id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0801.3048 | Franco Bagnoli | Franco Bagnoli, Andrea Guazzini, Pietro Lio' | Human Heuristics for Autonomous Agents | 12 pages | P. Li\'o et al. editors, BIOWIRE 2007, LNCS 5151, pages 340-351,
Springer--Verlag Berlin Heidelberg 2008 | 10.1007/978-3-540-92191-2_30 | null | cs.MA cs.HC cs.NI | null | We investigate the problem of autonomous agents processing pieces of
information that may be corrupted (tainted). Agents have the option of
contacting a central database for a reliable check of the status of the
message, but this procedure is costly and therefore should be used with
parsimony. Agents have to evaluate the risk of being infected, and decide if
and when communicating partners are affordable. Trustability is implemented as
a personal (one-to-one) record of past contacts among agents, and as a
mean-field monitoring of the level of message corruption. Moreover, this
information is slowly forgotten in time, so that at the end everybody is
checked against the database. We explore the behavior of a homogeneous system
in the case of a fixed pool of spreaders of corrupted messages, and in the case
of spontaneous appearance of corrupted messages.
| [
{
"version": "v1",
"created": "Sat, 19 Jan 2008 19:36:13 GMT"
}
] | 2011-08-22T00:00:00 | [
[
"Bagnoli",
"Franco",
""
],
[
"Guazzini",
"Andrea",
""
],
[
"Lio'",
"Pietro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0801.3049 | Zhi Quan | Zhi Quan, Shuguang Cui, Ali. H. Sayed, and H. Vincent Poor | Spatial-Spectral Joint Detection for Wideband Spectrum Sensing in
Cognitive Radio Networks | To appear in the Proceedings of the 2008 IEEE International
Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March
30-April 4, 2008 | null | 10.1109/TSP.2008.2008540 | null | cs.IT math.IT | null | Spectrum sensing is an essential functionality that enables cognitive radios
to detect spectral holes and opportunistically use under-utilized frequency
bands without causing harmful interference to primary networks. Since
individual cognitive radios might not be able to reliably detect weak primary
signals due to channel fading/shadowing, this paper proposes a cooperative
wideband spectrum sensing scheme, referred to as spatial-spectral joint
detection, which is based on a linear combination of the local statistics from
spatially distributed multiple cognitive radios. The cooperative sensing
problem is formulated into an optimization problem, for which suboptimal but
efficient solutions can be obtained through mathematical transformation under
practical conditions.
| [
{
"version": "v1",
"created": "Sat, 19 Jan 2008 19:55:02 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Quan",
"Zhi",
""
],
[
"Cui",
"Shuguang",
""
],
[
"Sayed",
"Ali. H.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3065 | Alwen Tiu | Alwen Tiu | Cut Elimination for a Logic with Generic Judgments and Induction | null | null | null | null | cs.LO | null | This paper presents a cut-elimination proof for the logic $LG^\omega$, which
is an extension of a proof system for encoding generic judgments, the logic
$\FOLDNb$ of Miller and Tiu, with an induction principle. The logic
$LG^\omega$, just as $\FOLDNb$, features extensions of first-order
intuitionistic logic with fixed points and a ``generic quantifier'', $\nabla$,
which is used to reason about the dynamics of bindings in object systems
encoded in the logic. A previous attempt to extend $\FOLDNb$ with an induction
principle has been unsuccessful in modeling some behaviours of bindings in
inductive specifications. It turns out that this problem can be solved by
relaxing some restrictions on $\nabla$, in particular by adding the axiom $B
\equiv \nabla x. B$, where $x$ is not free in $B$. We show that by adopting the
equivariance principle, the presentation of the extended logic can be much
simplified. This paper contains the technical proofs for the results stated in
\cite{tiu07entcs}; readers are encouraged to consult \cite{tiu07entcs} for
motivations and examples for $LG^\omega.$
| [
{
"version": "v1",
"created": "Sun, 20 Jan 2008 08:34:22 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Tiu",
"Alwen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.3073 | Youngchul Sung | Youngchul Sung, H. Vincent Poor and Heejung Yu | Large Deviations Analysis for the Detection of 2D Hidden Gauss-Markov
Random Fields Using Sensor Networks | To appear in the Proceedings of the 2008 IEEE International
Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March
30 - April 4, 2008 | null | 10.1109/ICASSP.2008.4518504 | null | cs.IT math.IT | null | The detection of hidden two-dimensional Gauss-Markov random fields using
sensor networks is considered. Under a conditional autoregressive model, the
error exponent for the Neyman-Pearson detector satisfying a fixed level
constraint is obtained using the large deviations principle. For a symmetric
first order autoregressive model, the error exponent is given explicitly in
terms of the SNR and an edge dependence factor (field correlation). The
behavior of the error exponent as a function of correlation strength is seen to
divide into two regions depending on the value of the SNR. At high SNR,
uncorrelated observations maximize the error exponent for a given SNR, whereas
there is non-zero optimal correlation at low SNR. Based on the error exponent,
the energy efficiency (defined as the ratio of the total information gathered
to the total energy required) of ad hoc sensor network for detection is
examined for two sensor deployment models: an infinite area model and and
infinite density model. For a fixed sensor density, the energy efficiency
diminishes to zero at rate O(area^{-1/2}) as the area is increased. On the
other hand, non-zero efficiency is possible for increasing density depending on
the behavior of the physical correlation as a function of the link length.
| [
{
"version": "v1",
"created": "Sun, 20 Jan 2008 10:04:16 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Sung",
"Youngchul",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Yu",
"Heejung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3097 | Zhu Han | Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Poor | Auction-based Resource Allocation for Multi-relay Asynchronous
Cooperative Networks | To appear in the Proceedings of the 2008 IEEE International
Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March
30 to April 4, 2008 | null | 10.1109/ICASSP.2008.4518870 | null | cs.IT math.IT | null | Resource allocation is considered for cooperative transmissions in
multiple-relay wireless networks. Two auction mechanisms, SNR auctions and
power auctions, are proposed to distributively coordinate the allocation of
power among multiple relays. In the SNR auction, a user chooses the relay with
the lowest weighted price. In the power auction, a user may choose to use
multiple relays simultaneously, depending on the network topology and the
relays' prices. Sufficient conditions for the existence (in both auctions) and
uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness
of the SNR auction and efficiency of the power auction are further discussed.
It is also proven that users can achieve the unique Nash equilibrium
distributively via best response updates in a completely asynchronous manner.
| [
{
"version": "v1",
"created": "Sun, 20 Jan 2008 17:25:56 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Huang",
"Jianwei",
""
],
[
"Han",
"Zhu",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3102 | Eloisa Bentivegna | Mark Wenstrom, Eloisa Bentivegna and Ali Hurson (Pennsylvania State
University) | Balancing transparency, efficiency and security in pervasive systems | 52 pages, to be published in Advances in Computers | null | null | null | cs.HC cs.IR | null | This chapter will survey pervasive computing with a look at how its
constraint for transparency affects issues of resource management and security.
The goal of pervasive computing is to render computing transparent, such that
computing resources are ubiquitously offered to the user and services are
proactively performed for a user without his or her intervention. The task of
integrating computing infrastructure into everyday life without making it
excessively invasive brings about tradeoffs between flexibility and robustness,
efficiency and effectiveness, as well as autonomy and reliability. As the
feasibility of ubiquitous computing and its real potential for mass
applications are still a matter of controversy, this chapter will look into the
underlying issues of resource management and authentication to discover how
these can be handled in a least invasive fashion. The discussion will be closed
by an overview of the solutions proposed by current pervasive computing
efforts, both in the area of generic platforms and for dedicated applications
such as pervasive education and healthcare.
| [
{
"version": "v1",
"created": "Sun, 20 Jan 2008 19:15:50 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Wenstrom",
"Mark",
"",
"Pennsylvania State\n University"
],
[
"Bentivegna",
"Eloisa",
"",
"Pennsylvania State\n University"
],
[
"Hurson",
"Ali",
"",
"Pennsylvania State\n University"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0801.3111 | Martin Pelikan | Martin Pelikan | Analysis of Estimation of Distribution Algorithms and Genetic Algorithms
on NK Landscapes | Also available at the MEDAL web site, http://medal.cs.umsl.edu/ | Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO-2008), ACM Press, 1033-1040 | null | MEDAL Report No. 2008001 | cs.NE cs.AI | null | This study analyzes performance of several genetic and evolutionary
algorithms on randomly generated NK fitness landscapes with various values of n
and k. A large number of NK problem instances are first generated for each n
and k, and the global optimum of each instance is obtained using the
branch-and-bound algorithm. Next, the hierarchical Bayesian optimization
algorithm (hBOA), the univariate marginal distribution algorithm (UMDA), and
the simple genetic algorithm (GA) with uniform and two-point crossover
operators are applied to all generated instances. Performance of all algorithms
is then analyzed and compared, and the results are discussed.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:20:50 GMT"
}
] | 2008-07-30T00:00:00 | [
[
"Pelikan",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3112 | Vinod Prabhakaran | Adnan Raja, Vinod M. Prabhakaran, and Pramod Viswanath | The Two User Gaussian Compound Interference Channel | null | null | null | null | cs.IT math.IT | null | We introduce the two user finite state compound Gaussian interference channel
and characterize its capacity region to within one bit. The main contributions
involve both novel inner and outer bounds. The inner bound is multilevel
superposition coding, but the decoding of the levels is opportunistic,
depending on the channel state. The genie aided outer bound is motivated by the
typical error events of the achievable scheme.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:15:18 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Mar 2008 16:14:32 GMT"
},
{
"version": "v3",
"created": "Thu, 1 May 2008 00:17:44 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Raja",
"Adnan",
""
],
[
"Prabhakaran",
"Vinod M.",
""
],
[
"Viswanath",
"Pramod",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3113 | Martin Pelikan | Martin Pelikan, Kumara Sastry, and David E. Goldberg | iBOA: The Incremental Bayesian Optimization Algorithm | Also available at the MEDAL web site, http://medal.cs.umsl.edu/ | Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO-2008), ACM Press, 455-462 | null | MEDAL Report No. 2008002 | cs.NE cs.AI | null | This paper proposes the incremental Bayesian optimization algorithm (iBOA),
which modifies standard BOA by removing the population of solutions and using
incremental updates of the Bayesian network. iBOA is shown to be able to learn
and exploit unrestricted Bayesian networks using incremental techniques for
updating both the structure as well as the parameters of the probabilistic
model. This represents an important step toward the design of competent
incremental estimation of distribution algorithms that can solve difficult
nearly decomposable problems scalably and reliably.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:34:55 GMT"
}
] | 2008-07-30T00:00:00 | [
[
"Pelikan",
"Martin",
""
],
[
"Sastry",
"Kumara",
""
],
[
"Goldberg",
"David E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3114 | Grenville Croll | Raymond R. Panko | Thinking is Bad: Implications of Human Error Research for Spreadsheet
Research and Practice | 12 pages including references | Proc. European Spreadsheet Risks Int. Grp. 2007 69-80 ISBN
978-905617-58-6 | null | null | cs.HC | null | In the spreadsheet error community, both academics and practitioners
generally have ignored the rich findings produced by a century of human error
research. These findings can suggest ways to reduce errors; we can then test
these suggestions empirically. In addition, research on human error seems to
suggest that several common prescriptions and expectations for reducing errors
are likely to be incorrect. Among the key conclusions from human error research
are that thinking is bad, that spreadsheets are not the cause of spreadsheet
errors, and that reducing errors is extremely difficult.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:33:15 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Panko",
"Raymond R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.3116 | Grenville Croll | Ralph Baxter | Enterprise Spreadsheet Management: A Necessary Good | 8 pages, includes references | Proc. European Spreadsheet Risks Int. Grp. 2007 7-13 ISBN
978-905617-58-6 | null | null | cs.CY | null | This paper presents the arguments and supporting business metrics for
Enterprise Spreadsheet Management to be seen as a necessary good. These
arguments are divided into a summary of external business drivers that make it
necessary and the good that may be delivered to business spreadsheet users
involved in repetitive manual processes.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:41:18 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Baxter",
"Ralph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.3117 | Yongzhi Cao | Yongzhi Cao | A hierarchy of behavioral equivalences in the $\pi$-calculus with noisy
channels | 30 pages, 2 figures | Comput. J., vol. 53, no. 1, pp. 3-20, 2010 | null | null | cs.LO | null | The $\pi$-calculus is a process algebra where agents interact by sending
communication links to each other via noiseless communication channels. Taking
into account the reality of noisy channels, an extension of the $\pi$-calculus,
called the $\pi_N$-calculus, has been introduced recently. In this paper, we
present an early transitional semantics of the $\pi_N$-calculus, which is not a
directly translated version of the late semantics of $\pi_N$, and then extend
six kinds of behavioral equivalences consisting of reduction bisimilarity,
barbed bisimilarity, barbed equivalence, barbed congruence, bisimilarity, and
full bisimilarity into the $\pi_N$-calculus. Such behavioral equivalences are
cast in a hierarchy, which is helpful to verify behavioral equivalence of two
agents. In particular, we show that due to the noisy nature of channels, the
coincidence of bisimilarity and barbed equivalence, as well as the coincidence
of full bisimilarity and barbed congruence, in the $\pi$-calculus does not hold
in $\pi_N$.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:42:52 GMT"
}
] | 2011-10-04T00:00:00 | [
[
"Cao",
"Yongzhi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.3118 | Grenville Croll | Simon Murphy | Spreadsheet Hell | 6 pages | Proc. European Spreadsheet Risks Int. Grp. 2007 15-20 ISBN
978-905617-58-6 | null | null | cs.CY | null | This management paper looks at the real world issues faced by practitioners
managing spreadsheets through the production phase of their life cycle. It
draws on the commercial experience of several developers working with large
corporations, either as employees or consultants or contractors. It provides
commercial examples of some of the practicalities involved with spreadsheet use
around the enterprise.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:51:12 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Murphy",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.3119 | Grenville Croll | Mukul Madahar, Pat Cleary, David Ball | Categorisation of Spreadsheet Use within Organisations, Incorporating
Risk: A Progress Report | 10 pages | Proc. European Spreadsheet Risks Int. Grp. 2007 37-45 ISBN
978-905617-58-6 | null | null | cs.CY cs.HC | null | There has been a significant amount of research into spreadsheets over the
last two decades. Errors in spreadsheets are well documented. Once used mainly
for simple functions such as logging, tracking and totalling information,
spreadsheets with enhanced formulas are being used for complex calculative
models. There are many software packages and tools which assist in detecting
errors within spreadsheets. There has been very little evidence of
investigation into the spreadsheet risks associated with the main stream
operations within an organisation. This study is a part of the investigation
into the means of mitigating risks associated with spreadsheet use within
organisations. In this paper the authors present and analyse three proposed
models for categorisation of spreadsheet use and the level of risks involved.
