id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0801.3048
Franco Bagnoli
Franco Bagnoli, Andrea Guazzini, Pietro Lio'
Human Heuristics for Autonomous Agents
12 pages
P. Li\'o et al. editors, BIOWIRE 2007, LNCS 5151, pages 340-351, Springer--Verlag Berlin Heidelberg 2008
10.1007/978-3-540-92191-2_30
null
cs.MA cs.HC cs.NI
null
We investigate the problem of autonomous agents processing pieces of information that may be corrupted (tainted). Agents have the option of contacting a central database for a reliable check of the status of the message, but this procedure is costly and therefore should be used with parsimony. Agents have to evaluate the risk of being infected, and decide if and when communicating partners are affordable. Trustability is implemented as a personal (one-to-one) record of past contacts among agents, and as a mean-field monitoring of the level of message corruption. Moreover, this information is slowly forgotten in time, so that at the end everybody is checked against the database. We explore the behavior of a homogeneous system in the case of a fixed pool of spreaders of corrupted messages, and in the case of spontaneous appearance of corrupted messages.
[ { "version": "v1", "created": "Sat, 19 Jan 2008 19:36:13 GMT" } ]
2011-08-22T00:00:00
[ [ "Bagnoli", "Franco", "" ], [ "Guazzini", "Andrea", "" ], [ "Lio'", "Pietro", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0801.3049
Zhi Quan
Zhi Quan, Shuguang Cui, Ali. H. Sayed, and H. Vincent Poor
Spatial-Spectral Joint Detection for Wideband Spectrum Sensing in Cognitive Radio Networks
To appear in the Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March 30-April 4, 2008
null
10.1109/TSP.2008.2008540
null
cs.IT math.IT
null
Spectrum sensing is an essential functionality that enables cognitive radios to detect spectral holes and opportunistically use under-utilized frequency bands without causing harmful interference to primary networks. Since individual cognitive radios might not be able to reliably detect weak primary signals due to channel fading/shadowing, this paper proposes a cooperative wideband spectrum sensing scheme, referred to as spatial-spectral joint detection, which is based on a linear combination of the local statistics from spatially distributed multiple cognitive radios. The cooperative sensing problem is formulated into an optimization problem, for which suboptimal but efficient solutions can be obtained through mathematical transformation under practical conditions.
[ { "version": "v1", "created": "Sat, 19 Jan 2008 19:55:02 GMT" } ]
2009-11-13T00:00:00
[ [ "Quan", "Zhi", "" ], [ "Cui", "Shuguang", "" ], [ "Sayed", "Ali. H.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3065
Alwen Tiu
Alwen Tiu
Cut Elimination for a Logic with Generic Judgments and Induction
null
null
null
null
cs.LO
null
This paper presents a cut-elimination proof for the logic $LG^\omega$, which is an extension of a proof system for encoding generic judgments, the logic $\FOLDNb$ of Miller and Tiu, with an induction principle. The logic $LG^\omega$, just as $\FOLDNb$, features extensions of first-order intuitionistic logic with fixed points and a ``generic quantifier'', $\nabla$, which is used to reason about the dynamics of bindings in object systems encoded in the logic. A previous attempt to extend $\FOLDNb$ with an induction principle has been unsuccessful in modeling some behaviours of bindings in inductive specifications. It turns out that this problem can be solved by relaxing some restrictions on $\nabla$, in particular by adding the axiom $B \equiv \nabla x. B$, where $x$ is not free in $B$. We show that by adopting the equivariance principle, the presentation of the extended logic can be much simplified. This paper contains the technical proofs for the results stated in \cite{tiu07entcs}; readers are encouraged to consult \cite{tiu07entcs} for motivations and examples for $LG^\omega.$
[ { "version": "v1", "created": "Sun, 20 Jan 2008 08:34:22 GMT" } ]
2008-01-22T00:00:00
[ [ "Tiu", "Alwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.3073
Youngchul Sung
Youngchul Sung, H. Vincent Poor and Heejung Yu
Large Deviations Analysis for the Detection of 2D Hidden Gauss-Markov Random Fields Using Sensor Networks
To appear in the Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March 30 - April 4, 2008
null
10.1109/ICASSP.2008.4518504
null
cs.IT math.IT
null
The detection of hidden two-dimensional Gauss-Markov random fields using sensor networks is considered. Under a conditional autoregressive model, the error exponent for the Neyman-Pearson detector satisfying a fixed level constraint is obtained using the large deviations principle. For a symmetric first order autoregressive model, the error exponent is given explicitly in terms of the SNR and an edge dependence factor (field correlation). The behavior of the error exponent as a function of correlation strength is seen to divide into two regions depending on the value of the SNR. At high SNR, uncorrelated observations maximize the error exponent for a given SNR, whereas there is non-zero optimal correlation at low SNR. Based on the error exponent, the energy efficiency (defined as the ratio of the total information gathered to the total energy required) of ad hoc sensor network for detection is examined for two sensor deployment models: an infinite area model and and infinite density model. For a fixed sensor density, the energy efficiency diminishes to zero at rate O(area^{-1/2}) as the area is increased. On the other hand, non-zero efficiency is possible for increasing density depending on the behavior of the physical correlation as a function of the link length.
[ { "version": "v1", "created": "Sun, 20 Jan 2008 10:04:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Sung", "Youngchul", "" ], [ "Poor", "H. Vincent", "" ], [ "Yu", "Heejung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3097
Zhu Han
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Poor
Auction-based Resource Allocation for Multi-relay Asynchronous Cooperative Networks
To appear in the Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March 30 to April 4, 2008
null
10.1109/ICASSP.2008.4518870
null
cs.IT math.IT
null
Resource allocation is considered for cooperative transmissions in multiple-relay wireless networks. Two auction mechanisms, SNR auctions and power auctions, are proposed to distributively coordinate the allocation of power among multiple relays. In the SNR auction, a user chooses the relay with the lowest weighted price. In the power auction, a user may choose to use multiple relays simultaneously, depending on the network topology and the relays' prices. Sufficient conditions for the existence (in both auctions) and uniqueness (in the SNR auction) of the Nash equilibrium are given. The fairness of the SNR auction and efficiency of the power auction are further discussed. It is also proven that users can achieve the unique Nash equilibrium distributively via best response updates in a completely asynchronous manner.
[ { "version": "v1", "created": "Sun, 20 Jan 2008 17:25:56 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Jianwei", "" ], [ "Han", "Zhu", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3102
Eloisa Bentivegna
Mark Wenstrom, Eloisa Bentivegna and Ali Hurson (Pennsylvania State University)
Balancing transparency, efficiency and security in pervasive systems
52 pages, to be published in Advances in Computers
null
null
null
cs.HC cs.IR
null
This chapter will survey pervasive computing with a look at how its constraint for transparency affects issues of resource management and security. The goal of pervasive computing is to render computing transparent, such that computing resources are ubiquitously offered to the user and services are proactively performed for a user without his or her intervention. The task of integrating computing infrastructure into everyday life without making it excessively invasive brings about tradeoffs between flexibility and robustness, efficiency and effectiveness, as well as autonomy and reliability. As the feasibility of ubiquitous computing and its real potential for mass applications are still a matter of controversy, this chapter will look into the underlying issues of resource management and authentication to discover how these can be handled in a least invasive fashion. The discussion will be closed by an overview of the solutions proposed by current pervasive computing efforts, both in the area of generic platforms and for dedicated applications such as pervasive education and healthcare.
[ { "version": "v1", "created": "Sun, 20 Jan 2008 19:15:50 GMT" } ]
2008-01-22T00:00:00
[ [ "Wenstrom", "Mark", "", "Pennsylvania State\n University" ], [ "Bentivegna", "Eloisa", "", "Pennsylvania State\n University" ], [ "Hurson", "Ali", "", "Pennsylvania State\n University" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0801.3111
Martin Pelikan
Martin Pelikan
Analysis of Estimation of Distribution Algorithms and Genetic Algorithms on NK Landscapes
Also available at the MEDAL web site, http://medal.cs.umsl.edu/
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2008), ACM Press, 1033-1040
null
MEDAL Report No. 2008001
cs.NE cs.AI
null
This study analyzes performance of several genetic and evolutionary algorithms on randomly generated NK fitness landscapes with various values of n and k. A large number of NK problem instances are first generated for each n and k, and the global optimum of each instance is obtained using the branch-and-bound algorithm. Next, the hierarchical Bayesian optimization algorithm (hBOA), the univariate marginal distribution algorithm (UMDA), and the simple genetic algorithm (GA) with uniform and two-point crossover operators are applied to all generated instances. Performance of all algorithms is then analyzed and compared, and the results are discussed.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:20:50 GMT" } ]
2008-07-30T00:00:00
[ [ "Pelikan", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3112
Vinod Prabhakaran
Adnan Raja, Vinod M. Prabhakaran, and Pramod Viswanath
The Two User Gaussian Compound Interference Channel
null
null
null
null
cs.IT math.IT
null
We introduce the two user finite state compound Gaussian interference channel and characterize its capacity region to within one bit. The main contributions involve both novel inner and outer bounds. The inner bound is multilevel superposition coding, but the decoding of the levels is opportunistic, depending on the channel state. The genie aided outer bound is motivated by the typical error events of the achievable scheme.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:15:18 GMT" }, { "version": "v2", "created": "Thu, 6 Mar 2008 16:14:32 GMT" }, { "version": "v3", "created": "Thu, 1 May 2008 00:17:44 GMT" } ]
2008-05-01T00:00:00
[ [ "Raja", "Adnan", "" ], [ "Prabhakaran", "Vinod M.", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3113
Martin Pelikan
Martin Pelikan, Kumara Sastry, and David E. Goldberg
iBOA: The Incremental Bayesian Optimization Algorithm
Also available at the MEDAL web site, http://medal.cs.umsl.edu/
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2008), ACM Press, 455-462
null
MEDAL Report No. 2008002
cs.NE cs.AI
null
This paper proposes the incremental Bayesian optimization algorithm (iBOA), which modifies standard BOA by removing the population of solutions and using incremental updates of the Bayesian network. iBOA is shown to be able to learn and exploit unrestricted Bayesian networks using incremental techniques for updating both the structure as well as the parameters of the probabilistic model. This represents an important step toward the design of competent incremental estimation of distribution algorithms that can solve difficult nearly decomposable problems scalably and reliably.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:34:55 GMT" } ]
2008-07-30T00:00:00
[ [ "Pelikan", "Martin", "" ], [ "Sastry", "Kumara", "" ], [ "Goldberg", "David E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3114
Grenville Croll
Raymond R. Panko
Thinking is Bad: Implications of Human Error Research for Spreadsheet Research and Practice
12 pages including references
Proc. European Spreadsheet Risks Int. Grp. 2007 69-80 ISBN 978-905617-58-6
null
null
cs.HC
null
In the spreadsheet error community, both academics and practitioners generally have ignored the rich findings produced by a century of human error research. These findings can suggest ways to reduce errors; we can then test these suggestions empirically. In addition, research on human error seems to suggest that several common prescriptions and expectations for reducing errors are likely to be incorrect. Among the key conclusions from human error research are that thinking is bad, that spreadsheets are not the cause of spreadsheet errors, and that reducing errors is extremely difficult.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:33:15 GMT" } ]
2008-03-10T00:00:00
[ [ "Panko", "Raymond R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0801.3116
Grenville Croll
Ralph Baxter
Enterprise Spreadsheet Management: A Necessary Good
8 pages, includes references
Proc. European Spreadsheet Risks Int. Grp. 2007 7-13 ISBN 978-905617-58-6
null
null
cs.CY
null
This paper presents the arguments and supporting business metrics for Enterprise Spreadsheet Management to be seen as a necessary good. These arguments are divided into a summary of external business drivers that make it necessary and the good that may be delivered to business spreadsheet users involved in repetitive manual processes.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:41:18 GMT" } ]
2008-03-13T00:00:00
[ [ "Baxter", "Ralph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.3117
Yongzhi Cao
Yongzhi Cao
A hierarchy of behavioral equivalences in the $\pi$-calculus with noisy channels
30 pages, 2 figures
Comput. J., vol. 53, no. 1, pp. 3-20, 2010
null
null
cs.LO
null
The $\pi$-calculus is a process algebra where agents interact by sending communication links to each other via noiseless communication channels. Taking into account the reality of noisy channels, an extension of the $\pi$-calculus, called the $\pi_N$-calculus, has been introduced recently. In this paper, we present an early transitional semantics of the $\pi_N$-calculus, which is not a directly translated version of the late semantics of $\pi_N$, and then extend six kinds of behavioral equivalences consisting of reduction bisimilarity, barbed bisimilarity, barbed equivalence, barbed congruence, bisimilarity, and full bisimilarity into the $\pi_N$-calculus. Such behavioral equivalences are cast in a hierarchy, which is helpful to verify behavioral equivalence of two agents. In particular, we show that due to the noisy nature of channels, the coincidence of bisimilarity and barbed equivalence, as well as the coincidence of full bisimilarity and barbed congruence, in the $\pi$-calculus does not hold in $\pi_N$.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:42:52 GMT" } ]
2011-10-04T00:00:00
[ [ "Cao", "Yongzhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.3118
Grenville Croll
Simon Murphy
Spreadsheet Hell
6 pages
Proc. European Spreadsheet Risks Int. Grp. 2007 15-20 ISBN 978-905617-58-6
null
null
cs.CY
null
This management paper looks at the real world issues faced by practitioners managing spreadsheets through the production phase of their life cycle. It draws on the commercial experience of several developers working with large corporations, either as employees or consultants or contractors. It provides commercial examples of some of the practicalities involved with spreadsheet use around the enterprise.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:51:12 GMT" } ]
2008-03-10T00:00:00
[ [ "Murphy", "Simon", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.3119
Grenville Croll
Mukul Madahar, Pat Cleary, David Ball
Categorisation of Spreadsheet Use within Organisations, Incorporating Risk: A Progress Report
10 pages
Proc. European Spreadsheet Risks Int. Grp. 2007 37-45 ISBN 978-905617-58-6
null
null
cs.CY cs.HC
null
