id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0802.1369
Pascal Vontobel
Pascal O. Vontobel
Interior-Point Algorithms for Linear-Programming Decoding
Essentially the paper that appeared in Proc. 2008 Information Theory and Applications Workshop, UC San Diego, CA, USA, January 27 -- February 1, 2008
null
null
null
cs.IT math.IT
null
Interior-point algorithms constitute a very interesting class of algorithms for solving linear-programming problems. In this paper we study efficient implementations of such algorithms for solving the linear program that appears in the linear-programming decoder formulation.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 02:57:25 GMT" } ]
2008-02-12T00:00:00
[ [ "Vontobel", "Pascal O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1372
Yoshiyuki Kabashima
Yoshiyuki Kabashima
An integral formula for large random rectangular matrices and its application to analysis of linear vector channels
Submitted to PHYSCOMNET08
null
null
null
cs.IT cond-mat.dis-nn math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A statistical mechanical framework for analyzing random linear vector channels is presented in a large system limit. The framework is based on the assumptions that the left and right singular value bases of the rectangular channel matrix $\bH$ are generated independently from uniform distributions over Haar measures and the eigenvalues of $\bH^{\rm T}\bH$ asymptotically follow a certain specific distribution. These assumptions make it possible to characterize the communication performance of the channel utilizing an integral formula with respect to $\bH$, which is analogous to the one introduced by Marinari {\em et. al.} in {\em J. Phys. A} {\bf 27}, 7647 (1994) for large random square (symmetric) matrices. A computationally feasible algorithm for approximately decoding received signals based on the integral formula is also provided.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 04:06:50 GMT" }, { "version": "v2", "created": "Thu, 21 Feb 2008 03:19:19 GMT" } ]
2008-02-21T00:00:00
[ [ "Kabashima", "Yoshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1379
Qing Zhao
Qing Zhao, Bhaskar Krishnamachari
Structure and Optimality of Myopic Policy in Opportunistic Access with Noisy Observations
Submitted to IEEE Transactions on Automatic Control
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A restless multi-armed bandit problem that arises in multichannel opportunistic communications is considered, where channels are modeled as independent and identical Gilbert-Elliot channels and channel state observations are subject to errors. A simple structure of the myopic policy is established under a certain condition on the false alarm probability of the channel state detector. It is shown that the myopic policy has a semi-universal structure that reduces channel selection to a simple round-robin procedure and obviates the need to know the underlying Markov transition probabilities. The optimality of the myopic policy is proved for the case of two channels and conjectured for the general case based on numerical examples.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 05:57:02 GMT" }, { "version": "v2", "created": "Thu, 13 Nov 2008 03:12:05 GMT" } ]
2008-11-13T00:00:00
[ [ "Zhao", "Qing", "" ], [ "Krishnamachari", "Bhaskar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.1380
Haim Permuter Henry
Haim H. Permuter, Tsachy Weissman and Jun Chen
New Bounds for the Capacity Region of the Finite-State Multiple Access Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of the Finite-State Multiple Access Channel (FS-MAC) with feedback that may be an arbitrary time-invariant function of the channel output samples is considered. We provided a sequence of inner and outer bounds for this region. These bounds are shown to coincide, and hence yield the capacity region, of FS-MACs where the state process is stationary and ergodic and not affected by the inputs, and for indecomposable FS-MAC when feedback is not allowed. Though the capacity region is `multi-letter' in general, our results yield explicit conclusions when applied to specific scenarios of interest.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 06:25:25 GMT" } ]
2008-02-12T00:00:00
[ [ "Permuter", "Haim H.", "" ], [ "Weissman", "Tsachy", "" ], [ "Chen", "Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1381
Andrzej Kwasniewski
A. K. Kwasniewski
Comments on combinatorial interpretation of fibonomial coefficients - an email style letter
2 pages
Bulletin of the ICA vol. 42 September (2004) 10-11
null
null
math.CO cs.DM math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Up to our knowledge -since about 126 years we were lacking of classical type combinatorial interpretation of Fibonomial coefficients as it was Lukas \cite{1} - to our knowledge -who was the first who had defined Finonomial coefficients and derived a recurrence for them (see Historical Note in \cite{2,3}). Here we inform that a join combinatorial interpretation was found \cite{4} for all binomial-type coefficient - Fibonomial coefficients included.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 06:33:24 GMT" } ]
2008-02-12T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0802.1382
Andrzej Kwasniewski
A. K. Kwasniewski
New type Stirling like numbers - an email style letter
3 pages
Bulletin of the ICA Vol. 49 (2007), pp. 99-102
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of the Fibonacci cobweb poset from [1] has been naturally extended to any admissible sequence $F$ in [2] where it was also recognized that the celebrated prefab notion of Bender and Goldman [3] - (see also [4,5]) - admits such an extension so as to encompass the new type combinatorial objects from [2] as leading examples. Recently the present author had introduced also [6] two natural partial orders in there: one $\leq$ in grading-natural subsets of cobweb`s prefabs sets [2] and in the second proposal one endows the set sums of the so called "prefabiants" with such another partial order that one arrives at Bell-like numbers including Fibonacci triad sequences introduced by the present author in [7]. Here we quote the basic observations concerning the new type Stirling like numbers as they appear in [6]. For more on notation, Stirling like numbers of the first kind and for proofs - see [6].
