that at every point (x,y,z), except for points lying within some set of
dimension 2, evaluating \xi is #P-hard.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 13:58:45 GMT"
}
] | 2008-01-11T00:00:00 | [
[
"Hoffmann",
"Christian",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.1630 | Frank Bentrem | Frank W. Bentrem, John T. Sample, and Michael M. Harris (Naval
Research Laboratory) | Computational Solutions for Today's Navy | This is a work of the U.S. Government | Scientific Computing, vol. 25, no. 2, pp. 30-32 (March 2008) | null | null | cs.MA cs.GL | null | New methods are being employed to meet the Navy's changing
software-development environment.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 16:46:04 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 17:47:40 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Apr 2008 21:39:09 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"Bentrem",
"Frank W.",
"",
"Naval\n Research Laboratory"
],
[
"Sample",
"John T.",
"",
"Naval\n Research Laboratory"
],
[
"Harris",
"Michael M.",
"",
"Naval\n Research Laboratory"
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0801.1655 | Amy Glen | Amy Glen, Jacques Justin | Episturmian words: a survey | 36 pages; major revision: improvements + new material + more
references | RAIRO - Theoretical Informatics and Applications 43 (2009) 402-433 | 10.1051/ita/2009003 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we survey the rich theory of infinite episturmian words which
generalize to any finite alphabet, in a rather resembling way, the well-known
family of Sturmian words on two letters. After recalling definitions and basic
properties, we consider episturmian morphisms that allow for a deeper study of
these words. Some properties of factors are described, including factor
complexity, palindromes, fractional powers, frequencies, and return words. We
also consider lexicographical properties of episturmian words, as well as their
connection to the balance property, and related notions such as finite
episturmian words, Arnoux-Rauzy sequences, and "episkew words" that generalize
the skew words of Morse and Hedlund.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 19:11:10 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 12:56:39 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
],
[
"Justin",
"Jacques",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1656 | Amy Glen | Amy Glen, Jacques Justin, Steve Widmer, Luca Q. Zamboni | Palindromic Richness | 26 pages; merged with work of Steve Widmer and Luca Q. Zamboni on
weakly rich words; accepted by the European Journal of Combinatorics | European Journal of Combinatorics 30 (2009) 510-531 | 10.1016/j.ejc.2008.04.006 | null | math.CO cs.DM | null | In this paper, we study combinatorial and structural properties of a new
class of finite and infinite words that are 'rich' in palindromes in the utmost
sense. A characteristic property of so-called "rich words" is that all complete
returns to any palindromic factor are themselves palindromes. These words
encompass the well-known episturmian words, originally introduced by the second
author together with X. Droubay and G. Pirillo in 2001. Other examples of rich
words have appeared in many different contexts. Here we present the first
unified approach to the study of this intriguing family of words.
Amongst our main results, we give an explicit description of the periodic
rich infinite words and show that the recurrent balanced rich infinite words
coincide with the balanced episturmian words. We also consider two wider
classes of infinite words, namely "weakly rich words" and almost rich words
(both strictly contain all rich words, but neither one is contained in the
other). In particular, we classify all recurrent balanced weakly rich words. As
a consequence, we show that any such word on at least three letters is
necessarily episturmian; hence weakly rich words obey Fraenkel's conjecture.
Likewise, we prove that a certain class of almost rich words obeys Fraenkel's
conjecture by showing that the recurrent balanced ones are episturmian or
contain at least two distinct letters with the same frequency.
Lastly, we study the action of morphisms on (almost) rich words with
particular interest in morphisms that preserve (almost) richness. Such
morphisms belong to the class of "P-morphisms" that was introduced by A. Hof,
O. Knill, and B. Simon in 1995.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 19:22:11 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Feb 2008 17:12:09 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Apr 2008 18:06:41 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
],
[
"Justin",
"Jacques",
""
],
[
"Widmer",
"Steve",
""
],
[
"Zamboni",
"Luca Q.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1658 | Adam Lipowski | Adam Lipowski, Dorota Lipowska | Computational approach to the emergence and evolution of language -
evolutionary naming game model | paper withdrawn, much revised version is under preparation | null | null | null | physics.soc-ph cs.CL cs.MA | null | Computational modelling with multi-agent systems is becoming an important
technique of studying language evolution. We present a brief introduction into
this rapidly developing field, as well as our own contributions that include an
analysis of the evolutionary naming-game model. In this model communicating
agents, that try to establish a common vocabulary, are equipped with an
evolutionarily selected learning ability. Such a coupling of biological and
linguistic ingredients results in an abrupt transition: upon a small change of
the model control parameter a poorly communicating group of linguistically
unskilled agents transforms into almost perfectly communicating group with
large learning abilities. Genetic imprinting of the learning abilities proceeds
via Baldwin effect: initially unskilled communicating agents learn a language
and that creates a niche in which there is an evolutionary pressure for the
increase of learning ability. Under the assumption that communication intensity
increases continuously with finite speed, the transition is split into several
transition-like changes. It shows that the speed of cultural changes, that sets
an additional characteristic timescale, might be yet another factor affecting
the evolution of language. In our opinion, this model shows that linguistic and
biological processes have a strong influence on each other and this effect
certainly has contributed to an explosive development of our species.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 19:45:25 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jan 2008 23:45:42 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Aug 2010 21:14:21 GMT"
}
] | 2010-08-24T00:00:00 | [
[
"Lipowski",
"Adam",
""
],
[
"Lipowska",
"Dorota",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0801.1676 | Juan Gerardo Alcazar Arribas | Juan Gerardo Alcazar | Analyzing the Topology Types arising in a Family of Algebraic Curves
Depending On Two Parameters | 8 pages, 4 figures | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given the implicit equation $F(x,y,t,s)$ of a family of algebraic plane
curves depending on the parameters $t,s$, we provide an algorithm for studying
the topology types arising in the family. For this purpose, the algorithm
computes a finite partition of the parameter space so that the topology type of
the family stays invariant over each element of the partition. The ideas
contained in the paper can be seen as a generalization of the ideas in
\cite{JGRS}, where the problem is solved for families of algebraic curves
depending on one parameter, to the two-parameters case.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 21:08:22 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2008 15:44:23 GMT"
}
] | 2008-09-02T00:00:00 | [
[
"Alcazar",
"Juan Gerardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0801.1687 | Jad Saklawi | Paul C. Attie | Synthesis of Large Dynamic Concurrent Programs from Dynamic
Specifications | 46 pages | null | null | null | cs.LO | null | We present a tractable method for synthesizing arbitrarily large concurrent
programs, for a shared memory model with common hardware-available primitives
such as atomic registers, compare-and-swap, load-linked/store conditional, etc.
The programs we synthesize are dynamic: new processes can be created and added
at run-time, and so our programs are not finite-state, in general.
Nevertheless, we successfully exploit automatic synthesis and model-checking
methods based on propositional temporal logic. Our method is algorithmically
efficient, with complexity polynomial in the number of component processes (of
the program) that are ``alive'' at any time. Our method does not explicitly
construct the automata-theoretic product of all processes that are alive,
thereby avoiding \intr{state explosion}. Instead, for each pair of processes
which interact, our method constructs an automata-theoretic product
(\intr{pair-machine}) which embodies all the possible interactions of these two
processes. From each pair-machine, we can synthesize a correct
\intr{pair-program} which coordinates the two involved processes as needed. We
allow such pair-programs to be added dynamically at run-time. They are then
``composed conjunctively'' with the currently alive pair-programs to
re-synthesize the program as it results after addition of the new pair-program.