The models are analysed in the light of current knowledge and the general risks
associated with organisations.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 00:57:31 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Madahar",
"Mukul",
""
],
[
"Cleary",
"Pat",
""
],
[
"Ball",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.3147 | Ke Xu | Liang Li, Xin Li, Tian Liu, Ke Xu | From k-SAT to k-CSP: Two Generalized Algorithms | null | null | null | null | cs.DS cs.AI cs.CC | null | Constraint satisfaction problems (CSPs) models many important intractable
NP-hard problems such as propositional satisfiability problem (SAT). Algorithms
with non-trivial upper bounds on running time for restricted SAT with bounded
clause length k (k-SAT) can be classified into three styles: DPLL-like,
PPSZ-like and Local Search, with local search algorithms having already been
generalized to CSP with bounded constraint arity k (k-CSP). We generalize a
DPLL-like algorithm in its simplest form and a PPSZ-like algorithm from k-SAT
to k-CSP. As far as we know, this is the first attempt to use PPSZ-like
strategy to solve k-CSP, and before little work has been focused on the
DPLL-like or PPSZ-like strategies for k-CSP.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 08:07:33 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Li",
"Liang",
""
],
[
"Li",
"Xin",
""
],
[
"Liu",
"Tian",
""
],
[
"Xu",
"Ke",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.3199 | Ngoc-Diep Ho | Ngoc-Diep Ho (1), Paul Van Dooren (1) and Vincent D. Blondel (1) ((1)
Universit\'e catholique de Louvain, Belgium) | Descent methods for Nonnegative Matrix Factorization | 47 pages. New convergence proof using damped version of RRI. To
appear in Numerical Linear Algebra in Signals, Systems and Control. Accepted.
Illustrating Matlab code is included in the source bundle | null | null | 2007.057 | cs.NA cs.IR math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present several descent methods that can be applied to
nonnegative matrix factorization and we analyze a recently developped fast
block coordinate method called Rank-one Residue Iteration (RRI). We also give a
comparison of these different methods and show that the new block coordinate
method has better properties in terms of approximation error and complexity. By
interpreting this method as a rank-one approximation of the residue matrix, we
prove that it \emph{converges} and also extend it to the nonnegative tensor
factorization and introduce some variants of the method by imposing some
additional controllable constraints such as: sparsity, discreteness and
smoothness.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 15:46:43 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2008 21:20:12 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Aug 2009 22:32:24 GMT"
}
] | 2009-08-25T00:00:00 | [
[
"Ho",
"Ngoc-Diep",
""
],
[
"Van Dooren",
"Paul",
""
],
[
"Blondel",
"Vincent D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0801.3209 | Uwe Aickelin | Uwe Aickelin | A Pyramidal Evolutionary Algorithm with Different Inter-Agent Partnering
Strategies for Scheduling Problems | null | Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO 2001), late-breaking papers volume, pp 1-8, San Francisco, USA | null | null | cs.NE cs.CE | null | This paper combines the idea of a hierarchical distributed genetic algorithm
with different inter-agent partnering strategies. Cascading clusters of
sub-populations are built from bottom up, with higher-level sub-populations
optimising larger parts of the problem. Hence higher-level sub-populations
search a larger search space with a lower resolution whilst lower-level
sub-populations search a smaller search space with a higher resolution. The
effects of different partner selection schemes amongst the agents on solution
quality are examined for two multiple-choice optimisation problems. It is shown
that partnering strategies that exploit problem-specific knowledge are superior
and can counter inappropriate (sub-) fitness measurements.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 15:55:22 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:10:36 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0801.3239 | Andrij Rovenchak | Solomiya Buk, Andrij Rovenchak | Online-concordance "Perekhresni stezhky" ("The Cross-Paths"), a novel by
Ivan Franko | in Ukrainian | Ivan Franko: Spirit, Science, Thought, Will (Proceedings of the
International Scientific Congress dedicated to the 150th anniversary (Lviv,
27 September -- 1 October 2006, Lviv University Press, Vol. 2, pp. 203-211,
2010) | null | null | cs.CL cs.DL | null | In the article, theoretical principles and practical realization for the
compilation of the concordance to "Perekhresni stezhky" ("The Cross-Paths"), a
novel by Ivan Franko, are described. Two forms for the context presentation are
proposed. The electronic version of this lexicographic work is available
online.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 17:41:57 GMT"
}
] | 2014-01-17T00:00:00 | [
[
"Buk",
"Solomiya",
""
],
[
"Rovenchak",
"Andrij",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0801.3249 | Christian Kuehn | Christian Kuehn | Complex Eigenvalues for Binary Subdivision Schemes | 7 pages, 2 figures | null | null | null | cs.GR cs.NA | null | Convergence properties of binary stationary subdivision schemes for curves
have been analyzed using the techniques of z-transforms and eigenanalysis.
Eigenanalysis provides a way to determine derivative continuity at specific
points based on the eigenvalues of a finite matrix. None of the well-known
subdivision schemes for curves have complex eigenvalues. We prove when a
convergent scheme with palindromic mask can have complex eigenvalues and that a
lower limit for the size of the mask exists in this case. We find a scheme with
complex eigenvalues achieving this lower bound. Furthermore we investigate this
scheme numerically and explain from a geometric viewpoint why such a scheme has
not yet been used in computer-aided geometric design.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 18:27:09 GMT"
}
] | 2008-01-22T00:00:00 | [
[
"Kuehn",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0801.3272 | Steven Peters | Steven W. Peters and Robert W. Heath Jr | Nonregenerative MIMO Relaying with Optimal Transmit Antenna Selection | null | null | 10.1109/LSP.2008.921466 | null | cs.IT math.IT | null | We derive optimal SNR-based transmit antenna selection rules at the source
and relay for the nonregenerative half duplex MIMO relay channel. While antenna
selection is a suboptimal form of beamforming, it has the advantage that the
optimization is tractable and can be implemented with only a few bits of
feedback from the destination to the source and relay. We compare the bit error
rate of optimal antenna selection at both the source and relay to other
proposed beamforming techniques and propose methods for performing the
necessary limited feedback.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 21:03:11 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Peters",
"Steven W.",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3289 | Lifeng Lai | Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor | Optimal Medium Access Control in Cognitive Radios: A Sequential Design
Approach | To appear in the Proceedings of the 2008 IEEE International
Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March
30- April 4, 2008 | null | 10.1109/ICASSP.2008.4518049 | null | cs.IT cs.NI math.IT | null | The design of medium access control protocols for a cognitive user wishing to
opportunistically exploit frequency bands within parts of the radio spectrum
having multiple bands is considered. In the scenario under consideration, the
availability probability of each channel is unknown a priori to the cognitive
user. Hence efficient medium access strategies must strike a balance between
exploring the availability of channels and exploiting the opportunities
identified thus far. Using a sequential design approach, an optimal medium
access strategy is derived. To avoid the prohibitive computational complexity
of this optimal strategy, a low complexity asymptotically optimal strategy is
also developed. The proposed strategy does not require any prior statistical
knowledge about the traffic pattern on the different channels.
| [
{
"version": "v1",
"created": "Mon, 21 Jan 2008 22:45:28 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Jiang",
"Hai",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3331 | Guillaume Hanrot | Guillaume Hanrot (INRIA Lorraine - LORIA), Damien Stehl\'e (INRIA
Rh\^one-Alpes) | Worst-Case Hermite-Korkine-Zolotarev Reduced Lattice Bases | null | null | null | null | math.NT cs.CC cs.CR | null | The Hermite-Korkine-Zolotarev reduction plays a central role in strong
lattice reduction algorithms. By building upon a technique introduced by Ajtai,
we show the existence of Hermite-Korkine-Zolotarev reduced bases that are
arguably least reduced. We prove that for such bases, Kannan's algorithm
solving the shortest lattice vector problem requires
$d^{\frac{d}{2\e}(1+o(1))}$ bit operations in dimension $d$. This matches the
best complexity upper bound known for this algorithm. These bases also provide
lower bounds on Schnorr's constants $\alpha_d$ and $\beta_d$ that are
essentially equal to the best upper bounds. Finally, we also show the existence
of particularly bad bases for Schnorr's hierarchy of reductions.
| [
{
"version": "v1",
"created": "Tue, 22 Jan 2008 09:52:35 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jan 2008 15:13:23 GMT"
}
] | 2008-01-24T00:00:00 | [
[
"Hanrot",
"Guillaume",
"",
"INRIA Lorraine - LORIA"
],
[
"Stehlé",
"Damien",
"",
"INRIA\n Rhône-Alpes"
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.3408 | Laurent Lyaudet | Uffe Flarup (IMADA), Laurent Lyaudet (LIP) | On the expressive power of permanents and perfect matchings of matrices
of bounded pathwidth/cliquewidth | 21 pages | null | null | null | cs.DM | null | Some 25 years ago Valiant introduced an algebraic model of computation in
order to study the complexity of evaluating families of polynomials. The theory
was introduced along with the complexity classes VP and VNP which are analogues
of the classical classes P and NP. Families of polynomials that are difficult
to evaluate (that is, VNP-complete) includes the permanent and hamiltonian
polynomials. In a previous paper the authors together with P. Koiran studied
the expressive power of permanent and hamiltonian polynomials of matrices of
bounded treewidth, as well as the expressive power of perfect matchings of
planar graphs. It was established that the permanent and hamiltonian
polynomials of matrices of bounded treewidth are equivalent to arithmetic
formulas. Also, the sum of weights of perfect matchings of planar graphs was
shown to be equivalent to (weakly) skew circuits. In this paper we continue the
research in the direction described above, and study the expressive power of
permanents, hamiltonians and perfect matchings of matrices that have bounded
pathwidth or bounded cliquewidth. In particular, we prove that permanents,
hamiltonians and perfect matchings of matrices that have bounded pathwidth
express exactly arithmetic formulas. This is an improvement of our previous
result for matrices of bounded treewidth. Also, for matrices of bounded
weighted cliquewidth we show membership in VP for these polynomials.
| [
{
"version": "v1",
"created": "Tue, 22 Jan 2008 16:35:15 GMT"
}
] | 2008-01-23T00:00:00 | [
[
"Flarup",
"Uffe",
"",
"IMADA"
],
[
"Lyaudet",
"Laurent",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.3511 | Hamid Saeedi | Hamid Saeedi and Amir H. Banihashemi | Deterministic Design of Low-Density Parity-Check Codes for Binary
Erasure Channels | Submitted to IEEE Transactions on Communications, Sept. 2007 | null | null | null | cs.IT math.IT | null | We propose a deterministic method to design irregular Low-Density
Parity-Check (LDPC) codes for binary erasure channels (BEC). Compared to the
existing methods, which are based on the application of asymptomatic analysis
tools such as density evolution or Extrinsic Information Transfer (EXIT) charts
in an optimization process, the proposed method is much simpler and faster.
Through a number of examples, we demonstrate that the codes designed by the
proposed method perform very closely to the best codes designed by
optimization. An important property of the proposed designs is the flexibility
to select the number of constituent variable node degrees P. The proposed
designs include existing deterministic designs as a special case with P = N-1,
where N is the maximum variable node degree. Compared to the existing
deterministic designs, for a given rate and a given d > 0, the designed
ensembles can have a threshold in d-neighborhood of the capacity upper bound
with smaller values of P and N. They can also achieve the capacity of the BEC
as N, and correspondingly P and the maximum check node degree tend to infinity.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 06:56:12 GMT"
}
] | 2008-01-24T00:00:00 | [
[
"Saeedi",
"Hamid",
""
],
[
"Banihashemi",
"Amir H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3521 | Vasanthan Raghavan | Gautham Hariharan, Vasanthan Raghavan, Akbar M. Sayeed | Capacity of Sparse Wideband Channels with Partial Channel Feedback | 32 pages, 4 figures, Accepted for publication in European
Transactions on Telecommunication, New Directions in Information Theory | null | null | null | cs.IT math.IT | null | This paper studies the ergodic capacity of wideband multipath channels with
limited feedback. Our work builds on recent results that have established the
possibility of significant capacity gains in the wideband/low-SNR regime when
there is perfect channel state information (CSI) at the transmitter.
