id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0801.4417 | Wei Lianfu | L.F. Wei, J.R. Johansson, L.X. Cen, S. Ashhab, Franco Nori | Controllable coherent population transfers in superconducting qubits for
quantum computing | 4 pages, 6 figures. to appear in Physical Review Letters | Phys. Rev. Lett. 100, 113601 (2008) | 10.1103/PhysRevLett.100.113601 | null | quant-ph cond-mat.mes-hall cond-mat.supr-con cs.GT | null | We propose an approach to coherently transfer populations between selected
quantum states in one- and two-qubit systems by using controllable
Stark-chirped rapid adiabatic passages (SCRAPs). These {\it evolution-time
insensitive} transfers, assisted by easily implementable single-qubit
phase-shift operations, could serve as elementary logic gates for quantum
computing. Specifically, this proposal could be conveniently demonstrated with
existing Josephson phase qubits. Our proposal can find an immediate application
in the readout of these qubits. Indeed, the broken parity symmetries of the
bound states in these artificial "atoms" provide an efficient approach to
design the required adiabatic pulses.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 02:14:19 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Wei",
"L. F.",
""
],
[
"Johansson",
"J. R.",
""
],
[
"Cen",
"L. X.",
""
],
[
"Ashhab",
"S.",
""
],
[
"Nori",
"Franco",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.mes-hall",
"description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures",
"span": "(Mesoscale and Nanoscale Physics)"
},
{
"class": "Physics",
"code": "cond-mat.supr-con",
"description": "Superconductivity: theory, models, experiment. Superflow in helium",
"span": "(Superconductivity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0801.4423 | Manas Tungare | Manas Tungare, Manuel Perez-Quinones | It's Not What You Have, But How You Use It: Compromises in Mobile Device
Use | null | null | null | null | cs.HC | null | As users begin to use many more devices for personal information management
(PIM) than just the traditional desktop computer, it is essential for HCI
researchers to understand how these devices are being used in the wild and
their roles in users' information environments. We conducted a study of 220
knowledge workers about their devices, the activities they performed on each,
and the groups of devices used together. Our findings indicate that several
devices are often used in groups; integrated multi-function portable devices
have begun to replace single-function devices for communication (e.g. email and
IM). Users use certain features opportunistically because they happen to be
carrying a multi-function device with them. The use of multiple devices and
multi-function devices is fraught with compromises as users must choose and
make trade-offs among various factors.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 04:42:26 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Tungare",
"Manas",
""
],
[
"Perez-Quinones",
"Manuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0801.4480 | Babatunde Okunoye | Babatunde O. Okunoye | Abstractions for biomolecular computations | 9 pages, 2 figures | null | null | null | cs.OH | null | Deoxyribonucleic acid is increasingly being understood to be an informational
molecule, capable of information processing.It has found application in the
determination of non-deterministic algorithms and in the design of molecular
computing devices. This is a theoretical analysis of the mathematical
properties and relations of the molecules which constituting DNA, which
explains in part why DNA is a successful computing molecule.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 12:12:11 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Okunoye",
"Babatunde O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.4483 | Jocelyne Troccaz | Jean-Alexandre Long (TIMC), Vincent Daanen (TIMC), Alexandre
Moreau-Gaudry (TIMC, CHU-Grenoble CIC), Jocelyne Troccaz (TIMC), Jean-Jacques
Rambeaud, Jean-Luc Descotes | Biopsies prostatiques sous guidage \'echographique 3D et temps r\'eel
(4D) sur fant\^ome. Etude comparative versus guidage 2D | null | Progr\`es en Urologie 17, 7 (2007) 1137-1143 | null | null | cs.OH | null | This paper analyzes the impact of using 2D or 3D ultrasound on the efficiency
of prostate biopsies. The evaluation is performed on home-made phantoms. The
study shows that the accuracy is significantly improved.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 12:26:02 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Long",
"Jean-Alexandre",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Moreau-Gaudry",
"Alexandre",
"",
"TIMC, CHU-Grenoble CIC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Rambeaud",
"Jean-Jacques",
""
],
[
"Descotes",
"Jean-Luc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.4544 | Pierre Moulin | Pierre Moulin | A Neyman-Pearson Approach to Universal Erasure and List Decoding | 31 pages, submitted to IEEE Transactions on Information Theory | null | 10.1109/ISIT.2008.4594948 | null | cs.IT math.IT | null | When information is to be transmitted over an unknown, possibly unreliable
channel, an erasure option at the decoder is desirable. Using
constant-composition random codes, we propose a generalization of Csiszar and
Korner's Maximum Mutual Information decoder with erasure option for discrete
memoryless channels. The new decoder is parameterized by a weighting function
that is designed to optimize the fundamental tradeoff between undetected-error
and erasure exponents for a compound class of channels. The class of weighting
functions may be further enlarged to optimize a similar tradeoff for list
decoders -- in that case, undetected-error probability is replaced with average
number of incorrect messages in the list. Explicit solutions are identified.
The optimal exponents admit simple expressions in terms of the sphere-packing
exponent, at all rates below capacity. For small erasure exponents, these
expressions coincide with those derived by Forney (1968) for symmetric
channels, using Maximum a Posteriori decoding. Thus for those channels at
least, ignorance of the channel law is inconsequential. Conditions for
optimality of the Csiszar-Korner rule and of the simpler
empirical-mutual-information thresholding rule are identified. The error
exponents are evaluated numerically for the binary symmetric channel.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 19:17:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Moulin",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4571 | Yongyi Mao Dr | Ronghui Tu, Yongyi Mao and Jiying Zhao | Is SP BP? | 77 page double-spaced single-column submitted version to IEEE
Transactions on Information Theory | null | null | null | cs.IT math.IT | null | The Survey Propagation (SP) algorithm for solving $k$-SAT problems has been
shown recently as an instance of the Belief Propagation (BP) algorithm. In this
paper, we show that for general constraint-satisfaction problems, SP may not be
reducible from BP. We also establish the conditions under which such a
reduction is possible. Along our development, we present a unification of the
existing SP algorithms in terms of a probabilistically interpretable iterative
procedure -- weighted Probabilistic Token Passing.
| [
{
"version": "v1",
"created": "Tue, 29 Jan 2008 21:35:13 GMT"
}
] | 2008-01-31T00:00:00 | [
[
"Tu",
"Ronghui",
""
],
[
"Mao",
"Yongyi",
""
],
[
"Zhao",
"Jiying",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4585 | Piotr Faliszewski | Piotr Faliszewski, Lane A. Hemaspaandra | The Complexity of Power-Index Comparison | 12 pages | null | null | URCS TR-2008-929 | cs.CC cs.GT | null | We study the complexity of the following problem: Given two weighted voting
games G' and G'' that each contain a player p, in which of these games is p's
power index value higher? We study this problem with respect to both the
Shapley-Shubik power index [SS54] and the Banzhaf power index [Ban65,DS79]. Our
main result is that for both of these power indices the problem is complete for
probabilistic polynomial time (i.e., is PP-complete). We apply our results to
partially resolve some recently proposed problems regarding the complexity of
weighted voting games. We also study the complexity of the raw Shapley-Shubik
power index. Deng and Papadimitriou [DP94] showed that the raw Shapley-Shubik
power index is #P-metric-complete. We strengthen this by showing that the raw
Shapley-Shubik power index is many-one complete for #P. And our strengthening
cannot possibly be further improved to parsimonious completeness, since we
observe that, in contrast with the raw Banzhaf power index, the raw
Shapley-Shubik power index is not #P-parsimonious-complete.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 00:10:07 GMT"
}
] | 2008-01-31T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0801.4592 | Yue Wang | Yue Wang, John C. S. Lui, Dah-Ming Chiu | Understanding the Paradoxical Effects of Power Control on the Capacity
of Wireless Networks | I refined the previous version in many places, including the title.
to appear in IEEE Transactions on Wireless Communications | null | 10.1109/T-WC.2009.080142 | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent works show conflicting results: network capacity may increase or
decrease with higher transmission power under different scenarios. In this
work, we want to understand this paradox. Specifically, we address the
following questions: (1)Theoretically, should we increase or decrease
transmission power to maximize network capacity? (2) Theoretically, how much
network capacity gain can we achieve by power control? (3) Under realistic
situations, how do power control, link scheduling and routing interact with
each other? Under which scenarios can we expect a large capacity gain by using
higher transmission power? To answer these questions, firstly, we prove that
the optimal network capacity is a non-decreasing function of transmission
power. Secondly, we prove that the optimal network capacity can be increased
unlimitedly by higher transmission power in some network configurations.
However, when nodes are distributed uniformly, the gain of optimal network
capacity by higher transmission power is upper-bounded by a positive constant.
Thirdly, we discuss why network capacity in practice may increase or decrease
with higher transmission power under different scenarios using carrier sensing
and the minimum hop-count routing. Extensive simulations are carried out to
verify our analysis.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 02:51:11 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Sep 2008 04:03:33 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Wang",
"Yue",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Chiu",
"Dah-Ming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0801.4664 | Babatunde Okunoye | O. Okunoye Babatunde | A Molecular Model for Communication through a Secrecy System | 8 pages,7 figures | null | null | null | cs.CR | null | Codes have been used for centuries to convey secret information.To a
cryptanalyst, the interception of a code is only the first step in recovering a
secret message.Deoxyribonucleic acid (DNA) is a biological and molecular
code.Through the work of Marshall Nirenberg and others, DNA is now understood
to specify for amino acids in triplet codes of bases.The possibilty of DNA
encoding secret information in a natural language is explored, since a code is
expected to have a distinct mathematical solution.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 12:44:38 GMT"
}
] | 2008-01-31T00:00:00 | [
[
"Babatunde",
"O. Okunoye",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.4699 | Maciej Dziemianczuk | M. Dziemia\'nczuk | On Cobweb Admissible Sequences - The Production Theorem | 6 pages | Proceedings of FCS'08, Interesting results, new models, and
methodologies, pp.163-165, July 14-17, 2008, Las Vegas, USA | null | null | math.CO cs.DM | null | In this note further clue decisive observations on cobweb admissible
sequences are shared with the audience. In particular an announced proof of the
Theorem 1 (by Dziemia\'nczuk) from [1] announced in India -Kolkata- December
2007 is delivered here. Namely here and there we claim that any cobweb
admissible sequence F is at the point product of primary cobweb admissible
sequences taking values one and/or certain power of an appropriate primary
number p.