We are thus able to add new behaviors, which result in new properties being
satisfied, at run-time. We establish a ``large model'' theorem which shows that
the synthesized large program inherits correctness properties from the
pair-programs.
| [
{
"version": "v1",
"created": "Thu, 10 Jan 2008 21:27:42 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Attie",
"Paul C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.1703 | Milan Derpich | Milan S. Derpich, Jan Ostergaard and Graham C. Goodwin | The Quadratic Gaussian Rate-Distortion Function for Source Uncorrelated
Distortions | Revised version, to be presented at the Data Compression Conference
2008 | null | null | null | cs.IT math.IT | null | We characterize the rate-distortion function for zero-mean stationary
Gaussian sources under the MSE fidelity criterion and subject to the additional
constraint that the distortion is uncorrelated to the input. The solution is
given by two equations coupled through a single scalar parameter. This has a
structure similar to the well known water-filling solution obtained without the
uncorrelated distortion restriction. Our results fully characterize the unique
statistics of the optimal distortion. We also show that, for all positive
distortions, the minimum achievable rate subject to the uncorrelation
constraint is strictly larger than that given by the un-constrained
rate-distortion function. This gap increases with the distortion and tends to
infinity and zero, respectively, as the distortion tends to zero and infinity.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 01:37:56 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Derpich",
"Milan S.",
""
],
[
"Ostergaard",
"Jan",
""
],
[
"Goodwin",
"Graham C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1715 | Srivatsava Ranjit Ganta | Srivatsava Ranjit Ganta, Raj Acharya | On Breaching Enterprise Data Privacy Through Adversarial Information
Fusion | null | null | null | null | cs.DB cs.CR cs.OH | null | Data privacy is one of the key challenges faced by enterprises today.
Anonymization techniques address this problem by sanitizing sensitive data such
that individual privacy is preserved while allowing enterprises to maintain and
share sensitive data. However, existing work on this problem make inherent
assumptions about the data that are impractical in day-to-day enterprise data
management scenarios. Further, application of existing anonymization schemes on
enterprise data could lead to adversarial attacks in which an intruder could
use information fusion techniques to inflict a privacy breach. In this paper,
we shed light on the shortcomings of current anonymization schemes in the
context of enterprise data. We define and experimentally demonstrate Web-based
Information- Fusion Attack on anonymized enterprise data. We formulate the
problem of Fusion Resilient Enterprise Data Anonymization and propose a
prototype solution to address this problem.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 03:21:49 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Feb 2008 21:58:35 GMT"
}
] | 2008-02-08T00:00:00 | [
[
"Ganta",
"Srivatsava Ranjit",
""
],
[
"Acharya",
"Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.1718 | Milan Derpich | Milan S. Derpich, Jan Ostergaard and Daniel E. Quevedo | Achieving the Quadratic Gaussian Rate-Distortion Function for Source
Uncorrelated Distortions | Technical report, January 2008. Other papers available from
http://msderpich.no-ip.org | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove achievability of the recently characterized quadratic Gaussian
rate-distortion function (RDF) subject to the constraint that the distortion is
uncorrelated to the source. This result is based on shaped dithered lattice
quantization in the limit as the lattice dimension tends to infinity and holds
for all positive distortions. It turns out that this uncorrelated distortion
RDF can be realized causally. This feature, which stands in contrast to
Shannon's RDF, is illustrated by causal transform coding. Moreover, we prove
that by using feedback noise shaping the uncorrelated distortion RDF can be
achieved causally and with memoryless entropy coding. Whilst achievability
relies upon infinite dimensional quantizers, we prove that the rate loss
incurred in the finite dimensional case can be upper-bounded by the space
filling loss of the quantizer and, thus, is at most 0.254 bit/dimension.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 04:08:07 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Jan 2008 04:48:14 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2008 10:02:42 GMT"
}
] | 2008-07-24T00:00:00 | [
[
"Derpich",
"Milan S.",
""
],
[
"Ostergaard",
"Jan",
""
],
[
"Quevedo",
"Daniel E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1736 | Walid Hachem | Abla Kammoun, Malika Kharouf, Walid Hachem, Jamal Najim | A Central Limit Theorem for the SNR at the Wiener Filter Output for
Large Dimensional Signals | null | null | null | null | cs.IT math.IT | null | Consider the quadratic form $\beta = {\bf y}^* ({\bf YY}^* + \rho {\bf
I})^{-1} {\bf y}$ where $\rho$ is a positive number, where ${\bf y}$ is a
random vector and ${\bf Y}$ is a $N \times K$ random matrix both having
independent elements with different variances, and where ${\bf y}$ and ${\bf
Y}$ are independent. Such quadratic forms represent the Signal to Noise Ratio
at the output of the linear Wiener receiver for multi dimensional signals
frequently encountered in wireless communications and in array processing.
Using well known results of Random Matrix Theory, the quadratic form $\beta$
can be approximated with a known deterministic real number $\bar\beta_K$ in the
asymptotic regime where $K\to\infty$ and $K/N \to \alpha > 0$. This paper
addresses the problem of convergence of $\beta$. More specifically, it is shown
here that $\sqrt{K}(\beta - \bar\beta_K)$ behaves for large $K$ like a Gaussian
random variable which variance is provided.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 09:18:52 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Kammoun",
"Abla",
""
],
[
"Kharouf",
"Malika",
""
],
[
"Hachem",
"Walid",
""
],
[
"Najim",
"Jamal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1737 | Rico Zenklusen | Rico Zenklusen | Extensions to Network Flow Interdiction on Planar Graphs | 16 pages, 3 figures | null | null | null | cs.DM | null | Network flow interdiction analysis studies by how much the value of a maximum
flow in a network can be diminished by removing components of the network
constrained to some budget. Although this problem is strongly NP-complete on
general networks, pseudo-polynomial algorithms were found for planar networks
with a single source and a single sink and without the possibility to remove
vertices. In this work we introduce pseudo-polynomial algorithms which overcome
some of the restrictions of previous methods. We propose a planarity-preserving
transformation that allows to incorporate vertex removals and vertex capacities
in pseudo-polynomial interdiction algorithms for planar graphs. Additionally, a
pseudo-polynomial algorithm is introduced for the problem of determining the
minimal interdiction budget which is at least needed to make it impossible to
satisfy the demand of all sink nodes, on planar networks with multiple sources
and sinks satisfying that the sum of the supplies at the source nodes equals
the sum of the demands at the sink nodes. Furthermore we show that the
k-densest subgraph problem on planar graphs can be reduced to a network flow
interdiction problem on a planar graph with multiple sources and sinks and
polynomially bounded input numbers. However it is still not known if either of
these problems can be solved in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 09:13:23 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Zenklusen",
"Rico",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1766 | Pinyan Lu | Jin-Yi Cai, Pinyan Lu and Mingji Xia | A Family of Counter Examples to an Approach to Graph Isomorphism | null | null | null | null | cs.CC cs.DM | null | We give a family of counter examples showing that the two sequences of
polytopes $\Phi_{n,n}$ and $\Psi_{n,n}$ are different. These polytopes were
defined recently by S. Friedland in an attempt at a polynomial time algorithm
for graph isomorphism.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 12:28:05 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jan 2008 10:12:53 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Cai",
"Jin-Yi",
""
],
[
"Lu",
"Pinyan",
""
],
[
"Xia",
"Mingji",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1772 | Veronika Rehn-Sonigo | Anne Benoit (INRIA Rh\^one-Alpes, LIP), Harald Kosch, Veronika
Rehn-Sonigo (INRIA Rh\^one-Alpes, LIP), Yves Robert (INRIA Rh\^one-Alpes,
LIP) | Bi-criteria Pipeline Mappings for Parallel Image Processing | null | null | null | null | cs.DC | null | Mapping workflow applications onto parallel platforms is a challenging
problem, even for simple application patterns such as pipeline graphs. Several
antagonistic criteria should be optimized, such as throughput and latency (or a
combination). Typical applications include digital image processing, where
images are processed in steady-state mode. In this paper, we study the mapping
of a particular image processing application, the JPEG encoding. Mapping