Furthermore, the perfect CSI benchmark gain can be obtained with the feedback
of just one bit per channel coefficient. However, the input signals used in
these methods are peaky, that is, they have a large peak-to-average power
ratios. Signal peakiness is related to channel coherence and many recent
measurement campaigns show that, in contrast to previous assumptions, wideband
channels exhibit a sparse multipath structure that naturally leads to coherence
in time and frequency. In this work, we first show that even an instantaneous
power constraint is sufficient to achieve the benchmark gain when perfect CSI
is available at the receiver. In the more realistic non-coherent setting, we
study the performance of a training-based signaling scheme. We show that
multipath sparsity can be leveraged to achieve the benchmark gain under both
average as well as instantaneous power constraints as long as the channel
coherence scales at a sufficiently fast rate with signal space dimensions. We
also present rules of thumb on choosing signaling parameters as a function of
the channel parameters so that the full benefits of sparsity can be realized.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 08:12:47 GMT"
}
] | 2008-01-24T00:00:00 | [
[
"Hariharan",
"Gautham",
""
],
[
"Raghavan",
"Vasanthan",
""
],
[
"Sayeed",
"Akbar M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3526 | Vasanthan Raghavan | Vasanthan Raghavan, Venu Veeravalli, Akbar Sayeed | Quantized Multimode Precoding in Spatially Correlated Multi-Antenna
Channels | 30 pages, 4 figures, Preprint to be submitted to IEEE Transactions on
Signal Processing | null | 10.1109/TSP.2008.2005748 | null | cs.IT math.IT | null | Multimode precoding, where the number of independent data-streams is adapted
optimally, can be used to maximize the achievable throughput in multi-antenna
communication systems. Motivated by standardization efforts embraced by the
industry, the focus of this work is on systematic precoder design with
realistic assumptions on the spatial correlation, channel state information
(CSI) at the transmitter and the receiver, and implementation complexity. For
spatial correlation of the channel matrix, we assume a general channel model,
based on physical principles, that has been verified by many recent measurement
campaigns. We also assume a coherent receiver and knowledge of the spatial
statistics at the transmitter along with the presence of an ideal, low-rate
feedback link from the receiver to the transmitter. The reverse link is used
for codebook-index feedback and the goal of this work is to construct precoder
codebooks, adaptable in response to the statistical information, such that the
achievable throughput is significantly enhanced over that of a fixed,
non-adaptive, i.i.d. codebook design. We illustrate how a codebook of
semiunitary precoder matrices localized around some fixed center on the
Grassmann manifold can be skewed in response to the spatial correlation via
low-complexity maps that can rotate and scale submanifolds on the Grassmann
manifold. The skewed codebook in combination with a lowcomplexity statistical
power allocation scheme is then shown to bridge the gap in performance between
a perfect CSI benchmark and an i.i.d. codebook design.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 08:52:25 GMT"
}
] | 2015-10-28T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Veeravalli",
"Venu",
""
],
[
"Sayeed",
"Akbar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3539 | Uwe Aickelin | Steve Cayzer and Uwe Aickelin | On the Effects of Idiotypic Interactions for Recommendation Communities
in Artificial Immune Systems | null | Proceedings of the 1st International Conference on Artificial
Immune Systems (ICARIS 2002), pp 154-160, Canterbury, UK, 2001 | null | null | cs.NE cs.AI | null | It has previously been shown that a recommender based on immune system
idiotypic principles can out perform one based on correlation alone. This paper
reports the results of work in progress, where we undertake some investigations
into the nature of this beneficial effect. The initial findings are that the
immune system recommender tends to produce different neighbourhoods, and that
the superior performance of this recommender is due partly to the different
neighbourhoods, and partly to the way that the idiotypic effect is used to
weight each neighbours recommendations.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 09:59:06 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:10:05 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:42:42 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Cayzer",
"Steve",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3547 | Uwe Aickelin | Steve Cazyer and Uwe Aickelin | A Recommender System based on the Immune Network | null | Proceedings of the IEEE Congress on Evolutionary Computation (CEC
2002), pp 807-813, Honolulu, USA, 2002 | null | null | cs.NE cs.AI | null | The immune system is a complex biological system with a highly distributed,
adaptive and self-organising nature. This paper presents an artificial immune
system (AIS) that exploits some of these characteristics and is applied to the
task of film recommendation by collaborative filtering (CF). Natural evolution
and in particular the immune system have not been designed for classical
optimisation. However, for this problem, we are not interested in finding a
single optimum. Rather we intend to identify a sub-set of good matches on which
recommendations can be based. It is our hypothesis that an AIS built on two
central aspects of the biological immune system will be an ideal candidate to
achieve this: Antigen - antibody interaction for matching and antibody -
antibody interaction for diversity. Computational results are presented in
support of this conjecture and compared to those found by other CF techniques.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 10:42:49 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:09:24 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Cazyer",
"Steve",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3549 | Uwe Aickelin | Uwe Aickelin and Steve Cayzer | The Danger Theory and Its Application to Artificial Immune Systems | null | Proceedings of the 1st International Conference on Artificial
Immune Systems (ICARIS 2002), pp 141-148, Canterbury, Uk, 2002 | null | null | cs.NE cs.AI cs.CR | null | Over the last decade, a new idea challenging the classical self-non-self
viewpoint has become popular amongst immunologists. It is called the Danger
Theory. In this conceptual paper, we look at this theory from the perspective
of Artificial Immune System practitioners. An overview of the Danger Theory is
presented with particular emphasis on analogies in the Artificial Immune
Systems world. A number of potential application areas are then used to provide
a framing for a critical assessment of the concept, and its relevance for
Artificial Immune Systems.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 11:01:31 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:08:46 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:45:49 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Cayzer",
"Steve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.3550 | Uwe Aickelin | Uwe Aickelin and Larry Bull | Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary
Algorithm | null | Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO 2002), pp 263-270, New York, USA, 2002 | null | null | cs.NE cs.AI | null | This paper combines the idea of a hierarchical distributed genetic algorithm
with different inter-agent partnering strategies. Cascading clusters of
sub-populations are built from bottom up, with higher-level sub-populations
optimising larger parts of the problem. Hence higher-level sub-populations
search a larger search space with a lower resolution whilst lower-level
sub-populations search a smaller search space with a higher resolution. The
effects of different partner selection schemes for (sub-)fitness evaluation
purposes are examined for two multiple-choice optimisation problems. It is
shown that random partnering strategies perform best by providing better
sampling and more diversity.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 11:12:39 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:08:00 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Bull",
"Larry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3581 | Shay Solomon | Yefim Dinitz, Michael Elkin, Shay Solomon | Shallow, Low, and Light Trees, and Tight Lower Bounds for Euclidean
Spanners | 41 pages, 11 figures | null | null | null | cs.CG cs.DS | null | We show that for every $n$-point metric space $M$ there exists a spanning
tree $T$ with unweighted diameter $O(\log n)$ and weight $\omega(T) = O(\log n)
\cdot \omega(MST(M))$. Moreover, there is a designated point $rt$ such that for
every point $v$, $dist_T(rt,v) \le (1+\epsilon) \cdot dist_M(rt,v)$, for an
arbitrarily small constant $\epsilon > 0$. We extend this result, and provide a
tradeoff between unweighted diameter and weight, and prove that this tradeoff
is \emph{tight up to constant factors} in the entire range of parameters. These
results enable us to settle a long-standing open question in Computational
Geometry. In STOC'95 Arya et al. devised a construction of Euclidean Spanners
with unweighted diameter $O(\log n)$ and weight $O(\log n) \cdot
\omega(MST(M))$. Ten years later in SODA'05 Agarwal et al. showed that this
result is tight up to a factor of $O(\log \log n)$. We close this gap and show
that the result of Arya et al. is tight up to constant factors.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 13:57:00 GMT"
}
] | 2011-08-31T00:00:00 | [
[
"Dinitz",
"Yefim",
""
],
[
"Elkin",
"Michael",
""
],
[
"Solomon",
"Shay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.3624 | Anil Ada | Arkadev Chattopadhyay and Anil Ada | Multiparty Communication Complexity of Disjointness | 15 pages, 2 figures | null | null | null | cs.CC | null | We obtain a lower bound of n^Omega(1) on the k-party randomized communication
complexity of the Disjointness function in the `Number on the Forehead' model
of multiparty communication when k is a constant. For k=o(loglog n), the bounds
remain super-polylogarithmic i.e. (log n)^omega(1). The previous best lower
bound for three players until recently was Omega(log n).
Our bound separates the communication complexity classes NP^{CC}_k and
BPP^{CC}_k for k=o(loglog n). Furthermore, by the results of Beame, Pitassi and
Segerlind \cite{BPS07}, our bound implies proof size lower bounds for
tree-like, degree k-1 threshold systems and superpolynomial size lower bounds
for Lovasz-Schrijver proofs.
Sherstov \cite{She07b} recently developed a novel technique to obtain lower
bounds on two-party communication using the approximate polynomial degree of
boolean functions. We obtain our results by extending his technique to the
multi-party setting using ideas from Chattopadhyay \cite{Cha07}.
A similar bound for Disjointness has been recently and independently obtained
by Lee and Shraibman.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 16:39:31 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Jan 2008 17:39:19 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Feb 2008 23:04:00 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Chattopadhyay",
"Arkadev",
""
],
[
"Ada",
"Anil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.3640 | Sharon Betz | Sharon Betz and H. Vincent Poor | Energy Efficiency in Multi-Hop CDMA Networks: a Game Theoretic Analysis
Considering Operating Costs | To appear in the Proceedings of the 2008 IEEE International
Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March
30 -- April 4, 2008 | null | 10.1109/TSP.2008.929118 | null | cs.IT math.IT | null | A game-theoretic analysis is used to study the effects of receiver choice and
transmit power on the energy efficiency of multi-hop networks in which the
nodes communicate using Direct-Sequence Code Division Multiple Access
(DS-CDMA). A Nash equilibrium of the game in which the network nodes can choose
their receivers as well as their transmit powers to maximize the total number
of bits they transmit per unit of energy spent (including both transmit and
operating energy) is derived. The energy efficiencies resulting from the use of
different linear multiuser receivers in this context are compared for the
non-cooperative game. Significant gains in energy efficiency are observed when
multiuser receivers, particularly the linear minimum mean-square error (MMSE)
receiver, are used instead of conventional matched filter receivers.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 18:24:31 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Betz",
"Sharon",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3642 | Jessica Metcalf-Burton | Jessica Ruth Metcalf-Burton | Information Rates of Minimal Non-Matroid-Related Access Structures | 8 pages | null | null | null | cs.CR math.CO | null | In a secret sharing scheme, shares of a secret are distributed to
participants in such a way that only certain predetermined sets of participants
are qualified to reconstruct the secret. An access structure on a set of
participants specifies which sets are to be qualified. The information rate of
an access structure is a bound on how efficient a secret sharing scheme for
that access structure can be. Marti-Farre and Padro showed that all access
structures with information rate greater than two-thirds are matroid-related,
and Stinson showed that four of the minor-minimal, non-matroid-related access
structures have information rate exactly two-thirds. By a result of Seymour,
there are infinitely many remaining minor-minimal, non-matroid-related access
structures. In this paper we find the exact information rates for all such
structures.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 18:36:39 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Metcalf-Burton",
"Jessica Ruth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0801.3654 | Mikhail Zaslavskiy | Mikhail Zaslavskiy, Francis Bach, and Jean-Philippe Vert | A path following algorithm for the graph matching problem | 23 pages, 13 figures,typo correction, new results in sections 4,5,6 | null | null | null | cs.CV cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a convex-concave programming approach for the labeled weighted
graph matching problem. The convex-concave programming formulation is obtained
by rewriting the weighted graph matching problem as a least-square problem on
the set of permutation matrices and relaxing it to two different optimization
problems: a quadratic convex and a quadratic concave optimization problem on
the set of doubly stochastic matrices. The concave relaxation has the same
global minimum as the initial graph matching problem, but the search for its
global minimum is also a hard combinatorial problem. We therefore construct an
approximation of the concave problem solution by following a solution path of a
convex-concave problem obtained by linear interpolation of the convex and
concave formulations, starting from the convex relaxation. This method allows
to easily integrate the information on graph label similarities into the
optimization problem, and therefore to perform labeled weighted graph matching.
The algorithm is compared with some of the best performing graph matching
methods on four datasets: simulated graphs, QAPLib, retina vessel images and
handwritten chinese characters. In all cases, the results are competitive with
the state-of-the-art.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 20:20:32 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2008 14:16:01 GMT"
}
] | 2008-10-27T00:00:00 | [
[
"Zaslavskiy",
"Mikhail",
""
],
[
"Bach",
"Francis",
""
],
[
"Vert",
"Jean-Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.3669 | Mohammad Mahmoody | Boaz Barak, Mohammad Mahmoody | Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any
Key Agreement from Random Oracles | This version fixes a bug in the proof of the previous version of this
paper, see "Correction of Error" paragraph and Appendix A | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that every key agreement protocol in the random oracle model in
which the honest users make at most $n$ queries to the oracle can be broken by
an adversary who makes $O(n^2)$ queries to the oracle. This improves on the
previous $\widetilde{\Omega}(n^6)$ query attack given by Impagliazzo and Rudich
(STOC '89) and resolves an open question posed by them.
Our bound is optimal up to a constant factor since Merkle proposed a key
agreement protocol in 1974 that can be easily implemented with $n$ queries to a
random oracle and cannot be broken by any adversary who asks $o(n^2)$ queries.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 21:01:37 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jan 2008 01:41:04 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Jul 2008 14:14:45 GMT"
},
{
"version": "v4",
"created": "Sun, 31 Mar 2019 00:51:20 GMT"
}
] | 2019-04-02T00:00:00 | [
[
"Barak",
"Boaz",
""
],
[
"Mahmoody",
"Mohammad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.3678 | Grenville Croll | Ralph Baxter | Regulation and the Integrity of Spreadsheets in the Information Supply
Chain | 7 Pages including references and diagrams in colour | Proc. European Spreadsheet Risks Int. Grp. 2005 95-101
ISBN:1-902724-16-X | null | null | cs.CY cs.CR | null | Spreadsheets provide many of the key links between information systems,
closing the gap between business needs and the capability of central systems.
Recent regulations have brought these vulnerable parts of information supply
chains into focus. The risk they present to the organisation depends on the
role that they fulfil, with generic differences between their use as modeling
tools and as operational applications. Four sections of the Sarbanes-Oxley Act
(SOX) are particularly relevant to the use of spreadsheets. Compliance with
each of these sections is dependent on maintaining the integrity of those
spreadsheets acting as operational applications. This can be achieved manually
but at high cost. There are a range of commercially available off-the-shelf
solutions that can reduce this cost. These may be divided into those that
assist in the debugging of logic and more recently the arrival of solutions
that monitor the change and user activity taking place in business-critical
spreadsheets. ClusterSeven provides one of these monitoring solutions,
highlighting areas of operational risk whilst also establishing a database of
information to deliver new business intelligence.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 21:45:43 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Baxter",
"Ralph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.3680 | Mohammad Mahmoody | Boaz Barak, Mohammad Mahmoody | Lower Bounds on Signatures from Symmetric Primitives | null | null | null | null | cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that every construction of one-time signature schemes from a random
oracle achieves black-box security at most $2^{(1+o(1))q}$, where $q$ is the
total number of oracle queries asked by the key generation, signing, and
verification algorithms. That is, any such scheme can be broken with
probability close to $1$ by a (computationally unbounded) adversary making
$2^{(1+o(1))q}$ queries to the oracle. This is tight up to a constant factor in
the number of queries, since a simple modification of Lamport's one-time
signatures (Lamport '79) achieves $2^{(0.812-o(1))q}$ black-box security using
$q$ queries to the oracle.
Our result extends (with a loss of a constant factor in the number of
queries) also to the random permutation and ideal-cipher oracles. Since the
symmetric primitives (e.g. block ciphers, hash functions, and message
authentication codes) can be constructed by a constant number of queries to the
mentioned oracles, as corollary we get lower bounds on the efficiency of
signature schemes from symmetric primitives when the construction is black-box.