Here also an algorithm to produce the family of all cobweb-admissible
sequences i.e. the Problem 1 from [1] i.e. one of several problems posed in
source papers [2,3] is solved using the idea and methods implicitly present
already in [4]
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 15:48:52 GMT"
}
] | 2009-09-13T00:00:00 | [
[
"Dziemiańczuk",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0801.4706 | Pedram Pad | P. Pad, F. Marvasti, K. Alishahi, S. Akbari | A Class of Errorless Codes for Over-loaded Synchronous Wireless and
Optical CDMA Systems | null | null | null | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a new class of codes for over-loaded synchronous
wireless and optical CDMA systems which increases the number of users for fixed
number of chips without introducing any errors. Equivalently, the chip rate can
be reduced for a given number of users, which implies bandwidth reduction for
downlink wireless systems. An upper bound for the maximum number of users for a
given number of chips is derived. Also, lower and upper bounds for the sum
channel capacity of a binary over-loaded CDMA are derived that can predict the
existence of such over-loaded codes. We also propose a simplified maximum
likelihood method for decoding these types of over-loaded codes. Although a
high percentage of the over-loading factor degrades the system performance in
noisy channels, simulation results show that this degradation is not
significant. More importantly, for moderate values of Eb/N0 (in the range of
6-10 dB) or higher, the proposed codes perform much better than the binary
Welch bound equality sequences.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 16:21:18 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Oct 2008 10:40:56 GMT"
},
{
"version": "v3",
"created": "Sat, 18 Oct 2008 11:45:23 GMT"
}
] | 2008-10-18T00:00:00 | [
[
"Pad",
"P.",
""
],
[
"Marvasti",
"F.",
""
],
[
"Alishahi",
"K.",
""
],
[
"Akbari",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4709 | Igor Yurkevich | A. S. Stepanenko, C. C. Constantinou, I. V. Yurkevich and I. V. Lerner | Temporal Correlations of Local Network Losses | null | Phys. Rev. E 77, 046115 (2008) | 10.1103/PhysRevE.77.046115 | null | cs.NI cond-mat.stat-mech | null | We introduce a continuum model describing data losses in a single node of a
packet-switched network (like the Internet) which preserves the discrete nature
of the data loss process. {\em By construction}, the model has critical
behavior with a sharp transition from exponentially small to finite losses with
increasing data arrival rate. We show that such a model exhibits strong
fluctuations in the loss rate at the critical point and non-Markovian power-law
correlations in time, in spite of the Markovian character of the data arrival
process. The continuum model allows for rather general incoming data packet
distributions and can be naturally generalized to consider the buffer server
idleness statistics.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 16:40:02 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Stepanenko",
"A. S.",
""
],
[
"Constantinou",
"C. C.",
""
],
[
"Yurkevich",
"I. V.",
""
],
[
"Lerner",
"I. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0801.4714 | Miroslava Sotakova | Miroslava Sotakova | Breaking One-Round Key-Agreement Protocols in the Random Oracle Model | 6 pages | null | null | null | cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study one-round key-agreement protocols analogous to
Merkle's puzzles in the random oracle model. The players Alice and Bob are
allowed to query a random permutation oracle $n$ times and upon their queries
and communication, they both output the same key with high probability. We
prove that Eve can always break such a protocol by querying the oracle $O(n^2)$
times. The long-time unproven optimality of the quadratic bound in the fully
general, multi-round scenario has been shown recently by Barak and
Mahmoody-Ghidary. The results in this paper have been found independently of
their work.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 19:34:34 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Mar 2008 21:02:49 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Mar 2009 12:17:31 GMT"
}
] | 2009-03-24T00:00:00 | [
[
"Sotakova",
"Miroslava",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0801.4716 | Jean-Yves Antoine | Tonio Wandmacher, Jean-Yves Antoine | Methods to integrate a language model with semantic information for a
word prediction component | 10 pages ; EMNLP'2007 Conference (Prague) | null | null | null | cs.CL | null | Most current word prediction systems make use of n-gram language models (LM)
to estimate the probability of the following word in a phrase. In the past
years there have been many attempts to enrich such language models with further
syntactic or semantic information. We want to explore the predictive powers of
Latent Semantic Analysis (LSA), a method that has been shown to provide
reliable information on long-distance semantic dependencies between words in a
context. We present and evaluate here several methods that integrate LSA-based
information with a standard language model: a semantic cache, partial
reranking, and different forms of interpolation. We found that all methods show
significant improvements, compared to the 4-gram baseline, and most of them to
a simple cache model as well.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 17:10:24 GMT"
}
] | 2008-01-31T00:00:00 | [
[
"Wandmacher",
"Tonio",
""
],
[
"Antoine",
"Jean-Yves",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0801.4746 | W Saba | Walid S. Saba | Concerning Olga, the Beautiful Little Street Dancer (Adjectives as
Higher-Order Polymorphic Functions) | 6 pages | null | null | null | cs.CL cs.LO | null | In this paper we suggest a typed compositional seman-tics for nominal
compounds of the form [Adj Noun] that models adjectives as higher-order
polymorphic functions, and where types are assumed to represent concepts in an
ontology that reflects our commonsense view of the world and the way we talk
about it in or-dinary language. In addition to [Adj Noun] compounds our
proposal seems also to suggest a plausible explana-tion for well known
adjective ordering restrictions.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 19:40:45 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Jan 2008 17:10:22 GMT"
},
{
"version": "v3",
"created": "Fri, 1 Feb 2008 01:34:55 GMT"
},
{
"version": "v4",
"created": "Mon, 4 Feb 2008 22:36:04 GMT"
},
{
"version": "v5",
"created": "Sun, 10 Feb 2008 08:26:02 GMT"
}
] | 2008-02-10T00:00:00 | [
[
"Saba",
"Walid S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0801.4750 | Maxime Gariel | Maxime Gariel, Eric Feron | Graceful Degradation of Air Traffic Operations | null | null | null | null | cs.OH | null | The introduction of new technologies and concepts of operation in the air
transportation system is not possible, unless they can be proven not to
adversely affect the system operation under not only nominal, but also degraded
conditions. In extreme scenarios, degraded operations due to partial or
complete technological failures should never endanger system safety. Many past
system evolutions, whether ground-based or airborne, have been based on
trial-and-error, and system safety was addressed only after a specific event
yielded dramatic or near- dramatic consequences. Future system evolutions,
however, must leverage available computation, prior knowledge and abstract
reasoning to anticipate all possible system degradations and prove that such
degradations are graceful and safe. This paper is concerned with the graceful
degradation of high-density, structured arrival traffic against partial or
complete surveillance failures. It is shown that for equal performance
requirements, some traffic configurations might be easier to handle than
others, thereby offering a quantitative perspective on these traffic
configurations. ability to "gracefully degrade". To support our work, we also
introduce a new conflict resolution algorithm, aimed at solving conflicts
involving many aircraft when aircraft position information is in the process of
degrading.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 19:50:44 GMT"
}
] | 2008-01-31T00:00:00 | [
[
"Gariel",
"Maxime",
""
],
[
"Feron",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0801.4774 | Grenville Croll | Thomas A. Grossman | Source Code Protection for Applications Written in Microsoft Excel and
Google Spreadsheet | 11 pages | Proc. European Spreadsheet Risks Int. Grp. 2007 81-91 ISBN
978-905617-58-6 | null | null | cs.SE | null | Spreadsheets are used to develop application software that is distributed to
users. Unfortunately, the users often have the ability to change the
programming statements ("source code") of the spreadsheet application. This
causes a host of problems. By critically examining the suitability of
spreadsheet computer programming languages for application development, six
"application development features" are identified, with source code protection
being the most important. We investigate the status of these features and
discuss how they might be implemented in the dominant Microsoft Excel
spreadsheet and in the new Google Spreadsheet. Although Google Spreadsheet
currently provides no source code control, its web-centric delivery model
offers technical advantages for future provision of a rich set of features.
Excel has a number of tools that can be combined to provide "pretty good
protection" of source code, but weak passwords reduce its robustness. User
access to Excel source code must be considered a programmer choice rather than
an attribute of the spreadsheet.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 21:35:17 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Grossman",
"Thomas A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0801.4775 | Grenville Croll | Harmen Ettema, Paul Janssen, Jacques de Swart | Spreadsheet Assurance by "Control Around" is a Viable Alternative to the
Traditional Approach | 9 pages, one colour diagram and a client case study | Proc. European Spreadsheet Risks Int. Grp. 2001 107-116 ISBN:1
86166 179 7 | null | null | cs.SE | null | The traditional approach to spreadsheet auditing generally consists of
auditing every distinct formula within a spreadsheet. Although tools are
developed to support auditors during this process, the approach is still very
time consuming and therefore relatively expensive. As an alternative to the
traditional "control through" approach, this paper discusses a "control around"
approach. Within the proposed approach not all distinct formulas are audited
separately, but the relationship between input data and output data of a
spreadsheet is audited through comparison with a shadow model developed in a
modelling language. Differences between the two models then imply possible
errors in the spreadsheet. This paper describes relevant issues regarding the
"control around" approach and the circumstances in which this approach is
preferred above a traditional spreadsheet audit approach.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 21:53:43 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Ettema",
"Harmen",
""
],
[
"Janssen",
"Paul",
""
],
[
"de Swart",
"Jacques",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0801.4777 | Anil Ada | Anil Ada | Non-Deterministic Communication Complexity of Regular Languages | Master's thesis, 93 pages | null | null | null | cs.CC | null | In this thesis, we study the place of regular languages within the
communication complexity setting. In particular, we are interested in the
non-deterministic communication complexity of regular languages.
We show that a regular language has either O(1) or Omega(log n)
non-deterministic complexity. We obtain several linear lower bound results
which cover a wide range of regular languages having linear non-deterministic
complexity. These lower bound results also imply a result in semigroup theory:
we obtain sufficient conditions for not being in the positive variety Pol(Com).
To obtain our results, we use algebraic techniques. In the study of regular
languages, the algebraic point of view pioneered by Eilenberg (\cite{Eil74})
has led to many interesting results. Viewing a semigroup as a computational
device that recognizes languages has proven to be prolific from both semigroup
theory and formal languages perspectives. In this thesis, we provide further
instances of such mutualism.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 21:55:13 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Ada",
"Anil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.4790 | Joel Ratsaby | Joel Ratsaby | Information Width | Typo error in eq. (13) | null | null | null | cs.DM cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kolmogorov argued that the concept of information exists also in problems
with no underlying stochastic model (as Shannon's information representation)
for instance, the information contained in an algorithm or in the genome. He
introduced a combinatorial notion of entropy and information $I(x:\sy)$
conveyed by a binary string $x$ about the unknown value of a variable $\sy$.
The current paper poses the following questions: what is the relationship
between the information conveyed by $x$ about $\sy$ to the description
complexity of $x$ ? is there a notion of cost of information ? are there limits
on how efficient $x$ conveys information ?
To answer these questions Kolmogorov's definition is extended and a new
concept termed {\em information width} which is similar to $n$-widths in
approximation theory is introduced. Information of any input source, e.g.,
sample-based, general side-information or a hybrid of both can be evaluated by
a single common formula. An application to the space of binary functions is
considered.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 22:49:57 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jul 2008 09:46:33 GMT"
}
] | 2008-07-01T00:00:00 | [
[
"Ratsaby",
"Joel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0801.4794 | Joel Ratsaby | Joel Ratsaby | On the Complexity of Binary Samples | null | null | null | null | cs.DM cs.AI cs.LG | null | Consider a class $\mH$ of binary functions $h: X\to\{-1, +1\}$ on a finite
interval $X=[0, B]\subset \Real$. Define the {\em sample width} of $h$ on a
finite subset (a sample) $S\subset X$ as $\w_S(h) \equiv \min_{x\in S}
|\w_h(x)|$, where $\w_h(x) = h(x) \max\{a\geq 0: h(z)=h(x), x-a\leq z\leq
x+a\}$. Let $\mathbb{S}_\ell$ be the space of all samples in $X$ of cardinality
$\ell$ and consider sets of wide samples, i.e., {\em hypersets} which are
defined as $A_{\beta, h} = \{S\in \mathbb{S}_\ell: \w_{S}(h) \geq \beta\}$.
Through an application of the Sauer-Shelah result on the density of sets an
upper estimate is obtained on the growth function (or trace) of the class
$\{A_{\beta, h}: h\in\mH\}$, $\beta>0$, i.e., on the number of possible
dichotomies obtained by intersecting all hypersets with a fixed collection of
samples $S\in\mathbb{S}_\ell$ of cardinality $m$. The estimate is
$2\sum_{i=0}^{2\lfloor B/(2\beta)\rfloor}{m-\ell\choose i}$.
| [
{
"version": "v1",
"created": "Wed, 30 Jan 2008 23:14:19 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Ratsaby",
"Joel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0801.4802 | Grenville Croll | Alan Rust, Brian Bishop, Kevin McDaid | Investigating the Potential of Test-Driven Development for Spreadsheet
Engineering | 11 pages, 5 colour figures, 2 case studies | Proc. European Spreadsheet Risks Int. Grp. 2006 95-105
ISBN:1-905617-08-9 | null | null | cs.SE | null | It is widely documented that the absence of a structured approach to
spreadsheet engineering is a key factor in the high level of spreadsheet
errors. In this paper we propose and investigate the application of Test-Driven
Development to the creation of spreadsheets. Test-Driven Development is an
emerging development technique in software engineering that has been shown to
result in better quality software code. It has also been shown that this code
requires less testing and is easier to maintain. Through a pair of case studies
we demonstrate that Test-Driven Development can be applied to the development
of spreadsheets. We present the detail of these studies preceded by a clear
explanation of the technique and its application to spreadsheet engineering. A
supporting tool under development by the authors is also documented along with
proposed research to determine the effectiveness of the methodology and the
associated tool.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 00:39:38 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Rust",
"Alan",
""
],
[
"Bishop",
"Brian",
""
],
[
"McDaid",
"Kevin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0801.4807 | Syed Ali Jafri | Syed Ali Raza Jafri, Mireille Boutin, and Edward J. Delp | Automatic Text Area Segmentation in Natural Images | null | null | null | null | cs.CV | null | We present a hierarchical method for segmenting text areas in natural images.
The method assumes that the text is written with a contrasting color on a more
or less uniform background. But no assumption is made regarding the language or
character set used to write the text. In particular, the text can contain
simple graphics or symbols. The key feature of our approach is that we first
concentrate on finding the background of the text, before testing whether there
is actually text on the background. Since uniform areas are easy to find in
natural images, and since text backgrounds define areas which contain "holes"
(where the text is written) we thus look for uniform areas containing "holes"
and label them as text backgrounds candidates. Each candidate area is then
further tested for the presence of text within its convex hull. We tested our
method on a database of 65 images including English and Urdu text. The method
correctly segmented all the text areas in 63 of these images, and in only 4 of
these were areas that do not contain text also segmented.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 01:46:32 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Jafri",
"Syed Ali Raza",
""
],
[
"Boutin",
"Mireille",
""
],
[
"Delp",
"Edward J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0801.4817 | Shenghui Su | Shenghui Su and Shuwang Lv | The REESSE2+ Public-key Encryption Scheme | 11 pages, 2 tables | null | null | null | cs.CR cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper gives the definitions of an anomalous super-increasing sequence
and an anomalous subset sum separately, proves the two properties of an
anomalous super-increasing sequence, and proposes the REESSE2+ public-key
encryption scheme which includes the three algorithms for key generation,
encryption and decryption. The paper discusses the necessity and sufficiency of
the lever function for preventing the Shamir extremum attack, analyzes the
security of REESSE2+ against extracting a private key from a public key through
the exhaustive search, recovering a plaintext from a ciphertext plus a knapsack
of high density through the L3 lattice basis reduction method, and
heuristically obtaining a plaintext through the meet-in-the-middle attack or
the adaptive-chosen-ciphertext attack. The authors evaluate the time complexity
of REESSE2+ encryption and decryption algorithms, compare REESSE2+ with ECC and
NTRU, and find that the encryption speed of REESSE2+ is ten thousand times
faster than ECC and NTRU bearing the equivalent security, and the decryption
speed of REESSE2+ is roughly equivalent to ECC and NTRU respectively.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 03:50:39 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Feb 2008 17:56:47 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Nov 2014 15:57:54 GMT"
}
] | 2014-11-04T00:00:00 | [
[
"Su",
"Shenghui",
""
],
[
"Lv",
"Shuwang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.4845 | Shailesh Vaya | Carlos Brito and Shailesh Vaya | Improved lower bound for deterministic broadcasting in radio networks | 13 pages | null | null | null | cs.DM cs.DC | null | We consider the problem of deterministic broadcasting in radio networks when
the nodes have limited knowledge about the topology of the network. We show
that for every deterministic broadcasting protocol there exists a network, of
radius 2, for which the protocol takes at least $\Omega(\sqrt{n}) rounds for
completing the broadcast. Our argument can be extended to prove a lower bound
of Omega(\sqrt{nD}) rounds for broadcasting in radio networks of radius D. This
resolves one of the open problems posed in [29], where in the authors proved a
lower bound of $\Omega(n^{1/4}) rounds for broadcasting in constant diameter
networks.
We prove the new lower $\Omega(\sqrt{n})$ bound for a special family of
radius 2 networks. Each network of this family consists of O(\sqrt{n})
components which are connected to each other via only the source node. At the
heart of the proof is a novel simulation argument, which essentially says that
any arbitrarily complicated strategy of the source node can be simulated by the
nodes of the networks, if the source node just transmits partial topological
knowledge about some component instead of arbitrary complicated messages. To
the best of our knowledge this type of simulation argument is novel and may be
useful in further improving the lower bound or may find use in other
applications.