There has been a significant amount of research into spreadsheets over the last two decades. Errors in spreadsheets are well documented. Once used mainly for simple functions such as logging, tracking and totalling information, spreadsheets with enhanced formulas are being used for complex calculative models. There are many software packages and tools which assist in detecting errors within spreadsheets. There has been very little evidence of investigation into the spreadsheet risks associated with the main stream operations within an organisation. This study is a part of the investigation into the means of mitigating risks associated with spreadsheet use within organisations. In this paper the authors present and analyse three proposed models for categorisation of spreadsheet use and the level of risks involved. The models are analysed in the light of current knowledge and the general risks associated with organisations.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 00:57:31 GMT" } ]
2008-03-10T00:00:00
[ [ "Madahar", "Mukul", "" ], [ "Cleary", "Pat", "" ], [ "Ball", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0801.3147
Ke Xu
Liang Li, Xin Li, Tian Liu, Ke Xu
From k-SAT to k-CSP: Two Generalized Algorithms
null
null
null
null
cs.DS cs.AI cs.CC
null
Constraint satisfaction problems (CSPs) models many important intractable NP-hard problems such as propositional satisfiability problem (SAT). Algorithms with non-trivial upper bounds on running time for restricted SAT with bounded clause length k (k-SAT) can be classified into three styles: DPLL-like, PPSZ-like and Local Search, with local search algorithms having already been generalized to CSP with bounded constraint arity k (k-CSP). We generalize a DPLL-like algorithm in its simplest form and a PPSZ-like algorithm from k-SAT to k-CSP. As far as we know, this is the first attempt to use PPSZ-like strategy to solve k-CSP, and before little work has been focused on the DPLL-like or PPSZ-like strategies for k-CSP.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 08:07:33 GMT" } ]
2008-01-22T00:00:00
[ [ "Li", "Liang", "" ], [ "Li", "Xin", "" ], [ "Liu", "Tian", "" ], [ "Xu", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.3199
Ngoc-Diep Ho
Ngoc-Diep Ho (1), Paul Van Dooren (1) and Vincent D. Blondel (1) ((1) Universit\'e catholique de Louvain, Belgium)
Descent methods for Nonnegative Matrix Factorization
47 pages. New convergence proof using damped version of RRI. To appear in Numerical Linear Algebra in Signals, Systems and Control. Accepted. Illustrating Matlab code is included in the source bundle
null
null
2007.057
cs.NA cs.IR math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present several descent methods that can be applied to nonnegative matrix factorization and we analyze a recently developped fast block coordinate method called Rank-one Residue Iteration (RRI). We also give a comparison of these different methods and show that the new block coordinate method has better properties in terms of approximation error and complexity. By interpreting this method as a rank-one approximation of the residue matrix, we prove that it \emph{converges} and also extend it to the nonnegative tensor factorization and introduce some variants of the method by imposing some additional controllable constraints such as: sparsity, discreteness and smoothness.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 15:46:43 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2008 21:20:12 GMT" }, { "version": "v3", "created": "Mon, 24 Aug 2009 22:32:24 GMT" } ]
2009-08-25T00:00:00
[ [ "Ho", "Ngoc-Diep", "" ], [ "Van Dooren", "Paul", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0801.3209
Uwe Aickelin
Uwe Aickelin
A Pyramidal Evolutionary Algorithm with Different Inter-Agent Partnering Strategies for Scheduling Problems
null
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2001), late-breaking papers volume, pp 1-8, San Francisco, USA
null
null
cs.NE cs.CE
null
This paper combines the idea of a hierarchical distributed genetic algorithm with different inter-agent partnering strategies. Cascading clusters of sub-populations are built from bottom up, with higher-level sub-populations optimising larger parts of the problem. Hence higher-level sub-populations search a larger search space with a lower resolution whilst lower-level sub-populations search a smaller search space with a higher resolution. The effects of different partner selection schemes amongst the agents on solution quality are examined for two multiple-choice optimisation problems. It is shown that partnering strategies that exploit problem-specific knowledge are superior and can counter inappropriate (sub-) fitness measurements.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 15:55:22 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:10:36 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0801.3239
Andrij Rovenchak
Solomiya Buk, Andrij Rovenchak
Online-concordance "Perekhresni stezhky" ("The Cross-Paths"), a novel by Ivan Franko
in Ukrainian
Ivan Franko: Spirit, Science, Thought, Will (Proceedings of the International Scientific Congress dedicated to the 150th anniversary (Lviv, 27 September -- 1 October 2006, Lviv University Press, Vol. 2, pp. 203-211, 2010)
null
null
cs.CL cs.DL
null
In the article, theoretical principles and practical realization for the compilation of the concordance to "Perekhresni stezhky" ("The Cross-Paths"), a novel by Ivan Franko, are described. Two forms for the context presentation are proposed. The electronic version of this lexicographic work is available online.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 17:41:57 GMT" } ]
2014-01-17T00:00:00
[ [ "Buk", "Solomiya", "" ], [ "Rovenchak", "Andrij", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0801.3249
Christian Kuehn
Christian Kuehn
Complex Eigenvalues for Binary Subdivision Schemes
7 pages, 2 figures
null
null
null
cs.GR cs.NA
null
Convergence properties of binary stationary subdivision schemes for curves have been analyzed using the techniques of z-transforms and eigenanalysis. Eigenanalysis provides a way to determine derivative continuity at specific points based on the eigenvalues of a finite matrix. None of the well-known subdivision schemes for curves have complex eigenvalues. We prove when a convergent scheme with palindromic mask can have complex eigenvalues and that a lower limit for the size of the mask exists in this case. We find a scheme with complex eigenvalues achieving this lower bound. Furthermore we investigate this scheme numerically and explain from a geometric viewpoint why such a scheme has not yet been used in computer-aided geometric design.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 18:27:09 GMT" } ]
2008-01-22T00:00:00
[ [ "Kuehn", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0801.3272
Steven Peters
Steven W. Peters and Robert W. Heath Jr
Nonregenerative MIMO Relaying with Optimal Transmit Antenna Selection
null
null
10.1109/LSP.2008.921466
null
cs.IT math.IT
null
We derive optimal SNR-based transmit antenna selection rules at the source and relay for the nonregenerative half duplex MIMO relay channel. While antenna selection is a suboptimal form of beamforming, it has the advantage that the optimization is tractable and can be implemented with only a few bits of feedback from the destination to the source and relay. We compare the bit error rate of optimal antenna selection at both the source and relay to other proposed beamforming techniques and propose methods for performing the necessary limited feedback.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 21:03:11 GMT" } ]
2009-11-13T00:00:00
[ [ "Peters", "Steven W.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3289
Lifeng Lai
Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor
Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach
To appear in the Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March 30- April 4, 2008
null
10.1109/ICASSP.2008.4518049
null
cs.IT cs.NI math.IT
null
The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring the availability of channels and exploiting the opportunities identified thus far. Using a sequential design approach, an optimal medium access strategy is derived. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is also developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 22:45:28 GMT" } ]
2016-11-17T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Jiang", "Hai", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3331
Guillaume Hanrot
Guillaume Hanrot (INRIA Lorraine - LORIA), Damien Stehl\'e (INRIA Rh\^one-Alpes)
Worst-Case Hermite-Korkine-Zolotarev Reduced Lattice Bases
null
null
null
null
math.NT cs.CC cs.CR
null
The Hermite-Korkine-Zolotarev reduction plays a central role in strong lattice reduction algorithms. By building upon a technique introduced by Ajtai, we show the existence of Hermite-Korkine-Zolotarev reduced bases that are arguably least reduced. We prove that for such bases, Kannan's algorithm solving the shortest lattice vector problem requires $d^{\frac{d}{2\e}(1+o(1))}$ bit operations in dimension $d$. This matches the best complexity upper bound known for this algorithm. These bases also provide lower bounds on Schnorr's constants $\alpha_d$ and $\beta_d$ that are essentially equal to the best upper bounds. Finally, we also show the existence of particularly bad bases for Schnorr's hierarchy of reductions.
[ { "version": "v1", "created": "Tue, 22 Jan 2008 09:52:35 GMT" }, { "version": "v2", "created": "Thu, 24 Jan 2008 15:13:23 GMT" } ]
2008-01-24T00:00:00
[ [ "Hanrot", "Guillaume", "", "INRIA Lorraine - LORIA" ], [ "Stehlé", "Damien", "", "INRIA\n Rhône-Alpes" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.3408
Laurent Lyaudet
Uffe Flarup (IMADA), Laurent Lyaudet (LIP)
On the expressive power of permanents and perfect matchings of matrices of bounded pathwidth/cliquewidth
21 pages
null
null
null
cs.DM
null
Some 25 years ago Valiant introduced an algebraic model of computation in order to study the complexity of evaluating families of polynomials. The theory was introduced along with the complexity classes VP and VNP which are analogues of the classical classes P and NP. Families of polynomials that are difficult to evaluate (that is, VNP-complete) includes the permanent and hamiltonian polynomials. In a previous paper the authors together with P. Koiran studied the expressive power of permanent and hamiltonian polynomials of matrices of bounded treewidth, as well as the expressive power of perfect matchings of planar graphs. It was established that the permanent and hamiltonian polynomials of matrices of bounded treewidth are equivalent to arithmetic formulas. Also, the sum of weights of perfect matchings of planar graphs was shown to be equivalent to (weakly) skew circuits. In this paper we continue the research in the direction described above, and study the expressive power of permanents, hamiltonians and perfect matchings of matrices that have bounded pathwidth or bounded cliquewidth. In particular, we prove that permanents, hamiltonians and perfect matchings of matrices that have bounded pathwidth express exactly arithmetic formulas. This is an improvement of our previous result for matrices of bounded treewidth. Also, for matrices of bounded weighted cliquewidth we show membership in VP for these polynomials.
[ { "version": "v1", "created": "Tue, 22 Jan 2008 16:35:15 GMT" } ]
2008-01-23T00:00:00
[ [ "Flarup", "Uffe", "", "IMADA" ], [ "Lyaudet", "Laurent", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.3511
Hamid Saeedi
Hamid Saeedi and Amir H. Banihashemi
Deterministic Design of Low-Density Parity-Check Codes for Binary Erasure Channels
Submitted to IEEE Transactions on Communications, Sept. 2007
null
null
null
cs.IT math.IT
null
We propose a deterministic method to design irregular Low-Density Parity-Check (LDPC) codes for binary erasure channels (BEC). Compared to the existing methods, which are based on the application of asymptomatic analysis tools such as density evolution or Extrinsic Information Transfer (EXIT) charts in an optimization process, the proposed method is much simpler and faster. Through a number of examples, we demonstrate that the codes designed by the proposed method perform very closely to the best codes designed by optimization. An important property of the proposed designs is the flexibility to select the number of constituent variable node degrees P. The proposed designs include existing deterministic designs as a special case with P = N-1, where N is the maximum variable node degree. Compared to the existing deterministic designs, for a given rate and a given d > 0, the designed ensembles can have a threshold in d-neighborhood of the capacity upper bound with smaller values of P and N. They can also achieve the capacity of the BEC as N, and correspondingly P and the maximum check node degree tend to infinity.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 06:56:12 GMT" } ]
2008-01-24T00:00:00
[ [ "Saeedi", "Hamid", "" ], [ "Banihashemi", "Amir H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3521
Vasanthan Raghavan
Gautham Hariharan, Vasanthan Raghavan, Akbar M. Sayeed
Capacity of Sparse Wideband Channels with Partial Channel Feedback
32 pages, 4 figures, Accepted for publication in European Transactions on Telecommunication, New Directions in Information Theory
null
null
null
cs.IT math.IT
null
This paper studies the ergodic capacity of wideband multipath channels with limited feedback. Our work builds on recent results that have established the possibility of significant capacity gains in the wideband/low-SNR regime when there is perfect channel state information (CSI) at the transmitter. Furthermore, the perfect CSI benchmark gain can be obtained with the feedback of just one bit per channel coefficient. However, the input signals used in these methods are peaky, that is, they have a large peak-to-average power ratios. Signal peakiness is related to channel coherence and many recent measurement campaigns show that, in contrast to previous assumptions, wideband channels exhibit a sparse multipath structure that naturally leads to coherence in time and frequency. In this work, we first show that even an instantaneous power constraint is sufficient to achieve the benchmark gain when perfect CSI is available at the receiver. In the more realistic non-coherent setting, we study the performance of a training-based signaling scheme. We show that multipath sparsity can be leveraged to achieve the benchmark gain under both average as well as instantaneous power constraints as long as the channel coherence scales at a sufficiently fast rate with signal space dimensions. We also present rules of thumb on choosing signaling parameters as a function of the channel parameters so that the full benefits of sparsity can be realized.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 08:12:47 GMT" } ]
2008-01-24T00:00:00
[ [ "Hariharan", "Gautham", "" ], [ "Raghavan", "Vasanthan", "" ], [ "Sayeed", "Akbar M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3526
Vasanthan Raghavan
Vasanthan Raghavan, Venu Veeravalli, Akbar Sayeed
Quantized Multimode Precoding in Spatially Correlated Multi-Antenna Channels
30 pages, 4 figures, Preprint to be submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2008.2005748
null
cs.IT math.IT
null
Multimode precoding, where the number of independent data-streams is adapted optimally, can be used to maximize the achievable throughput in multi-antenna communication systems. Motivated by standardization efforts embraced by the industry, the focus of this work is on systematic precoder design with realistic assumptions on the spatial correlation, channel state information (CSI) at the transmitter and the receiver, and implementation complexity. For spatial correlation of the channel matrix, we assume a general channel model, based on physical principles, that has been verified by many recent measurement campaigns. We also assume a coherent receiver and knowledge of the spatial statistics at the transmitter along with the presence of an ideal, low-rate feedback link from the receiver to the transmitter. The reverse link is used for codebook-index feedback and the goal of this work is to construct precoder codebooks, adaptable in response to the statistical information, such that the achievable throughput is significantly enhanced over that of a fixed, non-adaptive, i.i.d. codebook design. We illustrate how a codebook of semiunitary precoder matrices localized around some fixed center on the Grassmann manifold can be skewed in response to the spatial correlation via low-complexity maps that can rotate and scale submanifolds on the Grassmann manifold. The skewed codebook in combination with a lowcomplexity statistical power allocation scheme is then shown to bridge the gap in performance between a perfect CSI benchmark and an i.i.d. codebook design.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 08:52:25 GMT" } ]