This can be taken as evidence of an inherent efficiency gap between signature
schemes and symmetric primitives.
| [
{
"version": "v1",
"created": "Wed, 23 Jan 2008 22:16:00 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jan 2008 02:13:43 GMT"
},
{
"version": "v3",
"created": "Sun, 31 Mar 2019 00:40:57 GMT"
}
] | 2019-04-02T00:00:00 | [
[
"Barak",
"Boaz",
""
],
[
"Mahmoody",
"Mohammad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.3690 | Grenville Croll | Jocelyn Paine | Ensuring Spreadsheet Integrity with Model Master | 15 pages; substantive references; code examples | Proc. European Spreadsheet Risks Int. Grp. 2001 17-38 ISBN:1 86166
179 7 | null | null | cs.PL cs.HC | null | We have developed the Model Master (MM) language for describing spreadsheets,
and tools for converting MM programs to and from spreadsheets. The MM
decompiler translates a spreadsheet into an MM program which gives a concise
summary of its calculations, layout, and styling. This is valuable when trying
to understand spreadsheets one has not seen before, and when checking for
errors. The MM compiler goes the other way, translating an MM program into a
spreadsheet. This makes possible a new style of development, in which
spreadsheets are generated from textual specifications. This can reduce error
rates compared to working directly with the raw spreadsheet, and gives
important facilities for code reuse. MM programs also offer advantages over
Excel files for the interchange of spreadsheets.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 00:32:29 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Paine",
"Jocelyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.3697 | George Bell | George I. Bell | The mathematics of Septoku | 11 pages, 9 figures; added two recent references | null | null | null | math.CO cs.DM math.GM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Septoku is a Sudoku variant invented by Bruce Oberg, played on a hexagonal
grid of 37 cells. We show that up to rotations, reflections, and symbol
permutations, there are only six valid Septoku boards. In order to have a
unique solution, we show that the minimum number of given values is six. We
generalize the puzzle to other board shapes, and devise a puzzle on a
star-shaped board with 73 cells with six givens which has a unique solution. We
show how this puzzle relates to the unsolved Hadwiger-Nelson problem in
combinatorial geometry.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 16:04:22 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Feb 2008 21:23:31 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jun 2011 03:56:56 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Dec 2013 04:54:01 GMT"
},
{
"version": "v5",
"created": "Thu, 12 Mar 2020 22:48:56 GMT"
}
] | 2020-03-16T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0801.3702 | Sharon Betz | Tim Holliday, Andrea J. Goldsmith, and H. Vincent Poor | Joint source and channel coding for MIMO systems: Is it better to be
robust or quick? | To appear in the IEEE Transactions on Information Theory, Vol. 54,
No. 4, April 2008 | IEEE Transactions on Information Theory, Vol. 54, No. 4, April
2008 | 10.1109/TIT.2008.917725 | null | cs.IT math.IT | null | We develop a framework to optimize the tradeoff between diversity,
multiplexing, and delay in MIMO systems to minimize end-to-end distortion. We
first focus on the diversity-multiplexing tradeoff in MIMO systems, and develop
analytical results to minimize distortion of a vector quantizer concatenated
with a space-time MIMO channel code. In the high SNR regime we obtain a
closed-form expression for the end-to-end distortion as a function of the
optimal point on the diversity-multiplexing tradeoff curve. For large but
finite SNR we find this optimal point via convex optimization. We then consider
MIMO systems using ARQ retransmission to provide additional diversity at the
expense of delay. For sources without a delay constraint, distortion is
minimized by maximizing the ARQ window size. This results in an ARQ-enhanced
multiplexing-diversity tradeoff region, with distortion minimized over this
region in the same manner as without ARQ. Under a source delay constraint the
problem formulation changes to account for delay distortion associated with
random message arrival and random ARQ completion times. We use a dynamic
programming formulation to capture the channel diversity-multiplexing tradeoff
at finite SNR as well as the random arrival and retransmission dynamics; we
solve for the optimal multiplexing-diversity-delay tradeoff to minimize
end-to-end distortion associated with the source encoder, channel, and ARQ
retransmissions. Our results show that a delay-sensitive system should adapt
its operating point on the diversity-multiplexing-delay tradeoff region to the
system dynamics. We provide numerical results that demonstrate significant
performance gains of this adaptive policy over a static allocation of
diversity/multiplexing in the channel code and a static ARQ window size.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 04:13:48 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Holliday",
"Tim",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3703 | Margreta Kuijper | Margreta Kuijper and Raquel Pinto | On minimality of convolutional ring encoders | 13 pages in v1, submitted; 8 pages in revision v2 | IEEE Trans. Information Theory, Vol. 55, No. 11, pp. 4890-4897,
November 2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional codes are considered with code sequences modelled as
semi-infinite Laurent series. It is wellknown that a convolutional code C over
a finite group G has a minimal trellis representation that can be derived from
code sequences. It is also wellknown that, for the case that G is a finite
field, any polynomial encoder of C can be algebraically manipulated to yield a
minimal polynomial encoder whose controller canonical realization is a minimal
trellis. In this paper we seek to extend this result to the finite ring case G
= Z_{p^r} by introducing a socalled "p-encoder". We show how to manipulate a
polynomial encoding of a noncatastrophic convolutional code over Z_{p^r} to
produce a particular type of p-encoder ("minimal p-encoder") whose controller
canonical realization is a minimal trellis with nonlinear features. The minimum
number of trellis states is then expressed as p^gamma, where gamma is the sum
of the row degrees of the minimal p-encoder. In particular, we show that any
convolutional code over Z_{p^r} admits a delay-free p-encoder which implies the
novel result that delay-freeness is not a property of the code but of the
encoder, just as in the field case. We conjecture that a similar result holds
with respect to catastrophicity, i.e., any catastrophic convolutional code over
Z_{p^r} admits a noncatastrophic p-encoder.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 05:07:49 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2009 05:36:02 GMT"
}
] | 2010-05-28T00:00:00 | [
[
"Kuijper",
"Margreta",
""
],
[
"Pinto",
"Raquel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3710 | Amitabh Trehan | Jared Saia, Amitabh Trehan | Picking up the Pieces: Self-Healing in Reconfigurable Networks | To be presented at IPDPS (IEEE International Parallel & Distributed
Processing Symposium) 2008 | null | 10.1109/IPDPS.2008.4536326 | null | cs.DS cs.DC cs.NI | null | We consider the problem of self-healing in networks that are reconfigurable
in the sense that they can change their topology during an attack. Our goal is
to maintain connectivity in these networks, even in the presence of repeated
adversarial node deletion, by carefully adding edges after each attack. We
present a new algorithm, DASH, that provably ensures that: 1) the network stays
connected even if an adversary deletes up to all nodes in the network; and 2)
no node ever increases its degree by more than 2 log n, where n is the number
of nodes initially in the network. DASH is fully distributed; adds new edges
only among neighbors of deleted nodes; and has average latency and bandwidth
costs that are at most logarithmic in n. DASH has these properties irrespective
of the topology of the initial network, and is thus orthogonal and
complementary to traditional topology-based approaches to defending against
attack.
We also prove lower-bounds showing that DASH is asymptotically optimal in
terms of minimizing maximum degree increase over multiple attacks. Finally, we
present empirical results on power-law graphs that show that DASH performs well
in practice, and that it significantly outperforms naive algorithms in reducing
maximum degree increase. We also present empirical results on performance of
our algorithms and a new heuristic with regard to stretch (increase in shortest
path lengths).
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 07:46:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Saia",
"Jared",
""
],
[
"Trehan",
"Amitabh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0801.3711 | Jocelyne Troccaz | Michael Baumann (TIMC), Vincent Daanen (TIMC), Antoine Leroy (TIMC),
Jocelyne Troccaz (TIMC) | 3D-Ultrasound probe calibration for computer-guided diagnosis and
therapy | null | Dans Proceedings of CVAMIA'06 - 2nd International workshop on
Computer Vision Approaches to Medical Image Analysis - CVAMIA'06, Graz :
Autriche (2006) | null | null | cs.OH | null | With the emergence of swept-volume ultrasound (US) probes, precise and almost
real-time US volume imaging has become available. This offers many new
opportunities for computer guided diagnosis and therapy, 3-D images containing
significantly more information than 2-D slices. However, computer guidance
often requires knowledge about the exact position of US voxels relative to a
tracking reference, which can only be achieved through probe calibration. In
this paper we present a 3-D US probe calibration system based on a membrane
phantom. The calibration matrix is retrieved by detection of a membrane plane
in a dozen of US acquisitions of the phantom. Plane detection is robustly
performed with the 2-D Hough transformation. The feature extraction process is
fully automated, calibration requires about 20 minutes and the calibration
system can be used in a clinical context. The precision of the system was
evaluated to a root mean square (RMS) distance error of 1.15mm and to an RMS
angular error of 0.61 degrees. The point reconstruction accuracy was evaluated
to 0.9mm and the angular reconstruction accuracy to 1.79 degrees.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 07:48:56 GMT"
}
] | 2008-01-25T00:00:00 | [
[
"Baumann",
"Michael",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Leroy",
"Antoine",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.3714 | Vahan Mkrtchyan | Matt DeVos, Vahan V. Mkrtchyan, Samvel S. Petrosyan | 5-cycles and the Petersen graph | 6 pages | null | null | null | cs.DM | null | We show that if G is a connected bridgeless cubic graph whose every 2-factor
is comprised of cycles of length five then G is the Petersen graph.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 07:55:32 GMT"
}
] | 2008-01-25T00:00:00 | [
[
"DeVos",
"Matt",
""
],
[
"Mkrtchyan",
"Vahan V.",
""
],
[
"Petrosyan",
"Samvel S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.3715 | Annie Ressouche | Annie Ressouche, Daniel Gaff\'e (LEAT), Val\'erie Roy | Modular Compilation of a Synchronous Language | null | null | null | null | cs.PL cs.LO | null | Synchronous languages rely on formal methods to ease the development of
applications in an efficient and reusable way. Formal methods have been
advocated as a means of increasing the reliability of systems, especially those
which are safety or business critical. It is still difficult to develop
automatic specification and verification tools due to limitations like state
explosion, undecidability, etc... In this work, we design a new specification
model based on a reactive synchronous approach. Then, we benefit from a formal
framework well suited to perform compilation and formal validation of systems.
In practice, we design and implement a special purpose language (LE) and its
two semantics: the ehavioral semantics helps us to define a program by the set
of its behaviors and avoid ambiguousness in programs' interpretation; the
execution equational semantics allows the modular compilation of programs into
software and hardware targets (c code, vhdl code, fpga synthesis, observers).
Our approach is pertinent considering the two main requirements of critical
realistic applications: the modular compilation allows us to deal with large
systems, the model-based approach provides us with formal validation.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 15:24:46 GMT"
}
] | 2009-04-20T00:00:00 | [
[
"Ressouche",
"Annie",
"",
"LEAT"
],
[
"Gaffé",
"Daniel",
"",
"LEAT"
],
[
"Roy",
"Valérie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.3773 | Lars Eirik Danielsen | Lars Eirik Danielsen | Graph-Based Classification of Self-Dual Additive Codes over Finite
Fields | 20 pages, 13 figures | Adv. Math. Commun. 3(4), pp. 329-348, 2009 | 10.3934/amc.2009.3.329 | null | cs.IT math.CO math.IT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum stabilizer states over GF(m) can be represented as self-dual additive
codes over GF(m^2). These codes can be represented as weighted graphs, and
orbits of graphs under the generalized local complementation operation
correspond to equivalence classes of codes. We have previously used this fact
to classify self-dual additive codes over GF(4). In this paper we classify
self-dual additive codes over GF(9), GF(16), and GF(25). Assuming that the
classical MDS conjecture holds, we are able to classify all self-dual additive
MDS codes over GF(9) by using an extension technique. We prove that the minimum
distance of a self-dual additive code is related to the minimum vertex degree
in the associated graph orbit. Circulant graph codes are introduced, and a
computer search reveals that this set contains many strong codes. We show that
some of these codes have highly regular graph representations.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 14:43:42 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Apr 2008 11:06:38 GMT"
},
{
"version": "v3",
"created": "Sat, 3 Oct 2009 12:24:07 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Danielsen",
"Lars Eirik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0801.3790 | Khaled Elbassioni | Endre Boros, Khaled Elbassioni, Vladimir Gurvich, Hans Raj Tiwary | Characterization of the Vertices and Extreme Directions of the Negative
Cycles Polyhedron and Hardness of Generating Vertices of 0/1-Polyhedra | Title typo fixed | null | null | null | cs.CC cs.DM | null | Given a graph $G=(V,E)$ and a weight function on the edges $w:E\mapsto\RR$,
we consider the polyhedron $P(G,w)$ of negative-weight flows on $G$, and get a
complete characterization of the vertices and extreme directions of $P(G,w)$.
As a corollary, we show that, unless $P=NP$, there is no output polynomial-time
algorithm to generate all the vertices of a 0/1-polyhedron. This strengthens
the NP-hardness result of Khachiyan et al. (2006) for non 0/1-polyhedra, and
comes in contrast with the polynomiality of vertex enumeration for
0/1-polytopes \cite{BL98} [Bussieck and L\"ubbecke (1998)].
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 16:16:45 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2008 17:26:09 GMT"
}
] | 2008-04-28T00:00:00 | [
[
"Boros",
"Endre",
""
],
[
"Elbassioni",
"Khaled",
""
],
[
"Gurvich",
"Vladimir",
""
],
[
"Tiwary",
"Hans Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.3802 | Sven Kosub | Sven Kosub | Dichotomy Results for Fixed-Point Existence Problems for Boolean
Dynamical Systems | 17 pages; this version corrects an error/typo in the 2008/01/24
version | Mathematics in Computer Science, 1(3):487-505, 2008, special issue
on Modeling and Analysis of Complex Systems | null | TUM-I0701, Institut fuer Informatik, Technische Universitaet
Muenchen | cs.CC cond-mat.dis-nn cs.DM nlin.AO nlin.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A complete classification of the computational complexity of the fixed-point
existence problem for boolean dynamical systems, i.e., finite discrete
dynamical systems over the domain {0, 1}, is presented. For function classes F
and graph classes G, an (F, G)-system is a boolean dynamical system such that
all local transition functions lie in F and the underlying graph lies in G. Let
F be a class of boolean functions which is closed under composition and let G
be a class of graphs which is closed under taking minors. The following
dichotomy theorems are shown: (1) If F contains the self-dual functions and G
contains the planar graphs then the fixed-point existence problem for (F,
G)-systems with local transition function given by truth-tables is NP-complete;
otherwise, it is decidable in polynomial time. (2) If F contains the self-dual
functions and G contains the graphs having vertex covers of size one then the
fixed-point existence problem for (F, G)-systems with local transition function
given by formulas or circuits is NP-complete; otherwise, it is decidable in
polynomial time.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 17:10:12 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2008 16:53:14 GMT"
}
] | 2008-12-01T00:00:00 | [
[
"Kosub",
"Sven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
] |
0801.3817 | Tuomo Kakkonen | Tuomo Kakkonen | Robustness Evaluation of Two CCG, a PCFG and a Link Grammar Parsers | null | Proceedings of the 3rd Language & Technology Conference: Human
Language Technologies as a Challenge for Computer Science and Linguistics.