Keywords: radio networks, deterministic broadcast, lower bound, advice
string, simulation, selective families, limited topological knowledge.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 10:27:10 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Brito",
"Carlos",
""
],
[
"Vaya",
"Shailesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0801.4851 | Rajgopal Kannan | Costas Busch and Rajgopal Kannan | Bicretieria Optimization in Routing Games | 15 pages, submitted to SPAA | null | null | null | cs.GT cs.DS | null | Two important metrics for measuring the quality of routing paths are the
maximum edge congestion $C$ and maximum path length $D$. Here, we study
bicriteria in routing games where each player $i$ selfishly selects a path that
simultaneously minimizes its maximum edge congestion $C_i$ and path length
$D_i$. We study the stability and price of anarchy of two bicriteria games:
- {\em Max games}, where the social cost is $\max(C,D)$ and the player cost
is $\max(C_i, D_i)$. We prove that max games are stable and convergent under
best-response dynamics, and that the price of anarchy is bounded above by the
maximum path length in the players' strategy sets. We also show that this bound
is tight in worst-case scenarios.
- {\em Sum games}, where the social cost is $C+D$ and the player cost is
$C_i+D_i$. For sum games, we first show the negative result that there are game
instances that have no Nash-equilibria. Therefore, we examine an approximate
game called the {\em sum-bucket game} that is always convergent (and therefore
stable). We show that the price of anarchy in sum-bucket games is bounded above
by $C^* \cdot D^* / (C^* + D^*)$ (with a poly-log factor), where $C^*$ and
$D^*$ are the optimal coordinated congestion and path length. Thus, the
sum-bucket game has typically superior price of anarchy bounds than the max
game. In fact, when either $C^*$ or $D^*$ is small (e.g. constant) the social
cost of the Nash-equilibria is very close to the coordinated optimal $C^* +
D^*$ (within a poly-log factor). We also show that the price of anarchy bound
is tight for cases where both $C^*$ and $D^*$ are large.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 19:29:13 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Busch",
"Costas",
""
],
[
"Kannan",
"Rajgopal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0801.4911 | Oleg Verbitsky | Oleg Verbitsky | On the Double Coset Membership Problem for Permutation Groups | 14 pages | Algebraic structures and their applications, pp. 351--363 (2002) | null | null | cs.CC | null | We show that the Double Coset Membership problem for permutation groups
possesses perfect zero-knowledge proofs.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 16:19:20 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Verbitsky",
"Oleg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0801.4917 | Oleg Verbitsky | Oleg Verbitsky | Zero-Knowledge Proofs of the Conjugacy for Permutation Groups | 12 pages | Bulletin of the Lviv University, Series in Mechanics and
Mathematics. Vol. 61, pp. 195--205 (2003) | null | null | cs.CC | null | We design a perfect zero-knowledge proof system for recognition if two
permutation groups are conjugate.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 16:33:15 GMT"
}
] | 2008-02-01T00:00:00 | [
[
"Verbitsky",
"Oleg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.0003 | Denis Krotov | Yuriy Vasil'ev (Sobolev Institute of Mathematics, Novosibirsk,
Russia), Sergey Avgustinovich (Sobolev Institute of Mathematics, Novosibirsk,
Russia), Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On mobile sets in the binary hypercube | 9p., in Russian (English version will be finished later) | Diskretn. Anal. Issled. Oper. 15(3) 2008, 11-21 (in Russian) | null | null | math.CO cs.IT math.IT | null | If two distance-3 codes have the same neighborhood, then each of them is
called a mobile set. In the (4k+3)-dimensional binary hypercube, there exists a
mobile set of cardinality 2*6^k that cannot be split into mobile sets of
smaller cardinalities or represented as a natural extension of a mobile set in
a hypercube of smaller dimension. Keywords: mobile set; 1-perfect code.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 20:58:51 GMT"
}
] | 2008-08-06T00:00:00 | [
[
"Vasil'ev",
"Yuriy",
"",
"Sobolev Institute of Mathematics, Novosibirsk,\n Russia"
],
[
"Avgustinovich",
"Sergey",
"",
"Sobolev Institute of Mathematics, Novosibirsk,\n Russia"
],
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0006 | Edward G. Effros | Edward G. Effros | New Perspectives and some Celebrated Quantum Inequalities | null | null | null | null | math-ph cs.IT math.IT math.MP | null | Some of the important inequalities associated with quantum entropy are
immediate algebraic consequences of the Hansen-Pedersen-Jensen inequality. A
general argument is given in terms of the matrix perspective of an operator
convex function. A matrix analogue of Mar\'{e}chal's extended perspectives
provides additional inequalities, including a $p+q\leq 1$ result of Lieb.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 21:03:50 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2008 00:24:10 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Effros",
"Edward G.",
""
]
] | [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0802.0017 | Amir Rothschild | Amihood Amir and Klim Efremenko and Oren Kapah and Ely Porat and Amir
Rothschild | Improved Deterministic Length Reduction | 7 pages | null | null | null | cs.DS | null | This paper presents a new technique for deterministic length reduction. This
technique improves the running time of the algorithm presented in \cite{LR07}
for performing fast convolution in sparse data. While the regular fast
convolution of vectors $V_1,V_2$ whose sizes are $N_1,N_2$ respectively, takes
$O(N_1 \log N_2)$ using FFT, using the new technique for length reduction, the
algorithm proposed in \cite{LR07} performs the convolution in $O(n_1 \log^3
n_1)$, where $n_1$ is the number of non-zero values in $V_1$. The algorithm
assumes that $V_1$ is given in advance, and $V_2$ is given in running time. The
novel technique presented in this paper improves the convolution time to $O(n_1
\log^2 n_1)$ {\sl deterministically}, which equals the best running time given
achieved by a {\sl randomized} algorithm.
The preprocessing time of the new technique remains the same as the
preprocessing time of \cite{LR07}, which is $O(n_1^2)$. This assumes and deals
the case where $N_1$ is polynomial in $n_1$. In the case where $N_1$ is
exponential in $n_1$, a reduction to a polynomial case can be used. In this
paper we also improve the preprocessing time of this reduction from $O(n_1^4)$
to $O(n_1^3{\rm polylog}(n_1))$.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 21:59:33 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Amir",
"Amihood",
""
],
[
"Efremenko",
"Klim",
""
],
[
"Kapah",
"Oren",
""
],
[
"Porat",
"Ely",
""
],
[
"Rothschild",
"Amir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.0024 | Fran\c{c}ois Nicolas | Sylvain Guillemot and Francois Nicolas | Solving the Maximum Agreement SubTree and the Maximum Compatible Tree
problems on many bounded degree trees | Revised version of our paper from CPM'06. 14 pages. 3 figures | Proceedings of the 17th Annual Symposium on Combinatorial Pattern
Matching (CPM'06), volume 4009 of Lecture Notes in Computer Science, pages
165--176. Springer-Verlag, 2006 | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a set of leaf-labeled trees with identical leaf sets, the well-known
"Maximum Agreement SubTree" problem (MAST) consists of finding a subtree
homeomorphically included in all input trees and with the largest number of
leaves. Its variant called "Maximum Compatible Tree" (MCT) is less stringent,
as it allows the input trees to be refined. Both problems are of particular
interest in computational biology, where trees encountered have often small
degrees.
In this paper, we study the parameterized complexity of MAST and MCT with
respect to the maximum degree, denoted by D, of the input trees. It is known
that MAST is polynomial for bounded D. As a counterpart, we show that the
problem is W[1]-hard with respect to parameter D. Moreover, relying on recent
advances in parameterized complexity we obtain a tight lower bound: while MAST
can be solved in O(N^{O(D)}) time where N denotes the input length, we show
that an O(N^{o(D)}) bound is not achievable, unless SNP is contained in SE. We
also show that MCT is W[1]-hard with respect to D, and that MCT cannot be
solved in O(N^{o(2^{D/2})}) time, SNP is contained in SE.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 16:18:04 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2008 01:54:34 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Jul 2008 10:35:55 GMT"
}
] | 2008-07-10T00:00:00 | [
[
"Guillemot",
"Sylvain",
""
],
[
"Nicolas",
"Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.0030 | Terence H. Chan | Terence Chan and Alex Grant | Mission impossible: Computing the network coding capacity region | null | null | null | null | cs.IT math.IT | null | One of the main theoretical motivations for the emerging area of network
coding is the achievability of the max-flow/min-cut rate for single source
multicast. This can exceed the rate achievable with routing alone, and is
achievable with linear network codes. The multi-source problem is more
complicated. Computation of its capacity region is equivalent to determination
of the set of all entropy functions $\Gamma^*$, which is non-polyhedral. The
aim of this paper is to demonstrate that this difficulty can arise even in
single source problems. In particular, for single source networks with
hierarchical sink requirements, and for single source networks with secrecy
constraints. In both cases, we exhibit networks whose capacity regions involve
$\Gamma^*$. As in the multi-source case, linear codes are insufficient.
| [
{
"version": "v1",
"created": "Thu, 31 Jan 2008 23:04:19 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0116 | Lutz Schr\"oder | Lutz Schr\"oder and Dirk Patinson | Shallow Models for Non-Iterative Modal Logics | null | null | null | Imperial College TR Computing 2008/3 | cs.LO cs.AI cs.CC cs.MA | null | The methods used to establish PSPACE-bounds for modal logics can roughly be
grouped into two classes: syntax driven methods establish that exhaustive proof
search can be performed in polynomial space whereas semantic approaches
directly construct shallow models. In this paper, we follow the latter approach
and establish generic PSPACE-bounds for a large and heterogeneous class of
modal logics in a coalgebraic framework. In particular, no complete
axiomatisation of the logic under scrutiny is needed. This does not only
complement our earlier, syntactic, approach conceptually, but also covers a
wide variety of new examples which are difficult to harness by purely syntactic
means. Apart from re-proving known complexity bounds for a large variety of
structurally different logics, we apply our method to obtain previously unknown
PSPACE-bounds for Elgesem's logic of agency and for graded modal logic over
reflexive frames.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 13:11:09 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Mar 2008 20:48:05 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Apr 2008 09:34:18 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Schröder",
"Lutz",
""
],
[
"Patinson",
"Dirk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0802.0130 | Zeev Schuss | D. Ezri, B.Z. Bobrovsky, Z. Schuss | About the true type of smoothers | Non-causal estimation | null | null | null | math.OC cs.IT math.IT | null | We employ the variational formulation and the Euler-Lagrange equations to
study the steady-state error in linear non-causal estimators (smoothers). We
give a complete description of the steady-state error for inputs that are
polynomial in time. We show that the steady-state error regime in a smoother is
similar to that in a filter of double the type. This means that the
steady-state error in the optimal smoother is significantly smaller than that
in the Kalman filter. The results reveal a significant advantage of smoothing
over filtering with respect to robustness to model uncertainty.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 14:23:31 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Ezri",
"D.",
""
],
[
"Bobrovsky",
"B. Z.",
""
],
[
"Schuss",
"Z.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0137 | Pierre Sutra | Pierre Sutra (INRIA Rocquencourt), Marc Shapiro (INRIA Rocquencourt) | Fault-Tolerant Partial Replication in Large-Scale Database Systems | null | null | null | RR-6440 | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate a decentralised approach to committing transactions in a
replicated database, under partial replication. Previous protocols either
re-execute transactions entirely and/or compute a total order of transactions.
In contrast, ours applies update values, and orders only conflicting
transactions. It results that transactions execute faster, and distributed
databases commit in small committees. Both effects contribute to preserve
scalability as the number of databases and transactions increase. Our algorithm
ensures serializability, and is live and safe in spite of faults.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 14:47:24 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2008 16:47:09 GMT"
},
{
"version": "v3",
"created": "Tue, 31 Mar 2009 14:41:43 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Sutra",
"Pierre",
"",
"INRIA Rocquencourt"
],
[
"Shapiro",
"Marc",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0802.0179 | Salim El Rouayheb | Salim El Rouayheb, Alex Sprintson, Costas Georghiades | On the Relation Between the Index Coding and the Network Coding Problems | null | null | null | null | cs.IT math.IT | null | In this paper we show that the Index Coding problem captures several
important properties of the more general Network Coding problem. An instance of
the Index Coding problem includes a server that holds a set of information
messages $X=\{x_1,...,x_k\}$ and a set of receivers $R$. Each receiver has some
side information, known to the server, represented by a subset of $X$ and
demands another subset of $X$. The server uses a noiseless communication
channel to broadcast encodings of messages in $X$ to satisfy the receivers'
demands. The goal of the server is to find an encoding scheme that requires the
minimum number of transmissions.
We show that any instance of the Network Coding problem can be efficiently
reduced to an instance of the Index Coding problem. Our reduction shows that
several important properties of the Network Coding problem carry over to the
Index Coding problem. In particular, we prove that both scalar linear and
vector linear codes are insufficient for achieving the minimal number of
transmissions.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 20:02:06 GMT"
},
{
"version": "v2",
"created": "Mon, 12 May 2008 19:15:36 GMT"
}
] | 2008-05-12T00:00:00 | [
[
"Rouayheb",
"Salim El",
""
],
[
"Sprintson",
"Alex",
""
],
[
"Georghiades",
"Costas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0188 | J\'er\^ome Feret | J\'er\^ome Feret | Partitioning the Threads of a Mobile System | null | null | null | null | cs.OH | null | In this paper, we show how thread partitioning helps in proving properties of
mobile systems. Thread partitioning consists in gathering the threads of a
mobile system into several classes. The partitioning criterion is left as a
parameter of both the mobility model and the properties we are interested in.