pipelined JPEG encoding onto parallel platforms is useful for instance for
encoding Motion JPEG images. As the bi-criteria mapping problem is NP-complete,
we concentrate on the evaluation and performance of polynomial heuristics.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 14:48:43 GMT"
}
] | 2008-01-14T00:00:00 | [
[
"Benoit",
"Anne",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Kosch",
"Harald",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Rehn-Sonigo",
"Veronika",
"",
"INRIA Rhône-Alpes, LIP"
],
[
"Robert",
"Yves",
"",
"INRIA Rhône-Alpes,\n LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.1783 | Olivier Finkel | Jacques Duparc (UNIL), Olivier Finkel (LIP) | An omega-power of a context-free language which is Borel above
Delta^0_omega | To appear in the Proceedings of the International Conference
Foundations of the Formal Sciences V : Infinite Games, November 26th to 29th,
2004, Bonn, Germany, Stefan Bold, Benedikt L\"owe, Thoralf R\"asch, Johan van
Benthem (eds.), College Publications at King's College (Studies in Logic),
2007 | Dans Proceedings of the International Conference on Foundations of
the Formal Sciences V : Infinite Games - Foundations of the Formal Sciences V
: Infinite Games, November 26-29, 2004, Bonn : Allemagne | null | null | cs.CC cs.GT cs.LO math.LO | null | We use erasers-like basic operations on words to construct a set that is both
Borel and above Delta^0_omega, built as a set V^\omega where V is a language of
finite words accepted by a pushdown automaton. In particular, this gives a
first example of an omega-power of a context free language which is a Borel set
of infinite rank.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 14:20:30 GMT"
}
] | 2008-09-10T00:00:00 | [
[
"Duparc",
"Jacques",
"",
"UNIL"
],
[
"Finkel",
"Olivier",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0801.1784 | Sergei Vyshenski | S. V. Vyshenski, P. V. Grigoriev, Yu. Yu. Dubenskaya | Ideal synchronizer for marked pairs in fork-join network | 18 pages, 3 figures, in Russian, typos fixed | null | null | null | cs.DM | null | We introduce a new functional element (synchronizer for marked pairs) meant
to join results of parallel processing in two-branch fork-join queueing
network. Approximations for distribution of sojourn time at the synchronizer
are derived along with a validity domain. Calculations are performed assuming
that: arrivals to the network form a Poisson process, each branch operates like
an M/M/N queueing system. It is shown that mean sojourn time at a real
synchronizer node is bounded below by the value, defined by parameters of the
network (which contains the synchronizer) and does not depend upon performance
and particular properties of the synchronizer.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 16:00:59 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jan 2008 20:57:32 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Vyshenski",
"S. V.",
""
],
[
"Grigoriev",
"P. V.",
""
],
[
"Dubenskaya",
"Yu. Yu.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1856 | Grenville Croll | David A. Banks, Ann Monday | Interpretation as a factor in understanding flawed spreadsheets | 9 pages incuding references | Proc. European Spreadsheet Risks Int. Grp. 2002 13 21 ISBN 1 86166
182 7 | null | null | cs.CY cs.HC | null | The spreadsheet has been used by the business community for many years and
yet still raises a number of significant concerns. As educators our concern is
to try to develop the students skills in both the development of spreadsheets
and in taking a critical view of their potential defects. In this paper we
consider both the problems of mechanical production and the problems of
translation of problem to spreadsheet representation.
| [
{
"version": "v1",
"created": "Fri, 11 Jan 2008 21:47:01 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Banks",
"David A.",
""
],
[
"Monday",
"Ann",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.1883 | Andras Lorincz | Barnabas Poczos and Andras Lorincz | D-optimal Bayesian Interrogation for Parameter and Noise Identification
of Recurrent Neural Networks | null | null | null | null | cs.NE cs.IT math.IT | null | We introduce a novel online Bayesian method for the identification of a
family of noisy recurrent neural networks (RNNs). We develop Bayesian active
learning technique in order to optimize the interrogating stimuli given past
experiences. In particular, we consider the unknown parameters as stochastic
variables and use the D-optimality principle, also known as `\emph{infomax
method}', to choose optimal stimuli. We apply a greedy technique to maximize
the information gain concerning network parameters at each time step. We also
derive the D-optimal estimation of the additive noise that perturbs the
dynamical system of the RNN. Our analytical results are approximation-free. The
analytic derivation gives rise to attractive quadratic update rules.
| [
{
"version": "v1",
"created": "Sat, 12 Jan 2008 08:02:12 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Poczos",
"Barnabas",
""
],
[
"Lorincz",
"Andras",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.1925 | Paul M. Aoki | Rowena Luk, Melissa Ho, Paul M. Aoki | A Framework for Designing Teleconsultation Systems in Africa | 5 pages | Proc. Int'l Conf. on Health Informatics in Africa (HELINA),
Bamako, Mali, Jan. 2007, 28(1-5) | null | null | cs.HC | null | All of the countries within Africa experience a serious shortage of medical
professionals, particularly specialists, a problem that is only exacerbated by
high emigration of doctors with better prospects overseas. As a result, those
that remain in Africa, particularly those practicing in rural regions,
experience a shortage of specialists and other colleagues with whom to exchange
ideas. Telemedicine and teleconsultation are key areas that attempt to address
this problem by leveraging remote expertise for local problems. This paper
presents an overview of teleconsultation in the developing world, with a
particular focus on how lessons learned apply to Africa. By teleconsultation,
we are addressing non-real-time communication between health care professionals
for the purposes of providing expertise and informal recommendations, without
the real-time, interactive requirements typical of diagnosis and patient care,
which is impractical for the vast majority of existing medical practices. From
these previous experiences, we draw a set of guidelines and examine their
relevance to Ghana in particular. Based on 6 weeks of needs assessment, we
identify key variables that guide our framework, and then illustrate how our
framework is used to inform the iterative design of a prototype system.
| [
{
"version": "v1",
"created": "Sat, 12 Jan 2008 23:39:30 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Luk",
"Rowena",
""
],
[
"Ho",
"Melissa",
""
],
[
"Aoki",
"Paul M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.1927 | Paul M. Aoki | Rowena Luk, Melissa Ho, Paul M. Aoki | Asynchronous Remote Medical Consultation for Ghana | 10 pages | null | 10.1145/1357054.1357173 | null | cs.HC | null | Computer-mediated communication systems can be used to bridge the gap between
doctors in underserved regions with local shortages of medical expertise and
medical specialists worldwide. To this end, we describe the design of a
prototype remote consultation system intended to provide the social,
institutional and infrastructural context for sustained, self-organizing growth
of a globally-distributed Ghanaian medical community. The design is grounded in
an iterative design process that included two rounds of extended design
fieldwork throughout Ghana and draws on three key design principles (social
networks as a framework on which to build incentives within a self-organizing
network; optional and incremental integration with existing referral
mechanisms; and a weakly-connected, distributed architecture that allows for a
highly interactive, responsive system despite failures in connectivity). We
discuss initial experiences from an ongoing trial deployment in southern Ghana.
| [
{
"version": "v1",
"created": "Sat, 12 Jan 2008 23:43:18 GMT"
}
] | 2016-09-05T00:00:00 | [
[
"Luk",
"Rowena",
""
],
[
"Ho",
"Melissa",
""
],
[
"Aoki",
"Paul M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.1979 | Gregory Gutin | G. Gutin, I. Razgon, E.J. Kim | Minimum Leaf Out-branching and Related Problems | The main change is a quadratic kernel derivation | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a digraph $D$, the Minimum Leaf Out-Branching problem (MinLOB) is the
problem of finding in $D$ an out-branching with the minimum possible number of
leaves, i.e., vertices of out-degree 0. We prove that MinLOB is polynomial-time
solvable for acyclic digraphs. In general, MinLOB is NP-hard and we consider
three parameterizations of MinLOB. We prove that two of them are NP-complete
for every value of the parameter, but the third one is fixed-parameter
tractable (FPT). The FPT parametrization is as follows: given a digraph $D$ of
order $n$ and a positive integral parameter $k$, check whether $D$ contains an
out-branching with at most $n-k$ leaves (and find such an out-branching if it
exists). We find a problem kernel of order $O(k^2)$ and construct an algorithm
of running time $O(2^{O(k\log k)}+n^6),$ which is an `additive' FPT algorithm.