[ { "version": "v1", "created": "Mon, 11 Feb 2008 06:50:05 GMT" } ]
2010-11-16T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.1383
Haim Permuter Henry
Haim H. Permuter, Young-Han Kim and Tsachy Weissman
On Directed Information and Gambling
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of gambling in horse races with causal side information and show that Massey's directed information characterizes the increment in the maximum achievable capital growth rate due to the availability of side information. This result gives a natural interpretation of directed information $I(Y^n \to X^n)$ as the amount of information that $Y^n$ \emph{causally} provides about $X^n$. Extensions to stock market portfolio strategies and data compression with causal side information are also discussed.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 06:52:47 GMT" } ]
2008-02-12T00:00:00
[ [ "Permuter", "Haim H.", "" ], [ "Kim", "Young-Han", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1387
Anne Jaigu
Nathalie Mitton (INRIA Futurs), Katy Paroux (LM-Besan\c{c}on), Bruno Sericola (IRISA), S\'ebastien Tixeuil (INRIA Futurs)
Ascending runs in dependent uniformly distributed random variables: Application to wireless networks
null
null
null
null
cs.DM cs.NI math.CO math.PR
null
We analyze in this paper the longest increasing contiguous sequence or maximal ascending run of random variables with common uniform distribution but not independent. Their dependence is characterized by the fact that two successive random variables cannot take the same value. Using a Markov chain approach, we study the distribution of the maximal ascending run and we develop an algorithm to compute it. This problem comes from the analysis of several self-organizing protocols designed for large-scale wireless sensor networks, and we show how our results apply to this domain.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 15:08:20 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 15:20:45 GMT" } ]
2008-02-25T00:00:00
[ [ "Mitton", "Nathalie", "", "INRIA Futurs" ], [ "Paroux", "Katy", "", "LM-Besançon" ], [ "Sericola", "Bruno", "", "IRISA" ], [ "Tixeuil", "Sébastien", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0802.1389
Svante Janson
Svante Janson, Christian Lavault, Guy Louchard
Convergence of some leader election algorithms
27 pages, 13 figures, 5 tables
null
null
null
cs.DC math.PR
null
We start with a set of n players. With some probability P(n,k), we kill n-k players; the other ones stay alive, and we repeat with them. What is the distribution of the number X_n of phases (or rounds) before getting only one player? We present a probabilistic analysis of this algorithm under some conditions on the probability distributions P(n,k), including stochastic monotonicity and the assumption that roughly a fixed proportion alpha of the players survive in each round. We prove a kind of convergence in distribution for X_n-log_a n, where the basis a=1/alpha; as in many other similar problems there are oscillations and no true limit distribution, but suitable subsequences converge, and there is an absolutely continuous random variable Z such that the distribution of X_n can be approximated by Z+log_a n rounded to the nearest larger integer. Applications of the general result include the leader election algorithm where players are eliminated by independent coin tosses and a variation of the leader election algorithm proposed by W.R. Franklin. We study the latter algorithm further, including numerical results.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 11:01:11 GMT" } ]
2008-02-12T00:00:00
[ [ "Janson", "Svante", "" ], [ "Lavault", "Christian", "" ], [ "Louchard", "Guy", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0802.1393
Clement Jonquet
Cl\'ement Jonquet (LIRMM), Stefano A. Cerri (LIRMM)
Les Agents comme des interpr\'eteurs Scheme : Sp\'ecification dynamique par la communication
null
Dans 14\`eme Congr\`es Francophone AFRIF-AFIA de Reconnaissance des Formes et Intelligence Artificielle - RFIA'04, Toulouse : France (2004)
null
null
cs.MA cs.AI
null
We proposed in previous papers an extension and an implementation of the STROBE model, which regards the Agents as Scheme interpreters. These Agents are able to interpret messages in a dedicated environment including an interpreter that learns from the current conversation therefore representing evolving meta-level Agent's knowledge. When the Agent's interpreter is a nondeterministic one, the dialogues may consist of subsequent refinements of specifications in the form of constraint sets. The paper presents a worked out example of dynamic service generation - such as necessary on Grids - by exploiting STROBE Agents equipped with a nondeterministic interpreter. It shows how enabling dynamic specification of a problem. Then it illustrates how these principles could be effective for other applications. Details of the implementation are not provided here, but are available.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 08:55:46 GMT" } ]
2008-02-12T00:00:00
[ [ "Jonquet", "Clément", "", "LIRMM" ], [ "Cerri", "Stefano A.", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0802.1412
Mahesh Pal Dr.
Mahesh Pal
Extreme Learning Machine for land cover classification
6 pages, mapindia 2008 conference
null
10.1080/01431160902788636
null
cs.NE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores the potential of extreme learning machine based supervised classification algorithm for land cover classification. In comparison to a backpropagation neural network, which requires setting of several user-defined parameters and may produce local minima, extreme learning machine require setting of one parameter and produce a unique solution. ETM+ multispectral data set (England) was used to judge the suitability of extreme learning machine for remote sensing classifications. A back propagation neural network was used to compare its performance in term of classification accuracy and computational cost. Results suggest that the extreme learning machine perform equally well to back propagation neural network in term of classification accuracy with this data set. The computational cost using extreme learning machine is very small in comparison to back propagation neural network.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 11:12:06 GMT" } ]
2019-07-02T00:00:00
[ [ "Pal", "Mahesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0802.1427
Klim Efremenko
Klim Efremenko, Ely Porat
Approximating General Metric Distances Between a Pattern and a Text
This is updated version of paper appered in SODA 2008
SODA 2008
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $T=t_0 ... t_{n-1}$ be a text and $P = p_0 ... p_{m-1}$ a pattern taken from some finite alphabet set $\Sigma$, and let $\dist$ be a metric on $\Sigma$. We consider the problem of calculating the sum of distances between the symbols of $P$ and the symbols of substrings of $T$ of length $m$ for all possible offsets. We present an $\epsilon$-approximation algorithm for this problem which runs in time $O(\frac{1}{\epsilon^2}n\cdot \mathrm{polylog}(n,\abs{\Sigma}))$
[ { "version": "v1", "created": "Mon, 11 Feb 2008 12:36:31 GMT" } ]
2008-02-12T00:00:00
[ [ "Efremenko", "Klim", "" ], [ "Porat", "Ely", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.1430
Francis Bach
Jacob Abernethy, Francis Bach (INRIA Rocquencourt), Theodoros Evgeniou, Jean-Philippe Vert (CB)
A New Approach to Collaborative Filtering: Operator Estimation with Spectral Regularization
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general approach for collaborative filtering (CF) using spectral regularization to learn linear operators from "users" to the "objects" they rate. Recent low-rank type matrix completion approaches to CF are shown to be special cases. However, unlike existing regularization based CF methods, our approach can be used to also incorporate information such as attributes of the users or the objects -- a limitation of existing regularization based CF methods. We then provide novel representer theorems that we use to develop new estimation methods. We provide learning algorithms based on low-rank decompositions, and test them on a standard CF dataset. The experiments indicate the advantages of generalizing the existing regularization based CF methods to incorporate related information about users and objects. Finally, we show that certain multi-task learning methods can be also seen as special cases of our proposed approach.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 12:55:34 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 14:05:14 GMT" } ]
2008-12-19T00:00:00