Then, we design a polynomial time abstract interpretation-based static analysis
that counts the number of threads inside each partition class.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 19:46:39 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Feret",
"Jérôme",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0802.0212 | Christine C\'ordula Dantas | Miriam C. B. Alves, Christine C. Dantas, Nanci N. Arai, Rovedy B. da
Silva (Institute of Aeronautics and Space - IAE/CTA, Brazil) | A topological formal treatment for scenario-based software specification
of concurrent real-time systems | 20th International Conference on Software and Systems Engineering and
their Applications, Conservatoire des Arts & Metiers, Paris, France, 4-6
December 2007 | null | null | null | cs.SE cs.LO | null | Real-time systems are computing systems in which the meeting of their
requirements is vital for their correctness. Consequently, if the real-time
requirements of these systems are poorly understood and verified, the results
can be disastrous and lead to irremediable project failures at the early phases
of development. The present work addresses the problem of detecting deadlock
situations early in the requirements specification phase of a concurrent real
time system, proposing a simple proof-of-concepts prototype that joins
scenario-based requirements specifications and techniques based on topology.
The efforts are concentrated in the integration of the formal representation of
Message Sequence Chart scenarios into the deadlock detection algorithm of
Fajstrup et al., based on geometric and algebraic topology.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2008 22:12:47 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Alves",
"Miriam C. B.",
"",
"Institute of Aeronautics and Space - IAE/CTA, Brazil"
],
[
"Dantas",
"Christine C.",
"",
"Institute of Aeronautics and Space - IAE/CTA, Brazil"
],
[
"Arai",
"Nanci N.",
"",
"Institute of Aeronautics and Space - IAE/CTA, Brazil"
],
[
"da Silva",
"Rovedy B.",
"",
"Institute of Aeronautics and Space - IAE/CTA, Brazil"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.0249 | Gerard Henry Edmond Duchamp | G. H. E. Duchamp (LIPN), P. Blasiak (IFJ-Pan), A. Horzela (IFJ-Pan),
K. A. Penson (LPTMC), A. I. Solomon | Hopf Algebras in General and in Combinatorial Physics: a practical
introduction | null | null | null | null | quant-ph cs.SC math.CO | null | This tutorial is intended to give an accessible introduction to Hopf
algebras. The mathematical context is that of representation theory, and we
also illustrate the structures with examples taken from combinatorics and
quantum physics, showing that in this latter case the axioms of Hopf algebra
arise naturally. The text contains many exercises, some taken from physics,
aimed at expanding and exemplifying the concepts introduced.
| [
{
"version": "v1",
"created": "Sat, 2 Feb 2008 15:06:41 GMT"
}
] | 2008-02-09T00:00:00 | [
[
"Duchamp",
"G. H. E.",
"",
"LIPN"
],
[
"Blasiak",
"P.",
"",
"IFJ-Pan"
],
[
"Horzela",
"A.",
"",
"IFJ-Pan"
],
[
"Penson",
"K. A.",
"",
"LPTMC"
],
[
"Solomon",
"A. I.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.0251 | Fabrice Rossi | Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE),
Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis, LITA) | Multi-Layer Perceptrons and Symbolic Data | null | Symbolic Data Analysis and the SODAS Software Wiley (Ed.) (2008)
373-391 | null | null | cs.NE | null | In some real world situations, linear models are not sufficient to represent
accurately complex relations between input variables and output variables of a
studied system. Multilayer Perceptrons are one of the most successful
non-linear regression tool but they are unfortunately restricted to inputs and
outputs that belong to a normed vector space. In this chapter, we propose a
general recoding method that allows to use symbolic data both as inputs and
outputs to Multilayer Perceptrons. The recoding is quite simple to implement
and yet provides a flexible framework that allows to deal with almost all
practical cases. The proposed method is illustrated on a real world data set.
| [
{
"version": "v1",
"created": "Sat, 2 Feb 2008 15:09:42 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE"
],
[
"Conan-Guez",
"Brieuc",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis, LITA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.0252 | Fabrice Rossi | Brieuc Conan-Guez (LITA), Fabrice Rossi (INRIA Rocquencourt / INRIA
Sophia Antipolis) | Acc\'el\'eration des cartes auto-organisatrices sur tableau de
dissimilarit\'es par s\'eparation et \'evaluation | A para\^itre | REVUE DES NOUVELLES TECHNOLOGIES DE L'INFORMATION (2008) | null | null | cs.NE | null | In this paper, a new implementation of the adaptation of Kohonen
self-organising maps (SOM) to dissimilarity matrices is proposed. This
implementation relies on the branch and bound principle to reduce the algorithm
running time. An important property of this new approach is that the obtained
algorithm produces exactly the same results as the standard algorithm.
| [
{
"version": "v1",
"created": "Sat, 2 Feb 2008 15:10:35 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA\n Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.0260 | Ritabrata Sengupta | L. Jeganathan, R. Rama, Ritabrata Sengupta | A proposal to a generalised splicing with a self assembly approach | 8 pages, 3 figures | null | null | null | cs.DM | null | Theory of splicing is an abstract model of the recombinant behaviour of DNAs.
In a splicing system, two strings to be spliced are taken from the same set and
the splicing rule is from another set. Here we propose a generalised splicing
(GS) model with three components, two strings from two languages and a splicing
rule from third component. We propose a generalised self assembly (GSA) of
strings. Two strings $u_1xv_1$ and $u_2xv_2$ self assemble over $x$ and
generate $u_1xv_2$ and $u_2xv_1$. We study the relationship between GS and GSA.
We study some classes of generalised splicing languages with the help of
generalised self assembly.
| [
{
"version": "v1",
"created": "Sat, 2 Feb 2008 17:12:45 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Jeganathan",
"L.",
""
],
[
"Rama",
"R.",
""
],
[
"Sengupta",
"Ritabrata",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.0287 | Fabrice Rossi | Catherine Krier (DICE), Fabrice Rossi (INRIA Rocquencourt / INRIA
Sophia Antipolis), Damien Fran\c{c}ois (CESAME), Michel Verleysen (DICE -
MLG) | A data-driven functional projection approach for the selection of
feature ranges in spectra with ICA or cluster analysis | A paraitre | Chemometrics and Intelligent Laboratory Systems (2008) | 10.1016/j.chemolab.2007.09.004 | null | cs.NE | null | Prediction problems from spectra are largely encountered in chemometry. In
addition to accurate predictions, it is often needed to extract information
about which wavelengths in the spectra contribute in an effective way to the
quality of the prediction. This implies to select wavelengths (or wavelength
intervals), a problem associated to variable selection. In this paper, it is
shown how this problem may be tackled in the specific case of smooth (for
example infrared) spectra. The functional character of the spectra (their
smoothness) is taken into account through a functional variable projection
procedure. Contrarily to standard approaches, the projection is performed on a
basis that is driven by the spectra themselves, in order to best fit their
characteristics. The methodology is illustrated by two examples of functional
projection, using Independent Component Analysis and functional variable
clustering, respectively. The performances on two standard infrared spectra
benchmarks are illustrated.
| [
{
"version": "v1",
"created": "Sun, 3 Feb 2008 19:02:49 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Krier",
"Catherine",
"",
"DICE"
],
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA\n Sophia Antipolis"
],
[
"François",
"Damien",
"",
"CESAME"
],
[
"Verleysen",
"Michel",
"",
"DICE -\n MLG"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.0314 | Fran\c{c}ois Nicolas | Morris Michael and Francois Nicolas and Esko Ukkonen | On the complexity of finding gapped motifs | Published in Journal of Discrete Algorithms | null | 10.1016/j.jda.2009.12.001 | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the corresponding author because the newest
version is now published in Journal of Discrete Algorithms.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 00:08:40 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Feb 2008 09:12:24 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Dec 2009 14:19:13 GMT"
},
{
"version": "v4",
"created": "Wed, 10 Feb 2010 19:26:58 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Aug 2010 01:00:49 GMT"
},
{
"version": "v6",
"created": "Wed, 1 Sep 2010 13:21:53 GMT"
}
] | 2010-09-02T00:00:00 | [
[
"Michael",
"Morris",
""
],
[
"Nicolas",
"Francois",
""
],
[
"Ukkonen",
"Esko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.0342 | Bobak Nazer | Bobak Nazer and Michael Gastpar | The Case for Structured Random Codes in Network Capacity Theorems | 23 pages, 7 figures, To appear in European Transactions on
Telecommunication: Special Issue on New Directions in Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random coding arguments are the backbone of most channel capacity
achievability proofs. In this paper, we show that in their standard form, such
arguments are insufficient for proving some network capacity theorems:
structured coding arguments, such as random linear or lattice codes, attain
higher rates. Historically, structured codes have been studied as a stepping
stone to practical constructions. However, K\"{o}rner and Marton demonstrated
their usefulness for capacity theorems through the derivation of the optimal
rate region of a distributed functional source coding problem. Here, we use
multicasting over finite field and Gaussian multiple-access networks as
canonical examples to demonstrate that even if we want to send bits over a
network, structured codes succeed where simple random codes fail. Beyond
network coding, we also consider distributed computation over noisy channels
and a special relay-type problem.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 07:14:40 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Nazer",
"Bobak",
""
],
[
"Gastpar",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0351 | Sunil Srinivasa | Sunil Srinivasa and Martin Haenggi | Path Loss Exponent Estimation in a Large Field of Interferers | Work underway | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless channels, the path loss exponent (PLE) has a strong impact on the
quality of links, and hence, it needs to be accurately estimated for the
efficient design and operation of wireless networks. In this paper, we address
the problem of PLE estimation in large wireless networks, which is relevant to
several important issues in networked communications such as localization,
energy-efficient routing, and channel access. We consider a large ad hoc
network where nodes are distributed as a homogeneous Poisson point process on
the plane and the channels are subject to Nakagami-m fading. We propose and
discuss three distributed algorithms for estimating the PLE under these
settings which explicitly take into account the interference in the network. In
addition, we provide simulation results to demonstrate the performance of the
algorithms and quantify the estimation errors. We also describe how to estimate
the PLE accurately even in networks with spatially varying PLEs and more
general node distributions.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 17:04:15 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Nov 2009 06:16:41 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Jan 2012 01:46:49 GMT"
}
] | 2012-01-24T00:00:00 | [
[
"Srinivasa",
"Sunil",
""
],
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0414 | Zeev Schuss | Doron Ezri, Ben-Tzion Bobrovsky, Zeev Schuss | The exit problem in optimal non-causal extimation | Loss of lock in nonlinear smoothers | null | null | null | math.OC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the phenomenon of loss of lock in the optimal non-causal phase
estimation problem, a benchmark problem in nonlinear estimation. Our method is
based on the computation of the asymptotic distribution of the optimal
estimation error in case the number of trajectories in the optimization problem
is finite. The computation is based directly on the minimum noise energy
optimality criterion rather than on state equations of the error, as is the
usual case in the literature. The results include an asymptotic computation of
the mean time to lose lock (MTLL) in the optimal smoother. We show that the
MTLL in the first and second order smoothers is significantly longer than that
in the causal extended Kalman filter.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 12:12:14 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Ezri",
"Doron",
""
],
[
"Bobrovsky",
"Ben-Tzion",
""
],
[
"Schuss",
"Zeev",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0423 | Tommy F\"arnqvist | Tommy F\"arnqvist, Peter Jonsson and Johan Thapper | Approximability Distance in the Space of H-Colourability Problems | 19 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph homomorphism is a vertex map which carries edges from a source graph
to edges in a target graph. We study the approximability properties of the
Weighted Maximum H-Colourable Subgraph problem (MAX H-COL). The instances of
this problem are edge-weighted graphs G and the objective is to find a subgraph
of G that has maximal total edge weight, under the condition that the subgraph
has a homomorphism to H; note that for H=K_k this problem is equivalent to MAX
k-CUT. To this end, we introduce a metric structure on the space of graphs
which allows us to extend previously known approximability results to larger
classes of graphs. Specifically, the approximation algorithms for MAX CUT by
Goemans and Williamson and MAX k-CUT by Frieze and Jerrum can be used to yield
non-trivial approximation results for MAX H-COL. For a variety of graphs, we
show near-optimality results under the Unique Games Conjecture. We also use our
method for comparing the performance of Frieze & Jerrum's algorithm with
Hastad's approximation algorithm for general MAX 2-CSP. This comparison is, in
most cases, favourable to Frieze & Jerrum.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 14:32:45 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Färnqvist",
"Tommy",
""
],
[
"Jonsson",
"Peter",
""
],
[
"Thapper",
"Johan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.0483 | Bernardo Huberman | Fang Wu and Bernardo A. Huberman | Popularity, Novelty and Attention | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the role that popularity and novelty play in attracting the
attention of users to dynamic websites. We do so by determining the performance
of three different strategies that can be utilized to maximize attention. The
first one prioritizes novelty while the second emphasizes popularity. A third
strategy looks myopically into the future and prioritizes stories that are
expected to generate the most clicks within the next few minutes. We show that
the first two strategies should be selected on the basis of the rate of novelty
decay, while the third strategy performs sub-optimally in most cases. We also
demonstrate that the relative performance of the first two strategies as a
function of the rate of novelty decay changes abruptly around a critical value,
resembling a phase transition in the physical world. 1
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 19:46:09 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Wu",
"Fang",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0802.0487 | Marius Zimand | Cristian Calude, Marius Zimand | Algorithmically independent sequences | null | null | null | null | cs.IT cs.SE math.AG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two objects are independent if they do not affect each other. Independence is
well-understood in classical information theory, but less in algorithmic
information theory. Working in the framework of algorithmic information theory,
the paper proposes two types of independence for arbitrary infinite binary
sequences and studies their properties. Our two proposed notions of
independence have some of the intuitive properties that one naturally expects.