We also consider transformations from two related problems, the minimum path
covering and the maximum internal out-tree problems into MinLOB, which imply
that some parameterizations of the two problems are FPT as well.
| [
{
"version": "v1",
"created": "Sun, 13 Jan 2008 19:33:29 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2008 17:41:09 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Oct 2008 20:51:12 GMT"
}
] | 2008-10-14T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Razgon",
"I.",
""
],
[
"Kim",
"E. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.1987 | Neal E. Young | Christos Koufogiannakis and Neal E. Young | A Nearly Linear-Time PTAS for Explicit Fractional Packing and Covering
Linear Programs | corrected version of FOCS 2007 paper: 10.1109/FOCS.2007.62. Accepted
to Algorithmica, 2013 | Algorithmica 70(4):648-674(2014) | 10.1007/s00453-013-9771-6 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an approximation algorithm for packing and covering linear programs
(linear programs with non-negative coefficients). Given a constraint matrix
with n non-zeros, r rows, and c columns, the algorithm computes feasible primal
and dual solutions whose costs are within a factor of 1+eps of the optimal cost
in time O((r+c)log(n)/eps^2 + n).
| [
{
"version": "v1",
"created": "Sun, 13 Jan 2008 22:04:49 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Mar 2013 16:03:10 GMT"
}
] | 2015-06-02T00:00:00 | [
[
"Koufogiannakis",
"Christos",
""
],
[
"Young",
"Neal E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.1988 | Andras Lorincz | Istvan Szita and Andras Lorincz | Online variants of the cross-entropy method | 8 pages | null | null | null | cs.LG | null | The cross-entropy method is a simple but efficient method for global
optimization. In this paper we provide two online variants of the basic CEM,
together with a proof of convergence.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 06:56:42 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0801.2034 | Jochen Sommerfeld | Jochen Sommerfeld, Igor Bjelakovic and Holger Boche | On the Boundedness of the Support of Optimal Input Measures for Rayleigh
Fading Channels | 5 pages, submitted to ISIT 2008 | null | null | null | cs.IT math.IT | null | We consider transmission over a wireless multiple antenna communication
system operating in a Rayleigh flat fading environment with no channel state
information at the receiver and the transmitter with coherence time T=1. We
show that, subject to the average power constraint, the support of the capacity
achieving input distribution is bounded. Moreover, we show by a simple example
concerning the identity theorem (or uniqueness theorem) from the complex
analysis in several variables that some of the existing results in the field
are not rigorous.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 09:58:26 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Sommerfeld",
"Jochen",
""
],
[
"Bjelakovic",
"Igor",
""
],
[
"Boche",
"Holger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2069 | Istvan Szita | Istvan Szita and Andras Lorincz | Factored Value Iteration Converges | 17 pages, 1 figure | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a novel algorithm, factored value iteration (FVI),
for the approximate solution of factored Markov decision processes (fMDPs). The
traditional approximate value iteration algorithm is modified in two ways. For
one, the least-squares projection operator is modified so that it does not
increase max-norm, and thus preserves convergence. The other modification is
that we uniformly sample polynomially many samples from the (exponentially
large) state space. This way, the complexity of our algorithm becomes
polynomial in the size of the fMDP description length. We prove that the
algorithm is convergent. We also derive an upper bound on the difference
between our approximate solution and the optimal one, and also on the error
introduced by sampling. We analyze various projection operators with respect to
their computation complexity and their convergence when combined with
approximate value iteration.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 13:09:06 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Aug 2008 15:07:08 GMT"
}
] | 2008-08-13T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0801.2088 | Alejandro Maass | Xavier Bressaud, Pascal Hubert, Alejandro Maass | Persistence of Wandering Intervals in Self-Similar Affine Interval
Exchange Transformations | null | null | null | null | math.DS cs.IT math.IT | null | In this article we prove that given a self-similar interval exchange
transformation T, whose associated matrix verifies a quite general algebraic
condition, there exists an affine interval exchange transformation with
wandering intervals that is semi-conjugated to it. That is, in this context the
existence of Denjoy counterexamples occurs very often, generalizing the result
of M. Cobo in [C].
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 14:57:11 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Bressaud",
"Xavier",
""
],
[
"Hubert",
"Pascal",
""
],
[
"Maass",
"Alejandro",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2092 | Sergei Vyshenski | S. V. Vyshenski, P. V. Grigoriev, Yu. Yu. Dubenskaya | Model for synchronizer of marked pairs in fork-join network | 15 pages, 3 figures, in Russian | null | null | null | cs.DM | null | We introduce a model for synchronizer of marked pairs, which is a node for
joining results of parallel processing in two-branch fork-join queueing
network. A distribution for number of jobs in the synchronizer is obtained.
Calculations are performed assuming that: arrivals to the network form a
Poisson process, each branch operates like an M/M/N queueing system. It is
shown that a mean quantity of jobs in the synchronizer is bounded below by the
value, defined by parameters of the network (which contains the synchronizer)
and does not depend upon performance and particular properties of the
synchronizer. A domain of network parameters is found, where the flow of jobs
departing from the synchronizer does not manifest a statistically significant
difference from the Poisson type, despite the correlation between job flows
from both branches of the fork-join network.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 15:34:18 GMT"
}
] | 2008-01-15T00:00:00 | [
[
"Vyshenski",
"S. V.",
""
],
[
"Grigoriev",
"P. V.",
""
],
[
"Dubenskaya",
"Yu. Yu.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.2144 | Markus Grassl | Markus Grassl and Martin Roetteler | Non-Additive Quantum Codes from Goethals and Preparata Codes | submitted to the 2008 IEEE Information Theory Workshop (ITW 2008) | Proceedings IEEE Information Theory Workshop 2008 (ITW 2008),
Porto, Portugal, May 2008, pp. 396-400 | 10.1109/ITW.2008.4578694 | null | quant-ph cs.IT math.IT | null | We extend the stabilizer formalism to a class of non-additive quantum codes
which are constructed from non-linear classical codes. As an example, we
present infinite families of non-additive codes which are derived from Goethals
and Preparata codes.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 20:12:14 GMT"
}
] | 2009-05-24T00:00:00 | [
[
"Grassl",
"Markus",
""
],
[
"Roetteler",
"Martin",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2150 | Markus Grassl | Markus Grassl and Martin Roetteler | Quantum Goethals-Preparata Codes | Submitted to the 2008 IEEE International Symposium on Information
Theory | Proceedings 2008 IEEE International Symposium on Information
Theory (ISIT 2008), Toronto, Canada, July 2008, pp. 300-304 | 10.1109/ISIT.2008.4594996 | null | quant-ph cs.IT math.IT | null | We present a family of non-additive quantum codes based on Goethals and
Preparata codes with parameters ((2^m,2^{2^m-5m+1},8)). The dimension of these
codes is eight times higher than the dimension of the best known additive
quantum codes of equal length and minimum distance.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 20:29:17 GMT"
}
] | 2009-05-24T00:00:00 | [
[
"Grassl",
"Markus",
""
],
[
"Roetteler",
"Martin",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2175 | Johannes Gro{\ss}e | Johannes Gro{\ss}e | MathPSfrag 2: Convenient LaTeX Labels in Mathematica | 9 pages, package can be found at
http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/ | null | null | null | cs.GR | null | This article introduces the next version of MathPSfrag. MathPSfrag is a
Mathematica package that during export automatically replaces all expressions
in a plot by corresponding LaTeX commands. The new version can also produce
LaTeX independent images; e.g., PDF files for inclusion in pdfLaTeX. Moreover
from these files a preview is generated and shown within Mathematica.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 18:34:44 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Große",
"Johannes",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0801.2185 | Xiaohu Shang | Xiaohu Shang, Gerhard Kramer, Biao Chen | New Outer Bounds on the Capacity Region of Gaussian Interference
Channels | 5 pages, 2 figures, submitted to ISIT 2008 | null | null | null | cs.IT math.IT | null | Recent outer bounds on the capacity region of Gaussian interference channels
are generalized to $m$-user channels with $m>2$ and asymmetric powers and
crosstalk coefficients. The bounds are again shown to give the sum-rate
capacity for Gaussian interference channels with low powers and crosstalk
coefficients. The capacity is achieved by using single-user detection at each
receiver, i.e., treating the interference as noise incurs no loss in
performance.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 23:48:05 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Shang",
"Xiaohu",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Chen",
"Biao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2187 | Ephraim Feig | Ephraim Feig, Vivian Feig | A One-Way Function Based On The Extended Euclidean Algorithm | 2-page correspondence | null | null | null | cs.CR | null | A problem based on the Extended Euclidean Algorithm applied to a class of
polynomials with many factors is presented and believed to be hard. If so, it
is a one-way function well suited for applications in digital signicatures.
| [
{
"version": "v1",
"created": "Mon, 14 Jan 2008 23:58:01 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Feig",
"Ephraim",
""
],
[
"Feig",
"Vivian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.2201 | Ed Harcourt | Ed Harcourt | Policies of System Level Pipeline Modeling | null | null | null | null | cs.AR cs.PL | null | Pipelining is a well understood and often used implementation technique for
increasing the performance of a hardware system. We develop several SystemC/C++
modeling techniques that allow us to quickly model, simulate, and evaluate
pipelines. We employ a small domain specific language (DSL) based on resource
usage patterns that automates the drudgery of boilerplate code needed to
configure connectivity in simulation models. The DSL is embedded directly in
the host modeling language SystemC/C++. Additionally we develop several
techniques for parameterizing a pipeline's behavior based on policies of
function, communication, and timing (performance modeling).