2015-10-28T00:00:00
[ [ "Raghavan", "Vasanthan", "" ], [ "Veeravalli", "Venu", "" ], [ "Sayeed", "Akbar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3539
Uwe Aickelin
Steve Cayzer and Uwe Aickelin
On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
null
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002), pp 154-160, Canterbury, UK, 2001
null
null
cs.NE cs.AI
null
It has previously been shown that a recommender based on immune system idiotypic principles can out perform one based on correlation alone. This paper reports the results of work in progress, where we undertake some investigations into the nature of this beneficial effect. The initial findings are that the immune system recommender tends to produce different neighbourhoods, and that the superior performance of this recommender is due partly to the different neighbourhoods, and partly to the way that the idiotypic effect is used to weight each neighbours recommendations.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 09:59:06 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:10:05 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:42:42 GMT" } ]
2010-07-05T00:00:00
[ [ "Cayzer", "Steve", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3547
Uwe Aickelin
Steve Cazyer and Uwe Aickelin
A Recommender System based on the Immune Network
null
Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2002), pp 807-813, Honolulu, USA, 2002
null
null
cs.NE cs.AI
null
The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an artificial immune system (AIS) that exploits some of these characteristics and is applied to the task of film recommendation by collaborative filtering (CF). Natural evolution and in particular the immune system have not been designed for classical optimisation. However, for this problem, we are not interested in finding a single optimum. Rather we intend to identify a sub-set of good matches on which recommendations can be based. It is our hypothesis that an AIS built on two central aspects of the biological immune system will be an ideal candidate to achieve this: Antigen - antibody interaction for matching and antibody - antibody interaction for diversity. Computational results are presented in support of this conjecture and compared to those found by other CF techniques.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 10:42:49 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:09:24 GMT" } ]
2010-07-05T00:00:00
[ [ "Cazyer", "Steve", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3549
Uwe Aickelin
Uwe Aickelin and Steve Cayzer
The Danger Theory and Its Application to Artificial Immune Systems
null
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002), pp 141-148, Canterbury, Uk, 2002
null
null
cs.NE cs.AI cs.CR
null
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune System practitioners. An overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world. A number of potential application areas are then used to provide a framing for a critical assessment of the concept, and its relevance for Artificial Immune Systems.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 11:01:31 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:08:46 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:45:49 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Cayzer", "Steve", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.3550
Uwe Aickelin
Uwe Aickelin and Larry Bull
Partnering Strategies for Fitness Evaluation in a Pyramidal Evolutionary Algorithm
null
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), pp 263-270, New York, USA, 2002
null
null
cs.NE cs.AI
null
This paper combines the idea of a hierarchical distributed genetic algorithm with different inter-agent partnering strategies. Cascading clusters of sub-populations are built from bottom up, with higher-level sub-populations optimising larger parts of the problem. Hence higher-level sub-populations search a larger search space with a lower resolution whilst lower-level sub-populations search a smaller search space with a higher resolution. The effects of different partner selection schemes for (sub-)fitness evaluation purposes are examined for two multiple-choice optimisation problems. It is shown that random partnering strategies perform best by providing better sampling and more diversity.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 11:12:39 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:08:00 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Bull", "Larry", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3581
Shay Solomon
Yefim Dinitz, Michael Elkin, Shay Solomon
Shallow, Low, and Light Trees, and Tight Lower Bounds for Euclidean Spanners
41 pages, 11 figures
null
null
null
cs.CG cs.DS
null
We show that for every $n$-point metric space $M$ there exists a spanning tree $T$ with unweighted diameter $O(\log n)$ and weight $\omega(T) = O(\log n) \cdot \omega(MST(M))$. Moreover, there is a designated point $rt$ such that for every point $v$, $dist_T(rt,v) \le (1+\epsilon) \cdot dist_M(rt,v)$, for an arbitrarily small constant $\epsilon > 0$. We extend this result, and provide a tradeoff between unweighted diameter and weight, and prove that this tradeoff is \emph{tight up to constant factors} in the entire range of parameters. These results enable us to settle a long-standing open question in Computational Geometry. In STOC'95 Arya et al. devised a construction of Euclidean Spanners with unweighted diameter $O(\log n)$ and weight $O(\log n) \cdot \omega(MST(M))$. Ten years later in SODA'05 Agarwal et al. showed that this result is tight up to a factor of $O(\log \log n)$. We close this gap and show that the result of Arya et al. is tight up to constant factors.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 13:57:00 GMT" } ]
2011-08-31T00:00:00
[ [ "Dinitz", "Yefim", "" ], [ "Elkin", "Michael", "" ], [ "Solomon", "Shay", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0801.3624
Anil Ada
Arkadev Chattopadhyay and Anil Ada
Multiparty Communication Complexity of Disjointness
15 pages, 2 figures
null
null
null
cs.CC
null
We obtain a lower bound of n^Omega(1) on the k-party randomized communication complexity of the Disjointness function in the `Number on the Forehead' model of multiparty communication when k is a constant. For k=o(loglog n), the bounds remain super-polylogarithmic i.e. (log n)^omega(1). The previous best lower bound for three players until recently was Omega(log n). Our bound separates the communication complexity classes NP^{CC}_k and BPP^{CC}_k for k=o(loglog n). Furthermore, by the results of Beame, Pitassi and Segerlind \cite{BPS07}, our bound implies proof size lower bounds for tree-like, degree k-1 threshold systems and superpolynomial size lower bounds for Lovasz-Schrijver proofs. Sherstov \cite{She07b} recently developed a novel technique to obtain lower bounds on two-party communication using the approximate polynomial degree of boolean functions. We obtain our results by extending his technique to the multi-party setting using ideas from Chattopadhyay \cite{Cha07}. A similar bound for Disjointness has been recently and independently obtained by Lee and Shraibman.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 16:39:31 GMT" }, { "version": "v2", "created": "Sat, 26 Jan 2008 17:39:19 GMT" }, { "version": "v3", "created": "Wed, 20 Feb 2008 23:04:00 GMT" } ]
2008-02-21T00:00:00
[ [ "Chattopadhyay", "Arkadev", "" ], [ "Ada", "Anil", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.3640
Sharon Betz
Sharon Betz and H. Vincent Poor
Energy Efficiency in Multi-Hop CDMA Networks: a Game Theoretic Analysis Considering Operating Costs
To appear in the Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, March 30 -- April 4, 2008
null
10.1109/TSP.2008.929118
null
cs.IT math.IT
null
A game-theoretic analysis is used to study the effects of receiver choice and transmit power on the energy efficiency of multi-hop networks in which the nodes communicate using Direct-Sequence Code Division Multiple Access (DS-CDMA). A Nash equilibrium of the game in which the network nodes can choose their receivers as well as their transmit powers to maximize the total number of bits they transmit per unit of energy spent (including both transmit and operating energy) is derived. The energy efficiencies resulting from the use of different linear multiuser receivers in this context are compared for the non-cooperative game. Significant gains in energy efficiency are observed when multiuser receivers, particularly the linear minimum mean-square error (MMSE) receiver, are used instead of conventional matched filter receivers.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 18:24:31 GMT" } ]
2009-11-13T00:00:00
[ [ "Betz", "Sharon", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3642
Jessica Metcalf-Burton
Jessica Ruth Metcalf-Burton
Information Rates of Minimal Non-Matroid-Related Access Structures
8 pages
null
null
null
cs.CR math.CO
null
In a secret sharing scheme, shares of a secret are distributed to participants in such a way that only certain predetermined sets of participants are qualified to reconstruct the secret. An access structure on a set of participants specifies which sets are to be qualified. The information rate of an access structure is a bound on how efficient a secret sharing scheme for that access structure can be. Marti-Farre and Padro showed that all access structures with information rate greater than two-thirds are matroid-related, and Stinson showed that four of the minor-minimal, non-matroid-related access structures have information rate exactly two-thirds. By a result of Seymour, there are infinitely many remaining minor-minimal, non-matroid-related access structures. In this paper we find the exact information rates for all such structures.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 18:36:39 GMT" } ]
2008-01-30T00:00:00
[ [ "Metcalf-Burton", "Jessica Ruth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0801.3654
Mikhail Zaslavskiy
Mikhail Zaslavskiy, Francis Bach, and Jean-Philippe Vert
A path following algorithm for the graph matching problem
23 pages, 13 figures,typo correction, new results in sections 4,5,6
null
null
null
cs.CV cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a convex-concave programming approach for the labeled weighted graph matching problem. The convex-concave programming formulation is obtained by rewriting the weighted graph matching problem as a least-square problem on the set of permutation matrices and relaxing it to two different optimization problems: a quadratic convex and a quadratic concave optimization problem on the set of doubly stochastic matrices. The concave relaxation has the same global minimum as the initial graph matching problem, but the search for its global minimum is also a hard combinatorial problem. We therefore construct an approximation of the concave problem solution by following a solution path of a convex-concave problem obtained by linear interpolation of the convex and concave formulations, starting from the convex relaxation. This method allows to easily integrate the information on graph label similarities into the optimization problem, and therefore to perform labeled weighted graph matching. The algorithm is compared with some of the best performing graph matching methods on four datasets: simulated graphs, QAPLib, retina vessel images and handwritten chinese characters. In all cases, the results are competitive with the state-of-the-art.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 20:20:32 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2008 14:16:01 GMT" } ]
2008-10-27T00:00:00
[ [ "Zaslavskiy", "Mikhail", "" ], [ "Bach", "Francis", "" ], [ "Vert", "Jean-Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.3669
Mohammad Mahmoody
Boaz Barak, Mohammad Mahmoody
Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles
This version fixes a bug in the proof of the previous version of this paper, see "Correction of Error" paragraph and Appendix A
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that every key agreement protocol in the random oracle model in which the honest users make at most $n$ queries to the oracle can be broken by an adversary who makes $O(n^2)$ queries to the oracle. This improves on the previous $\widetilde{\Omega}(n^6)$ query attack given by Impagliazzo and Rudich (STOC '89) and resolves an open question posed by them. Our bound is optimal up to a constant factor since Merkle proposed a key agreement protocol in 1974 that can be easily implemented with $n$ queries to a random oracle and cannot be broken by any adversary who asks $o(n^2)$ queries.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 21:01:37 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2008 01:41:04 GMT" }, { "version": "v3", "created": "Thu, 10 Jul 2008 14:14:45 GMT" }, { "version": "v4", "created": "Sun, 31 Mar 2019 00:51:20 GMT" } ]
2019-04-02T00:00:00
[ [ "Barak", "Boaz", "" ], [ "Mahmoody", "Mohammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.3678
Grenville Croll
Ralph Baxter
Regulation and the Integrity of Spreadsheets in the Information Supply Chain
7 Pages including references and diagrams in colour
Proc. European Spreadsheet Risks Int. Grp. 2005 95-101 ISBN:1-902724-16-X
null
null
cs.CY cs.CR
null
Spreadsheets provide many of the key links between information systems, closing the gap between business needs and the capability of central systems. Recent regulations have brought these vulnerable parts of information supply chains into focus. The risk they present to the organisation depends on the role that they fulfil, with generic differences between their use as modeling tools and as operational applications. Four sections of the Sarbanes-Oxley Act (SOX) are particularly relevant to the use of spreadsheets. Compliance with each of these sections is dependent on maintaining the integrity of those spreadsheets acting as operational applications. This can be achieved manually but at high cost. There are a range of commercially available off-the-shelf solutions that can reduce this cost. These may be divided into those that assist in the debugging of logic and more recently the arrival of solutions that monitor the change and user activity taking place in business-critical spreadsheets. ClusterSeven provides one of these monitoring solutions, highlighting areas of operational risk whilst also establishing a database of information to deliver new business intelligence.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 21:45:43 GMT" } ]
2008-03-10T00:00:00
[ [ "Baxter", "Ralph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.3680
Mohammad Mahmoody
Boaz Barak, Mohammad Mahmoody
Lower Bounds on Signatures from Symmetric Primitives
null
null
null
null
cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most $2^{(1+o(1))q}$, where $q$ is the total number of oracle queries asked by the key generation, signing, and verification algorithms. That is, any such scheme can be broken with probability close to $1$ by a (computationally unbounded) adversary making $2^{(1+o(1))q}$ queries to the oracle. This is tight up to a constant factor in the number of queries, since a simple modification of Lamport's one-time signatures (Lamport '79) achieves $2^{(0.812-o(1))q}$ black-box security using $q$ queries to the oracle. Our result extends (with a loss of a constant factor in the number of queries) also to the random permutation and ideal-cipher oracles. Since the symmetric primitives (e.g. block ciphers, hash functions, and message authentication codes) can be constructed by a constant number of queries to the mentioned oracles, as corollary we get lower bounds on the efficiency of signature schemes from symmetric primitives when the construction is black-box. This can be taken as evidence of an inherent efficiency gap between signature schemes and symmetric primitives.