For example, for every sequence $x$, the set of sequences that are independent
(in the weaker of the two senses) with $x$ has measure one. For both notions of
independence we investigate to what extent pairs of independent sequences, can
be effectively constructed via Turing reductions (from one or more input
sequences). In this respect, we prove several impossibility results. For
example, it is shown that there is no effective way of producing from an
arbitrary sequence with positive constructive Hausdorff dimension two sequences
that are independent (even in the weaker type of independence) and have
super-logarithmic complexity. Finally, a few conjectures and open questions are
discussed.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2008 20:32:07 GMT"
}
] | 2008-02-05T00:00:00 | [
[
"Calude",
"Cristian",
""
],
[
"Zimand",
"Marius",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0534 | Syed Jafar | Viveck R. Cadambe, Syed A. Jafar | Capacity of Wireless Networks within o(log(SNR)) - the Impact of Relays,
Feedback, Cooperation and Full-Duplex Operation | null | IEEE Transactions on Information Theory, Vol. 55, No. 5, May 2009,
Pages: 2334-2344 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work has characterized the sum capacity of
time-varying/frequency-selective wireless interference networks and $X$
networks within $o(\log({SNR}))$, i.e., with an accuracy approaching 100% at
high SNR (signal to noise power ratio). In this paper, we seek similar capacity
characterizations for wireless networks with relays, feedback, full duplex
operation, and transmitter/receiver cooperation through noisy channels. First,
we consider a network with $S$ source nodes, $R$ relay nodes and $D$
destination nodes with random time-varying/frequency-selective channel
coefficients and global channel knowledge at all nodes. We allow full-duplex
operation at all nodes, as well as causal noise-free feedback of all received
signals to all source and relay nodes. The sum capacity of this network is
characterized as $\frac{SD}{S+D-1}\log({SNR})+o(\log({SNR}))$. The implication
of the result is that the capacity benefits of relays, causal feedback,
transmitter/receiver cooperation through physical channels and full duplex
operation become a negligible fraction of the network capacity at high SNR.
Some exceptions to this result are also pointed out in the paper. Second, we
consider a network with $K$ full duplex nodes with an independent message from
every node to every other node in the network. We find that the sum capacity of
this network is bounded below by $\frac{K(K-1)}{2K-2}+o(\log({SNR}))$ and
bounded above by $\frac{K(K-1)}{2K-3}+o(\log({SNR}))$.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 00:21:05 GMT"
}
] | 2012-04-03T00:00:00 | [
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0543 | Kazem Jahanbakhsh | Kazem Jahanbakhsh, Marzieh Hajhosseini | Improving Performance of Cluster Based Routing Protocol using
Cross-Layer Design | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main goal of routing protocol is to efficiency delivers data from source
to destination. All routing protocols are the same in this goal, but the way
they adopt to achieve it is different, so routing strategy has an egregious
role on the performance of an ad hoc network. Most of routing protocols
proposed for ad hoc networks have a flat structure. These protocols expand the
control overhead packets to discover or maintain a route. On the other hand a
number of hierarchical-based routing protocols have been developed, mostly are
based on layered design. These protocols improve network performances
especially when the network size grows up since details about remote portion of
network can be handled in an aggregate manner. Although, there is another
approach to design a protocol called cross-layer design. Using this approach
information can exchange between different layer of protocol stack, result in
optimizing network performances.
In this paper, we intend to exert cross-layer design to optimize Cluster
Based Routing Protocol (Cross-CBRP). Using NS-2 network simulator we evaluate
rate of cluster head changes, throughput and packet delivery ratio. Comparisons
denote that Cross-CBRP has better performances with respect to the original
CBRP.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 02:17:30 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Jahanbakhsh",
"Kazem",
""
],
[
"Hajhosseini",
"Marzieh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.0550 | Vincent Gramoli | Erwan Le Merrer (IRISA, FT R&D), Vincent Gramoli (IRISA), Anne-Marie
Kermarrec (IRISA), Aline Viana (IRISA), Marin Bertier (IRISA) | Energy Aware Self-Organizing Density Management in Wireless Sensor
Networks | null | Dans International Workshop on Decentralized Resource Sharing in
Mobile Computing and Networking (2006) 23--29 | null | null | cs.DC | null | Energy consumption is the most important factor that determines sensor node
lifetime. The optimization of wireless sensor network lifetime targets not only
the reduction of energy consumption of a single sensor node but also the
extension of the entire network lifetime. We propose a simple and adaptive
energy-conserving topology management scheme, called SAND (Self-Organizing
Active Node Density). SAND is fully decentralized and relies on a distributed
probing approach and on the redundancy resolution of sensors for energy
optimizations, while preserving the data forwarding and sensing capabilities of
the network. We present the SAND's algorithm, its analysis of convergence, and
simulation results. Simulation results show that, though slightly increasing
path lengths from sensor to sink nodes, the proposed scheme improves
significantly the network lifetime for different neighborhood densities
degrees, while preserving both sensing and routing fidelity.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 07:03:28 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Merrer",
"Erwan Le",
"",
"IRISA, FT R&D"
],
[
"Gramoli",
"Vincent",
"",
"IRISA"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
],
[
"Viana",
"Aline",
"",
"IRISA"
],
[
"Bertier",
"Marin",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0802.0552 | Vincent Gramoli | Vincent Gramoli (INRIA Futurs), Michel Raynal (IRISA) | Timed Quorum System for Large-Scale and Dynamic Environments | null | Dans 11th International Conference On Principles Of Distributed
Systems 4878 (2007) 429--442 | null | null | cs.DC cs.NI | null | This paper presents Timed Quorum System (TQS), a new quorum system especially
suited for large-scale and dynamic systems. TQS requires that two quorums
intersect with high probability if they are used in the same small period of
time. It proposed an algorithm that implements TQS and that verifies
probabilistic atomicity: a consistency criterion that requires each operation
to respect atomicity with high probability. This TQS implementation has quorum
of size O(\sqrt{nD}) and expected access time of O(log \sqrt{nD}) message
delays, where n measures the size of the system and D is a required parameter
to handle dynamism.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 07:09:08 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Gramoli",
"Vincent",
"",
"INRIA Futurs"
],
[
"Raynal",
"Michel",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.0554 | Brian Kurkoski | Brian M. Kurkoski and Justin Dauwels | Message-Passing Decoding of Lattices Using Gaussian Mixtures | Cite this paper as: Brian Kurkoski and Justin Dauwels,
"Message-passing decoding of lattices using Gaussian mixtures," in
Proceedings of the 30th Symposium on Information Theory and its Applications
(SITA 2007), pp. 877-882, November 27-30, 2007, Shima, Mie, Japan | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lattice decoder which represents messages explicitly as a mixture of
Gaussians functions is given. In order to prevent the number of functions in a
mixture from growing as the decoder iterations progress, a method for replacing
N Gaussian functions with M Gaussian functions, with M < N, is given. A squared
distance metric is used to select functions for combining. A pair of selected
Gaussians is replaced by a single Gaussian with the same first and second
moments. The metric can be computed efficiently, and at the same time, the
proposed algorithm empirically gives good results, for example, a dimension 100
lattice has a loss of 0.2 dB in signal-to-noise ratio at a probability of
symbol error of 10^{-5}.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 07:12:38 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Kurkoski",
"Brian M.",
""
],
[
"Dauwels",
"Justin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0580 | Frans Willems | Frans M.J. Willems | Rotated and Scaled Alamouti Coding | Submitted to ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Repetition-based retransmission is used in Alamouti-modulation [1998] for
$2\times 2$ MIMO systems. We propose to use instead of ordinary repetition
so-called "scaled repetition" together with rotation. It is shown that the
rotated and scaled Alamouti code has a hard-decision performance which is only
slightly worse than that of the Golden code [2005], the best known $2\times 2$
space-time code. Decoding the Golden code requires an exhaustive search over
all codewords, while our rotated and scaled Alamouti code can be decoded with
an acceptable complexity however.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 10:12:48 GMT"
}
] | 2008-02-06T00:00:00 | [
[
"Willems",
"Frans M. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0603 | Julien Bringer | Julien Bringer and Herve Chabanne | Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle
attacks | submitted to IEEE Transactions on Information Theory | IEEE Trans. IT. 54:9 (2008) 4339-4342 | 10.1109/TIT.2008.928290 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a
lightweight protocol secure against active attacks but only in a detection
based-model, many works have tried to enhance its security. We propose here a
new approach to achieve resistance against Man-in-The-Middle attacks. Our
requirements - in terms of extra communications and hardware - are surprisingly
low.
| [
{
"version": "v1",
"created": "Tue, 5 Feb 2008 20:39:03 GMT"
}
] | 2009-01-08T00:00:00 | [
[
"Bringer",
"Julien",
""
],
[
"Chabanne",
"Herve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.0726 | Fran\c{c}ois Nicolas | Francois Nicolas | (Generalized) Post Correspondence Problem and semi-Thue systems | Lecture notes. 14 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let PCP(k) denote the Post Correspondence Problem for k input pairs of
strings. Let ACCESSIBILITY(k) denote the the word problem for k-rule semi-Thue
systems. In 1980, Claus showed that if ACCESSIBILITY(k) is undecidable then
PCP(k + 4) is also undecidable. The aim of the paper is to present a clean,
detailed proof of the statement.
We proceed in two steps, using the Generalized Post Correspondence Problem as
an auxiliary. First, we prove that if ACCESSIBILITY(k) is undecidable then
GPCP(k + 2) is also undecidable. Then, we prove that if GPCP(k) is undecidable
then PCP(k + 2) is also undecidable. (The latter result has also been shown by
Harju and Karhumaki.) To date, the sharpest undecidability bounds for both PCP
and GPCP have been deduced from Claus's result: since Matiyasevich and
Senizergues showed that ACCESSIBILITY(3) is undecidable, GPCP(5) and PCP(7) are
undecidable.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 01:43:33 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Feb 2008 23:54:15 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Feb 2008 09:47:03 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Feb 2008 12:40:31 GMT"
},
{
"version": "v5",
"created": "Wed, 12 Nov 2008 18:25:58 GMT"
}
] | 2008-11-12T00:00:00 | [
[
"Nicolas",
"Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.0738 | Marco Chiani Dr. | Marco Chiani, Moe Z. Win, Hyundong Shin | MIMO Networks: the Effects of Interference | Submitted to IEEE Trans. on Info. Theory | IEEE Trans. Inform. Theory, vol. 56, no. 1, pp. 336-349, Jan. 2010 | 10.1109/TIT.2009.2034810 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple-input/multiple-output (MIMO) systems promise enormous capacity
increase and are being considered as one of the key technologies for future
wireless networks. However, the decrease in capacity due to the presence of
interferers in MIMO networks is not well understood. In this paper, we develop
an analytical framework to characterize the capacity of MIMO communication
systems in the presence of multiple MIMO co-channel interferers and noise. We
consider the situation in which transmitters have no information about the
channel and all links undergo Rayleigh fading. We first generalize the known
determinant representation of hypergeometric functions with matrix arguments to
the case when the argument matrices have eigenvalues of arbitrary multiplicity.
This enables the derivation of the distribution of the eigenvalues of Gaussian
quadratic forms and Wishart matrices with arbitrary correlation, with
application to both single user and multiuser MIMO systems. In particular, we
derive the ergodic mutual information for MIMO systems in the presence of
multiple MIMO interferers. Our analysis is valid for any number of interferers,
each with arbitrary number of antennas having possibly unequal power levels.
This framework, therefore, accommodates the study of distributed MIMO systems
and accounts for different positions of the MIMO interferers.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 04:47:53 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 16:53:46 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Oct 2009 07:38:45 GMT"
}
] | 2010-07-28T00:00:00 | [
[
"Chiani",
"Marco",
""
],
[
"Win",
"Moe Z.",
""
],
[
"Shin",
"Hyundong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0745 | Sander Spek | Sander Spek | Knowledge management by wikis | Position paper, not submitted elsewhere | null | null | null | cs.DL | null | Wikis provide a new way of collaboration and knowledge sharing. Wikis are
software that allows users to work collectively on a web-based knowledge base.
Wikis are characterised by a sense of anarchism, collaboration, connectivity,
organic development and self-healing, and they rely on trust. We list several
concerns about applying wikis in professional organisation. After these
concerns are met, wikis can provide a progessive, new knowledge sharing and
collaboration tool.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 08:01:48 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Spek",
"Sander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0802.0766 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin | Modelling and Analysis of the Distributed Coordination Function of IEEE
802.11 with Multirate Capability | Accepted at IEEE WCNC 2008, Las Vegas | null | 10.1109/WCNC.2008.242 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is twofold. On one hand, it presents a
multi-dimensional Markovian state transition model characterizing the behavior
at the Medium Access Control (MAC) layer by including transmission states that
account for packet transmission failures due to errors caused by propagation
through the channel, along with a state characterizing the system when there
are no packets to be transmitted in the queue of a station (to model
non-saturated traffic conditions). On the other hand, it provides a throughput
analysis of the IEEE 802.11 protocol at the data link layer in both saturated
and non-saturated traffic conditions taking into account the impact of both
transmission channel and multirate transmission in Rayleigh fading environment.