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 15:44:28 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Harcourt",
"Ed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.2226 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Programming an interpreter using molecular dynamics | 27 pages | Scientific Annals of Computer Science, 17:47--81, 2007.
http://www.infoiasi.ro/bin/download/Annals/XVII/XVII_2.pdf | null | PRG0801 | cs.PL | null | PGA (ProGram Algebra) is an algebra of programs which concerns programs in
their simplest form: sequences of instructions. Molecular dynamics is a simple
model of computation developed in the setting of PGA, which bears on the use of
dynamic data structures in programming. We consider the programming of an
interpreter for a program notation that is close to existing assembly languages
using PGA with the primitives of molecular dynamics as basic instructions. It
happens that, although primarily meant for explaining programming language
features relating to the use of dynamic data structures, the collection of
primitives of molecular dynamics in itself is suited to our programming wants.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 07:56:12 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.2233 | Lucile Sassatelli | Lucile Sassatelli and David Declercq | Analysis of Non-binary Hybrid LDPC Codes | in the proceedings of IEEE International Symposium on Information
Theory, June 2007, Nice, France | null | null | null | cs.IT math.IT | null | In this paper, we analyse asymptotically a new class of LDPC codes called
Non-binary Hybrid LDPC codes, which has been recently introduced. We use
density evolution techniques to derive a stability condition for hybrid LDPC
codes, and prove their threshold behavior. We study this stability condition to
conclude on asymptotic advantages of hybrid LDPC codes compared to their
non-hybrid counterparts.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 09:32:57 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Sassatelli",
"Lucile",
""
],
[
"Declercq",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2242 | Masahito Hayashi | Masahito Hayashi | Information Spectrum Approach to Second-Order Coding Rate in Channel
Coding | null | IEEE Transactions on Information Theory Volume 55, Issue 11, 4947
- 4966 (2009) | 10.1109/TIT.2009.2030478 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Second-order coding rate of channel coding is discussed for general sequence
of channels. The optimum second-order transmission rate with a constant error
constraint $\epsilon$ is obtained by using the information spectrum method. We
apply this result to the discrete memoryless case, the discrete memoryless case
with a cost constraint, the additive Markovian case, and the Gaussian channel
case with an energy constraint. We also clarify that the Gallager bound does
not give the optimum evaluation in the second-order coding rate.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 10:00:46 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Aug 2008 06:34:05 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Hayashi",
"Masahito",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2284 | Kettani Omar | Omar Kettani | Le probleme de l'isomorphisme de graphes est dans P | This paper has been withdrawn | null | null | null | cs.DM cs.DS | null | This paper has been withdrawn by the author, due to possible
counter-examples.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 13:06:41 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Jan 2008 13:58:28 GMT"
}
] | 2008-01-19T00:00:00 | [
[
"Kettani",
"Omar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.2323 | Shengshan Cui | Shengshan Cui, Alexander M. Haimovich, Oren Somekh, and H. Vincent
Poor | Decentralized Two-Hop Opportunistic Relaying With Limited Channel State
Information | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | null | A network consisting of $n$ source-destination pairs and $m$ relays is
considered. Focusing on the large system limit (large $n$), the throughput
scaling laws of two-hop relaying protocols are studied for Rayleigh fading
channels. It is shown that, under the practical constraints of single-user
encoding-decoding scheme, and partial channel state information (CSI) at the
transmitters (via integer-value feedback from the receivers), the maximal
throughput scales as $\log n$ even if full relay cooperation is allowed.
Furthermore, a novel decentralized opportunistic relaying scheme with receiver
CSI, partial transmitter CSI, and no relay cooperation, is shown to achieve the
optimal throughput scaling law of $\log n$.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 15:16:27 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2008 16:30:30 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Cui",
"Shengshan",
""
],
[
"Haimovich",
"Alexander M.",
""
],
[
"Somekh",
"Oren",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2345 | Marko A. Rodriguez | Marko A. Rodriguez and Alberto Pepe | On the relationship between the structural and socioacademic communities
of a coauthorship network | null | Journal of Informetrics, volume 2, issue 3, pages 195-201, ISSN:
1751-1577, Elsevier, July 2008 | 10.1016/j.joi.2008.04.002 | LA-UR-07-8339 | cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents a study that compares detected structural communities
in a coauthorship network to the socioacademic characteristics of the scholars
that compose the network. The coauthorship network was created from the
bibliographic record of a multi-institution, interdisciplinary research group
focused on the study of sensor networks and wireless communication. Four
different community detection algorithms were employed to assign a structural
community to each scholar in the network: leading eigenvector, walktrap, edge
betweenness and spinglass. Socioacademic characteristics were gathered from the
scholars and include such information as their academic department, academic
affiliation, country of origin, and academic position. A Pearson's $\chi^2$
test, with a simulated Monte Carlo, revealed that structural communities best
represent groupings of individuals working in the same academic department and
at the same institution. A generalization of this result suggests that, even in
interdisciplinary, multi-institutional research groups, coauthorship is
primarily driven by departmental and institutional affiliation.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 17:26:20 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Apr 2008 23:09:47 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Jul 2008 15:54:14 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Pepe",
"Alberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0801.2347 | Vitaly Khudobakhshov | V. A. Buslov, V. A. Khudobakhshov | On the Minimum Spanning Tree for Directed Graphs with Potential Weights | 3 pages | null | null | null | cs.DM | null | In general the problem of finding a miminum spanning tree for a weighted
directed graph is difficult but solvable. There are a lot of differences
between problems for directed and undirected graphs, therefore the algorithms
for undirected graphs cannot usually be applied to the directed case. In this
paper we examine the kind of weights such that the problems are equivalent and
a minimum spanning tree of a directed graph may be found by a simple algorithm
for an undirected graph.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 18:06:28 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Buslov",
"V. A.",
""
],
[
"Khudobakhshov",
"V. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.2378 | Paolo Ferragina | Paolo Ferragina | String algorithms and data structures | null | null | null | null | cs.DS cs.IR | null | The string-matching field has grown at a such complicated stage that various
issues come into play when studying it: data structure and algorithmic design,
database principles, compression techniques, architectural features, cache and
prefetching policies. The expertise nowadays required to design good string
data structures and algorithms is therefore transversal to many computer
science fields and much more study on the orchestration of known, or novel,
techniques is needed to make progress in this fascinating topic. This survey is
aimed at illustrating the key ideas which should constitute, in our opinion,
the current background of every index designer. We also discuss the positive
features and drawback of known indexing schemes and algorithms, and devote much
attention to detail research issues and open problems both on the theoretical
and the experimental side.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 20:54:18 GMT"
}
] | 2008-01-16T00:00:00 | [
[
"Ferragina",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0801.2398 | Zuoqiang Shi | Thomas Y. Hou, Zuoqiang Shi | Removing the Stiffness of Elastic Force from the Immersed Boundary
Method for the 2D Stokes Equations | 40 pages with 8 figures | null | 10.1016/j.jcp.2008.03.002 | null | cs.CE cs.NA math.NA | null | The Immersed Boundary method has evolved into one of the most useful
computational methods in studying fluid structure interaction. On the other
hand, the Immersed Boundary method is also known to suffer from a severe
timestep stability restriction when using an explicit time discretization. In
this paper, we propose several efficient semi-implicit schemes to remove this
stiffness from the Immersed Boundary method for the two-dimensional Stokes
flow. First, we obtain a novel unconditionally stable semi-implicit
discretization for the immersed boundary problem. Using this unconditionally
stable discretization as a building block, we derive several efficient
semi-implicit schemes for the immersed boundary problem by applying the Small
Scale Decomposition to this unconditionally stable discretization. Our
stability analysis and extensive numerical experiments show that our
semi-implicit schemes offer much better stability property than the explicit
scheme. Unlike other implicit or semi-implicit schemes proposed in the
literature, our semi-implicit schemes can be solved explicitly in the spectral
space. Thus the computational cost of our semi-implicit schemes is comparable
to that of an explicit scheme, but with a much better stability property.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 22:22:25 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jan 2008 21:38:37 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Hou",
"Thomas Y.",
""
],
[
"Shi",
"Zuoqiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0801.2405 | Katrin Heitmann | Steve Haroz, Kwan-Liu Ma, Katrin Heitmann | Multiple Uncertainties in Time-Variant Cosmological Particle Data | 8 pages, 8 figures, published in Pacific Vis 2008, project website at
http://steveharoz.com/research/cosmology/ | Haroz, S; Ma, K-L; Heitmann, K, "Multiple Uncertainties in
Time-Variant Cosmological Particle Data" IEEE PacificVIS '08, pp.207-214, 5-7
March 2008 | 10.1109/PACIFICVIS.2008.4475478 | LAUR-08-0052 | astro-ph cs.GR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Though the mediums for visualization are limited, the potential dimensions of
a dataset are not. In many areas of scientific study, understanding the
correlations between those dimensions and their uncertainties is pivotal to
mining useful information from a dataset. Obtaining this insight can
necessitate visualizing the many relationships among temporal, spatial, and
other dimensionalities of data and its uncertainties. We utilize multiple views
for interactive dataset exploration and selection of important features, and we
apply those techniques to the unique challenges of cosmological particle
datasets. We show how interactivity and incorporation of multiple visualization
techniques help overcome the problem of limited visualization dimensions and
allow many types of uncertainty to be seen in correlation with other variables.