[ [ "Abernethy", "Jacob", "", "INRIA Rocquencourt" ], [ "Bach", "Francis", "", "INRIA Rocquencourt" ], [ "Evgeniou", "Theodoros", "", "CB" ], [ "Vert", "Jean-Philippe", "", "CB" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0802.1465
Cyril Allauzen
Cyril Allauzen and Mehryar Mohri
3-Way Composition of Weighted Finite-State Transducers
Added missing acknowledgments
null
null
null
cs.CC
null
Composition of weighted transducers is a fundamental algorithm used in many applications, including for computing complex edit-distances between automata, or string kernels in machine learning, or to combine different components of a speech recognition, speech synthesis, or information extraction system. We present a generalization of the composition of weighted transducers, 3-way composition, which is dramatically faster in practice than the standard composition algorithm when combining more than two transducers. The worst-case complexity of our algorithm for composing three transducers $T_1$, $T_2$, and $T_3$ resulting in $T$, \ignore{depending on the strategy used, is $O(|T|_Q d(T_1) d(T_3) + |T|_E)$ or $(|T|_Q d(T_2) + |T|_E)$,} is $O(|T|_Q \min(d(T_1) d(T_3), d(T_2)) + |T|_E)$, where $|\cdot|_Q$ denotes the number of states, $|\cdot|_E$ the number of transitions, and $d(\cdot)$ the maximum out-degree. As in regular composition, the use of perfect hashing requires a pre-processing step with linear-time expected complexity in the size of the input transducers. In many cases, this approach significantly improves on the complexity of standard composition. Our algorithm also leads to a dramatically faster composition in practice. Furthermore, standard composition can be obtained as a special case of our algorithm. We report the results of several experiments demonstrating this improvement. These theoretical and empirical improvements significantly enhance performance in the applications already mentioned.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 16:18:40 GMT" }, { "version": "v2", "created": "Fri, 22 Feb 2008 18:02:27 GMT" } ]
2008-02-22T00:00:00
[ [ "Allauzen", "Cyril", "" ], [ "Mohri", "Mehryar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.1471
Ronald de Wolf
Ronald de Wolf (CWI Amsterdam)
Error-Correcting Data Structures
15 pages LaTeX; an abridged version will appear in the Proceedings of the STACS 2009 conference
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study data structures in the presence of adversarial noise. We want to encode a given object in a succinct data structure that enables us to efficiently answer specific queries about the object, even if the data structure has been corrupted by a constant fraction of errors. This new model is the common generalization of (static) data structures and locally decodable error-correcting codes. The main issue is the tradeoff between the space used by the data structure and the time (number of probes) needed to answer a query about the encoded object. We prove a number of upper and lower bounds on various natural error-correcting data structure problems. In particular, we show that the optimal length of error-correcting data structures for the Membership problem (where we want to store subsets of size s from a universe of size n) is closely related to the optimal length of locally decodable codes for s-bit strings.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 16:35:49 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2008 14:25:48 GMT" } ]
2008-12-01T00:00:00
[ [ "de Wolf", "Ronald", "", "CWI Amsterdam" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.1514
Konstantin Kobylkin S.
K.S. Kobylkin
Minimal Committee Problem for Inconsistent Systems of Linear Inequalities on the Plane
29 pages, 2 figures
null
10.1134/S1054661806040201
null
cs.DM cs.CG
null
A representation of an arbitrary system of strict linear inequalities in R^n as a system of points is proposed. The representation is obtained by using a so-called polarity. Based on this representation an algorithm for constructing a committee solution of an inconsistent plane system of linear inequalities is given. A solution of two problems on minimal committee of a plane system is proposed. The obtained solutions to these problems can be found by means of the proposed algorithm.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 19:50:56 GMT" }, { "version": "v2", "created": "Tue, 12 Feb 2008 07:40:17 GMT" }, { "version": "v3", "created": "Fri, 15 Feb 2008 17:15:03 GMT" } ]
2008-02-15T00:00:00
[ [ "Kobylkin", "K. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0802.1555
Shengtian Yang
Shengtian Yang, Yan Chen, Thomas Honold, Zhaoyang Zhang, Peiliang Qiu
Constructing Linear Codes with Good Joint Spectra
6 pages, 1 figure, to appear in Proc. ChinaCom 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of finding good linear codes for joint source-channel coding (JSCC) is investigated in this paper. By the code-spectrum approach, it has been proved in the authors' previous paper that a good linear code for the authors' JSCC scheme is a code with a good joint spectrum, so the main task in this paper is to construct linear codes with good joint spectra. First, the code-spectrum approach is developed further to facilitate the calculation of spectra. Second, some general principles for constructing good linear codes are presented. Finally, we propose an explicit construction of linear codes with good joint spectra based on low density parity check (LDPC) codes and low density generator matrix (LDGM) codes.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 02:23:02 GMT" }, { "version": "v2", "created": "Thu, 28 Aug 2008 02:04:53 GMT" } ]
2008-08-28T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Chen", "Yan", "" ], [ "Honold", "Thomas", "" ], [ "Zhang", "Zhaoyang", "" ], [ "Qiu", "Peiliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1567
Shigeaki Kuzuoka
Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu
Universal Coding for Lossless and Lossy Complementary Delivery Problems
20 pages, one column, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with a coding problem called complementary delivery, where messages from two correlated sources are jointly encoded and each decoder reproduces one of two messages using the other message as the side information. Both lossless and lossy universal complementary delivery coding schemes are investigated. In the lossless case, it is demonstrated that a universal complementary delivery code can be constructed by only combining two Slepian-Wolf codes. Especially, it is shown that a universal lossless complementary delivery code, for which error probability is exponentially tight, can be constructed from two linear Slepian-Wolf codes. In the lossy case, a universal complementary delivery coding scheme based on Wyner-Ziv codes is proposed. While the proposed scheme cannot attain the optimal rate-distortion trade-off in general, the rate-loss is upper bounded by a universal constant under some mild conditions. The proposed schemes allows us to apply any Slepian-Wolf and Wyner-Ziv codes to complementary delivery coding.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 05:54:27 GMT" } ]
2008-02-13T00:00:00
[ [ "Kuzuoka", "Shigeaki", "" ], [ "Kimura", "Akisato", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1578
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Thread extraction for polyadic instruction sequences
21 pages; error corrected; presentation improved
Scientific Annals of Computer Science, 21(2):283--310, 2011. http://www.infoiasi.ro/bin/download/Annals/XXI2/XXI2_4.pdf
null
PRG0803
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the phenomenon that instruction sequences are split into fragments which somehow produce a joint behaviour. In order to bring this phenomenon better into the picture, we formalize a simple mechanism by which several instruction sequence fragments can produce a joint behaviour. We also show that, even in the case of this simple mechanism, it is a non-trivial matter to explain by means of a translation into a single instruction sequence what takes place on execution of a collection of instruction sequence fragments.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 07:49:27 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2009 08:59:16 GMT" }, { "version": "v3", "created": "Tue, 28 Jul 2009 07:07:45 GMT" } ]
2012-11-20T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0802.1586
Mark Burgess
Demissies Aredo, Mark Burgess and Simen Hagen
Program Promises
null
null
null
null
cs.SE
null
The framework of promise theory offers an alternative way of understanding programming models, especially in distributed systems. We show that promise theory can express some familiar constructs and resolve some problems in program interface design, using fewer and simpler concepts than the Unified Modelling Language (UML).