[ { "version": "v1", "created": "Wed, 23 Jan 2008 22:16:00 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2008 02:13:43 GMT" }, { "version": "v3", "created": "Sun, 31 Mar 2019 00:40:57 GMT" } ]
2019-04-02T00:00:00
[ [ "Barak", "Boaz", "" ], [ "Mahmoody", "Mohammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.3690
Grenville Croll
Jocelyn Paine
Ensuring Spreadsheet Integrity with Model Master
15 pages; substantive references; code examples
Proc. European Spreadsheet Risks Int. Grp. 2001 17-38 ISBN:1 86166 179 7
null
null
cs.PL cs.HC
null
We have developed the Model Master (MM) language for describing spreadsheets, and tools for converting MM programs to and from spreadsheets. The MM decompiler translates a spreadsheet into an MM program which gives a concise summary of its calculations, layout, and styling. This is valuable when trying to understand spreadsheets one has not seen before, and when checking for errors. The MM compiler goes the other way, translating an MM program into a spreadsheet. This makes possible a new style of development, in which spreadsheets are generated from textual specifications. This can reduce error rates compared to working directly with the raw spreadsheet, and gives important facilities for code reuse. MM programs also offer advantages over Excel files for the interchange of spreadsheets.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 00:32:29 GMT" } ]
2008-03-10T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0801.3697
George Bell
George I. Bell
The mathematics of Septoku
11 pages, 9 figures; added two recent references
null
null
null
math.CO cs.DM math.GM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Septoku is a Sudoku variant invented by Bruce Oberg, played on a hexagonal grid of 37 cells. We show that up to rotations, reflections, and symbol permutations, there are only six valid Septoku boards. In order to have a unique solution, we show that the minimum number of given values is six. We generalize the puzzle to other board shapes, and devise a puzzle on a star-shaped board with 73 cells with six givens which has a unique solution. We show how this puzzle relates to the unsolved Hadwiger-Nelson problem in combinatorial geometry.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 16:04:22 GMT" }, { "version": "v2", "created": "Sun, 10 Feb 2008 21:23:31 GMT" }, { "version": "v3", "created": "Thu, 2 Jun 2011 03:56:56 GMT" }, { "version": "v4", "created": "Mon, 16 Dec 2013 04:54:01 GMT" }, { "version": "v5", "created": "Thu, 12 Mar 2020 22:48:56 GMT" } ]
2020-03-16T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
0801.3702
Sharon Betz
Tim Holliday, Andrea J. Goldsmith, and H. Vincent Poor
Joint source and channel coding for MIMO systems: Is it better to be robust or quick?
To appear in the IEEE Transactions on Information Theory, Vol. 54, No. 4, April 2008
IEEE Transactions on Information Theory, Vol. 54, No. 4, April 2008
10.1109/TIT.2008.917725
null
cs.IT math.IT
null
We develop a framework to optimize the tradeoff between diversity, multiplexing, and delay in MIMO systems to minimize end-to-end distortion. We first focus on the diversity-multiplexing tradeoff in MIMO systems, and develop analytical results to minimize distortion of a vector quantizer concatenated with a space-time MIMO channel code. In the high SNR regime we obtain a closed-form expression for the end-to-end distortion as a function of the optimal point on the diversity-multiplexing tradeoff curve. For large but finite SNR we find this optimal point via convex optimization. We then consider MIMO systems using ARQ retransmission to provide additional diversity at the expense of delay. For sources without a delay constraint, distortion is minimized by maximizing the ARQ window size. This results in an ARQ-enhanced multiplexing-diversity tradeoff region, with distortion minimized over this region in the same manner as without ARQ. Under a source delay constraint the problem formulation changes to account for delay distortion associated with random message arrival and random ARQ completion times. We use a dynamic programming formulation to capture the channel diversity-multiplexing tradeoff at finite SNR as well as the random arrival and retransmission dynamics; we solve for the optimal multiplexing-diversity-delay tradeoff to minimize end-to-end distortion associated with the source encoder, channel, and ARQ retransmissions. Our results show that a delay-sensitive system should adapt its operating point on the diversity-multiplexing-delay tradeoff region to the system dynamics. We provide numerical results that demonstrate significant performance gains of this adaptive policy over a static allocation of diversity/multiplexing in the channel code and a static ARQ window size.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 04:13:48 GMT" } ]
2008-04-09T00:00:00
[ [ "Holliday", "Tim", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3703
Margreta Kuijper
Margreta Kuijper and Raquel Pinto
On minimality of convolutional ring encoders
13 pages in v1, submitted; 8 pages in revision v2
IEEE Trans. Information Theory, Vol. 55, No. 11, pp. 4890-4897, November 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional codes are considered with code sequences modelled as semi-infinite Laurent series. It is wellknown that a convolutional code C over a finite group G has a minimal trellis representation that can be derived from code sequences. It is also wellknown that, for the case that G is a finite field, any polynomial encoder of C can be algebraically manipulated to yield a minimal polynomial encoder whose controller canonical realization is a minimal trellis. In this paper we seek to extend this result to the finite ring case G = Z_{p^r} by introducing a socalled "p-encoder". We show how to manipulate a polynomial encoding of a noncatastrophic convolutional code over Z_{p^r} to produce a particular type of p-encoder ("minimal p-encoder") whose controller canonical realization is a minimal trellis with nonlinear features. The minimum number of trellis states is then expressed as p^gamma, where gamma is the sum of the row degrees of the minimal p-encoder. In particular, we show that any convolutional code over Z_{p^r} admits a delay-free p-encoder which implies the novel result that delay-freeness is not a property of the code but of the encoder, just as in the field case. We conjecture that a similar result holds with respect to catastrophicity, i.e., any catastrophic convolutional code over Z_{p^r} admits a noncatastrophic p-encoder.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 05:07:49 GMT" }, { "version": "v2", "created": "Tue, 14 Apr 2009 05:36:02 GMT" } ]
2010-05-28T00:00:00
[ [ "Kuijper", "Margreta", "" ], [ "Pinto", "Raquel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3710
Amitabh Trehan
Jared Saia, Amitabh Trehan
Picking up the Pieces: Self-Healing in Reconfigurable Networks
To be presented at IPDPS (IEEE International Parallel & Distributed Processing Symposium) 2008
null
10.1109/IPDPS.2008.4536326
null
cs.DS cs.DC cs.NI
null
We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected even if an adversary deletes up to all nodes in the network; and 2) no node ever increases its degree by more than 2 log n, where n is the number of nodes initially in the network. DASH is fully distributed; adds new edges only among neighbors of deleted nodes; and has average latency and bandwidth costs that are at most logarithmic in n. DASH has these properties irrespective of the topology of the initial network, and is thus orthogonal and complementary to traditional topology-based approaches to defending against attack. We also prove lower-bounds showing that DASH is asymptotically optimal in terms of minimizing maximum degree increase over multiple attacks. Finally, we present empirical results on power-law graphs that show that DASH performs well in practice, and that it significantly outperforms naive algorithms in reducing maximum degree increase. We also present empirical results on performance of our algorithms and a new heuristic with regard to stretch (increase in shortest path lengths).
[ { "version": "v1", "created": "Thu, 24 Jan 2008 07:46:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Saia", "Jared", "" ], [ "Trehan", "Amitabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0801.3711
Jocelyne Troccaz
Michael Baumann (TIMC), Vincent Daanen (TIMC), Antoine Leroy (TIMC), Jocelyne Troccaz (TIMC)
3D-Ultrasound probe calibration for computer-guided diagnosis and therapy
null
Dans Proceedings of CVAMIA'06 - 2nd International workshop on Computer Vision Approaches to Medical Image Analysis - CVAMIA'06, Graz : Autriche (2006)
null
null
cs.OH
null
With the emergence of swept-volume ultrasound (US) probes, precise and almost real-time US volume imaging has become available. This offers many new opportunities for computer guided diagnosis and therapy, 3-D images containing significantly more information than 2-D slices. However, computer guidance often requires knowledge about the exact position of US voxels relative to a tracking reference, which can only be achieved through probe calibration. In this paper we present a 3-D US probe calibration system based on a membrane phantom. The calibration matrix is retrieved by detection of a membrane plane in a dozen of US acquisitions of the phantom. Plane detection is robustly performed with the 2-D Hough transformation. The feature extraction process is fully automated, calibration requires about 20 minutes and the calibration system can be used in a clinical context. The precision of the system was evaluated to a root mean square (RMS) distance error of 1.15mm and to an RMS angular error of 0.61 degrees. The point reconstruction accuracy was evaluated to 0.9mm and the angular reconstruction accuracy to 1.79 degrees.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 07:48:56 GMT" } ]
2008-01-25T00:00:00
[ [ "Baumann", "Michael", "", "TIMC" ], [ "Daanen", "Vincent", "", "TIMC" ], [ "Leroy", "Antoine", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0801.3714
Vahan Mkrtchyan
Matt DeVos, Vahan V. Mkrtchyan, Samvel S. Petrosyan
5-cycles and the Petersen graph
6 pages
null
null
null
cs.DM
null
We show that if G is a connected bridgeless cubic graph whose every 2-factor is comprised of cycles of length five then G is the Petersen graph.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 07:55:32 GMT" } ]
2008-01-25T00:00:00
[ [ "DeVos", "Matt", "" ], [ "Mkrtchyan", "Vahan V.", "" ], [ "Petrosyan", "Samvel S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.3715
Annie Ressouche
Annie Ressouche, Daniel Gaff\'e (LEAT), Val\'erie Roy
Modular Compilation of a Synchronous Language
null
null
null
null
cs.PL cs.LO
null
Synchronous languages rely on formal methods to ease the development of applications in an efficient and reusable way. Formal methods have been advocated as a means of increasing the reliability of systems, especially those which are safety or business critical. It is still difficult to develop automatic specification and verification tools due to limitations like state explosion, undecidability, etc... In this work, we design a new specification model based on a reactive synchronous approach. Then, we benefit from a formal framework well suited to perform compilation and formal validation of systems. In practice, we design and implement a special purpose language (LE) and its two semantics: the ehavioral semantics helps us to define a program by the set of its behaviors and avoid ambiguousness in programs' interpretation; the execution equational semantics allows the modular compilation of programs into software and hardware targets (c code, vhdl code, fpga synthesis, observers). Our approach is pertinent considering the two main requirements of critical realistic applications: the modular compilation allows us to deal with large systems, the model-based approach provides us with formal validation.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 15:24:46 GMT" } ]
2009-04-20T00:00:00
[ [ "Ressouche", "Annie", "", "LEAT" ], [ "Gaffé", "Daniel", "", "LEAT" ], [ "Roy", "Valérie", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.3773
Lars Eirik Danielsen
Lars Eirik Danielsen
Graph-Based Classification of Self-Dual Additive Codes over Finite Fields
20 pages, 13 figures
Adv. Math. Commun. 3(4), pp. 329-348, 2009
10.3934/amc.2009.3.329
null
cs.IT math.CO math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum stabilizer states over GF(m) can be represented as self-dual additive codes over GF(m^2). These codes can be represented as weighted graphs, and orbits of graphs under the generalized local complementation operation correspond to equivalence classes of codes. We have previously used this fact to classify self-dual additive codes over GF(4). In this paper we classify self-dual additive codes over GF(9), GF(16), and GF(25). Assuming that the classical MDS conjecture holds, we are able to classify all self-dual additive MDS codes over GF(9) by using an extension technique. We prove that the minimum distance of a self-dual additive code is related to the minimum vertex degree in the associated graph orbit. Circulant graph codes are introduced, and a computer search reveals that this set contains many strong codes. We show that some of these codes have highly regular graph representations.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 14:43:42 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2008 11:06:38 GMT" }, { "version": "v3", "created": "Sat, 3 Oct 2009 12:24:07 GMT" } ]
2009-11-11T00:00:00
[ [ "Danielsen", "Lars Eirik", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0801.3790
Khaled Elbassioni
Endre Boros, Khaled Elbassioni, Vladimir Gurvich, Hans Raj Tiwary
Characterization of the Vertices and Extreme Directions of the Negative Cycles Polyhedron and Hardness of Generating Vertices of 0/1-Polyhedra
Title typo fixed
null
null
null
cs.CC cs.DM
null
Given a graph $G=(V,E)$ and a weight function on the edges $w:E\mapsto\RR$, we consider the polyhedron $P(G,w)$ of negative-weight flows on $G$, and get a complete characterization of the vertices and extreme directions of $P(G,w)$. As a corollary, we show that, unless $P=NP$, there is no output polynomial-time algorithm to generate all the vertices of a 0/1-polyhedron. This strengthens the NP-hardness result of Khachiyan et al. (2006) for non 0/1-polyhedra, and comes in contrast with the polynomiality of vertex enumeration for 0/1-polytopes \cite{BL98} [Bussieck and L\"ubbecke (1998)].