Poznan, Poland, 2007 | null | null | cs.CL | null | Robustness in a parser refers to an ability to deal with exceptional
phenomena. A parser is robust if it deals with phenomena outside its normal
range of inputs. This paper reports on a series of robustness evaluations of
state-of-the-art parsers in which we concentrated on one aspect of robustness:
its ability to parse sentences containing misspelled words. We propose two
measures for robustness evaluation based on a comparison of a parser's output
for grammatical input sentences and their noisy counterparts. In this paper, we
use these measures to compare the overall robustness of the four evaluated
parsers, and we present an analysis of the decline in parser performance with
increasing error levels. Our results indicate that performance typically
declines tens of percentage units when parsers are presented with texts
containing misspellings. When it was tested on our purpose-built test set of
443 sentences, the best parser in the experiment (C&C parser) was able to
return exactly the same parse tree for the grammatical and ungrammatical
sentences for 60.8%, 34.0% and 14.9% of the sentences with one, two or three
misspelled words respectively.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 18:41:01 GMT"
}
] | 2008-01-25T00:00:00 | [
[
"Kakkonen",
"Tuomo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0801.3837 | Pierre Moulin | Pierre Moulin | Universal Fingerprinting: Capacity and Random-Coding Exponents | 69 pages, revised | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies fingerprinting (traitor tracing) games in which the number
of colluders and the collusion channel are unknown. The fingerprints are
embedded into host sequences representing signals to be protected and provide
the receiver with the capability to trace back pirated copies to the colluders.
The colluders and the fingerprint embedder are subject to signal fidelity
constraints. Our problem setup unifies the signal-distortion and Boneh-Shaw
formulations of fingerprinting. The fundamental tradeoffs between fingerprint
codelength, number of users, number of colluders, fidelity constraints, and
decoding reliability are then determined. Several bounds on fingerprinting
capacity have been presented in recent literature. This paper derives exact
capacity formulas and presents a new randomized fingerprinting scheme with the
following properties: (1) the encoder and receiver assume a nominal coalition
size but do not need to know the actual coalition size and the collusion
channel; (2) a tunable parameter $\Delta$ trades off false-positive and
false-negative error exponents; (3) the receiver provides a reliability metric
for its decision; and (4) the scheme is capacity-achieving when the
false-positive exponent $\Delta$ tends to zero and the nominal coalition size
coincides with the actual coalition size.
A fundamental component of the new scheme is the use of a "time-sharing"
randomized sequence. The decoder is a maximum penalized mutual information
decoder, where the significance of each candidate coalition is assessed
relative to a threshold, and the penalty is proportional to the coalition size.
A much simpler {\em threshold decoder} that satisfies properties (1)---(3)
above but not (4) is also given.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 20:37:54 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2008 17:41:37 GMT"
},
{
"version": "v3",
"created": "Tue, 24 May 2011 22:00:36 GMT"
}
] | 2011-05-26T00:00:00 | [
[
"Moulin",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3841 | Sumanth Gangasani | Sumanth Kumar Reddy Gangasani | Analysis of Prime Reciprocal Sequences in Base 10 | 12 pages, 1 figure | null | null | null | cs.CR | null | Prime reciprocals have applications in coding and cryptography and for
generation of random sequences. This paper investigates the structural
redundancy of prime reciprocals in base 10 in a manner that parallels an
earlier study for binary prime reciprocals. Several different kinds of
structural relationships amongst the digits in reciprocal sequences are
classified with respect to the digit in the least significant place of the
prime. It is also shown that the frequency of digit 0 exceeds that of every
other digit when the entire set of prime reciprocal sequences is considered.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 20:51:28 GMT"
}
] | 2008-01-25T00:00:00 | [
[
"Gangasani",
"Sumanth Kumar Reddy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.3853 | Grenville Croll | Simon Murphy | Comparison of Spreadsheets with other Development Tools (limitations,
solutions, workarounds and alternatives) | 9 pages including references, colour diagrams and comparison tables | Proc. European Spreadsheet Risks Int. Grp. 2005 201208
ISBN:1-902724-16-X | null | null | cs.SE cs.CY | null | The spreadsheet paradigm has some unique risks and challenges that are not
present in more traditional development technologies. Many of the recent
advances in other branches of software development have bypassed spreadsheets
and spreadsheet developers. This paper compares spreadsheets and spreadsheet
development to more traditional platforms such as databases and procedural
languages. It also considers the fundamental danger introduced in the
transition from paper spreadsheets to electronic. Suggestions are made to
manage the risks and work around the limitations.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2008 21:40:17 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Murphy",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.3864 | Alberto Pepe Mr | Alberto Pepe and Johan Bollen | Between conjecture and memento: shaping a collective emotional
perception of the future | 6 pages. AAAI Spring Symposium on Emotion, Personality, and Social
Behavior | null | null | null | cs.CL cs.GL | null | Large scale surveys of public mood are costly and often impractical to
perform. However, the web is awash with material indicative of public mood such
as blogs, emails, and web queries. Inexpensive content analysis on such
extensive corpora can be used to assess public mood fluctuations. The work
presented here is concerned with the analysis of the public mood towards the
future. Using an extension of the Profile of Mood States questionnaire, we have
extracted mood indicators from 10,741 emails submitted in 2006 to futureme.org,
a web service that allows its users to send themselves emails to be delivered
at a later date. Our results indicate long-term optimism toward the future, but
medium-term apprehension and confusion.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 01:09:47 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Pepe",
"Alberto",
""
],
[
"Bollen",
"Johan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0801.3871 | Ke Xu | Chunyan Zhao, Ke Xu, Zhiming Zheng | On the Scaling Window of Model RB | null | null | null | null | cs.CC cond-mat.stat-mech cs.AI | null | This paper analyzes the scaling window of a random CSP model (i.e. model RB)
for which we can identify the threshold points exactly, denoted by $r_{cr}$ or
$p_{cr}$. For this model, we establish the scaling window
$W(n,\delta)=(r_{-}(n,\delta), r_{+}(n,\delta))$ such that the probability of a
random instance being satisfiable is greater than $1-\delta$ for
$r<r_{-}(n,\delta)$ and is less than $\delta$ for $r>r_{+}(n,\delta)$.
Specifically, we obtain the following result
$$W(n,\delta)=(r_{cr}-\Theta(\frac{1}{n^{1-\epsilon}\ln n}), \
r_{cr}+\Theta(\frac{1}{n\ln n})),$$ where $0\leq\epsilon<1$ is a constant. A
similar result with respect to the other parameter $p$ is also obtained. Since
the instances generated by model RB have been shown to be hard at the
threshold, this is the first attempt, as far as we know, to analyze the scaling
window of such a model with hard instances.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 02:18:00 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Zhao",
"Chunyan",
""
],
[
"Xu",
"Ke",
""
],
[
"Zheng",
"Zhiming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.3875 | Jan Mandel | Jan Mandel, Jonathan D. Beezley, Soham Chakraborty, Janice L. Coen,
Craig C. Douglas, Anthony Vodacek, Zhen Wang | Towards a Real-Time Data Driven Wildland Fire Model | 5 pages, 4 figures | IEEE International Symposium on Parallel and Distributed
Processing, 2008 (IPDPS 2008), pp. 1-5 | 10.1109/IPDPS.2008.4536414 | UCD CCM Report 265 | physics.ao-ph cs.CE | null | A wildland fire model based on semi-empirical relations for the spread rate
of a surface fire and post-frontal heat release is coupled with the Weather
Research and Forecasting atmospheric model (WRF). The propagation of the fire
front is implemented by a level set method. Data is assimilated by a morphing
ensemble Kalman filter, which provides amplitude as well as position
corrections. Thermal images of a fire will provide the observations and will be
compared to a synthetic image from the model state.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 04:41:01 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Jan 2008 00:40:22 GMT"
}
] | 2015-08-03T00:00:00 | [
[
"Mandel",
"Jan",
""
],
[
"Beezley",
"Jonathan D.",
""
],
[
"Chakraborty",
"Soham",
""
],
[
"Coen",
"Janice L.",
""
],
[
"Douglas",
"Craig C.",
""
],
[
"Vodacek",
"Anthony",
""
],
[
"Wang",
"Zhen",
""
]
] | [
{
"class": "Physics",
"code": "physics.ao-ph",
"description": "Atmospheric and oceanic physics and physical chemistry, biogeophysics, and climate science",
"span": "(Atmospheric and Oceanic Physics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0801.3878 | Jun Muramatsu | Jun Muramatsu and Shigeki Miyake | Hash Property and Coding Theorems for Sparse Matrices and
Maximum-Likelihood Coding | This manuscript has been submitted to IEEE Transactions on
Information Theory and a part of this manuscript has been submitted to IEEE
International Symposium on Information Theory (ISIT2008,ISIT2009). 55 pages
v2: major changes | IEEE Transactions on Information Theory, vol 56, no. 5,
pp.2143-2167, May 2010; Corrections: IEEE Transactions on Information Theory,
vol. 56, no.9, p. 4762, Sep. 2010. Corrections: vol.56, no.9, p.4762, 2010 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove the achievability of several coding
problems by using sparse matrices (the maximum column weight grows
logarithmically in the block length) and maximal-likelihood (ML) coding. These
problems are the Slepian-Wolf problem, the Gel'fand-Pinsker problem, the
Wyner-Ziv problem, and the One-helps-one problem (source coding with partial
side information at the decoder). To this end, the notion of a hash property
for an ensemble of functions is introduced and it is proved that an ensemble of
$q$-ary sparse matrices satisfies the hash property. Based on this property, it
is proved that the rate of codes using sparse matrices and maximal-likelihood
(ML) coding can achieve the optimal rate.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 05:13:11 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Mar 2009 07:37:34 GMT"
}
] | 2013-01-28T00:00:00 | [
[
"Muramatsu",
"Jun",
""
],
[
"Miyake",
"Shigeki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3880 | Yi Sun | Yi Sun | Spectral efficiency and optimal medium access control of random access
systems over large random spreading CDMA | To appear in IEEE Trans. on Communications | null | 10.1109/TCOMM.2009.05.07044 | null | cs.IT math.IT | null | This paper analyzes the spectral efficiency as a function of medium access
control (MAC) for large random spreading CDMA random access systems that employ
a linear receiver. It is shown that located at higher than the physical layer,
MAC along with spreading and power allocation can effectively perform spectral
efficiency maximization and near-far mitigation.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 05:46:57 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Sun",
"Yi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3908 | Jakob Vo{\ss} | Jakob Voss | Encoding changing country codes for the Semantic Web with ISO 3166 and
SKOS | Accepted to appear in the proceedings of the 2nd International Con-
ference on Metadata and Semantics Research (MTSR 2007) | null | null | null | cs.IR | null | This paper shows how authority files can be encoded for the Semantic Web with
the Simple Knowledge Organisation System (SKOS). In particular the application
of SKOS for encoding the structure, management, and utilization of country
codes as defined in ISO 3166 is demonstrated. The proposed encoding gives a use
case for SKOS that includes features that have only been discussed little so
far, such as multiple notations, nested concept schemes, changes by versioning.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 10:40:27 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Voss",
"Jakob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0801.3912 | Olivier Finkel | Olivier Carton (LIAFA), Olivier Finkel (LIP), Pierre Simonnet (SPE) | On the Continuity Set of an omega Rational Function | Dedicated to Serge Grigorieff on the occasion of his 60th Birthday | Theoretical Informatics and Applications (1), 42 (2008) 183-196 | null | null | cs.CC cs.LO | null | In this paper, we study the continuity of rational functions realized by
B\"uchi finite state transducers. It has been shown by Prieur that it can be
decided whether such a function is continuous. We prove here that surprisingly,
it cannot be decided whether such a function F has at least one point of
continuity and that its continuity set C(F) cannot be computed. In the case of
a synchronous rational function, we show that its continuity set is rational
and that it can be computed. Furthermore we prove that any rational
Pi^0_2-subset of X^omega for some alphabet X is the continuity set C(F) of an
omega-rational synchronous function F defined on X^omega.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 10:54:05 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Carton",
"Olivier",
"",
"LIAFA"
],
[
"Finkel",
"Olivier",
"",
"LIP"
],
[
"Simonnet",
"Pierre",
"",
"SPE"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.3924 | Jaap-Henk Hoepman | Jaap-Henk Hoepman, Bart Jacobs | Increased security through open source | null | Communications of the ACM, 50(1):79-83, 2007 | null | null | cs.CR cs.CY cs.SE | null | In this paper we discuss the impact of open source on both the security and
transparency of a software system. We focus on the more technical aspects of
this issue, combining and extending arguments developed over the years. We
stress that our discussion of the problem only applies to software for general
purpose computing systems. For embedded systems, where the software usually
cannot easily be patched or upgraded, different considerations may apply.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 12:06:48 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
],
[
"Jacobs",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0801.3926 | Cen Jung Tjhai | C. Tjhai, M. Tomlinson, M. Ambroze and M. Ahmed | On the Weight Distribution of the Extended Quadratic Residue Code of
Prime 137 | Post-print of 7th International ITG Conference on Source and Channel
Coding, Ulm, 14--16 January 2008 | null | null | null | cs.IT cs.DM math.IT | null | The Hamming weight enumerator function of the formally self-dual even, binary
extended quadratic residue code of prime p = 8m + 1 is given by Gleason's
theorem for singly-even code. Using this theorem, the Hamming weight
distribution of the extended quadratic residue is completely determined once
the number of codewords of Hamming weight j A_j, for 0 <= j <= 2m, are known.