[ { "version": "v1", "created": "Tue, 12 Feb 2008 08:40:51 GMT" } ]
2008-02-13T00:00:00
[ [ "Aredo", "Demissies", "" ], [ "Burgess", "Mark", "" ], [ "Hagen", "Simen", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.1604
Constantinos Daskalakis
Constantinos Daskalakis, Grant Schoenebeck, Gregory Valiant, Paul Valiant
On the Complexity of Nash Equilibria of Action-Graph Games
null
null
null
null
cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of computing Nash Equilibria of action-graph games (AGGs). AGGs, introduced by Bhat and Leyton-Brown, is a succinct representation of games that encapsulates both "local" dependencies as in graphical games, and partial indifference to other agents' identities as in anonymous games, which occur in many natural settings. This is achieved by specifying a graph on the set of actions, so that the payoff of an agent for selecting a strategy depends only on the number of agents playing each of the neighboring strategies in the action graph. We present a Polynomial Time Approximation Scheme for computing mixed Nash equilibria of AGGs with constant treewidth and a constant number of agent types (and an arbitrary number of strategies), together with hardness results for the cases when either the treewidth or the number of agent types is unconstrained. In particular, we show that even if the action graph is a tree, but the number of agent-types is unconstrained, it is NP-complete to decide the existence of a pure-strategy Nash equilibrium and PPAD-complete to compute a mixed Nash equilibrium (even an approximate one); similarly for symmetric AGGs (all agents belong to a single type), if we allow arbitrary treewidth. These hardness results suggest that, in some sense, our PTAS is as strong of a positive result as one can expect.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 09:45:36 GMT" } ]
2008-02-13T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Schoenebeck", "Grant", "" ], [ "Valiant", "Gregory", "" ], [ "Valiant", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0802.1617
Christian Mercat
Christian Mercat (I3M)
Discrete Complex Structure on Surfel Surfaces
null
Dans 14th IAPR International Conference on Discrete Geometry for Computer Imagery - 14th IAPR International Conference on Discrete Geometry for Computer Imagery, Lyon : France (2008)
null
null
cs.CG cs.GR math.CV
null
This paper defines a theory of conformal parametrization of digital surfaces made of surfels equipped with a normal vector. The main idea is to locally project each surfel to the tangent plane, therefore deforming its aspect-ratio. It is a generalization of the theory known for polyhedral surfaces. The main difference is that the conformal ratios that appear are no longer real in general. It yields a generalization of the standard Laplacian on weighted graphs.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 11:06:38 GMT" } ]
2008-02-18T00:00:00
[ [ "Mercat", "Christian", "", "I3M" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Mathematics", "code": "math.CV", "description": "Holomorphic functions, automorphic group actions and forms, pseudoconvexity, complex geometry, analytic spaces, analytic sheaves", "span": "(Complex Variables)" } ]
0802.1661
Marie-Annick Guillemer
Dima Grigoriev (IRMAR), Vladimir Shpilrain
Zero-knowledge authentication schemes from actions on graphs, groups, or rings
null
null
null
08-09
cs.CR
null
We propose a general way of constructing zero-knowledge authentication schemes from actions of a semigroup on a set, without exploiting any specific algebraic properties of the set acted upon. Then we give several concrete realizations of this general idea, and in particular, we describe several zero-knowledge authentication schemes where forgery (a.k.a. impersonation) is NP-hard. Computationally hard problems that can be employed in these realizations include (Sub)graph Isomorphism, Graph Colorability, Diophantine Problem, and many others.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 16:10:40 GMT" } ]
2008-02-13T00:00:00
[ [ "Grigoriev", "Dima", "", "IRMAR" ], [ "Shpilrain", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.1685
Christoph Durr
Marcin Bienkowski, Marek Chrobak, Christoph Durr, Mathilde Hurand, Artur Jez, Lukasz Jez, Jakub Lopuszanski, Grzegorz Stachowiak
Generalized Whac-a-Mole
null
null
null
null
cs.DS
null
We consider online competitive algorithms for the problem of collecting weighted items from a dynamic set S, when items are added to or deleted from S over time. The objective is to maximize the total weight of collected items. We study the general version, as well as variants with various restrictions, including the following: the uniform case, when all items have the same weight, the decremental sets, when all items are present at the beginning and only deletion operations are allowed, and dynamic queues, where the dynamic set is ordered and only its prefixes can be deleted (with no restriction on insertions). The dynamic queue case is a generalization of bounded-delay packet scheduling (also referred to as buffer management). We present several upper and lower bounds on the competitive ratio for these variants.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 18:41:46 GMT" }, { "version": "v2", "created": "Sun, 17 Feb 2008 00:09:51 GMT" } ]
2016-09-08T00:00:00
[ [ "Bienkowski", "Marcin", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Hurand", "Mathilde", "" ], [ "Jez", "Artur", "" ], [ "Jez", "Lukasz", "" ], [ "Lopuszanski", "Jakub", "" ], [ "Stachowiak", "Grzegorz", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.1690
Andrzej Kwasniewski
A. Krzysztof Kwasniewski
More on the Bernoulli and Taylor Formula for Extended Umbral Calculus
11 pages
Advances in Applied Clifford Algebras Volume 16, Number 1,(2006) 29-39
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One delivers here the extended Bernoulli and Taylor formula of a new sort with the rest term of the Cauchy type recently derived by the author in the case of the so called $\psi$-difference calculus which constitutes the representative for the purpose case of extended umbral calculus. The central importance of such a type formulas is beyond any doubt. Recent publications do confirm this historically established experience. Its links via umbrality to combinatorics are known at least since Rota and Mullin source papers then up to recently extended by many authors to be indicated in the sequel.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 19:24:00 GMT" } ]
2008-02-15T00:00:00
[ [ "Kwasniewski", "A. Krzysztof", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.1696
Andrzej Kwasniewski
A. Krzysztof Kwa\'sniewski
First Observations on Prefab Posets Whitney Numbers
14 pages
Advances in Applied Clifford Algebras Volume 18, Number 1 / February, 2008, 57-73
10.1007/s00006-007-0054-7