[ { "version": "v1", "created": "Thu, 24 Jan 2008 16:16:45 GMT" }, { "version": "v2", "created": "Mon, 28 Apr 2008 17:26:09 GMT" } ]
2008-04-28T00:00:00
[ [ "Boros", "Endre", "" ], [ "Elbassioni", "Khaled", "" ], [ "Gurvich", "Vladimir", "" ], [ "Tiwary", "Hans Raj", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.3802
Sven Kosub
Sven Kosub
Dichotomy Results for Fixed-Point Existence Problems for Boolean Dynamical Systems
17 pages; this version corrects an error/typo in the 2008/01/24 version
Mathematics in Computer Science, 1(3):487-505, 2008, special issue on Modeling and Analysis of Complex Systems
null
TUM-I0701, Institut fuer Informatik, Technische Universitaet Muenchen
cs.CC cond-mat.dis-nn cs.DM nlin.AO nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete classification of the computational complexity of the fixed-point existence problem for boolean dynamical systems, i.e., finite discrete dynamical systems over the domain {0, 1}, is presented. For function classes F and graph classes G, an (F, G)-system is a boolean dynamical system such that all local transition functions lie in F and the underlying graph lies in G. Let F be a class of boolean functions which is closed under composition and let G be a class of graphs which is closed under taking minors. The following dichotomy theorems are shown: (1) If F contains the self-dual functions and G contains the planar graphs then the fixed-point existence problem for (F, G)-systems with local transition function given by truth-tables is NP-complete; otherwise, it is decidable in polynomial time. (2) If F contains the self-dual functions and G contains the graphs having vertex covers of size one then the fixed-point existence problem for (F, G)-systems with local transition function given by formulas or circuits is NP-complete; otherwise, it is decidable in polynomial time.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 17:10:12 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2008 16:53:14 GMT" } ]
2008-12-01T00:00:00
[ [ "Kosub", "Sven", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
0801.3817
Tuomo Kakkonen
Tuomo Kakkonen
Robustness Evaluation of Two CCG, a PCFG and a Link Grammar Parsers
null
Proceedings of the 3rd Language & Technology Conference: Human Language Technologies as a Challenge for Computer Science and Linguistics. Poznan, Poland, 2007
null
null
cs.CL
null
Robustness in a parser refers to an ability to deal with exceptional phenomena. A parser is robust if it deals with phenomena outside its normal range of inputs. This paper reports on a series of robustness evaluations of state-of-the-art parsers in which we concentrated on one aspect of robustness: its ability to parse sentences containing misspelled words. We propose two measures for robustness evaluation based on a comparison of a parser's output for grammatical input sentences and their noisy counterparts. In this paper, we use these measures to compare the overall robustness of the four evaluated parsers, and we present an analysis of the decline in parser performance with increasing error levels. Our results indicate that performance typically declines tens of percentage units when parsers are presented with texts containing misspellings. When it was tested on our purpose-built test set of 443 sentences, the best parser in the experiment (C&C parser) was able to return exactly the same parse tree for the grammatical and ungrammatical sentences for 60.8%, 34.0% and 14.9% of the sentences with one, two or three misspelled words respectively.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 18:41:01 GMT" } ]
2008-01-25T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0801.3837
Pierre Moulin
Pierre Moulin
Universal Fingerprinting: Capacity and Random-Coding Exponents
69 pages, revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies fingerprinting (traitor tracing) games in which the number of colluders and the collusion channel are unknown. The fingerprints are embedded into host sequences representing signals to be protected and provide the receiver with the capability to trace back pirated copies to the colluders. The colluders and the fingerprint embedder are subject to signal fidelity constraints. Our problem setup unifies the signal-distortion and Boneh-Shaw formulations of fingerprinting. The fundamental tradeoffs between fingerprint codelength, number of users, number of colluders, fidelity constraints, and decoding reliability are then determined. Several bounds on fingerprinting capacity have been presented in recent literature. This paper derives exact capacity formulas and presents a new randomized fingerprinting scheme with the following properties: (1) the encoder and receiver assume a nominal coalition size but do not need to know the actual coalition size and the collusion channel; (2) a tunable parameter $\Delta$ trades off false-positive and false-negative error exponents; (3) the receiver provides a reliability metric for its decision; and (4) the scheme is capacity-achieving when the false-positive exponent $\Delta$ tends to zero and the nominal coalition size coincides with the actual coalition size. A fundamental component of the new scheme is the use of a "time-sharing" randomized sequence. The decoder is a maximum penalized mutual information decoder, where the significance of each candidate coalition is assessed relative to a threshold, and the penalty is proportional to the coalition size. A much simpler {\em threshold decoder} that satisfies properties (1)---(3) above but not (4) is also given.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 20:37:54 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2008 17:41:37 GMT" }, { "version": "v3", "created": "Tue, 24 May 2011 22:00:36 GMT" } ]
2011-05-26T00:00:00
[ [ "Moulin", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3841
Sumanth Gangasani
Sumanth Kumar Reddy Gangasani
Analysis of Prime Reciprocal Sequences in Base 10
12 pages, 1 figure
null
null
null
cs.CR
null
Prime reciprocals have applications in coding and cryptography and for generation of random sequences. This paper investigates the structural redundancy of prime reciprocals in base 10 in a manner that parallels an earlier study for binary prime reciprocals. Several different kinds of structural relationships amongst the digits in reciprocal sequences are classified with respect to the digit in the least significant place of the prime. It is also shown that the frequency of digit 0 exceeds that of every other digit when the entire set of prime reciprocal sequences is considered.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 20:51:28 GMT" } ]
2008-01-25T00:00:00
[ [ "Gangasani", "Sumanth Kumar Reddy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.3853
Grenville Croll
Simon Murphy
Comparison of Spreadsheets with other Development Tools (limitations, solutions, workarounds and alternatives)
9 pages including references, colour diagrams and comparison tables
Proc. European Spreadsheet Risks Int. Grp. 2005 201208 ISBN:1-902724-16-X
null
null
cs.SE cs.CY
null
The spreadsheet paradigm has some unique risks and challenges that are not present in more traditional development technologies. Many of the recent advances in other branches of software development have bypassed spreadsheets and spreadsheet developers. This paper compares spreadsheets and spreadsheet development to more traditional platforms such as databases and procedural languages. It also considers the fundamental danger introduced in the transition from paper spreadsheets to electronic. Suggestions are made to manage the risks and work around the limitations.
[ { "version": "v1", "created": "Thu, 24 Jan 2008 21:40:17 GMT" } ]
2008-03-10T00:00:00
[ [ "Murphy", "Simon", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.3864
Alberto Pepe Mr
Alberto Pepe and Johan Bollen
Between conjecture and memento: shaping a collective emotional perception of the future
6 pages. AAAI Spring Symposium on Emotion, Personality, and Social Behavior
null
null
null
cs.CL cs.GL
null
Large scale surveys of public mood are costly and often impractical to perform. However, the web is awash with material indicative of public mood such as blogs, emails, and web queries. Inexpensive content analysis on such extensive corpora can be used to assess public mood fluctuations. The work presented here is concerned with the analysis of the public mood towards the future. Using an extension of the Profile of Mood States questionnaire, we have extracted mood indicators from 10,741 emails submitted in 2006 to futureme.org, a web service that allows its users to send themselves emails to be delivered at a later date. Our results indicate long-term optimism toward the future, but medium-term apprehension and confusion.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 01:09:47 GMT" } ]
2008-01-28T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Bollen", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0801.3871
Ke Xu
Chunyan Zhao, Ke Xu, Zhiming Zheng
On the Scaling Window of Model RB
null
null
null
null
cs.CC cond-mat.stat-mech cs.AI
null
This paper analyzes the scaling window of a random CSP model (i.e. model RB) for which we can identify the threshold points exactly, denoted by $r_{cr}$ or $p_{cr}$. For this model, we establish the scaling window $W(n,\delta)=(r_{-}(n,\delta), r_{+}(n,\delta))$ such that the probability of a random instance being satisfiable is greater than $1-\delta$ for $r<r_{-}(n,\delta)$ and is less than $\delta$ for $r>r_{+}(n,\delta)$. Specifically, we obtain the following result $$W(n,\delta)=(r_{cr}-\Theta(\frac{1}{n^{1-\epsilon}\ln n}), \ r_{cr}+\Theta(\frac{1}{n\ln n})),$$ where $0\leq\epsilon<1$ is a constant. A similar result with respect to the other parameter $p$ is also obtained. Since the instances generated by model RB have been shown to be hard at the threshold, this is the first attempt, as far as we know, to analyze the scaling window of such a model with hard instances.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 02:18:00 GMT" } ]
2008-01-28T00:00:00
[ [ "Zhao", "Chunyan", "" ], [ "Xu", "Ke", "" ], [ "Zheng", "Zhiming", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.3875
Jan Mandel
Jan Mandel, Jonathan D. Beezley, Soham Chakraborty, Janice L. Coen, Craig C. Douglas, Anthony Vodacek, Zhen Wang
Towards a Real-Time Data Driven Wildland Fire Model
5 pages, 4 figures
IEEE International Symposium on Parallel and Distributed Processing, 2008 (IPDPS 2008), pp. 1-5
10.1109/IPDPS.2008.4536414
UCD CCM Report 265
physics.ao-ph cs.CE
null
A wildland fire model based on semi-empirical relations for the spread rate of a surface fire and post-frontal heat release is coupled with the Weather Research and Forecasting atmospheric model (WRF). The propagation of the fire front is implemented by a level set method. Data is assimilated by a morphing ensemble Kalman filter, which provides amplitude as well as position corrections. Thermal images of a fire will provide the observations and will be compared to a synthetic image from the model state.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 04:41:01 GMT" }, { "version": "v2", "created": "Sun, 27 Jan 2008 00:40:22 GMT" } ]
2015-08-03T00:00:00
[ [ "Mandel", "Jan", "" ], [ "Beezley", "Jonathan D.", "" ], [ "Chakraborty", "Soham", "" ], [ "Coen", "Janice L.", "" ], [ "Douglas", "Craig C.", "" ], [ "Vodacek", "Anthony", "" ], [ "Wang", "Zhen", "" ] ]
[ { "class": "Physics", "code": "physics.ao-ph", "description": "Atmospheric and oceanic physics and physical chemistry, biogeophysics, and climate science", "span": "(Atmospheric and Oceanic Physics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0801.3878
Jun Muramatsu
Jun Muramatsu and Shigeki Miyake
Hash Property and Coding Theorems for Sparse Matrices and Maximum-Likelihood Coding
This manuscript has been submitted to IEEE Transactions on Information Theory and a part of this manuscript has been submitted to IEEE International Symposium on Information Theory (ISIT2008,ISIT2009). 55 pages v2: major changes
IEEE Transactions on Information Theory, vol 56, no. 5, pp.2143-2167, May 2010; Corrections: IEEE Transactions on Information Theory, vol. 56, no.9, p. 4762, Sep. 2010. Corrections: vol.56, no.9, p.4762, 2010
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to prove the achievability of several coding problems by using sparse matrices (the maximum column weight grows logarithmically in the block length) and maximal-likelihood (ML) coding. These problems are the Slepian-Wolf problem, the Gel'fand-Pinsker problem, the Wyner-Ziv problem, and the One-helps-one problem (source coding with partial side information at the decoder). To this end, the notion of a hash property for an ensemble of functions is introduced and it is proved that an ensemble of $q$-ary sparse matrices satisfies the hash property. Based on this property, it is proved that the rate of codes using sparse matrices and maximal-likelihood (ML) coding can achieve the optimal rate.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 05:13:11 GMT" }, { "version": "v2", "created": "Thu, 19 Mar 2009 07:37:34 GMT" } ]
2013-01-28T00:00:00
[ [ "Muramatsu", "Jun", "" ], [ "Miyake", "Shigeki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3880
Yi Sun
Yi Sun
Spectral efficiency and optimal medium access control of random access systems over large random spreading CDMA
To appear in IEEE Trans. on Communications
null
10.1109/TCOMM.2009.05.07044
null
cs.IT math.IT
null
This paper analyzes the spectral efficiency as a function of medium access control (MAC) for large random spreading CDMA random access systems that employ a linear receiver. It is shown that located at higher than the physical layer, MAC along with spreading and power allocation can effectively perform spectral efficiency maximization and near-far mitigation.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 05:46:57 GMT" } ]
2016-11-15T00:00:00
[ [ "Sun", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3908
Jakob Vo{\ss}
Jakob Voss
Encoding changing country codes for the Semantic Web with ISO 3166 and SKOS
Accepted to appear in the proceedings of the 2nd International Con- ference on Metadata and Semantics Research (MTSR 2007)
null
null
null
cs.IR
null
This paper shows how authority files can be encoded for the Semantic Web with the Simple Knowledge Organisation System (SKOS). In particular the application of SKOS for encoding the structure, management, and utilization of country codes as defined in ISO 3166 is demonstrated. The proposed encoding gives a use case for SKOS that includes features that have only been discussed little so far, such as multiple notations, nested concept schemes, changes by versioning.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 10:40:27 GMT" } ]
2008-01-28T00:00:00
[ [ "Voss", "Jakob", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0801.3912
Olivier Finkel
Olivier Carton (LIAFA), Olivier Finkel (LIP), Pierre Simonnet (SPE)
On the Continuity Set of an omega Rational Function
Dedicated to Serge Grigorieff on the occasion of his 60th Birthday
Theoretical Informatics and Applications (1), 42 (2008) 183-196
null
null
cs.CC cs.LO
null
In this paper, we study the continuity of rational functions realized by B\"uchi finite state transducers. It has been shown by Prieur that it can be decided whether such a function is continuous. We prove here that surprisingly, it cannot be decided whether such a function F has at least one point of continuity and that its continuity set C(F) cannot be computed. In the case of a synchronous rational function, we show that its continuity set is rational and that it can be computed. Furthermore we prove that any rational Pi^0_2-subset of X^omega for some alphabet X is the continuity set C(F) of an omega-rational synchronous function F defined on X^omega.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 10:54:05 GMT" } ]
2008-01-28T00:00:00
[ [ "Carton", "Olivier", "", "LIAFA" ], [ "Finkel", "Olivier", "", "LIP" ], [ "Simonnet", "Pierre", "", "SPE" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0801.3924
Jaap-Henk Hoepman
Jaap-Henk Hoepman, Bart Jacobs
Increased security through open source
null
Communications of the ACM, 50(1):79-83, 2007
null
null
cs.CR cs.CY cs.SE
null
In this paper we discuss the impact of open source on both the security and transparency of a software system. We focus on the more technical aspects of this issue, combining and extending arguments developed over the years. We stress that our discussion of the problem only applies to software for general purpose computing systems. For embedded systems, where the software usually cannot easily be patched or upgraded, different considerations may apply.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 12:06:48 GMT" } ]
2021-08-23T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ], [ "Jacobs", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0801.3926
Cen Jung Tjhai
C. Tjhai, M. Tomlinson, M. Ambroze and M. Ahmed
On the Weight Distribution of the Extended Quadratic Residue Code of Prime 137
Post-print of 7th International ITG Conference on Source and Channel Coding, Ulm, 14--16 January 2008
null
null
null
cs.IT cs.DM math.IT
null
The Hamming weight enumerator function of the formally self-dual even, binary extended quadratic residue code of prime p = 8m + 1 is given by Gleason's theorem for singly-even code. Using this theorem, the Hamming weight distribution of the extended quadratic residue is completely determined once the number of codewords of Hamming weight j A_j, for 0 <= j <= 2m, are known. The smallest prime for which the Hamming weight distribution of the corresponding extended quadratic residue code is unknown is 137. It is shown in this paper that, for p=137 A_2m = A_34 may be obtained with out the need of exhaustive codeword enumeration. After the remainder of A_j required by Gleason's theorem are computed and independently verified using their congruences, the Hamming weight distributions of the binary augmented and extended quadratic residue codes of prime 137 are derived.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 12:14:22 GMT" } ]