The smallest prime for which the Hamming weight distribution of the
corresponding extended quadratic residue code is unknown is 137. It is shown in
this paper that, for p=137 A_2m = A_34 may be obtained with out the need of
exhaustive codeword enumeration. After the remainder of A_j required by
Gleason's theorem are computed and independently verified using their
congruences, the Hamming weight distributions of the binary augmented and
extended quadratic residue codes of prime 137 are derived.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 12:14:22 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Tjhai",
"C.",
""
],
[
"Tomlinson",
"M.",
""
],
[
"Ambroze",
"M.",
""
],
[
"Ahmed",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3930 | Jaap-Henk Hoepman | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk,
Ronny Wichers Schreur | Crossing Borders: Security and Privacy Issues of the European e-Passport | null | 1st Int. Workshop on Security, LNCS 4266, pages 152-167, Kyoto,
Japan, October 23-24 2006 | null | null | cs.CR cs.CY | null | The first generation of European e-passports will be issued in 2006. We
discuss how borders are crossed regarding the security and privacy erosion of
the proposed schemes, and show which borders need to be crossed to improve the
security and the privacy protection of the next generation of e-passports. In
particular we discuss attacks on Basic Access Control due to the low entropy of
the data from which the access keys are derived, we sketch the European
proposals for Extended Access Control and the weaknesses in that scheme, and
show how fundamentally different design decisions can make e-passports more
secure.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 12:17:52 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
],
[
"Hubbers",
"Engelbert",
""
],
[
"Jacobs",
"Bart",
""
],
[
"Oostdijk",
"Martijn",
""
],
[
"Schreur",
"Ronny Wichers",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.3965 | Jocelyne Troccaz | Pierre Mozer (TIMC), Michael Baumann (TIMC), G. Chevreau (TIMC),
Vincent Daanen (TIMC), Alexandre Moreau-Gaudry (TIMC, CHU-Grenoble CIC),
Jocelyne Troccaz (TIMC) | Framework for 3D TransRectal Ultrasound | null | Johns Hopkins University "Prostate Day", Baltimore : \'Etats-Unis
d'Am\'erique (2008) | null | null | cs.OH | null | Prostate biopsies are mainly performed under 2D TransRectal UltraSound (TRUS)
control by sampling the prostate according to a predefined pattern. In case of
first biopsies, this pattern follows a random systematic plan. Sometimes,
repeat biopsies can be needed to target regions unsampled by previous biopsies
or resample critical regions (for example in case of cancer expectant
management or previous prostatic intraepithelial neoplasia findings). From a
clinical point of view, it could be useful to control the 3D spatial
distribution of theses biopsies inside the prostate. Modern 3D-TRUS probes
allow acquiring high-quality volumes of the prostate in few seconds. We
developed a framework to track the prostate in 3D TRUS images. It means that if
one acquires a reference volume at the beginning of the session and another
during each biopsy, it is possible to determine the relationship between the
prostate in the reference and the others volumes by aligning images. We used
this tool to evaluate the ability of a single operator (a young urologist
assistant professor) to perform a pattern of 12 biopsies under 2D TRUS
guidance.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 15:40:54 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Mozer",
"Pierre",
"",
"TIMC"
],
[
"Baumann",
"Michael",
"",
"TIMC"
],
[
"Chevreau",
"G.",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Moreau-Gaudry",
"Alexandre",
"",
"TIMC, CHU-Grenoble CIC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.3971 | Uwe Aickelin | Jingpeng Li and Uwe Aickelin | A Bayesian Optimisation Algorithm for the Nurse Scheduling Problem | null | Proceedings of the IEEE Congress on Evolutionary Computation (CEC
2003), pp 2149-2156, Canberra, Australia, 2003 | null | null | cs.NE cs.CE | null | A Bayesian optimization algorithm for the nurse scheduling problem is
presented, which involves choosing a suitable scheduling rule from a set for
each nurses assignment. Unlike our previous work that used Gas to implement
implicit learning, the learning in the proposed algorithm is explicit, ie.
Eventually, we will be able to identify and mix building blocks directly. The
Bayesian optimization algorithm is applied to implement such explicit learning
by building a Bayesian network of the joint distribution of solutions. The
conditional probability of each variable in the network is computed according
to an initial set of promising solutions. Subsequently, each new instance for
each variable is generated, ie in our case, a new rule string has been
obtained. Another set of rule strings will be generated in this way, some of
which will replace previous strings based on fitness selection. If stopping
conditions are not met, the conditional probabilities for all nodes in the
Bayesian network are updated again using the current set of promising rule
strings. Computational results from 52 real data instances demonstrate the
success of this approach. It is also suggested that the learning mechanism in
the proposed approach might be suitable for other scheduling problems.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 16:07:25 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:07:17 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:43:52 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0801.3982 | Ricardo Lopez-Ruiz | C. Pellicer-Lostao and R. Lopez-Ruiz | Pseudo-Random Bit Generation based on 2D chaotic maps of logistic type
and its Applications in Chaotic Cryptography | 13 pages, 5 figures, 3 tables | null | null | null | nlin.CD cs.CR physics.comp-ph | null | Pseudo-Random Bit Generation (PRBG) is required in many aspects of
cryptography as well as in other applications of modern security engineering.
In this work, PRBG based on 2D symmetrical chaotic mappings of logistic type is
considered. The sequences generated with a chaotic PRBG of this type, are
statistically tested and the computational effectiveness of the generators is
estimated. Considering this PRBG valid for cryptography, the size of the
available key space is also calculated. Different cryptographic applications
can be suitable to this PRBG, being a stream cipher probably the most immediate
of them.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 16:55:17 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Pellicer-Lostao",
"C.",
""
],
[
"Lopez-Ruiz",
"R.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0801.3983 | Lizhen Yang | Lizhen Yang, Ling Dong, Kefei Chen | New Upper Bounds on Sizes of Permutation Arrays | null | null | null | null | cs.IT math.IT | null | A permutation array(or code) of length $n$ and distance $d$, denoted by
$(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$ elements
such that the Hamming distance between distinct members
$\mathbf{x},\mathbf{y}\in C$ is at least $d$. Let $P(n,d)$ denote the maximum
size of an $(n,d)$ PA. New upper bounds on $P(n,d)$ are given. For constant
$\alpha,\beta$ satisfying certain conditions, whenever $d=\beta n^{\alpha}$,
the new upper bounds are asymptotically better than the previous ones.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 16:55:17 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Yang",
"Lizhen",
""
],
[
"Dong",
"Ling",
""
],
[
"Chen",
"Kefei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3985 | Andrzej Kwasniewski | A. Krzysztof Kwasniewski, M. Dziemianczuk | Cobweb posets - Recent Results | 27 pages, 15 figures | Adv. Stud. Contemp. Math. volume 16 (2), 2008 (April) pp. 197-218 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cobweb posets uniquely represented by directed acyclic graphs are such a
generalization of the Fibonacci tree that allows joint combinatorial
interpretation for all of them under admissibility condition. This
interpretation was derived in the source papers ([6,7] and references therein
to the first author).[7,6,8] include natural enquires to be reported on here.
The purpose of this presentation is to report on the progress in solving
computational problems which are quite easily formulated for the new class of
directed acyclic graphs interpreted as Hasse diagrams. The problems posed there
and not yet all solved completely are of crucial importance for the vast class
of new partially ordered sets with joint combinatorial interpretation. These so
called cobweb posets - are relatives of Fibonacci tree and are labeled by
specific number sequences - natural numbers sequence and Fibonacci sequence
included. The cobweb posets might be identified with a chain of di-bicliques
i.e. by definition - a chain of complete bipartite one direction digraphs [6].
Any chain of relations is therefore obtainable from the cobweb poset chain of
complete relations via deleting arcs in di-bicliques of the complete relations
chain. In particular we response to one of those problems [1].
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 17:01:28 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2009 21:01:15 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Jan 2011 15:59:10 GMT"
}
] | 2011-01-11T00:00:00 | [
[
"Kwasniewski",
"A. Krzysztof",
""
],
[
"Dziemianczuk",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.3986 | Lizhen Yang | Lizhen Yang, Kefei Chen, Luo Yuan | New Lower Bounds on Sizes of Permutation Arrays | null | null | null | null | cs.IT math.IT | null | A permutation array(or code) of length $n$ and distance $d$, denoted by
$(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$ elements
such that the Hamming distance between distinct members
$\mathbf{x},\mathbf{y}\in C$ is at least $d$. Let $P(n,d)$ denote the maximum
size of an $(n,d)$ PA. This correspondence focuses on the lower bound on
$P(n,d)$. First we give three improvements over the Gilbert-Varshamov lower
bounds on $P(n,d)$ by applying the graph theorem framework presented by Jiang
and Vardy. Next we show another two new improved bounds by considering the
covered balls intersections. Finally some new lower bounds for certain values
of $n$ and $d$ are given.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 17:02:22 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Yang",
"Lizhen",
""
],
[
"Chen",
"Kefei",
""
],
[
"Yuan",
"Luo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.3987 | Lizhen Yang | Lizhen Yang, Kefei Chen, Luo Yuan | New Constructions of Permutation Arrays | null | null | null | null | cs.IT math.IT | null | A permutation array(permutation code, PA) of length $n$ and distance $d$,
denoted by $(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$
elements such that the Hamming distance between distinct members
$\mathbf{x},\mathbf{y}\in C$ is at least $d$. In this correspondence, we
present two constructions of PA from fractional polynomials over finite field,
and a construction of $(n,d)$ PA from permutation group with degree $n$ and
minimal degree $d$. All these new constructions produces some new lower bounds
for PA.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 17:05:39 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Yang",
"Lizhen",
""
],
[
"Chen",
"Kefei",
""
],
[
"Yuan",
"Luo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4013 | Mathieu Couture | Prosenjit Bose and Paz Carmi and Mathieu Couture | Spanners of Additively Weighted Point Sets | null | null | null | null | cs.CG | null | We study the problem of computing geometric spanners for (additively)
weighted point sets. A weighted point set is a set of pairs $(p,r)$ where $p$
is a point in the plane and $r$ is a real number. The distance between two
points $(p_i,r_i)$ and $(p_j,r_j)$ is defined as $|p_ip_j|-r_i-r_j$. We show
that in the case where all $r_i$ are positive numbers and $|p_ip_j|\geq
r_i+r_j$ for all $i,j$ (in which case the points can be seen as
non-intersecting disks in the plane), a variant of the Yao graph is a
$(1+\epsilon)$-spanner that has a linear number of edges. We also show that the
Additively Weighted Delaunay graph (the face-dual of the Additively Weighted
Voronoi diagram) has constant spanning ratio. The straight line embedding of
the Additively Weighted Delaunay graph may not be a plane graph. We show how to
compute a plane embedding that also has a constant spanning ratio.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 19:43:09 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0801.4019 | Joseph O'Rourke | Alex Benton and Joseph O'Rourke | A Class of Convex Polyhedra with Few Edge Unfoldings | 12 pages, 9 figures | null | null | Smith Computer Science 088 | cs.CG | null | We construct a sequence of convex polyhedra on n vertices with the property
that, as n -> infinity, the fraction of its edge unfoldings that avoid overlap
approaches 0, and so the fraction that overlap approaches 1. Nevertheless, each
does have (several) nonoverlapping edge unfoldings.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 20:22:04 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Benton",
"Alex",
""
],
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0801.4024 | Ilya Shmulevich | David J. Galas, Matti Nykter, Gregory W. Carter, Nathan D. Price, Ilya
Shmulevich | Set-based complexity and biological information | null | null | null | null | cs.IT cs.CC math.IT q-bio.QM | null | It is not obvious what fraction of all the potential information residing in
the molecules and structures of living systems is significant or meaningful to
the system. Sets of random sequences or identically repeated sequences, for
example, would be expected to contribute little or no useful information to a
cell. This issue of quantitation of information is important since the ebb and
flow of biologically significant information is essential to our quantitative
understanding of biological function and evolution. Motivated specifically by
these problems of biological information, we propose here a class of measures
to quantify the contextual nature of the information in sets of objects, based
on Kolmogorov's intrinsic complexity. Such measures discount both random and
redundant information and are inherent in that they do not require a defined
state space to quantify the information. The maximization of this new measure,
which can be formulated in terms of the universal information distance, appears
to have several useful and interesting properties, some of which we illustrate
with examples.
| [
{
"version": "v1",
"created": "Fri, 25 Jan 2008 20:58:14 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Galas",
"David J.",
""
],
[
"Nykter",
"Matti",
""
],
[
"Carter",
"Gregory W.",
""
],
[
"Price",
"Nathan D.",
""
],
[
"Shmulevich",
"Ilya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0801.4048 | Zhu Han | Zhu Han, Xin Zhang, H. Vincent Poor | High Performance Cooperative Transmission Protocols Based on Multiuser
Detection and Network Coding | to appear IEEE Transactions on Wireless Communications | null | 10.1109/TWC.2009.070181 | null | cs.IT math.IT | null | Cooperative transmission is an emerging communication technique that takes
advantage of the broadcast nature of wireless channels. However, due to low
spectral efficiency and the requirement of orthogonal channels, its potential
for use in future wireless networks is limited. In this paper, by making use of
multiuser detection (MUD) and network coding, cooperative transmission
protocols with high spectral efficiency, diversity order, and coding gain are
developed. Compared with the traditional cooperative transmission protocols
with single-user detection, in which the diversity gain is only for one source
user, the proposed MUD cooperative transmission protocols have the merit that
the improvement of one user's link can also benefit the other users. In
addition, using MUD at the relay provides an environment in which network
coding can be employed. The coding gain and high diversity order can be
obtained by fully utilizing the link between the relay and the destination.
From the analysis and simulation results, it is seen that the proposed
protocols achieve higher diversity gain, better asymptotic efficiency, and
lower bit error rate, compared to traditional MUD schemes and to existing
cooperative transmission protocols. From the simulation results, the
performance of the proposed scheme is near optimal as the performance gap is
0.12dB for average bit error rate (BER) 10^{-6} and 1.04dB for average BER
10^(-3), compared to two performance upper bounds.
| [
{
"version": "v1",
"created": "Sat, 26 Jan 2008 00:55:08 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Han",
"Zhu",
""
],
[
"Zhang",
"Xin",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4054 | Soung Liew | Soung Chang Liew, Ying Jun Zhang, Da Rui Chen | Bounded Mean-Delay Throughput and Non-Starvation Conditions in Aloha
Network | We are replacing the old version (submitted in Jan 2008) with this
new version. The presentation and organization of the new version, we
believe, is easire to read. In addition, new simulation results have been
added | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the requirements to ensure bounded mean queuing delay
and non-starvation in a slotted Aloha network operating the exponential backoff
protocol. It is well-known that the maximum possible throughput of a slotted
Aloha system with a large number of nodes is 1/e = 0.3679. Indeed, a saturation
throughput of 1/e can be achieved with an exponential backoff factor of r =
e/(e-1)=1.5820. The binary backoff factor of r = 2 is assumed in the majority
of prior work, and in many practical multiple-access networks such as the
Ethernet and WiFi. For slotted Aloha, the saturation throughput 0.3466 for r =
2 is reasonably close to the maximum of 1/e, and one could hardly raise
objection to adopting r = 2 in the system. However, this paper shows that if
mean queuing delay is to be bounded, then the sustainable throughput when r = 2
is only 0.2158, a drastic 41% drop from 1/e . Fortunately, the optimal setting
of r = 1.3757 under the bounded mean-delay requirement allows us to achieve
sustainable throughput of 0.3545, a penalty of only less than 4% relative to
1/e. A general conclusion is that the value of r may significantly affect the
queuing delay performance. Besides analyzing mean queuing delay, this paper
also delves into the phenomenon of starvation, wherein some nodes are deprived
of service for an extended period of time while other nodes hog the system.