| [
{
"version": "v1",
"created": "Tue, 15 Jan 2008 22:57:41 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2009 08:09:24 GMT"
}
] | 2009-02-25T00:00:00 | [
[
"Haroz",
"Steve",
""
],
[
"Ma",
"Kwan-Liu",
""
],
[
"Heitmann",
"Katrin",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.2423 | Qingchuan Wang | Qingchuan Wang, Chen He | Design and Analysis of LDGM-Based Codes for MSE Quantization | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Approaching the 1.5329-dB shaping (granular) gain limit in mean-squared error
(MSE) quantization of R^n is important in a number of problems, notably
dirty-paper coding. For this purpose, we start with a binary low-density
generator-matrix (LDGM) code, and construct the quantization codebook by
periodically repeating its set of binary codewords, or them mapped to m-ary
ones with Gray mapping. The quantization algorithm is based on belief
propagation, and it uses a decimation procedure to do the guessing necessary
for convergence. Using the results of a true typical decimator (TTD) as
reference, it is shown that the asymptotic performance of the proposed
quantizer can be characterized by certain monotonicity conditions on the code's
fixed point properties, which can be analyzed with density evolution, and
degree distribution optimization can be carried out accordingly. When the
number of iterations is finite, the resulting loss is made amenable to analysis
through the introduction of a recovery algorithm from ``bad'' guesses, and the
results of such analysis enable further optimization of the pace of decimation
and the degree distribution. Simulation results show that the proposed
LDGM-based quantizer can achieve a shaping gain of 1.4906 dB, or 0.0423 dB from
the limit, and significantly outperforms trellis-coded quantization (TCQ) at a
similar computational complexity.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2008 03:19:32 GMT"
}
] | 2008-01-17T00:00:00 | [
[
"Wang",
"Qingchuan",
""
],
[
"He",
"Chen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2480 | Gesualdo Scutari | Gesualdo Scutari, Daniel P. Palomar, and Sergio Barbarossa | Asynchronous Iterative Waterfilling for Gaussian Frequency-Selective
Interference Channels | Submitted to IEEE Transactions on Information Theory, August 22,
2006. Revised September 25, 2007. Accepted January 14, 2008. To appear on
IEEE Transactions on Information Theory, 2008 | null | null | null | cs.IT cs.GT math.IT | null | This paper considers the maximization of information rates for the Gaussian
frequency-selective interference channel, subject to power and spectral mask
constraints on each link. To derive decentralized solutions that do not require
any cooperation among the users, the optimization problem is formulated as a
static noncooperative game of complete information. To achieve the so-called
Nash equilibria of the game, we propose a new distributed algorithm called
asynchronous iterative waterfilling algorithm. In this algorithm, the users
update their power spectral density in a completely distributed and
asynchronous way: some users may update their power allocation more frequently
than others and they may even use outdated measurements of the received
interference. The proposed algorithm represents a unified framework that
encompasses and generalizes all known iterative waterfilling algorithms, e.g.,
sequential and simultaneous versions. The main result of the paper consists of
a unified set of conditions that guarantee the global converge of the proposed
algorithm to the (unique) Nash equilibrium of the game.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2008 12:36:50 GMT"
}
] | 2008-01-17T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Palomar",
"Daniel P.",
""
],
[
"Barbarossa",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2498 | Alexis B\`es | Alexis B\`es | An Application of the Feferman-Vaught Theorem to Automata and Logics
for<br> Words over an Infinite Alphabet | 24 pages | Logical Methods in Computer Science, Volume 4, Issue 1 (March 25,
2008) lmcs:1202 | 10.2168/LMCS-4(1:8)2008 | null | cs.LO | null | We show that a special case of the Feferman-Vaught composition theorem gives
rise to a natural notion of automata for finite words over an infinite
alphabet, with good closure and decidability properties, as well as several
logical characterizations. We also consider a slight extension of the
Feferman-Vaught formalism which allows to express more relations between
component values (such as equality), and prove related decidability results.
From this result we get new classes of decidable logics for words over an
infinite alphabet.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2008 14:39:27 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 12:02:49 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Bès",
"Alexis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.2510 | Marcel Ausloos | J. Gillet and M. Ausloos | A Comparison of natural (english) and artificial (esperanto) languages.
A Multifractal method based analysis | 7 pages, 4 double figures, 45 references | null | null | null | cs.CL physics.data-an | null | We present a comparison of two english texts, written by Lewis Carroll, one
(Alice in wonderland) and the other (Through a looking glass), the former
translated into esperanto, in order to observe whether natural and artificial
languages significantly differ from each other. We construct one dimensional
time series like signals using either word lengths or word frequencies. We use
the multifractal ideas for sorting out correlations in the writings. In order
to check the robustness of the methods we also write the corresponding shuffled
texts. We compare characteristic functions and e.g. observe marked differences
in the (far from parabolic) f(alpha) curves, differences which we attribute to
Tsallis non extensive statistical features in the ''frequency time series'' and
''length time series''. The esperanto text has more extreme vallues. A very
rough approximation consists in modeling the texts as a random Cantor set if
resulting from a binomial cascade of long and short words (or words and
blanks). This leads to parameters characterizing the text style, and most
likely in fine the author writings.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2008 14:07:33 GMT"
}
] | 2008-01-17T00:00:00 | [
[
"Gillet",
"J.",
""
],
[
"Ausloos",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0801.2588 | K. Raj Kumar | K. Raj Kumar and Giuseppe Caire | Coding and Decoding for the Dynamic Decode and Forward Relay Protocol | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | We study the Dynamic Decode and Forward (DDF) protocol for a single
half-duplex relay, single-antenna channel with quasi-static fading. The DDF
protocol is well-known and has been analyzed in terms of the
Diversity-Multiplexing Tradeoff (DMT) in the infinite block length limit. We
characterize the finite block length DMT and give new explicit code
constructions. The finite block length analysis illuminates a few key aspects
that have been neglected in the previous literature: 1) we show that one
dominating cause of degradation with respect to the infinite block length
regime is the event of decoding error at the relay; 2) we explicitly take into
account the fact that the destination does not generally know a priori the
relay decision time at which the relay switches from listening to transmit
mode. Both the above problems can be tackled by a careful design of the
decoding algorithm. In particular, we introduce a decision rejection criterion
at the relay based on Forney's decision rule (a variant of the Neyman-Pearson
rule), such that the relay triggers transmission only when its decision is
reliable. Also, we show that a receiver based on the Generalized Likelihood
Ratio Test rule that jointly decodes the relay decision time and the
information message achieves the optimal DMT. Our results show that no cyclic
redundancy check (CRC) for error detection or additional protocol overhead to
communicate the decision time are needed for DDF. Finally, we investigate the
use of minimum mean squared error generalized decision feedback equalizer
(MMSE-GDFE) lattice decoding at both the relay and the destination, and show
that it provides near optimal performance at moderate complexity.