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a natural partial order in structurally natural finite subsets of the cobweb prefabs sets recently constructed by the present author. Whitney numbers of the second kind of the corresponding subposet which constitute Stirling like numbers triangular array are then calculated and the explicit formula for them is provided. Next, in the second construction we endow the set sums of prefabiants with such an another partial order that their Bell like numbers include Fibonacci triad sequences introduced recently by the present author in order to extend famous relation between binomial Newton coefficients and Fibonacci numbers onto the infinity of their relatives among whom there are also the Fibonacci triad sequences and binomial like coefficients (incidence coefficients included). The first partial order is F sequence independent while the second partial order is F sequence dependent where F is the so called admissible sequence determining cobweb poset by construction. An F determined cobweb posets Hasse diagram becomes Fibonacci tree sheathed with specific cobweb if the sequence F is chosen to be just the Fibonacci sequence. From the stand-point of linear algebra of formal series these are generating functions which stay for the so called extended coherent states of quantum physics. This information is delivered in the last section.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 19:47:18 GMT" } ]
2008-02-15T00:00:00
[ [ "Kwaśniewski", "A. Krzysztof", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.1699
Prajakta Nimbhorkar
Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar
Longest paths in Planar DAGs in Unambiguous Logspace
null
null
null
null
cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
We show via two different algorithms that finding the length of the longest path in planar directed acyclic graph (DAG) is in unambiguous logspace UL, and also in the complement class co-UL. The result extends to toroidal DAGs as well.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 20:08:39 GMT" } ]
2008-02-13T00:00:00
[ [ "Limaye", "Nutan", "" ], [ "Mahajan", "Meena", "" ], [ "Nimbhorkar", "Prajakta", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.1722
Saket Saurabh
Omid Amini, Fedor V. Fomin and Saket Saurabh
Parameterized Algorithms for Partial Cover Problems
20 page, 1 Figure
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Covering problems are fundamental classical problems in optimization, computer science and complexity theory. Typically an input to these problems is a family of sets over a finite universe and the goal is to cover the elements of the universe with as few sets of the family as possible. The variations of covering problems include well known problems like Set Cover, Vertex Cover, Dominating Set and Facility Location to name a few. Recently there has been a lot of study on partial covering problems, a natural generalization of covering problems. Here, the goal is not to cover all the elements but to cover the specified number of elements with the minimum number of sets. In this paper we study partial covering problems in graphs in the realm of parameterized complexity. Classical (non-partial) version of all these problems have been intensively studied in planar graphs and in graphs excluding a fixed graph $H$ as a minor. However, the techniques developed for parameterized version of non-partial covering problems cannot be applied directly to their partial counterparts. The approach we use, to show that various partial covering problems are fixed parameter tractable on planar graphs, graphs of bounded local treewidth and graph excluding some graph as a minor, is quite different from previously known techniques. The main idea behind our approach is the concept of implicit branching. We find implicit branching technique to be interesting on its own and believe that it can be used for some other problems.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 21:19:40 GMT" } ]
2008-02-14T00:00:00
[ [ "Amini", "Omid", "" ], [ "Fomin", "Fedor V.", "" ], [ "Saurabh", "Saket", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.1738
\'Alvaro Francisco Huertas-Rosero
\'Alvaro Francisco Huertas-Rosero, Leif Azzopardi and C. J. van Rijsbergen
Characterising through Erasing: A Theoretical Framework for Representing Documents Inspired by Quantum Theory
4 pages, 3 figures, Quantum Interaction Symposium 2008
Proceedings of Quantum Interaction Symposium 2008
null
null
cs.IR quant-ph
null
The problem of representing text documents within an Information Retrieval system is formulated as an analogy to the problem of representing the quantum states of a physical system. Lexical measurements of text are proposed as a way of representing documents which are akin to physical measurements on quantum states. Consequently, the representation of the text is only known after measurements have been made, and because the process of measuring may destroy parts of the text, the document is characterised through erasure. The mathematical foundations of such a quantum representation of text are provided in this position paper as a starting point for indexing and retrieval within a ``quantum like'' Information Retrieval system.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 23:43:20 GMT" }, { "version": "v2", "created": "Mon, 18 Feb 2008 18:58:00 GMT" } ]
2008-02-19T00:00:00
[ [ "Huertas-Rosero", "Álvaro Francisco", "" ], [ "Azzopardi", "Leif", "" ], [ "van Rijsbergen", "C. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0802.1754
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Devavrat Shah and Muriel M\'edard
ARQ for Network Coding
Submitted to the 2008 IEEE International Symposium on Information Theory (ISIT 2008)
null
10.1109/ISIT.2008.4595268
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\frac1{1-\rho})$ as opposed to $\Omega(\frac1{(1-\rho)^2})$ for the baseline approach, where $\rho$ is the load factor.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 02:01:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Shah", "Devavrat", "" ], [ "Médard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1785
Ryutaroh Matsumoto
Atsushi Okawado, Ryutaroh Matsumoto, Tomohiko Uyematsu
Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels
8 pages, two column, 14 figures, LaTeX2e
Proceedings of 2008 IEEE International Symposium on Information Theory, pp. 2022-2025, 2008
10.1109/ISIT.2008.4595344
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Dijkstra's algorithm with bounded list size after QR decomposition for decreasing the computational complexity of near maximum-likelihood (ML) detection of signals over multiple-input-multiple-output (MIMO) channels. After that, we compare the performances of proposed algorithm, QR decomposition M-algorithm (QRD-MLD), and its improvement. When the list size is set to achieve the almost same symbol error rate (SER) as the QRD-MLD, the proposed algorithm has smaller average computational complexity.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 09:43:14 GMT" } ]
2008-09-02T00:00:00
[ [ "Okawado", "Atsushi", "" ], [ "Matsumoto", "Ryutaroh", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1790
Silvano Di Zenzo
Silvano Di Zenzo
SAT Has No Wizards