Simulation results closely match the theoretical derivations confirming the
effectiveness of the proposed model.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 10:04:13 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"M.",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.0776 | Aitor del Coso | Aitor del Coso and Sebastien Simoens | Distributed Compression for the Uplink of a Backhaul-Constrained
Coordinated Cellular Network | 30 pages, 6 figures, Submitted to IEEE Trans on signal Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a backhaul-constrained coordinated cellular network. That is, a
single-frequency network with $N+1$ multi-antenna base stations (BSs) that
cooperate in order to decode the users' data, and that are linked by means of a
common lossless backhaul, of limited capacity $\mathrm{R}$. To implement
receive cooperation, we propose distributed compression: $N$ BSs, upon
receiving their signals, compress them using a multi-source lossy compression
code. Then, they send the compressed vectors to a central BS, which performs
users' decoding. Distributed Wyner-Ziv coding is proposed to be used, and is
optimally designed in this work. The first part of the paper is devoted to a
network with a unique multi-antenna user, that transmits a predefined Gaussian
space-time codeword. For such a scenario, the compression codebooks at the BSs
are optimized, considering the user's achievable rate as the performance
metric. In particular, for $N = 1$ the optimum codebook distribution is derived
in closed form, while for $N>1$ an iterative algorithm is devised. The second
part of the contribution focusses on the multi-user scenario. For it, the
achievable rate region is obtained by means of the optimum compression
codebooks for sum-rate and weighted sum-rate, respectively.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 11:19:02 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"del Coso",
"Aitor",
""
],
[
"Simoens",
"Sebastien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0797 | Abdourrahmane Atto | Abdourrahmane Atto (TAMCIC), Dominique Pastor (TAMCIC) | Central Limit Theorems for Wavelet Packet Decompositions of Stationary
Random Processes | Submitted to the IEEE Transactions on Signal Processing, October 2008 | IEEE Transactions on Signal Processing (2008) 1-12 | 10.1109/TSP.2009.2031726 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides central limit theorems for the wavelet packet
decomposition of stationary band-limited random processes. The asymptotic
analysis is performed for the sequences of the wavelet packet coefficients
returned at the nodes of any given path of the $M$-band wavelet packet
decomposition tree. It is shown that if the input process is centred and
strictly stationary, these sequences converge in distribution to white Gaussian
processes when the resolution level increases, provided that the decomposition
filters satisfy a suitable property of regularity. For any given path, the
variance of the limit white Gaussian process directly relates to the value of
the input process power spectral density at a specific frequency.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 13:46:14 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Feb 2008 12:59:07 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Apr 2009 09:13:19 GMT"
}
] | 2009-10-26T00:00:00 | [
[
"Atto",
"Abdourrahmane",
"",
"TAMCIC"
],
[
"Pastor",
"Dominique",
"",
"TAMCIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0799 | Thierry Val | Thierry Val (LATTIS), Adrien Van Den Bossche (LATTIS) | D\'eveloppement et analyse multi outils d'un protocole MAC
d\'eterministe pour un r\'eseau de capteurs sans fil | null | Colloque Francophone sur l'Ing\'enierie des Protocoles (CFIP), Les
Arcs : France (2008) | null | null | cs.NI | null | In this article, we present a multi-tool method for the development and the
analysis of a new medium access method. IEEE 802.15.4 / ZigBee technology has
been used as a basis for this new determinist MAC layer which enables a high
level of QoS. This WPAN can be typically used for wireless sensor networks
which require strong temporal constraints. To validate the proposed protocol,
three complementary and adequate tools are used: Petri Nets for the formal
validation of the algorithm, a dedicated simulator for the temporal aspects,
and some measures on a real prototype based on a couple of ZigBee FREESCALE
components for the hardware characterization of layers #1 and #2.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 13:52:44 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Feb 2008 15:37:27 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Val",
"Thierry",
"",
"LATTIS"
],
[
"Bossche",
"Adrien Van Den",
"",
"LATTIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.0802 | Ping Li | Ping Li | On Approximating Frequency Moments of Data Streams with Skewed
Projections | null | null | null | null | cs.DS cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose skewed stable random projections for approximating the pth
frequency moments of dynamic data streams (0<p<=2), which has been frequently
studied in theoretical computer science and database communities. Our method
significantly (or even infinitely when p->1) improves previous methods based on
(symmetric) stable random projections.
Our proposed method is applicable to data streams that are (a) insertion only
(the cash-register model); or (b) always non-negative (the strict Turnstile
model), or (c) eventually non-negative at check points. This is only a minor
restriction for practical applications.
Our method works particularly well when p = 1+/- \Delta and \Delta is small,
which is a practically important scenario. For example, \Delta may be the decay
rate or interest rate, which are usually small. Of course, when \Delta = 0, one
can compute the 1th frequent moment (i.e., the sum) essentially error-free
using a simple couter. Our method may be viewed as a ``genearlized counter'' in
that it can count the total value in the future, taking in account of the
effect of decaying or interest accruement.
In a summary, our contributions are two-fold. (A) This is the first propsal
of skewed stable random projections. (B) Based on first principle, we develop
various statistical estimators for skewed stable distributions, including their
variances and error (tail) probability bounds, and consequently the sample
complexity bounds.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 13:56:51 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Li",
"Ping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0808 | Fabio G. Guerrero Moreno | Fabio G. Guerrero, Maribell Sacanamboy | Turbo Interleaving inside the cdma2000 and W-CDMA Mobile Communication
Systems: A Tutorial | null | null | null | null | cs.IT math.IT | null | In this paper a discussion of the detailed operation of the interleavers used
by the turbo codes defined on the telecommunications standards cdma2000 (3GPP2
C.S0024-B V2.0) and W-CDMA (3GPP TS 25.212 V7.4.0) is presented. Differences in
the approach used by each turbo interleaver as well as dispersion analysis and
frequency analysis are also discussed. Two examples are presented to illustrate
the complete interleaving process defined by each standard. These two
interleaving approaches are also representative for other communications
standards.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 14:38:35 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Guerrero",
"Fabio G.",
""
],
[
"Sacanamboy",
"Maribell",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0820 | Jonathan Hayman | Jonathan Hayman and Glynn Winskel | Independence and concurrent separation logic | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 19,
2008) lmcs:1100 | 10.2168/LMCS-4(1:6)2008 | null | cs.LO cs.PL | null | A compositional Petri net-based semantics is given to a simple language
allowing pointer manipulation and parallelism. The model is then applied to
give a notion of validity to the judgements made by concurrent separation logic
that emphasizes the process-environment duality inherent in such rely-guarantee
reasoning. Soundness of the rules of concurrent separation logic with respect
to this definition of validity is shown. The independence information retained
by the Petri net model is then exploited to characterize the independence of
parallel processes enforced by the logic. This is shown to permit a refinement
operation capable of changing the granularity of atomic actions.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 15:39:20 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Mar 2008 15:26:51 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Hayman",
"Jonathan",
""
],
[
"Winskel",
"Glynn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0802.0823 | Marco Chiani Dr. | Enrico Paolini, Marc Fossorier, Marco Chiani | Doubly-Generalized LDPC Codes: Stability Bound over the BEC | Submitted to IEEE Trans. on Inform. Theory | IEEE Trans. Inform. Theory, vol. 55, no. 3, pp. 1027-1046, March
2009 | 10.1109/TIT.2008.2011446 | null | cs.IT math.IT | null | The iterative decoding threshold of low-density parity-check (LDPC) codes
over the binary erasure channel (BEC) fulfills an upper bound depending only on
the variable and check nodes with minimum distance 2. This bound is a
consequence of the stability condition, and is here referred to as stability
bound. In this paper, a stability bound over the BEC is developed for
doubly-generalized LDPC codes, where the variable and the check nodes can be
generic linear block codes, assuming maximum a posteriori erasure correction at
each node. It is proved that in this generalized context as well the bound
depends only on the variable and check component codes with minimum distance 2.
A condition is also developed, namely the derivative matching condition, under
which the bound is achieved with equality.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 16:29:14 GMT"
}
] | 2010-07-28T00:00:00 | [
[
"Paolini",
"Enrico",
""
],
[
"Fossorier",
"Marc",
""
],
[
"Chiani",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0832 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Distributed Double Spending Prevention | 15th Int. Workshop on Security Protocols, 2007 (to appear) | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of preventing double spending in electronic payment
schemes in a distributed fashion. This problem occurs, for instance, when the
spending of electronic coins needs to be controlled by a large collection of
nodes (eg. in a peer-to-peer (P2P) system) instead of one central bank.
Contrary to the commonly held belief that this is fundamentally impossible, we
propose several solutions that do achieve a reasonable level of double spending
prevention, and analyse their efficiency under varying assumptions.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 16:09:24 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.0834 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | The Ephemeral Pairing Problem | null | In 8th Int. Conf. Financial Cryptography, LNCS 3110, pages
212-226, Key West, FL, USA, February 9-12 2004. Springer | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless ad-hoc broadcast networks the pairing problem consists of
establishing a (long-term) connection between two specific physical nodes in
the network that do not yet know each other. We focus on the ephemeral version
of this problem. Ephemeral pairings occur, for example, when electronic
business cards are exchanged between two people that meet, or when one pays at
a check-out using a wireless wallet.
This problem can, in more abstract terms, be phrased as an ephemeral key
exchange problem: given a low bandwidth authentic (or private) communication
channel between two nodes, and a high bandwidth broadcast channel, can we
establish a high-entropy shared secret session key between the two nodes
without relying on any a priori shared secret information.
Apart from introducing this new problem, we present several ephemeral key
exchange protocols, both for the case of authentic channels as well as for the
case of private channels.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 16:14:11 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.0835 | Rossano Venturini | Paolo Ferragina, Igor Nitto and Rossano Venturini | Bit-Optimal Lempel-Ziv compression | null | null | null | null | cs.DS cs.IT math.IT | null | One of the most famous and investigated lossless data-compression scheme is
the one introduced by Lempel and Ziv about 40 years ago. This compression
scheme is known as "dictionary-based compression" and consists of squeezing an
input string by replacing some of its substrings with (shorter) codewords which
are actually pointers to a dictionary of phrases built as the string is
processed. Surprisingly enough, although many fundamental results are nowadays
known about upper bounds on the speed and effectiveness of this compression
process and references therein), ``we are not aware of any parsing scheme that
achieves optimality when the LZ77-dictionary is in use under any constraint on
the codewords other than being of equal length'' [N. Rajpoot and C. Sahinalp.
Handbook of Lossless Data Compression, chapter Dictionary-based data
compression. Academic Press, 2002. pag. 159]. Here optimality means to achieve
the minimum number of bits in compressing each individual input string, without
any assumption on its generating source. In this paper we provide the first
LZ-based compressor which computes the bit-optimal parsing of any input string
in efficient time and optimal space, for a general class of variable-length
codeword encodings which encompasses most of the ones typically used in data
compression and in the design of search engines and compressed indexes.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 16:31:54 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Ferragina",
"Paolo",
""
],
[
"Nitto",
"Igor",
""
],
[
"Venturini",
"Rossano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.0861 | Paul Gazis | Paul R. Gazis and Jeffrey D. Scargle | Using Bayesian Blocks to Partition Self-Organizing Maps | 9 pages, 3 figures | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self organizing maps (SOMs) are widely-used for unsupervised classification.
For this application, they must be combined with some partitioning scheme that
can identify boundaries between distinct regions in the maps they produce. We
discuss a novel partitioning scheme for SOMs based on the Bayesian Blocks
segmentation algorithm of Scargle [1998]. This algorithm minimizes a cost
function to identify contiguous regions over which the values of the attributes
can be represented as approximately constant. Because this cost function is
well-defined and largely independent of assumptions regarding the number and
structure of clusters in the original sample space, this partitioning scheme
offers significant advantages over many conventional methods. Sample code is
available.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 18:50:16 GMT"
}
] | 2008-02-07T00:00:00 | [
[
"Gazis",
"Paul R.",
""
],
[
"Scargle",
"Jeffrey D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.0865 | Andrew Gacek | Andrew Gacek, Dale Miller, and Gopalan Nadathur | Combining generic judgments with recursive definitions | To appear in LICS 2008 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many semantical aspects of programming languages, such as their operational
semantics and their type assignment calculi, are specified by describing
appropriate proof systems. Recent research has identified two proof-theoretic
features that allow direct, logic-based reasoning about such descriptions: the
treatment of atomic judgments as fixed points (recursive definitions) and an
encoding of binding constructs via generic judgments. However, the logics
encompassing these two features have thus far treated them orthogonally: that
is, they do not provide the ability to define object-logic properties that
themselves depend on an intrinsic treatment of binding. We propose a new and
simple integration of these features within an intuitionistic logic enhanced
with induction over natural numbers and we show that the resulting logic is
consistent. The pivotal benefit of the integration is that it allows recursive
definitions to not just encode simple, traditional forms of atomic judgments
but also to capture generic properties pertaining to such judgments. The
usefulness of this logic is illustrated by showing how it can provide elegant
treatments of object-logic contexts that appear in proofs involving typing
calculi and of arbitrarily cascading substitutions that play a role in
reducibility arguments.