Specifically, we propose a quantitative definition for starvation and show that
the conditions to guarantee bounded mean delay and non-starved operation are
one of the same, thus uniting these two notions. Finally, we show that when
mean delay is large and starvation occurs, the performance results obtained
from simulation experiments may not converge. A quantitative discussion of this
issue is provided in this paper.
| [
{
"version": "v1",
"created": "Sat, 26 Jan 2008 02:36:30 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2008 11:05:09 GMT"
}
] | 2008-07-14T00:00:00 | [
[
"Liew",
"Soung Chang",
""
],
[
"Zhang",
"Ying Jun",
""
],
[
"Chen",
"Da Rui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0801.4061 | Jean-Philippe Vert | Jean-Philippe Vert (CB) | The optimal assignment kernel is not positive definite | null | null | null | null | cs.LG | null | We prove that the optimal assignment kernel, proposed recently as an attempt
to embed labeled graphs and more generally tuples of basic data to a Hilbert
space, is in fact not always positive definite.
| [
{
"version": "v1",
"created": "Sat, 26 Jan 2008 07:32:48 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Vert",
"Jean-Philippe",
"",
"CB"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0801.4079 | Elena Dubrova | Elena Dubrova (Royal Institute of Technology) | An equivalence preserving transformation from the Fibonacci to the
Galois NLFSRs | 14 pages, 4 figures, one reference added, example 4 corrected | null | null | null | cs.CR | null | Conventional Non-Linear Feedback Shift Registers (NLFSRs) use the Fibonacci
configuration in which the value of the first bit is updated according to some
non-linear feedback function of previous values of other bits, and each
remaining bit repeats the value of its previous bit. We show how to transform
the feedback function of a Fibonacci NLFSR into several smaller feedback
functions of individual bits. Such a transformation reduces the propagation
time, thus increasing the speed of pseudo-random sequence generation. The
practical significance of the presented technique is that is makes possible
increasing the keystream generation speed of any Fibonacci NLFSR-based stream
cipher with no penalty in area.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 20:07:40 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jan 2008 15:26:54 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Dubrova",
"Elena",
"",
"Royal Institute of Technology"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.4082 | Marcello Caleffi | Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura | On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc
Networks | Proc. of WRECOM '07: Wireless Rural and Emergency Communications
Conference, Roma (Italy), October 2007 | null | null | null | cs.NI cs.DC | null | In this paper, a reliability analysis is carried out to state a performance
comparison between two recently proposed proactive routing algorithms. These
protocols are able to scale in ad hoc and sensor networks by resorting to
dynamic addressing, to face with the topology variability, which is typical of
ad hoc, and sensor networks. Numerical simulations are also carried out to
corroborate the results of the analysis.
| [
{
"version": "v1",
"created": "Sat, 26 Jan 2008 15:15:21 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Caleffi",
"Marcello",
""
],
[
"Ferraiuolo",
"Giancarlo",
""
],
[
"Paura",
"Luigi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.4105 | Steven Perron | Steven Perron (University of Toronto) | Quantified Propositional Logspace Reasoning | 28 pages | null | null | null | cs.LO cs.CC | null | In this paper, we develop a quantified propositional proof systems that
corresponds to logarithmic-space reasoning. We begin by defining a class
SigmaCNF(2) of quantified formulas that can be evaluated in log space. Then our
new proof system GL^* is defined as G_1^* with cuts restricted to SigmaCNF(2)
formulas and no cut formula that is not quantifier free contains a free
variable that does not appear in the final formula.
To show that GL^* is strong enough to capture log space reasoning, we
translate theorems of VL into a family of tautologies that have polynomial-size
GL^* proofs. VL is a theory of bounded arithmetic that is known to correspond
to logarithmic-space reasoning. To do the translation, we find an appropriate
axiomatization of VL, and put VL proofs into a new normal form.
To show that GL^* is not too strong, we prove the soundness of GL^* in such a
way that it can be formalized in VL. This is done by giving a logarithmic-space
algorithm that witnesses GL^* proofs.
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2008 19:53:39 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Perron",
"Steven",
"",
"University of Toronto"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.4119 | Uwe Aickelin | Gianni Tedesco and Uwe Aickelin | Strategic Alert Throttling for Intrusion Detection Systems | null | 4th WSEAS International Conference on Information Security (WSEAS
2005), Tenerife, Spain, 2005 | null | null | cs.NE cs.CR | null | Network intrusion detection systems are themselves becoming targets of
attackers. Alert flood attacks may be used to conceal malicious activity by
hiding it among a deluge of false alerts sent by the attacker. Although these
types of attacks are very hard to stop completely, our aim is to present
techniques that improve alert throughput and capacity to such an extent that
the resources required to successfully mount the attack become prohibitive. The
key idea presented is to combine a token bucket filter with a realtime
correlation algorithm. The proposed algorithm throttles alert output from the
IDS when an attack is detected. The attack graph used in the correlation
algorithm is used to make sure that alerts crucial to forming strategies are
not discarded by throttling.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 15:36:56 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:00:56 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:43:30 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Tedesco",
"Gianni",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.4129 | Amichai Sanderovich | Amichai Sanderovich, Michael Peleg and Shlomo Shamai | Scaling Laws and Techniques in Decentralized Processing of Interfered
Gaussian Channels | Submitted to European Transactions on Telecommunication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The scaling laws of the achievable communication rates and the corresponding
upper bounds of distributed reception in the presence of an interfering signal
are investigated. The scheme includes one transmitter communicating to a remote
destination via two relays, which forward messages to the remote destination
through reliable links with finite capacities. The relays receive the
transmission along with some unknown interference. We focus on three common
settings for distributed reception, wherein the scaling laws of the capacity
(the pre-log as the power of the transmitter and the interference are taken to
infinity) are completely characterized. It is shown in most cases that in order
to overcome the interference, a definite amount of information about the
interference needs to be forwarded along with the desired message, to the
destination. It is exemplified in one scenario that the cut-set upper bound is
strictly loose. The results are derived using the cut-set along with a new
bounding technique, which relies on multi letter expressions. Furthermore,
lattices are found to be a useful communication technique in this setting, and
are used to characterize the scaling laws of achievable rates.
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2008 12:47:04 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Dec 2009 22:16:00 GMT"
}
] | 2009-12-08T00:00:00 | [
[
"Sanderovich",
"Amichai",
""
],
[
"Peleg",
"Michael",
""
],
[
"Shamai",
"Shlomo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4130 | Klas Olof Daniel Andersson | Daniel Andersson | Solving Min-Max Problems with Applications to Games | null | null | null | null | cs.GT cs.DS | null | We refine existing general network optimization techniques, give new
characterizations for the class of problems to which they can be applied, and
show that they can also be used to solve various two-player games in almost
linear time. Among these is a new variant of the network interdiction problem,
where the interdictor wants to destroy high-capacity paths from the source to
the destination using a vertex-wise limited budget of arc removals. We also
show that replacing the limit average in mean payoff games by the maximum
weight results in a class of games amenable to these techniques.
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2008 13:28:43 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Andersson",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.4150 | Herbert Hoeger Dr | G. Diaz, J. Florez-Lopez, V. Hamar, H. Hoeger, C. Mendoza, Z. Mendez,
L. A. Nunez, N. Ruiz, R. Torrens, M. Uzcategui | e-Science perspectives in Venezuela | Presented at the Third Conference of the EELA Project in Catania,
Italy, Dec 2007 | Proceedings of the Third EELA Conference, R. Gavela, B. Marechal,
R. Barbera, L.N. Ciuffo, R. Mayo. (Editors), CIEMAT, Madrid, Spain (2007), pp
131-139 | null | null | cs.DC | null | We describe the e-Science strategy in Venezuela, in particular initiatives by
the Centro Nacional de Calculo Cientifico Universidad de Los Andes (CECALCULA),
Merida, the Universidad de Los Andes (ULA), Merida, and the Instituto
Venezolano de Investigaciones Cientificas (IVIC), Caracas. We present the plans
for the Venezuelan Academic Grid and the current status of Grid ULA supported
by Internet2. We show different web-based scientific applications that are
being developed in quantum chemistry, atomic physics, structural damage
analysis, biomedicine and bioclimate within the framework of the
E-Infrastructure shared between Europe and Latin America (EELA)
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2008 20:22:29 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Diaz",
"G.",
""
],
[
"Florez-Lopez",
"J.",
""
],
[
"Hamar",
"V.",
""
],
[
"Hoeger",
"H.",
""
],
[
"Mendoza",
"C.",
""
],
[
"Mendez",
"Z.",
""
],
[
"Nunez",
"L. A.",
""
],
[
"Ruiz",
"N.",
""
],
[
"Torrens",
"R.",
""
],
[
"Uzcategui",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.4158 | Gabor Vattay | Gabor Simon, Jozsef Steger, Peter Haga Istvan Csabai, Gabor Vattay | Measuring the Dynamical State of the Internet: Large Scale Network
Tomography via the ETOMIC Infrastructure | null | null | null | null | physics.data-an cs.NI | null | In this paper we show how to go beyond the study of the topological
properties of the Internet, by measuring its dynamical state using special
active probing techniques and the methods of network tomography. We demonstrate
this approach by measuring the key state parameters of Internet paths, the
characteristics of queueing delay, in a part of the European Internet. In the
paper we describe in detail the ETOMIC measurement platform that was used to
conduct the experiments, and the applied method of queueing delay tomography.
The main results of the paper are maps showing various spatial structure in the
characteristics of queueing delay corresponding to the resolved part of the
European Internet. These maps reveal that the average queueing delay of network
segments spans more than two orders of magnitude, and that the distribution of
this quantity is very well fitted by the log-normal distribution.
| [
{
"version": "v1",
"created": "Sun, 27 Jan 2008 21:53:36 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Simon",
"Gabor",
""
],
[
"Steger",
"Jozsef",
""
],
[
"Csabai",
"Peter Haga Istvan",
""
],
[
"Vattay",
"Gabor",
""
]
] | [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0801.4190 | Sebastian Roch | Constantinos Daskalakis, Elchanan Mossel, Sebastien Roch | Phylogenies without Branch Bounds: Contracting the Short, Pruning the
Deep | null | null | null | null | q-bio.PE cs.CE cs.DS math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new phylogenetic reconstruction algorithm which, unlike most
previous rigorous inference techniques, does not rely on assumptions regarding
the branch lengths or the depth of the tree. The algorithm returns a forest
which is guaranteed to contain all edges that are: 1) sufficiently long and 2)
sufficiently close to the leaves. How much of the true tree is recovered
depends on the sequence length provided. The algorithm is distance-based and
runs in polynomial time.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 05:10:22 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 01:48:27 GMT"
}
] | 2011-09-30T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0801.4194 | Kohtaro Tadaki | Kohtaro Tadaki | A statistical mechanical interpretation of algorithmic information
theory | 31 pages, LaTeX2e, no figures | null | null | null | cs.IT cs.CC math.IT math.PR quant-ph | null | We develop a statistical mechanical interpretation of algorithmic information
theory by introducing the notion of thermodynamic quantities, such as free
energy, energy, statistical mechanical entropy, and specific heat, into
algorithmic information theory. We investigate the properties of these
quantities by means of program-size complexity from the point of view of
algorithmic randomness. It is then discovered that, in the interpretation, the
temperature plays a role as the compression rate of the values of all these
thermodynamic quantities, which include the temperature itself. Reflecting this
self-referential nature of the compression rate of the temperature, we obtain
fixed point theorems on compression rate.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 17:42:27 GMT"
}
] | 2009-04-09T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0801.4198 | Kazutaka Nakamura | Kazutaka Nakamura, Toshiyuki Tanaka | Microscopic Analysis for Decoupling Principle of Linear Vector Channel | null | null | null | null | cs.IT math.IT | null | This paper studies the decoupling principle of a linear vector channel, which
is an extension of CDMA and MIMO channels. We show that the scalar-channel
characterization obtained via the decoupling principle is valid not only for
collections of a large number of elements of input vector, as discussed in
previous studies, but also for individual elements of input vector, i.e. the
linear vector channel for individual elements of channel input vector is
decomposed into a bank of independent scalar Gaussian channels in the
large-system limit, where dimensions of channel input and output are both sent
to infinity while their ratio fixed.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 06:59:42 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Nakamura",
"Kazutaka",
""
],
[
"Tanaka",
"Toshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4230 | Simon Perdrix | Simon Perdrix | Quantum entanglement analysis based on abstract interpretation | 13 pages | Proc. of 15th International Static Analysis Symposium (SAS 2008).
LNCS 5079, pp 270-282 | 10.1007/978-3-540-69166-2_18 | null | cs.LO cs.PL quant-ph | null | Entanglement is a non local property of quantum states which has no classical
counterpart and plays a decisive role in quantum information theory. Several
protocols, like the teleportation, are based on quantum entangled states.
Moreover, any quantum algorithm which does not create entanglement can be
efficiently simulated on a classical computer. The exact role of the
entanglement is nevertheless not well understood. Since an exact analysis of
entanglement evolution induces an exponential slowdown, we consider
approximative analysis based on the framework of abstract interpretation. In
this paper, a concrete quantum semantics based on superoperators is associated
with a simple quantum programming language. The representation of entanglement,
i.e. the design of the abstract domain is a key issue. A representation of
entanglement as a partition of the memory is chosen. An abstract semantics is
introduced, and the soundness of the approximation is proven.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 10:45:47 GMT"
}
] | 2008-12-08T00:00:00 | [
[
"Perdrix",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0801.4238 | Christoph Durr | Marek Chrobak, Christoph Durr, Mathilde Hurand and Julien Robert | Algorithms for Temperature-Aware Task Scheduling in Microprocessor
Systems | null | null | null | null | cs.DS | null | We study scheduling problems motivated by recently developed techniques for
microprocessor thermal management at the operating systems level. The general
scenario can be described as follows. The microprocessor's temperature is
controlled by the hardware thermal management system that continuously monitors
the chip temperature and automatically reduces the processor's speed as soon as
the thermal threshold is exceeded. Some tasks are more CPU-intensive than other
and thus generate more heat during execution. The cooling system operates
non-stop, reducing (at an exponential rate) the deviation of the processor's
temperature from the ambient temperature. As a result, the processor's
temperature, and thus the performance as well, depends on the order of the task
execution. Given a variety of possible underlying architectures, models for
cooling and for hardware thermal management, as well as types of tasks, this
scenario gives rise to a plethora of interesting and never studied scheduling
problems.