19 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An (encoded) decision problem is a pair (E, F) where E=words that encode instances of the problem, F=words to be accepted. We use "strings" in a technical sense. With an NP problem (E, F) we associate the "logogram" of F relative to E, which conveys structural information on E, F, and how F is embedded in E. The kernel Ker(P) of a program P that solves (E, F) consists of those strings in the logogram that are used by P. There are relations between Ker(P) and the complexity of P. We develop an application to SAT that relies upon a property of internal independence of SAT. We show that SAT cannot have in its logogram strings serving as collective certificates. As consequence, all programs that solve SAT have same kernel.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 14:43:40 GMT" } ]
2008-02-14T00:00:00
[ [ "Di Zenzo", "Silvano", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.1815
Ding Yang
Yang Ding
A Construction for Constant-Composition Codes
4 pages, submitted to IEEE Infromation Theory
null
10.1109/TIT.2008.926380
null
cs.IT math.IT
null
By employing the residue polynomials, a construction of constant-composition codes is given. This construction generalizes the one proposed by Xing[16]. It turns out that when d=3 this construction gives a lower bound of constant-composition codes improving the one in [10]. Moreover, for d>3, we give a lower bound on maximal size of constant-composition codes. In particular, our bound for d=5 gives the best possible size of constant-composition codes up to magnitude.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 12:59:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Ding", "Yang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1829
Francesco Zamponi
Fabrizio Altarelli, Remi Monasson, Guilhem Semerjian and Francesco Zamponi
A review of the Statistical Mechanics approach to Random Optimization Problems
26 pages, 8 figures. Contribution to the book "Handbook of Satisfiability" to be published in 2008 by IOS press
In "Handbook of Satisfiability", published by IOS press (2009), Volume 185 of the Series "Frontiers in Artificial Intelligence and Applications"
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review the connection between statistical mechanics and the analysis of random optimization problems, with particular emphasis on the random k-SAT problem. We discuss and characterize the different phase transitions that are met in these problems, starting from basic concepts. We also discuss how statistical mechanics methods can be used to investigate the behavior of local search and decimation based algorithms.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 13:45:16 GMT" } ]
2009-01-08T00:00:00
[ [ "Altarelli", "Fabrizio", "" ], [ "Monasson", "Remi", "" ], [ "Semerjian", "Guilhem", "" ], [ "Zamponi", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.1884
Henning Schnoor
Edith Hemaspaandra and Henning Schnoor
On the Complexity of Elementary Modal Logics
Full version of STACS 2008 paper
null
null
null
cs.CC cs.LO
null
Modal logics are widely used in computer science. The complexity of modal satisfiability problems has been investigated since the 1970s, usually proving results on a case-by-case basis. We prove a very general classification for a wide class of relevant logics: Many important subclasses of modal logics can be obtained by restricting the allowed models with first-order Horn formulas. We show that the satisfiability problem for each of these logics is either NP-complete or PSPACE-hard, and exhibit a simple classification criterion. Further, we prove matching PSPACE upper bounds for many of the PSPACE-hard logics.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 18:57:26 GMT" } ]
2008-02-14T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Schnoor", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.1888
K Sreeram
K. Sreeram, S. Birenjith and P. Vijay Kumar
Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design
null
null
null
null
cs.IT math.IT
null
We consider single-source single-sink (ss-ss) multi-hop networks, with slow-fading links and single-antenna half-duplex relays. We identify two families of networks that are multi-hop generalizations of the well-studied two-hop network: K-Parallel-Path (KPP) networks and layered networks. KPP networks can be viewed as the union of K node-disjoint parallel relaying paths, each of length greater than one. KPP networks are then generalized to KPP(I) networks, which permit interference between paths and to KPP(D) networks, which possess a direct link from source to sink. We characterize the DMT of these families of networks completely for K > 3. Layered networks are networks comprising of relaying layers with edges existing only within the same layer or between adjacent layers. We prove that a linear DMT between the maximum diversity d_{max} and the maximum multiplexing gain of 1 is achievable for fully-connected layered networks. This is shown to be equal to the optimal DMT if the number of layers is less than 4. For multi-antenna KPP and layered networks, we provide an achievable DMT region. For arbitrary ss-ss single-antenna directed-acyclic full-duplex networks, we prove that a linear tradeoff between maximum diversity and maximum multiplexing gain is achievable. All protocols in this paper are explicit and use only amplify and forward (AF) relaying. We also construct codes with short block-lengths based on cyclic division algebras that achieve the optimal DMT for all the proposed schemes. Two key implications of the results in the paper are that the half-duplex constraint does not entail any rate loss for a large class of networks and that simple AF protocols are often sufficient to attain the optimal DMT.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 20:57:54 GMT" } ]
2008-02-14T00:00:00
[ [ "Sreeram", "K.", "" ], [ "Birenjith", "S.", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1893
K Sreeram
K. Sreeram, S. Birenjith and P. Vijay Kumar
Diversity and Degrees of Freedom of Cooperative Wireless Networks
Submitted to International Symposium on Information Theory (ISIT), 2008
null
null
null
cs.IT math.IT
null
Wireless fading networks with multiple antennas are typically studied information-theoretically from two different perspectives - the outage characterization and the ergodic capacity characterization. A key parameter in the outage characterization of a network is the diversity, whereas a first-order indicator for the ergodic capacity is the degrees of freedom (DOF), which is the pre-log coefficient in the capacity expression. In this paper, we present max-flow min-cut type theorems for computing both the diversity and the degrees of freedom of arbitrary single-source single-sink multi-antenna networks. We also show that an amplify-and-forward protocol is sufficient to achieve this. The degrees of freedom characterization is obtained using a conversion to a deterministic wireless network for which the capacity was recently found. We show that the diversity result easily extends to multi-source multi-sink networks and evaluate the DOF for multi-casting in single-source multi-sink networks.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 20:52:16 GMT" } ]
2008-02-14T00:00:00
[ [ "Sreeram", "K.", "" ], [ "Birenjith", "S.", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.1957
Sudhir Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury
To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?