| [
{
"version": "v1",
"created": "Wed, 6 Feb 2008 19:18:57 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 13:25:42 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Gacek",
"Andrew",
""
],
[
"Miller",
"Dale",
""
],
[
"Nadathur",
"Gopalan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.0914 | Sebastian Roch | Elchanan Mossel and Sebastien Roch and Mike Steel | Shrinkage Effect in Ancestral Maximum Likelihood | null | null | null | null | q-bio.PE cs.CE math.PR math.ST stat.TH | null | Ancestral maximum likelihood (AML) is a method that simultaneously
reconstructs a phylogenetic tree and ancestral sequences from extant data
(sequences at the leaves). The tree and ancestral sequences maximize the
probability of observing the given data under a Markov model of sequence
evolution, in which branch lengths are also optimized but constrained to take
the same value on any edge across all sequence sites. AML differs from the more
usual form of maximum likelihood (ML) in phylogenetics because ML averages over
all possible ancestral sequences. ML has long been known to be statistically
consistent -- that is, it converges on the correct tree with probability
approaching 1 as the sequence length grows. However, the statistical
consistency of AML has not been formally determined, despite informal remarks
in a literature that dates back 20 years. In this short note we prove a general
result that implies that AML is statistically inconsistent. In particular we
show that AML can `shrink' short edges in a tree, resulting in a tree that has
no internal resolution as the sequence length grows. Our results apply to any
number of taxa.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 06:52:44 GMT"
}
] | 2017-07-24T00:00:00 | [
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
],
[
"Steel",
"Mike",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0802.1002 | Xavier Bry | Xavier Bry (I3M) | New Estimation Procedures for PLS Path Modelling | null | null | null | null | cs.LG | null | Given R groups of numerical variables X1, ... XR, we assume that each group
is the result of one underlying latent variable, and that all latent variables
are bound together through a linear equation system. Moreover, we assume that
some explanatory latent variables may interact pairwise in one or more
equations. We basically consider PLS Path Modelling's algorithm to estimate
both latent variables and the model's coefficients. New "external" estimation
schemes are proposed that draw latent variables towards strong group structures
in a more flexible way. New "internal" estimation schemes are proposed to
enable PLSPM to make good use of variable group complementarity and to deal
with interactions. Application examples are given.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 15:18:27 GMT"
}
] | 2008-02-08T00:00:00 | [
[
"Bry",
"Xavier",
"",
"I3M"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0802.1015 | Arnaud Legout | Pawel Marciniak, Nikitas Liogkas (UCLA), Arnaud Legout (INRIA Sophia
Antipolis / INRIA Rh\^one-Alpes), Eddie Kohler (UCLA) | Small Is Not Always Beautiful | null | Dans IPTPS'2008 (2008) | null | null | cs.NI | null | Peer-to-peer content distribution systems have been enjoying great
popularity, and are now gaining momentum as a means of disseminating video
streams over the Internet. In many of these protocols, including the popular
BitTorrent, content is split into mostly fixed-size pieces, allowing a client
to download data from many peers simultaneously. This makes piece size
potentially critical for performance. However, previous research efforts have
largely overlooked this parameter, opting to focus on others instead. This
paper presents the results of real experiments with varying piece sizes on a
controlled BitTorrent testbed. We demonstrate that this parameter is indeed
critical, as it determines the degree of parallelism in the system, and we
investigate optimal piece sizes for distributing small and large content. We
also pinpoint a related design trade-off, and explain how BitTorrent's choice
of dividing pieces into subpieces attempts to address it.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 16:04:33 GMT"
}
] | 2008-02-08T00:00:00 | [
[
"Marciniak",
"Pawel",
"",
"UCLA"
],
[
"Liogkas",
"Nikitas",
"",
"UCLA"
],
[
"Legout",
"Arnaud",
"",
"INRIA Sophia\n Antipolis / INRIA Rhône-Alpes"
],
[
"Kohler",
"Eddie",
"",
"UCLA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.1026 | Benjamin Sach Mr | Benjamin Sach and Rapha\"el Clifford | An Empirical Study of Cache-Oblivious Priority Queues and their
Application to the Shortest Path Problem | null | null | null | null | cs.DS cs.SE | null | In recent years the Cache-Oblivious model of external memory computation has
provided an attractive theoretical basis for the analysis of algorithms on
massive datasets. Much progress has been made in discovering algorithms that
are asymptotically optimal or near optimal. However, to date there are still
relatively few successful experimental studies. In this paper we compare two
different Cache-Oblivious priority queues based on the Funnel and Bucket Heap
and apply them to the single source shortest path problem on graphs with
positive edge weights. Our results show that when RAM is limited and data is
swapping to external storage, the Cache-Oblivious priority queues achieve
orders of magnitude speedups over standard internal memory techniques. However,
for the single source shortest path problem both on simulated and real world
graph data, these speedups are markedly lower due to the time required to
access the graph adjacency list itself.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 18:02:11 GMT"
}
] | 2008-02-08T00:00:00 | [
[
"Sach",
"Benjamin",
""
],
[
"Clifford",
"Raphaël",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.1059 | Tobias Friedrich | Deepak Ajwani, Tobias Friedrich | Average-Case Analysis of Online Topological Ordering | 22 pages, long version of ISAAC'07 paper | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many applications like pointer analysis and incremental compilation require
maintaining a topological ordering of the nodes of a directed acyclic graph
(DAG) under dynamic updates. All known algorithms for this problem are either
only analyzed for worst-case insertion sequences or only evaluated
experimentally on random DAGs. We present the first average-case analysis of
online topological ordering algorithms. We prove an expected runtime of O(n^2
polylog(n)) under insertion of the edges of a complete DAG in a random order
for the algorithms of Alpern et al. (SODA, 1990), Katriel and Bodlaender (TALG,
2006), and Pearce and Kelly (JEA, 2006). This is much less than the best known
worst-case bound O(n^{2.75}) for this problem.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 20:27:17 GMT"
}
] | 2008-02-08T00:00:00 | [
[
"Ajwani",
"Deepak",
""
],
[
"Friedrich",
"Tobias",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1076 | Damien Vergnaud | Damien Vergnaud | New Extensions of Pairing-based Signatures into Universal (Multi)
Designated Verifier Signatures | 23 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of universal designated verifier signatures was introduced by
Steinfeld, Bull, Wang and Pieprzyk at Asiacrypt 2003. These signatures can be
used as standard publicly verifiable digital signatures but have an additional
functionality which allows any holder of a signature to designate the signature
to any desired verifier. This designated verifier can check that the message
was indeed signed, but is unable to convince anyone else of this fact. We
propose new efficient constructions for pairing-based short signatures. Our
first scheme is based on Boneh-Boyen signatures and its security can be
analyzed in the standard security model. We prove its resistance to forgery
assuming the hardness of the so-called strong Diffie-Hellman problem, under the
knowledge-of-exponent assumption. The second scheme is compatible with the
Boneh-Lynn-Shacham signatures and is proven unforgeable, in the random oracle
model, under the assumption that the computational bilinear Diffie-Hellman
problem is untractable. Both schemes are designed for devices with constrained
computation capabilities since the signing and the designation procedure are
pairing-free. Finally, we present extensions of these schemes in the multi-user
setting proposed by Desmedt in 2003.
| [
{
"version": "v1",
"created": "Thu, 7 Feb 2008 23:35:41 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Vergnaud",
"Damien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.1113 | Damien Vergnaud | Beno\^it Libert and Damien Vergnaud | Multi-Use Unidirectional Proxy Re-Signatures | 16 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive
named proxy re-signatures where a proxy turns a signature computed under
Alice's secret key into one from Bob on the same message. The semi-trusted
proxy does not learn either party's signing key and cannot sign arbitrary
messages on behalf of Alice or Bob. At CCS 2005, Ateniese and Hohenberger
revisited the primitive by providing appropriate security definitions and
efficient constructions in the random oracle model. Nonetheless, they left open
the problem of designing a multi-use unidirectional scheme where the proxy is
able to translate in only one direction and signatures can be re-translated
several times.
This paper solves this problem, suggested for the first time 10 years ago,
and shows the first multi-hop unidirectional proxy re-signature schemes. We
describe a random-oracle-using system that is secure in the
Ateniese-Hohenberger model. The same technique also yields a similar
construction in the standard model (i.e. without relying on random oracles).
Both schemes are efficient and require newly defined -- but falsifiable --
Diffie-Hellman-like assumptions in bilinear groups.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 09:34:27 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Libert",
"Benoît",
""
],
[
"Vergnaud",
"Damien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.1123 | Sebastien Tixeuil | Sylvie Dela\"et (LRI), St\'ephane Devismes (LRI), Mikhail Nesterenko,
S\'ebastien Tixeuil (INRIA Futurs, LIP6) | Snap-Stabilization in Message-Passing Systems | null | null | null | null | cs.DC cs.NI cs.PF | null | In this paper, we tackle the open problem of snap-stabilization in
message-passing systems. Snap-stabilization is a nice approach to design
protocols that withstand transient faults. Compared to the well-known
self-stabilizing approach, snap-stabilization guarantees that the effect of
faults is contained immediately after faults cease to occur. Our contribution
is twofold: we show that (1) snap-stabilization is impossible for a wide class
of problems if we consider networks with finite yet unbounded channel capacity;
(2) snap-stabilization becomes possible in the same setting if we assume
bounded-capacity channels. We propose three snap-stabilizing protocols working
in fully-connected networks. Our work opens exciting new research perspectives,
as it enables the snap-stabilizing paradigm to be implemented in actual
networks.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 10:51:24 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2008 08:57:19 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Delaët",
"Sylvie",
"",
"LRI"
],
[
"Devismes",
"Stéphane",
"",
"LRI"
],
[
"Nesterenko",
"Mikhail",
"",
"INRIA Futurs, LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"INRIA Futurs, LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0802.1162 | Gerard Henry Edmond Duchamp | H. Cheballah (LIPN), G. H. E. Duchamp (LIPN), K. A. Penson (LPTMC) | Approximate substitutions and the normal ordering problem | null | null | 10.1088/1742-6596/104/1/012031 | null | quant-ph cs.SC math.CO | null | In this paper, we show that the infinite generalised Stirling matrices
associated with boson strings with one annihilation operator are projective
limits of approximate substitutions, the latter being characterised by a finite
set of algebraic equations.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 14:52:52 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Cheballah",
"H.",
"",
"LIPN"
],
[
"Duchamp",
"G. H. E.",
"",
"LIPN"
],
[
"Penson",
"K. A.",
"",
"LPTMC"
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.1176 | Thomas Begin | Thomas Begin (LIP6), Alexandre Brandwajn (UCSC) | Note sur les temps de service r\'esiduels dans les syst\`emes type M/G/c | null | Colloque Francophone sur l'Ing\'enierie des Protocoles (CFIP), Les
Arcs : France (2008) | null | null | cs.NI cs.PF | null | Approximations for the mean performance indices for the M/G/c queue rely on
the approximate computation of the probability that an arriving request has to
wait for service and of the minimum of residual service times if all servers
are found busy. Using numerical examples, we investigate properties of these
two quantities. In particular, we show that the minimum of residual service
times depends on higher order properties, beyond the first two moments, of the
service time distribution. Improved knowledge of the properties of the two
quantities studied in this paper provides insight into avenues for improving
the accuracy of approximations for the M/G/c queue.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 16:40:26 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2008 08:36:11 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Begin",
"Thomas",
"",
"LIP6"
],
[
"Brandwajn",
"Alexandre",
"",
"UCSC"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0802.1220 | Cheng Qi | Qi Cheng and Daqing Wan | Complexity of Decoding Positive-Rate Reed-Solomon Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The complexity of maximal likelihood decoding of the Reed-Solomon codes
$[q-1, k]_q$ is a well known open problem. The only known result in this
direction states that it is at least as hard as the discrete logarithm in some
cases where the information rate unfortunately goes to zero. In this paper, we
remove the rate restriction and prove that the same complexity result holds for
any positive information rate. In particular, this resolves an open problem
left in [4], and rules out the possibility of a polynomial time algorithm for
maximal likelihood decoding problem of Reed-Solomon codes of any rate under a
well known cryptographical hardness assumption. As a side result, we give an
explicit construction of Hamming balls of radius bounded away from the minimum
distance, which contain exponentially many codewords for Reed-Solomon code of
any positive rate less than one. The previous constructions only apply to
Reed-Solomon codes of diminishing rates. We also give an explicit construction
of Hamming balls of relative radius less than 1 which contain subexponentially
many codewords for Reed-Solomon code of rate approaching one.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 21:45:21 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Cheng",
"Qi",
""
],
[
"Wan",
"Daqing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1226 | Qiqi Yan | Qiqi Yan | Lower Bounds for Complementation of omega-Automata Via the Full Automata
Technique | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 19,
2008) lmcs:992 | 10.2168/LMCS-4(1:5)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we first introduce a lower bound technique for the state
complexity of transformations of automata. Namely we suggest first considering
the class of full automata in lower bound analysis, and later reducing the size
of the large alphabet via alphabet substitutions. Then we apply such technique
to the complementation of nondeterministic \omega-automata, and obtain several
lower bound results. Particularly, we prove an \omega((0.76n)^n) lower bound
for B\"uchi complementation, which also holds for almost every complementation
or determinization transformation of nondeterministic omega-automata, and prove
an optimal (\omega(nk))^n lower bound for the complementation of generalized
B\"uchi automata, which holds for Streett automata as well.
| [
{
"version": "v1",
"created": "Fri, 8 Feb 2008 23:13:52 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Mar 2008 15:05:48 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Oct 2008 21:01:52 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Yan",
"Qiqi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.1237 | Gwena\"el Joret | Jean Cardinal, Samuel Fiorini, and Gwena\"el Joret | Minimum Entropy Orientations | Referees' comments incorporated | Operations Research Letters 36 (2008), pp. 680-683 | 10.1016/j.orl.2008.06.010 | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study graph orientations that minimize the entropy of the in-degree
sequence. The problem of finding such an orientation is an interesting special
case of the minimum entropy set cover problem previously studied by Halperin
and Karp [Theoret. Comput. Sci., 2005] and by the current authors
[Algorithmica, to appear]. We prove that the minimum entropy orientation
problem is NP-hard even if the graph is planar, and that there exists a simple
linear-time algorithm that returns an approximate solution with an additive
error guarantee of 1 bit. This improves on the only previously known algorithm
which has an additive error guarantee of log_2 e bits (approx. 1.4427 bits).
| [
{
"version": "v1",
"created": "Sat, 9 Feb 2008 01:38:06 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 14:43:52 GMT"
}
] | 2008-10-28T00:00:00 | [
[
"Cardinal",
"Jean",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1244 | Shuheng Zhou | Shuheng Zhou | Learning Balanced Mixtures of Discrete Distributions with Small Sample | 24 Pages, 5 figures | null | null | null | cs.LG stat.ML | null | We study the problem of partitioning a small sample of $n$ individuals from a
mixture of $k$ product distributions over a Boolean cube $\{0, 1\}^K$ according
to their distributions. Each distribution is described by a vector of allele
frequencies in $\R^K$. Given two distributions, we use $\gamma$ to denote the
average $\ell_2^2$ distance in frequencies across $K$ dimensions, which
measures the statistical divergence between them. We study the case assuming
that bits are independently distributed across $K$ dimensions. This work
demonstrates that, for a balanced input instance for $k = 2$, a certain
graph-based optimization function returns the correct partition with high
probability, where a weighted graph $G$ is formed over $n$ individuals, whose
pairwise hamming distances between their corresponding bit vectors define the
edge weights, so long as $K = \Omega(\ln n/\gamma)$ and $Kn = \tilde\Omega(\ln
n/\gamma^2)$. The function computes a maximum-weight balanced cut of $G$, where
the weight of a cut is the sum of the weights across all edges in the cut. This
result demonstrates a nice property in the high-dimensional feature space: one
can trade off the number of features that are required with the size of the
sample to accomplish certain tasks like clustering.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 07:38:49 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Zhou",
"Shuheng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0802.1258 | Heng Lian | Heng Lian | Bayesian Nonlinear Principal Component Analysis Using Random Fields | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel model for nonlinear dimension reduction motivated by the
probabilistic formulation of principal component analysis. Nonlinearity is
achieved by specifying different transformation matrices at different locations
of the latent space and smoothing the transformation using a Markov random
field type prior. The computation is made feasible by the recent advances in
sampling from von Mises-Fisher distributions.
| [
{
"version": "v1",
"created": "Sat, 9 Feb 2008 12:22:47 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Lian",
"Heng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0802.1274 | Jose M. Martin-Garcia | Jose M. Martin-Garcia, David Yllanes, Renato Portugal | The Invar tensor package: Differential invariants of Riemann | 12 pages, 1 figure, 3 tables. Package can be downloaded from
http://metric.iem.csic.es/Martin-Garcia/xAct/Invar/ (Mathematica version) or
http://www.lncc.br/~portugal/Invar.html (Maple version) | Comp.Phys.Commun.179:586-590,2008 | 10.1016/j.cpc.2008.04.018 | null | cs.SC gr-qc hep-th | null | The long standing problem of the relations among the scalar invariants of the
Riemann tensor is computationally solved for all 6x10^23 objects with up to 12
derivatives of the metric. This covers cases ranging from products of up to 6
undifferentiated Riemann tensors to cases with up to 10 covariant derivatives
of a single Riemann. We extend our computer algebra system Invar to produce
within seconds a canonical form for any of those objects in terms of a basis.