| [
{
"version": "v1",
"created": "Wed, 16 Jan 2008 23:05:12 GMT"
}
] | 2008-01-18T00:00:00 | [
[
"Kumar",
"K. Raj",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.2618 | Barry Doyle | Barry Doyle (University of California, Irvine) and Cristina Videira
Lopes (University of California, Irvine) | Survey of Technologies for Web Application Development | 43 pages | null | null | null | cs.SE cs.IR cs.NI | null | Web-based application developers face a dizzying array of platforms,
languages, frameworks and technical artifacts to choose from. We survey,
classify, and compare technologies supporting Web application development. The
classification is based on (1) foundational technologies; (2)integration with
other information sources; and (3) dynamic content generation. We further
survey and classify software engineering techniques and tools that have been
adopted from traditional programming into Web programming. We conclude that,
although the infrastructure problems of the Web have largely been solved, the
cacophony of technologies for Web-based applications reflects the lack of a
solid model tailored for this domain.
| [
{
"version": "v1",
"created": "Thu, 17 Jan 2008 05:06:44 GMT"
}
] | 2008-01-18T00:00:00 | [
[
"Doyle",
"Barry",
"",
"University of California, Irvine"
],
[
"Lopes",
"Cristina Videira",
"",
"University of California, Irvine"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0801.2666 | Jocelyne Troccaz | Christophe Reynier (TIMC), Jocelyne Troccaz (TIMC), Philippe Fourneret
(TIMC), Andr\'e Dusserre, C\'ecile Gay-Jeune (CHU-Grenoble radio), Jean-Luc
Descotes, Michel Bolla, Jean-Yves Giraud | MRI/TRUS data fusion for prostate brachytherapy. Preliminary results | null | Medical Physics 31, 6 (2004) 1568-75 | null | null | cs.OH | null | Prostate brachytherapy involves implanting radioactive seeds (I125 for
instance) permanently in the gland for the treatment of localized prostate
cancers, e.g., cT1c-T2a N0 M0 with good prognostic factors. Treatment planning
and seed implanting are most often based on the intensive use of transrectal
ultrasound (TRUS) imaging. This is not easy because prostate visualization is
difficult in this imaging modality particularly as regards the apex of the
gland and from an intra- and interobserver variability standpoint. Radioactive
seeds are implanted inside open interventional MR machines in some centers.
Since MRI was shown to be sensitive and specific for prostate imaging whilst
open MR is prohibitive for most centers and makes surgical procedures very
complex, this work suggests bringing the MR virtually in the operating room
with MRI/TRUS data fusion. This involves providing the physician with
bi-modality images (TRUS plus MRI) intended to improve treatment planning from
the data registration stage. The paper describes the method developed and
implemented in the PROCUR system. Results are reported for a phantom and first
series of patients. Phantom experiments helped characterize the accuracy of the
process. Patient experiments have shown that using MRI data linked with TRUS
data improves TRUS image segmentation especially regarding the apex and base of
the prostate. This may significantly modify prostate volume definition and have
an impact on treatment planning.
| [
{
"version": "v1",
"created": "Thu, 17 Jan 2008 13:14:07 GMT"
}
] | 2008-01-18T00:00:00 | [
[
"Reynier",
"Christophe",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Fourneret",
"Philippe",
"",
"TIMC"
],
[
"Dusserre",
"André",
"",
"CHU-Grenoble radio"
],
[
"Gay-Jeune",
"Cécile",
"",
"CHU-Grenoble radio"
],
[
"Descotes",
"Jean-Luc",
""
],
[
"Bolla",
"Michel",
""
],
[
"Giraud",
"Jean-Yves",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.2793 | Jeff M Phillips | Jeff M. Phillips | Algorithms for eps-approximations of Terrains | 24 pages. Long version to supplement conference version to appear in
ICALP in May 2008 | null | null | null | cs.CG | null | Consider a point set D with a measure function w : D -> R. Let A be the set
of subsets of D induced by containment in a shape from some geometric family
(e.g. axis-aligned rectangles, half planes, balls, k-oriented polygons). We say
a range space (D, A) has an eps-approximation P if max {R \in A} | w(R \cap
P)/w(P) - w(R \cap D)/w(D) | <= eps. We describe algorithms for
deterministically constructing discrete eps-approximations for continuous point
sets such as distributions or terrains. Furthermore, for certain families of
subsets A, such as those described by axis-aligned rectangles, we reduce the
size of the eps-approximations by almost a square root from O(1/eps^2 log
1/eps) to O(1/eps polylog 1/eps). This is often the first step in transforming
a continuous problem into a discrete one for which combinatorial techniques can
be applied. We describe applications of this result in geo-spatial analysis,
biosurveillance, and sensor networks.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 01:19:44 GMT"
},
{
"version": "v2",
"created": "Fri, 9 May 2008 05:48:55 GMT"
}
] | 2008-05-09T00:00:00 | [
[
"Phillips",
"Jeff M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0801.2823 | Jocelyne Troccaz | Jonathan Schers (TIMC), Jocelyne Troccaz (TIMC), Vincent Daanen
(TIMC), C\'eline Fouard (TIMC), Christopher Plaskos, Pascal Kilian | 3D/4D ultrasound registration of bone | null | Dans IEEE International Ultrasonic Symposium, 2007 - IEEE
International Ultrasonic Symposium, 2007, New-York : \'Etats-Unis
d'Am\'erique (2007) | 10.1109/ULTSYM.2007.634 | null | cs.OH physics.med-ph | null | This paper presents a method to reduce the invasiveness of Computer Assisted
Orthopaedic Surgery (CAOS) using ultrasound. In this goal, we need to develop a
method for 3D/4D ultrasound registration. The premilinary results of this study
suggest that the development of a robust and ``realtime'' 3D/4D ultrasound
registration is feasible.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 06:55:06 GMT"
}
] | 2008-01-21T00:00:00 | [
[
"Schers",
"Jonathan",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Fouard",
"Céline",
"",
"TIMC"
],
[
"Plaskos",
"Christopher",
""
],
[
"Kilian",
"Pascal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Physics",
"code": "physics.med-ph",
"description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.",
"span": "(Medical Physics)"
}
] |
0801.2838 | Avraham Trahtman N | A.N. Trahtman | An Algorithm for Road Coloring | 10 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A coloring of edges of a finite directed graph turns the graph into
finite-state automaton. The synchronizing word of a deterministic automaton is
a word in the alphabet of colors (considered as letters) of its edges that maps
the automaton to a single state. A coloring of edges of a directed graph of
uniform outdegree (constant outdegree of any vertex) is synchronizing if the
coloring turns the graph into a deterministic finite automaton possessing a
synchronizing word. The road coloring problem is the problem of synchronizing
coloring of a directed finite strongly connected graph of uniform outdegree if
the greatest common divisor of the lengths of all its cycles is one. The
problem posed in 1970 had evoked a noticeable interest among the specialists in
the theory of graphs, automata, codes, symbolic dynamics as well as among the
wide mathematical community. A polynomial time algorithm of $O(n^3)$ complexity
in the most worst case and quadratic in majority of studied cases for the road
coloring of the considered graph is presented below. The work is based on
recent positive solution of the road coloring problem. The algorithm was
implemented in the package TESTAS
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 09:22:46 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 06:11:35 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Nov 2010 11:06:54 GMT"
}
] | 2010-11-24T00:00:00 | [
[
"Trahtman",
"A. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.2858 | Fabrizio Altarelli | Fabrizio Altarelli | Theoretical analysis of optimization problems - Some properties of
random k-SAT and k-XORSAT | Ph.D. thesis, 132 pages | null | null | null | cond-mat.stat-mech cond-mat.dis-nn cs.CC | null | This thesis is divided in two parts. The first presents an overview of known
results in statistical mechanics of disordered systems and its approach to
random combinatorial optimization problems. The second part is a discussion of
two original results.