33 pages, 10 figures, new results added, substantially revised
null
null
null
cs.GT cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look through the algorithmic lens, we first propose solution concepts for the game originating from the strategic behavior of advertisers as they try to optimize their budget allocation across various keywords. Next, we consider two broad match scenarios based on factors such as information asymmetry between advertisers and the auctioneer, and the extent of auctioneer's control on the budget splitting. In the first scenario, the advertisers have the full information about broad match and relevant parameters, and can reapportion their own budgets to utilize the extra information; in particular, the auctioneer has no direct control over budget splitting. We show that, the same broad match may lead to different equilibria, one leading to a revenue improvement, whereas another to a revenue loss. This leaves the auctioneer in a dilemma - whether to broad-match or not. This motivates us to consider another broad match scenario, where the advertisers have information only about the current scenario, and the allocation of the budgets unspent in the current scenario is in the control of the auctioneer. We observe that the auctioneer can always improve his revenue by judiciously using broad match. Thus, information seems to be a double-edged sword for the auctioneer.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 03:45:07 GMT" }, { "version": "v2", "created": "Mon, 21 Jul 2008 19:40:28 GMT" } ]
2008-07-21T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2001
Uwe Aickelin
Uwe Aickelin and Kathryn Dowsland
Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
null
Journal of Scheduling, 3(3), pp 139-153, 2000
10.1002/(SICI)1099-1425(200005/06)3:3<139::AID-JOS41>3.0.CO;2-2
null
cs.NE cs.CE
null
There is considerable interest in the use of genetic algorithms to solve problems arising in the areas of scheduling and timetabling. However, the classical genetic algorithm paradigm is not well equipped to handle the conflict between objectives and constraints that typically occurs in such problems. In order to overcome this, successful implementations frequently make use of problem specific knowledge. This paper is concerned with the development of a GA for a nurse rostering problem at a major UK hospital. The structure of the constraints is used as the basis for a co-evolutionary strategy using co-operating sub-populations. Problem specific knowledge is also used to define a system of incentives and disincentives, and a complementary mutation operator. Empirical results based on 52 weeks of live data show how these features are able to improve an unsuccessful canonical GA to the point where it is able to provide a practical solution to the problem
[ { "version": "v1", "created": "Thu, 14 Feb 2008 11:25:37 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 16:56:56 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:44:23 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Dowsland", "Kathryn", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0802.2013
Ayfer Ozgur
Ayfer Ozgur, Olivier Leveque
Throughput-Delay Trade-off for Hierarchical Cooperation in Ad Hoc Wireless Networks
9 pages, 6 figures, to appear in IEEE Transactions on Information Theory, submitted Dec 2007
null
10.1109/ICTEL.2008.4652688
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hierarchical cooperation has recently been shown to achieve better throughput scaling than classical multihop schemes under certain assumptions on the channel model in static wireless networks. However, the end-to-end delay of this scheme turns out to be significantly larger than those of multihop schemes. A modification of the scheme is proposed here that achieves a throughput-delay trade-off $D(n)=(\log n)^2 T(n)$ for T(n) between $\Theta(\sqrt{n}/\log n)$ and $\Theta(n/\log n)$, where D(n) and T(n) are respectively the average delay per bit and the aggregate throughput in a network of n nodes. This trade-off complements the previous results of El Gamal et al., which show that the throughput-delay trade-off for multihop schemes is given by D(n)=T(n) where T(n) lies between $\Theta(1)$ and $\Theta(\sqrt{n})$. Meanwhile, the present paper considers the network multiple-access problem, which may be of interest in its own right.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 14:09:59 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 2009 10:21:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Ozgur", "Ayfer", "" ], [ "Leveque", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2015
Steven de Rooij
Wouter Koolen and Steven de Rooij
Combining Expert Advice Efficiently
50 pages
null
null
null
cs.LG cs.DS cs.IT math.IT
null
We show how models for prediction with expert advice can be defined concisely and clearly using hidden Markov models (HMMs); standard HMM algorithms can then be used to efficiently calculate, among other things, how the expert predictions should be weighted according to the model. We cast many existing models as HMMs and recover the best known running times in each case. We also describe two new models: the switch distribution, which was recently developed to improve Bayesian/Minimum Description Length model selection, and a new generalisation of the fixed share algorithm based on run-length coding. We give loss bounds for all models and shed new light on their relationships.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 14:54:57 GMT" }, { "version": "v2", "created": "Fri, 15 Feb 2008 10:59:15 GMT" } ]
2008-02-15T00:00:00
[ [ "Koolen", "Wouter", "" ], [ "de Rooij", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2027
Martin Ziegler
Martin Ziegler and Wouter M. Koolen
Kolmogorov Complexity Theory over the Reals
null
null
null
null
cs.CC cs.SC
null
Kolmogorov Complexity constitutes an integral part of computability theory, information theory, and computational complexity theory -- in the discrete setting of bits and Turing machines. Over real numbers, on the other hand, the BSS-machine (aka real-RAM) has been established as a major model of computation. This real realm has turned out to exhibit natural counterparts to many notions and results in classical complexity and recursion theory; although usually with considerably different proofs. The present work investigates similarities and differences between discrete and real Kolmogorov Complexity as introduced by Montana and Pardo (1998).