We focus on scheduling real-time jobs in a simplified model for cooling and
thermal management. A collection of unit-length jobs is given, each job
specified by its release time, deadline and heat contribution. If, at some time
step, the temperature of the system is t and the processor executes a job with
heat contribution h, then the temperature at the next step is (t+h)/2. The
temperature cannot exceed the given thermal threshold T. The objective is to
maximize the throughput, that is, the number of tasks that meet their
deadlines. We prove that, in the offline case, computing the optimum schedule
is NP-hard, even if all jobs are released at the same time. In the online case,
we show a 2-competitive deterministic algorithm and a matching lower bound.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 10:47:42 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Hurand",
"Mathilde",
""
],
[
"Robert",
"Julien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.4268 | Grenville Croll | Roland T. Mittermeir, Markus Clermont, Karin Hodnigg | Protecting Spreadsheets Against Fraud | 16 Pages including extensive references | Proc. European Spreadsheet Risks Int. Grp. 2005 69-80
ISBN:1-902724-16-X | null | null | cs.CY cs.CR | null | Previous research on spreadsheet risks has predominantly focussed on errors
inadvertently introduced by spreadsheet writers i.e. it focussed on the
end-user aspects of spreadsheet development. When analyzing a faulty
spreadsheet, one might not be able to determine whether a particular error
(fault) has been made by mistake or with fraudulent intentions. However, the
fences protecting against fraudulent errors have to be different from those
shielding against inadvertent mistakes. Faults resulting from errors committed
inadvertently can be prevented ab initio by tools that notify the spreadsheet
writer about potential problems whereas faults that are introduced on purpose
have to be discovered by auditors without the cooperation of their originators.
Even worse, some spreadsheet writers will do their best to conceal fraudulent
parts of their spreadsheets from auditors. In this paper we survey the
available means for fraud protection by contrasting approaches suitable for
spreadsheets with those known from fraud protection for conventional software.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 13:45:28 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Mittermeir",
"Roland T.",
""
],
[
"Clermont",
"Markus",
""
],
[
"Hodnigg",
"Karin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.4274 | Grenville Croll | Karin Hodnigg, Markus Clermont, Roland T. Mittermeir | Computational Models of Spreadsheet Development: Basis for Educational
Approaches | 16 Pages, 4 figures, includes references | Proc. European Spreadsheet Risks Int. Grp. 2004 153-168 ISBN 1
902724 94 1 | null | null | cs.HC cs.SE | null | Among the multiple causes of high error rates in spreadsheets, lack of proper
training and of deep understanding of the computational model upon which
spreadsheet computations rest might not be the least issue. The paper addresses
this problem by presenting a didactical model focussing on cell interaction,
thus exceeding the atomicity of cell computations. The approach is motivated by
an investigation how different spreadsheet systems handle certain computational
issues implied from moving cells, copy-paste operations, or recursion.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 13:55:55 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Hodnigg",
"Karin",
""
],
[
"Clermont",
"Markus",
""
],
[
"Mittermeir",
"Roland T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0801.4280 | Grenville Croll | Yirsaw Ayalew, Roland Mittermeir | Spreadsheet Debugging | 13 Pages, 4 figues | Proc. European Spreadsheet Risks Int. Grp. 2003 67-79 ISBN 1 86166
199 1 | null | null | cs.SE cs.PL | null | Spreadsheet programs, artifacts developed by non-programmers, are used for a
variety of important tasks and decisions. Yet a significant proportion of them
have severe quality problems. To address this issue, our previous work
presented an interval-based testing methodology for spreadsheets.
Interval-based testing rests on the observation that spreadsheets are mainly
used for numerical computations. It also incorporates ideas from symbolic
testing and interval analysis. This paper addresses the issue of efficiently
debugging spreadsheets. Based on the interval-based testing methodology, this
paper presents a technique for tracing faults in spreadsheet programs. The
fault tracing technique proposed uses the dataflow information and cell marks
to identify the most influential faulty cell(s) for a given formula cell
containing a propagated fault.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 14:07:58 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Ayalew",
"Yirsaw",
""
],
[
"Mittermeir",
"Roland",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0801.4287 | Uwe Aickelin | Qi Chen and Uwe Aickelin | Movie Recommendation Systems Using An Artificial Immune System | null | 6th International Conference in Adaptive Computing in Design and
Manufacture (ACDM 2004), Bristol, UK, 2004 | null | null | cs.NE cs.AI | null | We apply the Artificial Immune System (AIS) technology to the Collaborative
Filtering (CF) technology when we build the movie recommendation system. Two
different affinity measure algorithms of AIS, Kendall tau and Weighted Kappa,
are used to calculate the correlation coefficients for this movie
recommendation system. From the testing we think that Weighted Kappa is more
suitable than Kendall tau for movie problems.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 14:19:12 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:05:58 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Chen",
"Qi",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.4292 | Joel Goossens | Liliana Cucu and Jo\"el Goossens | Exact Feasibility Tests for Real-Time Scheduling of Periodic Tasks upon
Multiprocessor Platforms | null | null | null | null | cs.OS | null | In this paper we study the global scheduling of periodic task systems upon
multiprocessor platforms. We first show two very general properties which are
well-known for uniprocessor platforms and which remain for multiprocessor
platforms: (i) under few and not so restrictive assumptions, we show that
feasible schedules of periodic task systems are periodic from some point with a
period equal to the least common multiple of task periods and (ii) for the
specific case of synchronous periodic task systems, we show that feasible
schedules repeat from the origin. We then present our main result: we
characterize, for task-level fixed-priority schedulers and for asynchronous
constrained or arbitrary deadline periodic task models, upper bounds of the
first time instant where the schedule repeats. We show that job-level
fixed-priority schedulers are predictable upon unrelated multiprocessor
platforms. For task-level fixed-priority schedulers, based on the upper bounds
and the predictability property, we provide for asynchronous constrained or
arbitrary deadline periodic task sets, exact feasibility tests. Finally, for
the job-level fixed-priority EDF scheduler, for which such an upper bound
remains unknown, we provide an exact feasibility test as well.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 14:30:34 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Cucu",
"Liliana",
""
],
[
"Goossens",
"Joël",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0801.4305 | Frank Schweitzer | J. Emeterio Navarro Barrientos, Frank E. Walter, Frank Schweitzer | Risk-Seeking versus Risk-Avoiding Investments in Noisy Periodic
Environments | 27 pp. v2 with minor corrections. See http://www.sg.ethz.ch for more
info | International Journal of Modern Physics C vol. 19, no. 6 (2008)
971-994 | 10.1142/S0129183108012662 | null | q-fin.PM cs.CE physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the performance of various agent strategies in an artificial
investment scenario. Agents are equipped with a budget, $x(t)$, and at each
time step invest a particular fraction, $q(t)$, of their budget. The return on
investment (RoI), $r(t)$, is characterized by a periodic function with
different types and levels of noise. Risk-avoiding agents choose their fraction
$q(t)$ proportional to the expected positive RoI, while risk-seeking agents
always choose a maximum value $q_{max}$ if they predict the RoI to be positive
("everything on red"). In addition to these different strategies, agents have
different capabilities to predict the future $r(t)$, dependent on their
internal complexity. Here, we compare 'zero-intelligent' agents using technical
analysis (such as moving least squares) with agents using reinforcement
learning or genetic algorithms to predict $r(t)$. The performance of agents is
measured by their average budget growth after a certain number of time steps.
We present results of extensive computer simulations, which show that, for our
given artificial environment, (i) the risk-seeking strategy outperforms the
risk-avoiding one, and (ii) the genetic algorithm was able to find this optimal
strategy itself, and thus outperforms other prediction approaches considered.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 15:09:58 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Sep 2008 13:48:45 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Barrientos",
"J. Emeterio Navarro",
""
],
[
"Walter",
"Frank E.",
""
],
[
"Schweitzer",
"Frank",
""
]
] | [
{
"class": "Quantitative Finance",
"code": "q-fin.PM",
"description": "Security selection and optimization, capital allocation, investment strategies and performance measurement",
"span": "(Portfolio Management)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0801.4307 | Uwe Aickelin | Uwe Aickelin and Qi Chen | On Affinity Measures for Artificial Immune System Movie Recommenders | null | Proceedings of the 5th International Conference on Recent Advances
in Soft Computing (RASC 2004), Nottingham, UK | null | null | cs.NE cs.AI cs.CY | null | We combine Artificial Immune Systems 'AIS', technology with Collaborative
Filtering 'CF' and use it to build a movie recommendation system. We already
know that Artificial Immune Systems work well as movie recommenders from
previous work by Cayzer and Aickelin 3, 4, 5. Here our aim is to investigate
the effect of different affinity measure algorithms for the AIS. Two different
affinity measures, Kendalls Tau and Weighted Kappa, are used to calculate the
correlation coefficients for the movie recommender. We compare the results with
those published previously and show that Weighted Kappa is more suitable than
others for movie problems. We also show that AIS are generally robust movie
recommenders and that, as long as a suitable affinity measure is chosen,
results are good.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 15:14:45 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:06:30 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:44:44 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Chen",
"Qi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0801.4312 | Uwe Aickelin | Uwe Aickelin, Edmund Burke and Aniza Din | Investigating Artificial Immune Systems For Job Shop Rescheduling In
Changing Environments | null | 6th International Conference in Adaptive Computing in Design and
Manufacture (ACDM 2004), Bristol, UK, 2004 | null | null | cs.NE cs.CE | null | Artificial immune system can be used to generate schedules in changing
environments and it has been proven to be more robust than schedules developed
using a genetic algorithm. Good schedules can be produced especially when the
number of the antigens is increased. However, an increase in the range of the
antigens had somehow affected the fitness of the immune system. In this
research, we are trying to improve the result of the system by rescheduling the
same problem using the same method while at the same time maintaining the
robustness of the schedules.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 15:26:59 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:03:46 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:43:07 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Burke",
"Edmund",
""
],
[
"Din",
"Aniza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0801.4314 | Uwe Aickelin | Uwe Aickelin | Artificial Immune Systems (AIS) - A New Paradigm for Heuristic Decision
Making | null | Invited Keynote Talk, Annual Operational Research Conference 46,
York, UK, 2004 | null | null | cs.NE cs.AI | null | Over the last few years, more and more heuristic decision making techniques
have been inspired by nature, e.g. evolutionary algorithms, ant colony
optimisation and simulated annealing. More recently, a novel computational
intelligence technique inspired by immunology has emerged, called Artificial
Immune Systems (AIS). This immune system inspired technique has already been
useful in solving some computational problems. In this keynote, we will very
briefly describe the immune system metaphors that are relevant to AIS. We will
then give some illustrative real-world problems suitable for AIS use and show a
step-by-step algorithm walkthrough. A comparison of AIS to other well-known
algorithms and areas for future work will round this keynote off. It should be
noted that as AIS is still a young and evolving field, there is not yet a fixed
algorithm template and hence actual implementations might differ somewhat from
the examples given here.
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 15:32:05 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:02:52 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:46:24 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0801.4355 | Jocelyne Troccaz | Jean-Jacques Banihachemi (TIMC), Eric Boidard (TIMC), Jean-Luc Bosson
(TIMC, CHU-Grenoble CIC), Luc Bressollette, Ivan Bricault (TIMC, CHU-Grenoble
radio), Philippe Cinquin (TIMC), Gilbert Ferretti (CHU-Grenoble radio), Maud
Marchal (TIMC), Thomas Martinelli (CHU-Grenoble radio), Alexandre
Moreau-Gaudry (CHU-Grenoble CIC), Franck Pelissier, Christian Roux, Dominique
Saragaglia, Pierre Thorel, Jocelyne Troccaz (TIMC), Adriana Vilchis (TIMC) | TER: A Robot for Remote Ultrasonic Examination: Experimental Evaluations | null | Telesurgery, Springer Verlag (Ed.) (2008) 91-99 | null | null | cs.OH cs.RO | null | This chapter:
o Motivates the clinical use of robotic tele-echography
o Introduces the TER system
o Describes technical and clinical evaluations performed with TER
| [
{
"version": "v1",
"created": "Mon, 28 Jan 2008 18:39:41 GMT"
}
] | 2008-01-29T00:00:00 | [
[
"Banihachemi",
"Jean-Jacques",
"",
"TIMC"
],
[
"Boidard",
"Eric",
"",
"TIMC"
],
[
"Bosson",
"Jean-Luc",
"",
"TIMC, CHU-Grenoble CIC"
],
[
"Bressollette",
"Luc",
"",
"TIMC, CHU-Grenoble\n radio"
],
[
"Bricault",
"Ivan",
"",
"TIMC, CHU-Grenoble\n radio"
],
[
"Cinquin",
"Philippe",
"",
"TIMC"
],
[
"Ferretti",
"Gilbert",
"",
"CHU-Grenoble radio"
],
[
"Marchal",
"Maud",
"",
"TIMC"
],
[
"Martinelli",
"Thomas",
"",
"CHU-Grenoble radio"
],
[
"Moreau-Gaudry",
"Alexandre",
"",
"CHU-Grenoble CIC"
],
[
"Pelissier",
"Franck",
"",
"TIMC"
],
[
"Roux",
"Christian",
"",
"TIMC"
],
[
"Saragaglia",
"Dominique",
"",
"TIMC"
],
[
"Thorel",
"Pierre",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Vilchis",
"Adriana",
"",
"TIMC"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0801.4405 | David Charlton | David Charlton, Erik D. Demaine, Martin L. Demaine, Gregory Price,
Yaa-Lirng Tu | A Locked Orthogonal Tree | null | null | null | null | cs.CG | null | We give a counterexample to a conjecture of Poon [Poo06] that any orthogonal
tree in two dimensions can always be flattened by a continuous motion that
preserves edge lengths and avoids self-intersection. We show our example is
locked by extending results on strongly locked self-touching linkages due to
Connelly, Demaine and Rote [CDR02] to allow zero-length edges as defined in
[ADG07], which may be of independent interest. Our results also yield a locked
tree with only eleven edges, which is the smallest known example of a locked
tree.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 00:39:37 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Charlton",
"David",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Price",
"Gregory",
""
],
[
"Tu",
"Yaa-Lirng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.