2008-01-28T00:00:00
[ [ "Tjhai", "C.", "" ], [ "Tomlinson", "M.", "" ], [ "Ambroze", "M.", "" ], [ "Ahmed", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3930
Jaap-Henk Hoepman
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
Crossing Borders: Security and Privacy Issues of the European e-Passport
null
1st Int. Workshop on Security, LNCS 4266, pages 152-167, Kyoto, Japan, October 23-24 2006
null
null
cs.CR cs.CY
null
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of e-passports. In particular we discuss attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, we sketch the European proposals for Extended Access Control and the weaknesses in that scheme, and show how fundamentally different design decisions can make e-passports more secure.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 12:17:52 GMT" } ]
2008-01-28T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ], [ "Hubbers", "Engelbert", "" ], [ "Jacobs", "Bart", "" ], [ "Oostdijk", "Martijn", "" ], [ "Schreur", "Ronny Wichers", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.3965
Jocelyne Troccaz
Pierre Mozer (TIMC), Michael Baumann (TIMC), G. Chevreau (TIMC), Vincent Daanen (TIMC), Alexandre Moreau-Gaudry (TIMC, CHU-Grenoble CIC), Jocelyne Troccaz (TIMC)
Framework for 3D TransRectal Ultrasound
null
Johns Hopkins University "Prostate Day", Baltimore : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.OH
null
Prostate biopsies are mainly performed under 2D TransRectal UltraSound (TRUS) control by sampling the prostate according to a predefined pattern. In case of first biopsies, this pattern follows a random systematic plan. Sometimes, repeat biopsies can be needed to target regions unsampled by previous biopsies or resample critical regions (for example in case of cancer expectant management or previous prostatic intraepithelial neoplasia findings). From a clinical point of view, it could be useful to control the 3D spatial distribution of theses biopsies inside the prostate. Modern 3D-TRUS probes allow acquiring high-quality volumes of the prostate in few seconds. We developed a framework to track the prostate in 3D TRUS images. It means that if one acquires a reference volume at the beginning of the session and another during each biopsy, it is possible to determine the relationship between the prostate in the reference and the others volumes by aligning images. We used this tool to evaluate the ability of a single operator (a young urologist assistant professor) to perform a pattern of 12 biopsies under 2D TRUS guidance.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 15:40:54 GMT" } ]
2008-01-28T00:00:00
[ [ "Mozer", "Pierre", "", "TIMC" ], [ "Baumann", "Michael", "", "TIMC" ], [ "Chevreau", "G.", "", "TIMC" ], [ "Daanen", "Vincent", "", "TIMC" ], [ "Moreau-Gaudry", "Alexandre", "", "TIMC, CHU-Grenoble CIC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0801.3971
Uwe Aickelin
Jingpeng Li and Uwe Aickelin
A Bayesian Optimisation Algorithm for the Nurse Scheduling Problem
null
Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2003), pp 2149-2156, Canberra, Australia, 2003
null
null
cs.NE cs.CE
null
A Bayesian optimization algorithm for the nurse scheduling problem is presented, which involves choosing a suitable scheduling rule from a set for each nurses assignment. Unlike our previous work that used Gas to implement implicit learning, the learning in the proposed algorithm is explicit, ie. Eventually, we will be able to identify and mix building blocks directly. The Bayesian optimization algorithm is applied to implement such explicit learning by building a Bayesian network of the joint distribution of solutions. The conditional probability of each variable in the network is computed according to an initial set of promising solutions. Subsequently, each new instance for each variable is generated, ie in our case, a new rule string has been obtained. Another set of rule strings will be generated in this way, some of which will replace previous strings based on fitness selection. If stopping conditions are not met, the conditional probabilities for all nodes in the Bayesian network are updated again using the current set of promising rule strings. Computational results from 52 real data instances demonstrate the success of this approach. It is also suggested that the learning mechanism in the proposed approach might be suitable for other scheduling problems.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 16:07:25 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:07:17 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:43:52 GMT" } ]
2010-07-05T00:00:00
[ [ "Li", "Jingpeng", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0801.3982
Ricardo Lopez-Ruiz
C. Pellicer-Lostao and R. Lopez-Ruiz
Pseudo-Random Bit Generation based on 2D chaotic maps of logistic type and its Applications in Chaotic Cryptography
13 pages, 5 figures, 3 tables
null
null
null
nlin.CD cs.CR physics.comp-ph
null
Pseudo-Random Bit Generation (PRBG) is required in many aspects of cryptography as well as in other applications of modern security engineering. In this work, PRBG based on 2D symmetrical chaotic mappings of logistic type is considered. The sequences generated with a chaotic PRBG of this type, are statistically tested and the computational effectiveness of the generators is estimated. Considering this PRBG valid for cryptography, the size of the available key space is also calculated. Different cryptographic applications can be suitable to this PRBG, being a stream cipher probably the most immediate of them.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 16:55:17 GMT" } ]
2008-01-28T00:00:00
[ [ "Pellicer-Lostao", "C.", "" ], [ "Lopez-Ruiz", "R.", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0801.3983
Lizhen Yang
Lizhen Yang, Ling Dong, Kefei Chen
New Upper Bounds on Sizes of Permutation Arrays
null
null
null
null
cs.IT math.IT
null
A permutation array(or code) of length $n$ and distance $d$, denoted by $(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$ elements such that the Hamming distance between distinct members $\mathbf{x},\mathbf{y}\in C$ is at least $d$. Let $P(n,d)$ denote the maximum size of an $(n,d)$ PA. New upper bounds on $P(n,d)$ are given. For constant $\alpha,\beta$ satisfying certain conditions, whenever $d=\beta n^{\alpha}$, the new upper bounds are asymptotically better than the previous ones.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 16:55:17 GMT" } ]
2008-01-28T00:00:00
[ [ "Yang", "Lizhen", "" ], [ "Dong", "Ling", "" ], [ "Chen", "Kefei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3985
Andrzej Kwasniewski
A. Krzysztof Kwasniewski, M. Dziemianczuk
Cobweb posets - Recent Results
27 pages, 15 figures
Adv. Stud. Contemp. Math. volume 16 (2), 2008 (April) pp. 197-218
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cobweb posets uniquely represented by directed acyclic graphs are such a generalization of the Fibonacci tree that allows joint combinatorial interpretation for all of them under admissibility condition. This interpretation was derived in the source papers ([6,7] and references therein to the first author).[7,6,8] include natural enquires to be reported on here. The purpose of this presentation is to report on the progress in solving computational problems which are quite easily formulated for the new class of directed acyclic graphs interpreted as Hasse diagrams. The problems posed there and not yet all solved completely are of crucial importance for the vast class of new partially ordered sets with joint combinatorial interpretation. These so called cobweb posets - are relatives of Fibonacci tree and are labeled by specific number sequences - natural numbers sequence and Fibonacci sequence included. The cobweb posets might be identified with a chain of di-bicliques i.e. by definition - a chain of complete bipartite one direction digraphs [6]. Any chain of relations is therefore obtainable from the cobweb poset chain of complete relations via deleting arcs in di-bicliques of the complete relations chain. In particular we response to one of those problems [1].
[ { "version": "v1", "created": "Fri, 25 Jan 2008 17:01:28 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 21:01:15 GMT" }, { "version": "v3", "created": "Sat, 8 Jan 2011 15:59:10 GMT" } ]
2011-01-11T00:00:00
[ [ "Kwasniewski", "A. Krzysztof", "" ], [ "Dziemianczuk", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0801.3986
Lizhen Yang
Lizhen Yang, Kefei Chen, Luo Yuan
New Lower Bounds on Sizes of Permutation Arrays
null
null
null
null
cs.IT math.IT
null
A permutation array(or code) of length $n$ and distance $d$, denoted by $(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$ elements such that the Hamming distance between distinct members $\mathbf{x},\mathbf{y}\in C$ is at least $d$. Let $P(n,d)$ denote the maximum size of an $(n,d)$ PA. This correspondence focuses on the lower bound on $P(n,d)$. First we give three improvements over the Gilbert-Varshamov lower bounds on $P(n,d)$ by applying the graph theorem framework presented by Jiang and Vardy. Next we show another two new improved bounds by considering the covered balls intersections. Finally some new lower bounds for certain values of $n$ and $d$ are given.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 17:02:22 GMT" } ]
2008-01-28T00:00:00
[ [ "Yang", "Lizhen", "" ], [ "Chen", "Kefei", "" ], [ "Yuan", "Luo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.3987
Lizhen Yang
Lizhen Yang, Kefei Chen, Luo Yuan
New Constructions of Permutation Arrays
null
null
null
null
cs.IT math.IT
null
A permutation array(permutation code, PA) of length $n$ and distance $d$, denoted by $(n,d)$ PA, is a set of permutations $C$ from some fixed set of $n$ elements such that the Hamming distance between distinct members $\mathbf{x},\mathbf{y}\in C$ is at least $d$. In this correspondence, we present two constructions of PA from fractional polynomials over finite field, and a construction of $(n,d)$ PA from permutation group with degree $n$ and minimal degree $d$. All these new constructions produces some new lower bounds for PA.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 17:05:39 GMT" } ]
2008-01-28T00:00:00
[ [ "Yang", "Lizhen", "" ], [ "Chen", "Kefei", "" ], [ "Yuan", "Luo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.4013
Mathieu Couture
Prosenjit Bose and Paz Carmi and Mathieu Couture
Spanners of Additively Weighted Point Sets
null
null
null
null
cs.CG
null
We study the problem of computing geometric spanners for (additively) weighted point sets. A weighted point set is a set of pairs $(p,r)$ where $p$ is a point in the plane and $r$ is a real number. The distance between two points $(p_i,r_i)$ and $(p_j,r_j)$ is defined as $|p_ip_j|-r_i-r_j$. We show that in the case where all $r_i$ are positive numbers and $|p_ip_j|\geq r_i+r_j$ for all $i,j$ (in which case the points can be seen as non-intersecting disks in the plane), a variant of the Yao graph is a $(1+\epsilon)$-spanner that has a linear number of edges. We also show that the Additively Weighted Delaunay graph (the face-dual of the Additively Weighted Voronoi diagram) has constant spanning ratio. The straight line embedding of the Additively Weighted Delaunay graph may not be a plane graph. We show how to compute a plane embedding that also has a constant spanning ratio.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 19:43:09 GMT" } ]
2008-01-28T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Carmi", "Paz", "" ], [ "Couture", "Mathieu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0801.4019
Joseph O'Rourke
Alex Benton and Joseph O'Rourke
A Class of Convex Polyhedra with Few Edge Unfoldings
12 pages, 9 figures
null
null
Smith Computer Science 088
cs.CG
null
We construct a sequence of convex polyhedra on n vertices with the property that, as n -> infinity, the fraction of its edge unfoldings that avoid overlap approaches 0, and so the fraction that overlap approaches 1. Nevertheless, each does have (several) nonoverlapping edge unfoldings.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 20:22:04 GMT" } ]
2008-01-28T00:00:00
[ [ "Benton", "Alex", "" ], [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0801.4024
Ilya Shmulevich
David J. Galas, Matti Nykter, Gregory W. Carter, Nathan D. Price, Ilya Shmulevich
Set-based complexity and biological information
null
null
null
null
cs.IT cs.CC math.IT q-bio.QM
null
It is not obvious what fraction of all the potential information residing in the molecules and structures of living systems is significant or meaningful to the system. Sets of random sequences or identically repeated sequences, for example, would be expected to contribute little or no useful information to a cell. This issue of quantitation of information is important since the ebb and flow of biologically significant information is essential to our quantitative understanding of biological function and evolution. Motivated specifically by these problems of biological information, we propose here a class of measures to quantify the contextual nature of the information in sets of objects, based on Kolmogorov's intrinsic complexity. Such measures discount both random and redundant information and are inherent in that they do not require a defined state space to quantify the information. The maximization of this new measure, which can be formulated in terms of the universal information distance, appears to have several useful and interesting properties, some of which we illustrate with examples.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 20:58:14 GMT" } ]
2008-01-28T00:00:00
[ [ "Galas", "David J.", "" ], [ "Nykter", "Matti", "" ], [ "Carter", "Gregory W.", "" ], [ "Price", "Nathan D.", "" ], [ "Shmulevich", "Ilya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0801.4048
Zhu Han
Zhu Han, Xin Zhang, H. Vincent Poor
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
to appear IEEE Transactions on Wireless Communications
null
10.1109/TWC.2009.070181
null
cs.IT math.IT
null
Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency and the requirement of orthogonal channels, its potential for use in future wireless networks is limited. In this paper, by making use of multiuser detection (MUD) and network coding, cooperative transmission protocols with high spectral efficiency, diversity order, and coding gain are developed. Compared with the traditional cooperative transmission protocols with single-user detection, in which the diversity gain is only for one source user, the proposed MUD cooperative transmission protocols have the merit that the improvement of one user's link can also benefit the other users. In addition, using MUD at the relay provides an environment in which network coding can be employed. The coding gain and high diversity order can be obtained by fully utilizing the link between the relay and the destination. From the analysis and simulation results, it is seen that the proposed protocols achieve higher diversity gain, better asymptotic efficiency, and lower bit error rate, compared to traditional MUD schemes and to existing cooperative transmission protocols. From the simulation results, the performance of the proposed scheme is near optimal as the performance gap is 0.12dB for average bit error rate (BER) 10^{-6} and 1.04dB for average BER 10^(-3), compared to two performance upper bounds.
[ { "version": "v1", "created": "Sat, 26 Jan 2008 00:55:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Han", "Zhu", "" ], [ "Zhang", "Xin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.4054
Soung Liew
Soung Chang Liew, Ying Jun Zhang, Da Rui Chen
Bounded Mean-Delay Throughput and Non-Starvation Conditions in Aloha Network
We are replacing the old version (submitted in Jan 2008) with this new version. The presentation and organization of the new version, we believe, is easire to read. In addition, new simulation results have been added
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the requirements to ensure bounded mean queuing delay and non-starvation in a slotted Aloha network operating the exponential backoff protocol. It is well-known that the maximum possible throughput of a slotted Aloha system with a large number of nodes is 1/e = 0.3679. Indeed, a saturation throughput of 1/e can be achieved with an exponential backoff factor of r = e/(e-1)=1.5820. The binary backoff factor of r = 2 is assumed in the majority of prior work, and in many practical multiple-access networks such as the Ethernet and WiFi. For slotted Aloha, the saturation throughput 0.3466 for r = 2 is reasonably close to the maximum of 1/e, and one could hardly raise objection to adopting r = 2 in the system. However, this paper shows that if mean queuing delay is to be bounded, then the sustainable throughput when r = 2 is only 0.2158, a drastic 41% drop from 1/e . Fortunately, the optimal setting of r = 1.3757 under the bounded mean-delay requirement allows us to achieve sustainable throughput of 0.3545, a penalty of only less than 4% relative to 1/e. A general conclusion is that the value of r may significantly affect the queuing delay performance. Besides analyzing mean queuing delay, this paper also delves into the phenomenon of starvation, wherein some nodes are deprived of service for an extended period of time while other nodes hog the system. Specifically, we propose a quantitative definition for starvation and show that the conditions to guarantee bounded mean delay and non-starved operation are one of the same, thus uniting these two notions. Finally, we show that when mean delay is large and starvation occurs, the performance results obtained from simulation experiments may not converge. A quantitative discussion of this issue is provided in this paper.