The process is as follows: (1) an invariant is converted in real time into a
canonical form with respect to the permutation symmetries of the Riemann
tensor; (2) Invar reads a database of more than 6x10^5 relations and applies
those coming from the cyclic symmetry of the Riemann tensor; (3) then applies
the relations coming from the Bianchi identity, (4) the relations coming from
commutations of covariant derivatives, (5) the dimensionally-dependent
identities for dimension 4, and finally (6) simplifies invariants that can be
expressed as product of dual invariants. Invar runs on top of the tensor
computer algebra systems xTensor (for Mathematica) and Canon (for Maple).
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 16:38:05 GMT"
}
] | 2008-11-26T00:00:00 | [
[
"Martin-Garcia",
"Jose M.",
""
],
[
"Yllanes",
"David",
""
],
[
"Portugal",
"Renato",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
}
] |
0802.1296 | Dusko Pavlovic | Dusko Pavlovic | On quantum statistics in data analysis | 7 pages, Quantum Interaction 2008 (Oxford, April 2008) v3: added two
diagrams, changed some wordings | null | null | null | cs.IR math.CT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Originally, quantum probability theory was developed to analyze statistical
phenomena in quantum systems, where classical probability theory does not
apply, because the lattice of measurable sets is not necessarily distributive.
On the other hand, it is well known that the lattices of concepts, that arise
in data analysis, are in general also non-distributive, albeit for completely
different reasons. In his recent book, van Rijsbergen argues that many of the
logical tools developed for quantum systems are also suitable for applications
in information retrieval. I explore the mathematical support for this idea on
an abstract vector space model, covering several forms of data analysis
(information retrieval, data mining, collaborative filtering, formal concept
analysis...), and roughly based on an idea from categorical quantum mechanics.
It turns out that quantum (i.e., noncommutative) probability distributions
arise already in this rudimentary mathematical framework. We show that a
Bell-type inequality must be satisfied by the standard similarity measures, if
they are used for preference predictions. The fact that already a very general,
abstract version of the vector space model yields simple counterexamples for
such inequalities seems to be an indicator of a genuine need for quantum
statistics in data analysis.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 01:42:31 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2008 12:08:53 GMT"
},
{
"version": "v3",
"created": "Tue, 13 May 2008 18:46:10 GMT"
}
] | 2009-04-18T00:00:00 | [
[
"Pavlovic",
"Dusko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0802.1303 | Wieslaw Bajguz | M. Dziemia\'nczuk, W. Bajguz | On GCD-morphic sequences | null | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note is a response to one of the problems posed by Kwa\'sniewski in
[1,2], see also [3] i.e. GCD-morphic Problem III. We show that any GCD-morphic
sequence $F$ is at the point product of primary GCD-morphic sequences and any
GCD-morphic sequence is encoded by natural number valued sequence satisfying
condition (C1). The problem of general importance - for example in number
theory was formulated in [1,2] while investigating a new class of DAG's and
their correspondent p.o. sets encoded uniquely by sequences with
combinatorially interpretable properties.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 05:03:40 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Dziemiańczuk",
"M.",
""
],
[
"Bajguz",
"W.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1306 | Dusko Pavlovic | Dusko Pavlovic | Network as a computer: ranking paths to find flows | 12 pages, CSR 2008 | null | null | null | cs.IR cs.AI math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore a simple mathematical model of network computation, based on
Markov chains. Similar models apply to a broad range of computational
phenomena, arising in networks of computers, as well as in genetic, and neural
nets, in social networks, and so on. The main problem of interaction with such
spontaneously evolving computational systems is that the data are not uniformly
structured. An interesting approach is to try to extract the semantical content
of the data from their distribution among the nodes. A concept is then
identified by finding the community of nodes that share it. The task of data
structuring is thus reduced to the task of finding the network communities, as
groups of nodes that together perform some non-local data processing. Towards
this goal, we extend the ranking methods from nodes to paths. This allows us to
extract some information about the likely flow biases from the available static
information about the network.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 05:33:37 GMT"
}
] | 2009-04-18T00:00:00 | [
[
"Pavlovic",
"Dusko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0802.1312 | Josef Cibulka | Josef Cibulka | Untangling polygons and graphs | 11 pages, 3 figures | Discrete and Computational Geometry 43(2): 402-411 (2010) | 10.1007/s00454-009-9150-x | null | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Untangling is a process in which some vertices of a planar graph are moved to
obtain a straight-line plane drawing. The aim is to move as few vertices as
possible. We present an algorithm that untangles the cycle graph C_n while
keeping at least \Omega(n^{2/3}) vertices fixed. For any graph G, we also
present an upper bound on the number of fixed vertices in the worst case. The
bound is a function of the number of vertices, maximum degree and diameter of
G. One of its consequences is the upper bound O((n log n)^{2/3}) for all
3-vertex-connected planar graphs.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 09:28:15 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jun 2008 09:45:10 GMT"
}
] | 2011-02-07T00:00:00 | [
[
"Cibulka",
"Josef",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1327 | Satish Babu Korada | Satish Babu Korada, Ruediger Urbanke | Exchange of Limits: Why Iterative Decoding Works | 16 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider communication over binary-input memoryless output-symmetric
channels using low-density parity-check codes and message-passing decoding. The
asymptotic (in the length) performance of such a combination for a fixed number
of iterations is given by density evolution. Letting the number of iterations
tend to infinity we get the density evolution threshold, the largest channel
parameter so that the bit error probability tends to zero as a function of the
iterations.
In practice we often work with short codes and perform a large number of
iterations. It is therefore interesting to consider what happens if in the
standard analysis we exchange the order in which the blocklength and the number
of iterations diverge to infinity. In particular, we can ask whether both
limits give the same threshold.
Although empirical observations strongly suggest that the exchange of limits
is valid for all channel parameters, we limit our discussion to channel
parameters below the density evolution threshold. Specifically, we show that
under some suitable technical conditions the bit error probability vanishes
below the density evolution threshold regardless of how the limit is taken.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 15:34:31 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Korada",
"Satish Babu",
""
],
[
"Urbanke",
"Ruediger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1332 | Amy Glen | Michelangelo Bucci, Alessandro De Luca, Amy Glen, Luca Q. Zamboni | A connection between palindromic and factor complexity using return
words | 17 pages; minor adjustment to the main theorem and other minor
changes (particularly in Sections 3 and 4); accepted by "Advances in Applied
Mathematics" | Advances In Applied Mathematics 42 (2009) 60--74 | 10.1016/j.aam.2008.03.005 | null | math.CO cs.DM | null | In this paper we prove that for any infinite word W whose set of factors is
closed under reversal, the following conditions are equivalent:
(I) all complete returns to palindromes are palindromes;
(II) P(n) + P(n+1) = C(n+1) - C(n) + 2 for all n, where P (resp. C) denotes
the palindromic complexity (resp. factor complexity) function of W, which
counts the number of distinct palindromic factors (resp. factors) of each
length in W.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 17:17:59 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 18:21:43 GMT"
}
] | 2010-04-08T00:00:00 | [
[
"Bucci",
"Michelangelo",
""
],
[
"De Luca",
"Alessandro",
""
],
[
"Glen",
"Amy",
""
],
[
"Zamboni",
"Luca Q.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1338 | Shai Gutner | Shai Gutner and Michael Tarsi | Some results on (a:b)-choosability | null | null | null | null | cs.DM cs.CC cs.DS | null | A solution to a problem of Erd\H{o}s, Rubin and Taylor is obtained by showing
that if a graph $G$ is $(a:b)$-choosable, and $c/d > a/b$, then $G$ is not
necessarily $(c:d)$-choosable. Applying probabilistic methods, an upper bound
for the $k^{th}$ choice number of a graph is given. We also prove that a
directed graph with maximum outdegree $d$ and no odd directed cycle is
$(k(d+1):k)$-choosable for every $k \geq 1$. Other results presented in this
article are related to the strong choice number of graphs (a generalization of
the strong chromatic number). We conclude with complexity analysis of some
decision problems related to graph choosability.
| [
{
"version": "v1",
"created": "Sun, 10 Feb 2008 17:46:54 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Gutner",
"Shai",
""
],
[
"Tarsi",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1348 | Andrey Khilko | Andrey Khilko | Fourier-Based Spectral Analysis with Adaptive Resolution | 31 pages including 10 figures. Fixed problem with computational
complexity, so section 10 is rewritten and 3 more figures are added. Also, a
way of optimal computation is suggested. Corrected a couple of typos in
formulas. Several language and style corrections. Two additional references
are added | null | null | null | physics.data-an cs.NA math.GM | null | Despite being the most popular methods of data analysis, Fourier-based
techniques suffer from the problem of static resolution that is currently
believed to be a fundamental limitation of the Fourier Transform. Although
alternative solutions overcome this limitation, none provide the simplicity,
versatility, and convenience of the Fourier analysis. The lack of convenience
often prevents these alternatives from replacing classical spectral methods -
even in applications that suffer from the limitation of static resolution.
This work demonstrates that, contrary to the generally accepted belief, the
Fourier Transform can be generalized to the case of adaptive resolution. The
generalized transform provides backward compatibility with classical spectral
techniques and introduces minimal computational overhead.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 16:45:58 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2008 15:51:46 GMT"
}
] | 2008-06-04T00:00:00 | [
[
"Khilko",
"Andrey",
""
]
] | [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0802.1361 | Menelaos Karavelas | Menelaos I. Karavelas | Guarding curvilinear art galleries with edge or mobile guards via
2-dominance of triangulation graphs | 45 pages, 33 figures, short version has appeared in [M. I. Karavelas.
Guarding curvilinear art galleries with edge or mobile guards. 2008 ACM
Symposium on Solid and Physical Modeling (SPM08), 339-345, 2008.]; v2: new
lower bound for the edge 2-dominance problem which now matches the upper
bound | Comput. Geom. Theory Appl. 44(1):20-51, 2011 | 10.1016/j.comgeo.2010.07.002 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of monitoring an art gallery modeled as a polygon,
the edges of which are arcs of curves, with edge or mobile guards. Our focus is
on piecewise-convex polygons, i.e., polygons that are locally convex, except
possibly at the vertices, and their edges are convex arcs. We transform the
problem of monitoring a piecewise-convex polygon to the problem of 2-dominating
a properly defined triangulation graph with edges or diagonals, where
2-dominance requires that every triangle in the triangulation graph has at
least two of its vertices in its 2-dominating set. We show that
$\lfloor\frac{n+1}{3}\rfloor$ diagonal guards or $\lfloor\frac{2n+1}{5}\rfloor$
edge guards are always sufficient and sometimes necessary, in order to
2-dominate a triangulation graph. Furthermore, we show how to compute: a
diagonal 2-dominating set of size $\lfloor\frac{n+1}{3}\rfloor$ in linear time,
an edge 2-dominating set of size $\lfloor\frac{2n+1}{5}\rfloor$ in $O(n^2)$
time, and an edge 2-dominating set of size $\lfloor\frac{3n}{7}\rfloor$ in O(n)
time. Based on the above-mentioned results, we prove that, for piecewise-convex
polygons, we can compute: a mobile guard set of size
$\lfloor\frac{n+1}{3}\rfloor$ in $O(n\log{}n)$ time, an edge guard set of size
$\lfloor\frac{2n+1}{5}\rfloor$ in $O(n^2)$ time, and an edge guard set of size
$\lfloor\frac{3n}{7}\rfloor$ in $O(n\log{}n)$ time. Finally, we show that
$\lfloor\frac{n}{3}\rfloor$ mobile or $\lceil\frac{n}{3}\rceil$ edge guards are
sometimes necessary. When restricting our attention to monotone
piecewise-convex polygons, the bounds mentioned above drop:
$\lceil\frac{n+1}{4}\rceil$ edge or mobile guards are always sufficient and
sometimes necessary; such an edge or mobile guard set, of size at most
$\lceil\frac{n+1}{4}\rceil$, can be computed in O(n) time.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 00:40:37 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 19:52:11 GMT"
}
] | 2011-03-01T00:00:00 | [
[
"Karavelas",
"Menelaos I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0802.1362 | Lance Fortnow | Yiling Chen, Lance Fortnow, Nicolas Lambert, David M. Pennock,
Jennifer Wortman | Complexity of Combinatorial Market Makers | null | null | null | null | cs.GT | null | We analyze the computational complexity of market maker pricing algorithms
for combinatorial prediction markets. We focus on Hanson's popular logarithmic
market scoring rule market maker (LMSR). Our goal is to implicitly maintain
correct LMSR prices across an exponentially large outcome space. We examine
both permutation combinatorics, where outcomes are permutations of objects, and
Boolean combinatorics, where outcomes are combinations of binary events. We
look at three restrictive languages that limit what traders can bet on. Even
with severely limited languages, we find that LMSR pricing is $\SP$-hard, even
when the same language admits polynomial-time matching without the market
maker. We then propose an approximation technique for pricing permutation
markets based on a recent algorithm for online permutation learning. The
connections we draw between LMSR pricing and the vast literature on online
learning with expert advice may be of independent interest.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 00:23:17 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Chen",
"Yiling",
""
],
[
"Fortnow",
"Lance",
""
],
[
"Lambert",
"Nicolas",
""
],
[
"Pennock",
"David M.",
""
],
[
"Wortman",
"Jennifer",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.