The first result concerns DPLL heuristics for random k-XORSAT, which is
equivalent to the diluted Ising p-spin model. It is well known that DPLL is
unable to find the ground states in the clustered phase of the problem, i.e.
that it leads to contradictions with probability 1. However, no solid argument
supports this is general. A class of heuristics, which includes the well known
UC and GUC, is introduced and studied. It is shown that any heuristic in this
class must fail if the clause to variable ratio is larger than some constant,
which depends on the heuristic but is always smaller than the clustering
threshold.
The second result concerns the properties of random k-SAT at large clause to
variable ratios. In this regime, it is well known that the uniform distribution
of random instances is dominated by unsatisfiable instances. A general
technique (based on the Replica method) to restrict the distribution to
satisfiable instances with uniform weight is introduced, and is used to
characterize their solutions. It is found that in the limit of large clause to
variable ratios, the uniform distribution of satisfiable random k-SAT formulas
is asymptotically equal to the much studied Planted distribution.
Both results are already published and available as arXiv:0709.0367 and
arXiv:cs/0609101 . A more detailed and self-contained derivation is presented
here.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 11:50:32 GMT"
}
] | 2008-01-21T00:00:00 | [
[
"Altarelli",
"Fabrizio",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.2890 | Abolfazl Ramezanpour | L. Dall'Asta, A. Ramezanpour and R. Zecchina | Entropy landscape and non-Gibbs solutions in constraint satisfaction
problems | 38 pages, 10 figures | Phys. Rev. E 77, 031118 (2008) | 10.1103/PhysRevE.77.031118 | null | cond-mat.stat-mech cs.CC | null | We study the entropy landscape of solutions for the bicoloring problem in
random graphs, a representative difficult constraint satisfaction problem. Our
goal is to classify which type of clusters of solutions are addressed by
different algorithms. In the first part of the study we use the cavity method
to obtain the number of clusters with a given internal entropy and determine
the phase diagram of the problem, e.g. dynamical, rigidity and SAT-UNSAT
transitions. In the second part of the paper we analyze different algorithms
and locate their behavior in the entropy landscape of the problem. For instance
we show that a smoothed version of a decimation strategy based on Belief
Propagation is able to find solutions belonging to sub-dominant clusters even
beyond the so called rigidity transition where the thermodynamically relevant
clusters become frozen. These non-equilibrium solutions belong to the most
probable unfrozen clusters.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 14:11:10 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dall'Asta",
"L.",
""
],
[
"Ramezanpour",
"A.",
""
],
[
"Zecchina",
"R.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.2931 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Evdokia Nikolova, Martin Pal | A Truthful Mechanism for Offline Ad Slot Scheduling | null | null | null | null | cs.GT cs.DS | null | We consider the "Offline Ad Slot Scheduling" problem, where advertisers must
be scheduled to "sponsored search" slots during a given period of time.
Advertisers specify a budget constraint, as well as a maximum cost per click,
and may not be assigned to more than one slot for a particular search.
We give a truthful mechanism under the utility model where bidders try to
maximize their clicks, subject to their personal constraints. In addition, we
show that the revenue-maximizing mechanism is not truthful, but has a Nash
equilibrium whose outcome is identical to our mechanism. As far as we can tell,
this is the first treatment of sponsored search that directly incorporates both
multiple slots and budget constraints into an analysis of incentives.
Our mechanism employs a descending-price auction that maintains a solution to
a certain machine scheduling problem whose job lengths depend on the price, and
hence is variable over the auction. The price stops when the set of bidders
that can afford that price pack exactly into a block of ad slots, at which
point the mechanism allocates that block and continues on the remaining slots.
To prove our result on the equilibrium of the revenue-maximizing mechanism, we
first show that a greedy algorithm suffices to solve the revenue-maximizing
linear program; we then use this insight to prove that bidders allocated in the
same block of our mechanism have no incentive to deviate from bidding the fixed
price of that block.
| [
{
"version": "v1",
"created": "Fri, 18 Jan 2008 16:34:30 GMT"
}
] | 2008-01-21T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Nikolova",
"Evdokia",
""
],
[
"Pal",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.3024 | Josep Rif\`a | J. Pujol, J. Rif\'a, F. I. Solov'eva | Construction of Z4-linear Reed-Muller codes | Paper submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | New quaternary Plotkin constructions are given and are used to obtain new
families of quaternary codes. The parameters of the obtained codes, such as the
length, the dimension and the minimum distance are studied. Using these
constructions new families of quaternary Reed-Muller codes are built with the
peculiarity that after using the Gray map the obtained Z4-linear codes have the
same parameters and fundamental properties as the codes in the usual binary
linear Reed-Muller family. To make more evident the duality relationships in
the constructed families the concept of Kronecker inner product is introduced.
| [
{
"version": "v1",
"created": "Sat, 19 Jan 2008 10:14:40 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Pujol",
"J.",
""
],
[
"Rifá",
"J.",
""
],
[
"Solov'eva",
"F. I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3042 | Lun Dong | Lun Dong, Athina P. Petropulu, H. Vincent Poor | Performance Analysis of a Cross-layer Collaborative Beamforming Approach
in the Presence of Channel and Phase Errors | 4 pages, 3 figures, To appear in the Proceedings of the 2008 IEEE
International Conference on Acoustics, Speech and Signal Processing, Las
Vegas, NV, March 30 - April 4, 2008 | null | null | null | cs.IT math.IT | null | Collaborative beamforming enables nodes in a wireless network to transmit a
common message over long distances in an energy efficient fashion. However, the
process of making available the same message to all collaborating nodes
introduces delays. The authors recently proposed a MAC-PHY cross-layer scheme
that enables collaborative beamforming with significantly reduced collaboration
overhead. The method requires knowledge of node locations and internode channel
coefficients. In this paper, the performance of that approach is studied
analytically in terms of average beampattern and symbol error probability (SEP)
under realistic conditions, i.e., when imperfect channel estimates are used and
when there are phase errors in the contributions of the collaborating nodes at
the receiver.
| [
{
"version": "v1",
"created": "Sat, 19 Jan 2008 16:26:06 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Dong",
"Lun",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3046 | John Stockie | Michael Chapwanya, Wentao Liu and John M. Stockie | A model for reactive porous transport during re-wetting of hardened
concrete | 30 pages | Journal of Engineering Mathematics, 65(1):53-73, 2009 | 10.1007/s10665-009-9268-0 | null | cs.CE physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A mathematical model is developed that captures the transport of liquid water
in hardened concrete, as well as the chemical reactions that occur between the
imbibed water and the residual calcium silicate compounds residing in the
porous concrete matrix. The main hypothesis in this model is that the reaction
product -- calcium silicate hydrate gel -- clogs the pores within the concrete
thereby hindering water transport. Numerical simulations are employed to
determine the sensitivity of the model solution to changes in various physical
parameters, and compare to experimental results available in the literature.
| [
{
"version": "v1",
"created": "Sat, 19 Jan 2008 18:54:01 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Aug 2008 17:55:14 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Jan 2009 04:15:45 GMT"
}
] | 2009-08-12T00:00:00 | [
[
"Chapwanya",
"Michael",
""
],
[
"Liu",
"Wentao",
""
],
[
"Stockie",
"John M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.