[ { "version": "v1", "created": "Sat, 26 Jan 2008 02:36:30 GMT" }, { "version": "v2", "created": "Mon, 14 Jul 2008 11:05:09 GMT" } ]
2008-07-14T00:00:00
[ [ "Liew", "Soung Chang", "" ], [ "Zhang", "Ying Jun", "" ], [ "Chen", "Da Rui", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0801.4061
Jean-Philippe Vert
Jean-Philippe Vert (CB)
The optimal assignment kernel is not positive definite
null
null
null
null
cs.LG
null
We prove that the optimal assignment kernel, proposed recently as an attempt to embed labeled graphs and more generally tuples of basic data to a Hilbert space, is in fact not always positive definite.
[ { "version": "v1", "created": "Sat, 26 Jan 2008 07:32:48 GMT" } ]
2008-01-29T00:00:00
[ [ "Vert", "Jean-Philippe", "", "CB" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0801.4079
Elena Dubrova
Elena Dubrova (Royal Institute of Technology)
An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs
14 pages, 4 figures, one reference added, example 4 corrected
null
null
null
cs.CR
null
Conventional Non-Linear Feedback Shift Registers (NLFSRs) use the Fibonacci configuration in which the value of the first bit is updated according to some non-linear feedback function of previous values of other bits, and each remaining bit repeats the value of its previous bit. We show how to transform the feedback function of a Fibonacci NLFSR into several smaller feedback functions of individual bits. Such a transformation reduces the propagation time, thus increasing the speed of pseudo-random sequence generation. The practical significance of the presented technique is that is makes possible increasing the keystream generation speed of any Fibonacci NLFSR-based stream cipher with no penalty in area.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 20:07:40 GMT" }, { "version": "v2", "created": "Wed, 30 Jan 2008 15:26:54 GMT" } ]
2008-01-30T00:00:00
[ [ "Dubrova", "Elena", "", "Royal Institute of Technology" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.4082
Marcello Caleffi
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
Proc. of WRECOM '07: Wireless Rural and Emergency Communications Conference, Roma (Italy), October 2007
null
null
null
cs.NI cs.DC
null
In this paper, a reliability analysis is carried out to state a performance comparison between two recently proposed proactive routing algorithms. These protocols are able to scale in ad hoc and sensor networks by resorting to dynamic addressing, to face with the topology variability, which is typical of ad hoc, and sensor networks. Numerical simulations are also carried out to corroborate the results of the analysis.
[ { "version": "v1", "created": "Sat, 26 Jan 2008 15:15:21 GMT" } ]
2008-01-29T00:00:00
[ [ "Caleffi", "Marcello", "" ], [ "Ferraiuolo", "Giancarlo", "" ], [ "Paura", "Luigi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0801.4105
Steven Perron
Steven Perron (University of Toronto)
Quantified Propositional Logspace Reasoning
28 pages
null
null
null
cs.LO cs.CC
null
In this paper, we develop a quantified propositional proof systems that corresponds to logarithmic-space reasoning. We begin by defining a class SigmaCNF(2) of quantified formulas that can be evaluated in log space. Then our new proof system GL^* is defined as G_1^* with cuts restricted to SigmaCNF(2) formulas and no cut formula that is not quantifier free contains a free variable that does not appear in the final formula. To show that GL^* is strong enough to capture log space reasoning, we translate theorems of VL into a family of tautologies that have polynomial-size GL^* proofs. VL is a theory of bounded arithmetic that is known to correspond to logarithmic-space reasoning. To do the translation, we find an appropriate axiomatization of VL, and put VL proofs into a new normal form. To show that GL^* is not too strong, we prove the soundness of GL^* in such a way that it can be formalized in VL. This is done by giving a logarithmic-space algorithm that witnesses GL^* proofs.
[ { "version": "v1", "created": "Sun, 27 Jan 2008 19:53:39 GMT" } ]
2008-01-29T00:00:00
[ [ "Perron", "Steven", "", "University of Toronto" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0801.4119
Uwe Aickelin
Gianni Tedesco and Uwe Aickelin
Strategic Alert Throttling for Intrusion Detection Systems
null
4th WSEAS International Conference on Information Security (WSEAS 2005), Tenerife, Spain, 2005
null
null
cs.NE cs.CR
null
Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 15:36:56 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:00:56 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:43:30 GMT" } ]
2010-07-05T00:00:00
[ [ "Tedesco", "Gianni", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.4129
Amichai Sanderovich
Amichai Sanderovich, Michael Peleg and Shlomo Shamai
Scaling Laws and Techniques in Decentralized Processing of Interfered Gaussian Channels
Submitted to European Transactions on Telecommunication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The scaling laws of the achievable communication rates and the corresponding upper bounds of distributed reception in the presence of an interfering signal are investigated. The scheme includes one transmitter communicating to a remote destination via two relays, which forward messages to the remote destination through reliable links with finite capacities. The relays receive the transmission along with some unknown interference. We focus on three common settings for distributed reception, wherein the scaling laws of the capacity (the pre-log as the power of the transmitter and the interference are taken to infinity) are completely characterized. It is shown in most cases that in order to overcome the interference, a definite amount of information about the interference needs to be forwarded along with the desired message, to the destination. It is exemplified in one scenario that the cut-set upper bound is strictly loose. The results are derived using the cut-set along with a new bounding technique, which relies on multi letter expressions. Furthermore, lattices are found to be a useful communication technique in this setting, and are used to characterize the scaling laws of achievable rates.
[ { "version": "v1", "created": "Sun, 27 Jan 2008 12:47:04 GMT" }, { "version": "v2", "created": "Mon, 7 Dec 2009 22:16:00 GMT" } ]
2009-12-08T00:00:00
[ [ "Sanderovich", "Amichai", "" ], [ "Peleg", "Michael", "" ], [ "Shamai", "Shlomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.4130
Klas Olof Daniel Andersson
Daniel Andersson
Solving Min-Max Problems with Applications to Games
null
null
null
null
cs.GT cs.DS
null
We refine existing general network optimization techniques, give new characterizations for the class of problems to which they can be applied, and show that they can also be used to solve various two-player games in almost linear time. Among these is a new variant of the network interdiction problem, where the interdictor wants to destroy high-capacity paths from the source to the destination using a vertex-wise limited budget of arc removals. We also show that replacing the limit average in mean payoff games by the maximum weight results in a class of games amenable to these techniques.
[ { "version": "v1", "created": "Sun, 27 Jan 2008 13:28:43 GMT" } ]
2008-01-29T00:00:00
[ [ "Andersson", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0801.4150
Herbert Hoeger Dr
G. Diaz, J. Florez-Lopez, V. Hamar, H. Hoeger, C. Mendoza, Z. Mendez, L. A. Nunez, N. Ruiz, R. Torrens, M. Uzcategui
e-Science perspectives in Venezuela
Presented at the Third Conference of the EELA Project in Catania, Italy, Dec 2007
Proceedings of the Third EELA Conference, R. Gavela, B. Marechal, R. Barbera, L.N. Ciuffo, R. Mayo. (Editors), CIEMAT, Madrid, Spain (2007), pp 131-139
null
null
cs.DC
null
We describe the e-Science strategy in Venezuela, in particular initiatives by the Centro Nacional de Calculo Cientifico Universidad de Los Andes (CECALCULA), Merida, the Universidad de Los Andes (ULA), Merida, and the Instituto Venezolano de Investigaciones Cientificas (IVIC), Caracas. We present the plans for the Venezuelan Academic Grid and the current status of Grid ULA supported by Internet2. We show different web-based scientific applications that are being developed in quantum chemistry, atomic physics, structural damage analysis, biomedicine and bioclimate within the framework of the E-Infrastructure shared between Europe and Latin America (EELA)
[ { "version": "v1", "created": "Sun, 27 Jan 2008 20:22:29 GMT" } ]
2008-01-29T00:00:00
[ [ "Diaz", "G.", "" ], [ "Florez-Lopez", "J.", "" ], [ "Hamar", "V.", "" ], [ "Hoeger", "H.", "" ], [ "Mendoza", "C.", "" ], [ "Mendez", "Z.", "" ], [ "Nunez", "L. A.", "" ], [ "Ruiz", "N.", "" ], [ "Torrens", "R.", "" ], [ "Uzcategui", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0801.4158
Gabor Vattay
Gabor Simon, Jozsef Steger, Peter Haga Istvan Csabai, Gabor Vattay
Measuring the Dynamical State of the Internet: Large Scale Network Tomography via the ETOMIC Infrastructure
null
null
null
null
physics.data-an cs.NI
null
In this paper we show how to go beyond the study of the topological properties of the Internet, by measuring its dynamical state using special active probing techniques and the methods of network tomography. We demonstrate this approach by measuring the key state parameters of Internet paths, the characteristics of queueing delay, in a part of the European Internet. In the paper we describe in detail the ETOMIC measurement platform that was used to conduct the experiments, and the applied method of queueing delay tomography. The main results of the paper are maps showing various spatial structure in the characteristics of queueing delay corresponding to the resolved part of the European Internet. These maps reveal that the average queueing delay of network segments spans more than two orders of magnitude, and that the distribution of this quantity is very well fitted by the log-normal distribution.
[ { "version": "v1", "created": "Sun, 27 Jan 2008 21:53:36 GMT" } ]
2008-01-29T00:00:00
[ [ "Simon", "Gabor", "" ], [ "Steger", "Jozsef", "" ], [ "Csabai", "Peter Haga Istvan", "" ], [ "Vattay", "Gabor", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0801.4190
Sebastian Roch
Constantinos Daskalakis, Elchanan Mossel, Sebastien Roch
Phylogenies without Branch Bounds: Contracting the Short, Pruning the Deep
null
null
null
null
q-bio.PE cs.CE cs.DS math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new phylogenetic reconstruction algorithm which, unlike most previous rigorous inference techniques, does not rely on assumptions regarding the branch lengths or the depth of the tree. The algorithm returns a forest which is guaranteed to contain all edges that are: 1) sufficiently long and 2) sufficiently close to the leaves. How much of the true tree is recovered depends on the sequence length provided. The algorithm is distance-based and runs in polynomial time.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 05:10:22 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 01:48:27 GMT" } ]
2011-09-30T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0801.4194
Kohtaro Tadaki
Kohtaro Tadaki
A statistical mechanical interpretation of algorithmic information theory
31 pages, LaTeX2e, no figures
null
null
null
cs.IT cs.CC math.IT math.PR quant-ph
null
We develop a statistical mechanical interpretation of algorithmic information theory by introducing the notion of thermodynamic quantities, such as free energy, energy, statistical mechanical entropy, and specific heat, into algorithmic information theory. We investigate the properties of these quantities by means of program-size complexity from the point of view of algorithmic randomness. It is then discovered that, in the interpretation, the temperature plays a role as the compression rate of the values of all these thermodynamic quantities, which include the temperature itself. Reflecting this self-referential nature of the compression rate of the temperature, we obtain fixed point theorems on compression rate.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 17:42:27 GMT" } ]
2009-04-09T00:00:00
[ [ "Tadaki", "Kohtaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0801.4198
Kazutaka Nakamura
Kazutaka Nakamura, Toshiyuki Tanaka
Microscopic Analysis for Decoupling Principle of Linear Vector Channel
null
null
null
null
cs.IT math.IT
null
This paper studies the decoupling principle of a linear vector channel, which is an extension of CDMA and MIMO channels. We show that the scalar-channel characterization obtained via the decoupling principle is valid not only for collections of a large number of elements of input vector, as discussed in previous studies, but also for individual elements of input vector, i.e. the linear vector channel for individual elements of channel input vector is decomposed into a bank of independent scalar Gaussian channels in the large-system limit, where dimensions of channel input and output are both sent to infinity while their ratio fixed.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 06:59:42 GMT" } ]
2008-01-29T00:00:00
[ [ "Nakamura", "Kazutaka", "" ], [ "Tanaka", "Toshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0801.4230
Simon Perdrix
Simon Perdrix
Quantum entanglement analysis based on abstract interpretation
13 pages
Proc. of 15th International Static Analysis Symposium (SAS 2008). LNCS 5079, pp 270-282
10.1007/978-3-540-69166-2_18
null
cs.LO cs.PL quant-ph
null
Entanglement is a non local property of quantum states which has no classical counterpart and plays a decisive role in quantum information theory. Several protocols, like the teleportation, are based on quantum entangled states. Moreover, any quantum algorithm which does not create entanglement can be efficiently simulated on a classical computer. The exact role of the entanglement is nevertheless not well understood. Since an exact analysis of entanglement evolution induces an exponential slowdown, we consider approximative analysis based on the framework of abstract interpretation. In this paper, a concrete quantum semantics based on superoperators is associated with a simple quantum programming language. The representation of entanglement, i.e. the design of the abstract domain is a key issue. A representation of entanglement as a partition of the memory is chosen. An abstract semantics is introduced, and the soundness of the approximation is proven.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 10:45:47 GMT" } ]
2008-12-08T00:00:00
[ [ "Perdrix", "Simon", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0801.4238
Christoph Durr
Marek Chrobak, Christoph Durr, Mathilde Hurand and Julien Robert
Algorithms for Temperature-Aware Task Scheduling in Microprocessor Systems
null
null
null
null
cs.DS
null
We study scheduling problems motivated by recently developed techniques for microprocessor thermal management at the operating systems level. The general scenario can be described as follows. The microprocessor's temperature is controlled by the hardware thermal management system that continuously monitors the chip temperature and automatically reduces the processor's speed as soon as the thermal threshold is exceeded. Some tasks are more CPU-intensive than other and thus generate more heat during execution. The cooling system operates non-stop, reducing (at an exponential rate) the deviation of the processor's temperature from the ambient temperature. As a result, the processor's temperature, and thus the performance as well, depends on the order of the task execution. Given a variety of possible underlying architectures, models for cooling and for hardware thermal management, as well as types of tasks, this scenario gives rise to a plethora of interesting and never studied scheduling problems. We focus on scheduling real-time jobs in a simplified model for cooling and thermal management. A collection of unit-length jobs is given, each job specified by its release time, deadline and heat contribution. If, at some time step, the temperature of the system is t and the processor executes a job with heat contribution h, then the temperature at the next step is (t+h)/2. The temperature cannot exceed the given thermal threshold T. The objective is to maximize the throughput, that is, the number of tasks that meet their deadlines. We prove that, in the offline case, computing the optimum schedule is NP-hard, even if all jobs are released at the same time. In the online case, we show a 2-competitive deterministic algorithm and a matching lower bound.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 10:47:42 GMT" } ]
2008-01-29T00:00:00
[ [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Hurand", "Mathilde", "" ], [ "Robert", "Julien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0801.4268
Grenville Croll
Roland T. Mittermeir, Markus Clermont, Karin Hodnigg
Protecting Spreadsheets Against Fraud
16 Pages including extensive references
Proc. European Spreadsheet Risks Int. Grp. 2005 69-80 ISBN:1-902724-16-X
null
null
cs.CY cs.CR
null
Previous research on spreadsheet risks has predominantly focussed on errors inadvertently introduced by spreadsheet writers i.e. it focussed on the end-user aspects of spreadsheet development. When analyzing a faulty spreadsheet, one might not be able to determine whether a particular error (fault) has been made by mistake or with fraudulent intentions. However, the fences protecting against fraudulent errors have to be different from those shielding against inadvertent mistakes. Faults resulting from errors committed inadvertently can be prevented ab initio by tools that notify the spreadsheet writer about potential problems whereas faults that are introduced on purpose have to be discovered by auditors without the cooperation of their originators. Even worse, some spreadsheet writers will do their best to conceal fraudulent parts of their spreadsheets from auditors. In this paper we survey the available means for fraud protection by contrasting approaches suitable for spreadsheets with those known from fraud protection for conventional software.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 13:45:28 GMT" } ]
2008-03-10T00:00:00
[ [ "Mittermeir", "Roland T.", "" ], [ "Clermont", "Markus", "" ], [ "Hodnigg", "Karin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0801.4274
Grenville Croll
Karin Hodnigg, Markus Clermont, Roland T. Mittermeir
Computational Models of Spreadsheet Development: Basis for Educational Approaches
16 Pages, 4 figures, includes references
Proc. European Spreadsheet Risks Int. Grp. 2004 153-168 ISBN 1 902724 94 1
null
null
cs.HC cs.SE
null
Among the multiple causes of high error rates in spreadsheets, lack of proper training and of deep understanding of the computational model upon which spreadsheet computations rest might not be the least issue. The paper addresses this problem by presenting a didactical model focussing on cell interaction, thus exceeding the atomicity of cell computations. The approach is motivated by an investigation how different spreadsheet systems handle certain computational issues implied from moving cells, copy-paste operations, or recursion.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 13:55:55 GMT" } ]
2008-03-10T00:00:00
[ [ "Hodnigg", "Karin", "" ], [ "Clermont", "Markus", "" ], [ "Mittermeir", "Roland T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0801.4280
Grenville Croll
Yirsaw Ayalew, Roland Mittermeir
Spreadsheet Debugging
13 Pages, 4 figues
Proc. European Spreadsheet Risks Int. Grp. 2003 67-79 ISBN 1 86166 199 1
null
null
cs.SE cs.PL
null
Spreadsheet programs, artifacts developed by non-programmers, are used for a variety of important tasks and decisions. Yet a significant proportion of them have severe quality problems. To address this issue, our previous work presented an interval-based testing methodology for spreadsheets. Interval-based testing rests on the observation that spreadsheets are mainly used for numerical computations. It also incorporates ideas from symbolic testing and interval analysis. This paper addresses the issue of efficiently debugging spreadsheets. Based on the interval-based testing methodology, this paper presents a technique for tracing faults in spreadsheet programs. The fault tracing technique proposed uses the dataflow information and cell marks to identify the most influential faulty cell(s) for a given formula cell containing a propagated fault.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 14:07:58 GMT" } ]
2008-03-10T00:00:00
[ [ "Ayalew", "Yirsaw", "" ], [ "Mittermeir", "Roland", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0801.4287
Uwe Aickelin
Qi Chen and Uwe Aickelin
Movie Recommendation Systems Using An Artificial Immune System
null
6th International Conference in Adaptive Computing in Design and Manufacture (ACDM 2004), Bristol, UK, 2004
null
null
cs.NE cs.AI
null
We apply the Artificial Immune System (AIS) technology to the Collaborative Filtering (CF) technology when we build the movie recommendation system. Two different affinity measure algorithms of AIS, Kendall tau and Weighted Kappa, are used to calculate the correlation coefficients for this movie recommendation system. From the testing we think that Weighted Kappa is more suitable than Kendall tau for movie problems.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 14:19:12 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:05:58 GMT" } ]
2010-07-05T00:00:00
[ [ "Chen", "Qi", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.4292
Joel Goossens
Liliana Cucu and Jo\"el Goossens
Exact Feasibility Tests for Real-Time Scheduling of Periodic Tasks upon Multiprocessor Platforms
null
null
null
null
cs.OS
null
In this paper we study the global scheduling of periodic task systems upon multiprocessor platforms. We first show two very general properties which are well-known for uniprocessor platforms and which remain for multiprocessor platforms: (i) under few and not so restrictive assumptions, we show that feasible schedules of periodic task systems are periodic from some point with a period equal to the least common multiple of task periods and (ii) for the specific case of synchronous periodic task systems, we show that feasible schedules repeat from the origin. We then present our main result: we characterize, for task-level fixed-priority schedulers and for asynchronous constrained or arbitrary deadline periodic task models, upper bounds of the first time instant where the schedule repeats. We show that job-level fixed-priority schedulers are predictable upon unrelated multiprocessor platforms. For task-level fixed-priority schedulers, based on the upper bounds and the predictability property, we provide for asynchronous constrained or arbitrary deadline periodic task sets, exact feasibility tests. Finally, for the job-level fixed-priority EDF scheduler, for which such an upper bound remains unknown, we provide an exact feasibility test as well.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 14:30:34 GMT" } ]
2008-01-29T00:00:00
[ [ "Cucu", "Liliana", "" ], [ "Goossens", "Joël", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0801.4305
Frank Schweitzer
J. Emeterio Navarro Barrientos, Frank E. Walter, Frank Schweitzer
Risk-Seeking versus Risk-Avoiding Investments in Noisy Periodic Environments
27 pp. v2 with minor corrections. See http://www.sg.ethz.ch for more info
International Journal of Modern Physics C vol. 19, no. 6 (2008) 971-994
10.1142/S0129183108012662
null
q-fin.PM cs.CE physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the performance of various agent strategies in an artificial investment scenario. Agents are equipped with a budget, $x(t)$, and at each time step invest a particular fraction, $q(t)$, of their budget. The return on investment (RoI), $r(t)$, is characterized by a periodic function with different types and levels of noise. Risk-avoiding agents choose their fraction $q(t)$ proportional to the expected positive RoI, while risk-seeking agents always choose a maximum value $q_{max}$ if they predict the RoI to be positive ("everything on red"). In addition to these different strategies, agents have different capabilities to predict the future $r(t)$, dependent on their internal complexity. Here, we compare 'zero-intelligent' agents using technical analysis (such as moving least squares) with agents using reinforcement learning or genetic algorithms to predict $r(t)$. The performance of agents is measured by their average budget growth after a certain number of time steps. We present results of extensive computer simulations, which show that, for our given artificial environment, (i) the risk-seeking strategy outperforms the risk-avoiding one, and (ii) the genetic algorithm was able to find this optimal strategy itself, and thus outperforms other prediction approaches considered.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 15:09:58 GMT" }, { "version": "v2", "created": "Sun, 7 Sep 2008 13:48:45 GMT" } ]
2009-11-13T00:00:00
[ [ "Barrientos", "J. Emeterio Navarro", "" ], [ "Walter", "Frank E.", "" ], [ "Schweitzer", "Frank", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.PM", "description": "Security selection and optimization, capital allocation, investment strategies and performance measurement", "span": "(Portfolio Management)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0801.4307
Uwe Aickelin
Uwe Aickelin and Qi Chen
On Affinity Measures for Artificial Immune System Movie Recommenders
null
Proceedings of the 5th International Conference on Recent Advances in Soft Computing (RASC 2004), Nottingham, UK
null
null
cs.NE cs.AI cs.CY
null
We combine Artificial Immune Systems 'AIS', technology with Collaborative Filtering 'CF' and use it to build a movie recommendation system. We already know that Artificial Immune Systems work well as movie recommenders from previous work by Cayzer and Aickelin 3, 4, 5. Here our aim is to investigate the effect of different affinity measure algorithms for the AIS. Two different affinity measures, Kendalls Tau and Weighted Kappa, are used to calculate the correlation coefficients for the movie recommender. We compare the results with those published previously and show that Weighted Kappa is more suitable than others for movie problems. We also show that AIS are generally robust movie recommenders and that, as long as a suitable affinity measure is chosen, results are good.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 15:14:45 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:06:30 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:44:44 GMT" } ]
2008-05-16T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Chen", "Qi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0801.4312
Uwe Aickelin
Uwe Aickelin, Edmund Burke and Aniza Din
Investigating Artificial Immune Systems For Job Shop Rescheduling In Changing Environments
null
6th International Conference in Adaptive Computing in Design and Manufacture (ACDM 2004), Bristol, UK, 2004
null
null
cs.NE cs.CE
null
Artificial immune system can be used to generate schedules in changing environments and it has been proven to be more robust than schedules developed using a genetic algorithm. Good schedules can be produced especially when the number of the antigens is increased. However, an increase in the range of the antigens had somehow affected the fitness of the immune system. In this research, we are trying to improve the result of the system by rescheduling the same problem using the same method while at the same time maintaining the robustness of the schedules.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 15:26:59 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:03:46 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:43:07 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Burke", "Edmund", "" ], [ "Din", "Aniza", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0801.4314
Uwe Aickelin
Uwe Aickelin
Artificial Immune Systems (AIS) - A New Paradigm for Heuristic Decision Making
null
Invited Keynote Talk, Annual Operational Research Conference 46, York, UK, 2004
null
null
cs.NE cs.AI
null
Over the last few years, more and more heuristic decision making techniques have been inspired by nature, e.g. evolutionary algorithms, ant colony optimisation and simulated annealing. More recently, a novel computational intelligence technique inspired by immunology has emerged, called Artificial Immune Systems (AIS). This immune system inspired technique has already been useful in solving some computational problems. In this keynote, we will very briefly describe the immune system metaphors that are relevant to AIS. We will then give some illustrative real-world problems suitable for AIS use and show a step-by-step algorithm walkthrough. A comparison of AIS to other well-known algorithms and areas for future work will round this keynote off. It should be noted that as AIS is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from the examples given here.
[ { "version": "v1", "created": "Mon, 28 Jan 2008 15:32:05 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 17:02:52 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:46:24 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0801.4355
Jocelyne Troccaz
Jean-Jacques Banihachemi (TIMC), Eric Boidard (TIMC), Jean-Luc Bosson (TIMC, CHU-Grenoble CIC), Luc Bressollette, Ivan Bricault (TIMC, CHU-Grenoble radio), Philippe Cinquin (TIMC), Gilbert Ferretti (CHU-Grenoble radio), Maud Marchal (TIMC), Thomas Martinelli (CHU-Grenoble radio), Alexandre Moreau-Gaudry (CHU-Grenoble CIC), Franck Pelissier, Christian Roux, Dominique Saragaglia, Pierre Thorel, Jocelyne Troccaz (TIMC), Adriana Vilchis (TIMC)
TER: A Robot for Remote Ultrasonic Examination: Experimental Evaluations
null
Telesurgery, Springer Verlag (Ed.) (2008) 91-99
null
null
cs.OH cs.RO
null
This chapter: o Motivates the clinical use of robotic tele-echography o Introduces the TER system o Describes technical and clinical evaluations performed with TER
[ { "version": "v1", "created": "Mon, 28 Jan 2008 18:39:41 GMT" } ]
2008-01-29T00:00:00
[ [ "Banihachemi", "Jean-Jacques", "", "TIMC" ], [ "Boidard", "Eric", "", "TIMC" ], [ "Bosson", "Jean-Luc", "", "TIMC, CHU-Grenoble CIC" ], [ "Bressollette", "Luc", "", "TIMC, CHU-Grenoble\n radio" ], [ "Bricault", "Ivan", "", "TIMC, CHU-Grenoble\n radio" ], [ "Cinquin", "Philippe", "", "TIMC" ], [ "Ferretti", "Gilbert", "", "CHU-Grenoble radio" ], [ "Marchal", "Maud", "", "TIMC" ], [ "Martinelli", "Thomas", "", "CHU-Grenoble radio" ], [ "Moreau-Gaudry", "Alexandre", "", "CHU-Grenoble CIC" ], [ "Pelissier", "Franck", "", "TIMC" ], [ "Roux", "Christian", "", "TIMC" ], [ "Saragaglia", "Dominique", "", "TIMC" ], [ "Thorel", "Pierre", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ], [ "Vilchis", "Adriana", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0801.4405
David Charlton
David Charlton, Erik D. Demaine, Martin L. Demaine, Gregory Price, Yaa-Lirng Tu
A Locked Orthogonal Tree
null
null
null
null
cs.CG
null
We give a counterexample to a conjecture of Poon [Poo06] that any orthogonal tree in two dimensions can always be flattened by a continuous motion that preserves edge lengths and avoids self-intersection. We show our example is locked by extending results on strongly locked self-touching linkages due to Connelly, Demaine and Rote [CDR02] to allow zero-length edges as defined in [ADG07], which may be of independent interest. Our results also yield a locked tree with only eleven edges, which is the smallest known example of a locked tree.
[ { "version": "v1", "created": "Tue, 29 Jan 2008 00:39:37 GMT" } ]
2008-01-30T00:00:00
[ [ "Charlton", "David", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Price", "Gregory", "" ], [ "Tu", "Yaa-Lirng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]