[ { "version": "v1", "created": "Thu, 14 Feb 2008 18:30:55 GMT" }, { "version": "v2", "created": "Fri, 28 Mar 2008 11:04:28 GMT" } ]
2008-03-28T00:00:00
[ [ "Ziegler", "Martin", "" ], [ "Koolen", "Wouter M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0802.2045
Simona Settepanella
Simona Settepanella
Blocking Sets in the complement of hyperplane arrangements in projective space
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well know that the theory of minimal blocking sets is studied by several author. Another theory which is also studied by a large number of researchers is the theory of hyperplane arrangements. We can remark that the affine space $AG(n,q)$ is the complement of the line at infinity in $PG(n,q)$. Then $AG(n,q)$ can be regarded as the complement of an hyperplane arrangement in $PG(n,q)$! Therefore the study of blocking sets in the affine space $AG(n,q)$ is simply the study of blocking sets in the complement of a finite arrangement in $PG(n,q)$. In this paper the author generalizes this remark starting to study the problem of existence of blocking sets in the complement of a given hyperplane arrangement in $PG(n,q)$. As an example she solves the problem for the case of braid arrangement. Moreover she poses significant questions on this new and interesting problem.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 16:08:48 GMT" } ]
2008-02-15T00:00:00
[ [ "Settepanella", "Simona", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2108
Anil Hirani
Evan VanderZee, Anil N. Hirani, Damrong Guoy, Edgar Ramos
Well-Centered Triangulation
Content has been added to experimental results section. Significant edits in introduction and in summary of current and previous results. Minor edits elsewhere
SIAM J. Sci. Comput. 31, 6 (2010) 4497-4523
10.1137/090748214
UIUCDCS-R-2008-2936
cs.CG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Meshes composed of well-centered simplices have nice orthogonal dual meshes (the dual Voronoi diagram). This is useful for certain numerical algorithms that prefer such primal-dual mesh pairs. We prove that well-centered meshes also have optimality properties and relationships to Delaunay and minmax angle triangulations. We present an iterative algorithm that seeks to transform a given triangulation in two or three dimensions into a well-centered one by minimizing a cost function and moving the interior vertices while keeping the mesh connectivity and boundary vertices fixed. The cost function is a direct result of a new characterization of well-centeredness in arbitrary dimensions that we present. Ours is the first optimization-based heuristic for well-centeredness, and the first one that applies in both two and three dimensions. We show the results of applying our algorithm to small and large two-dimensional meshes, some with a complex boundary, and obtain a well-centered tetrahedralization of the cube. We also show numerical evidence that our algorithm preserves gradation and that it improves the maximum and minimum angles of acute triangulations created by the best known previous method.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 23:04:07 GMT" }, { "version": "v2", "created": "Fri, 6 Feb 2009 21:21:40 GMT" }, { "version": "v3", "created": "Tue, 18 Aug 2009 16:48:13 GMT" } ]
2010-01-25T00:00:00
[ [ "VanderZee", "Evan", "" ], [ "Hirani", "Anil N.", "" ], [ "Guoy", "Damrong", "" ], [ "Ramos", "Edgar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0802.2112
Manik Lal Das
Manik Lal Das
On the Security of ``an efficient and complete remote user authentication scheme''
null
null
null
null
cs.CR
null
Recently, Liaw et al. proposed a remote user authentication scheme using smart cards. Their scheme has claimed a number of features e.g. mutual authentication, no clock synchronization, no verifier table, flexible user password change, etc. We show that Liaw et al.'s scheme is completely insecure. By intercepting a valid login message in Liaw et al.'s scheme, any unregistered user or adversary can easily login to the remote system and establish a session key.
[ { "version": "v1", "created": "Thu, 14 Feb 2008 22:28:37 GMT" } ]
2008-02-18T00:00:00
[ [ "Das", "Manik Lal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.2125
Syed Jafar
Viveck R. Cadambe, Syed A. Jafar
Multiple Access Outerbounds and the Inseparability of Parallel Interference Channels
null
IEEE Transactions on Information Theory, Vol. 55, No. 9, Sep. 2009,Pages: 3983-3990
10.1109/GLOCOM.2008.ECP.904
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that the capacity of parallel (multi-carrier) Gaussian point-to-point, multiple access and broadcast channels can be achieved by separate encoding for each subchannel (carrier) subject to a power allocation across carriers. In this paper we show that such a separation does not apply to parallel Gaussian interference channels in general. A counter-example is provided in the form of a 3 user interference channel where separate encoding can only achieve a sum capacity of $\log({SNR})+o(\log({SNR}))$ per carrier while the actual capacity, achieved only by joint-encoding across carriers, is $3/2\log({SNR}))+o(\log({SNR}))$ per carrier. As a byproduct of our analysis, we propose a class of multiple-access-outerbounds on the capacity of the 3 user interference channel.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 00:53:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Cadambe", "Viveck R.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2127
Alexandre Riazanov
Alexandre Riazanov
New Implementation Framework for Saturation-Based Reasoning
17 pages
null
null
null
cs.AI cs.LO
null
The saturation-based reasoning methods are among the most theoretically developed ones and are used by most of the state-of-the-art first-order logic reasoners. In the last decade there was a sharp increase in performance of such systems, which I attribute to the use of advanced calculi and the intensified research in implementation techniques. However, nowadays we are witnessing a slowdown in performance progress, which may be considered as a sign that the saturation-based technology is reaching its inherent limits. The position I am trying to put forward in this paper is that such scepticism is premature and a sharp improvement in performance may potentially be reached by adopting new architectural principles for saturation. The top-level algorithms and corresponding designs used in the state-of-the-art saturation-based theorem provers have (at least) two inherent drawbacks: the insufficient flexibility of the used inference selection mechanisms and the lack of means for intelligent prioritising of search directions. In this position paper I analyse these drawbacks and present two ideas on how they could be overcome. In particular, I propose a flexible low-cost high-precision mechanism for inference selection, intended to overcome problems associated with the currently used instances of clause selection-based procedures. I also outline a method for intelligent prioritising of search directions, based on probing the search space by exploring generalised search directions. I discuss some technical issues related to implementation of the proposed architectural principles and outline possible solutions.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 01:51:29 GMT" } ]
2008-02-18T00:00:00
[ [ "Riazanov", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.2130
Ashkan Aazami
Ashkan Aazami
Domination in graphs with bounded propagation: algorithms, formulations and hardness results
24 pages
null
null
null
cs.DS cs.CC
null
We introduce a hierarchy of problems between the \textsc{Dominating Set} problem and the \textsc{Power Dominating Set} (PDS) problem called the $\ell$-round power dominating set ($\ell$-round PDS, for short) problem. For $\ell=1$, this is the \textsc{Dominating Set} problem, and for $\ell\geq n-1$, this is the PDS problem; here $n$ denotes the number of nodes in the input graph. In PDS the goal is to find a minimum size set of nodes $S$ that power dominates all the nodes, where a node $v$ is power dominated if (1) $v$ is in $S$ or it has a neighbor in $S$, or (2) $v$ has a neighbor $u$ such that $u$ and all of its neighbors except $v$ are power dominated. Note that rule (1) is the same as for the \textsc{Dominating Set} problem, and that rule (2) is a type of propagation rule that applies iteratively. The $\ell$-round PDS problem has the same set of rules as PDS, except we apply rule (2) in ``parallel'' in at most $\ell-1$ rounds. We prove that $\ell$-round PDS cannot be approximated better than $2^{\log^{1-\epsilon}{n}}$ even for $\ell=4$ in general graphs. We provide a dynamic programming algorithm to solve $\ell$-round PDS optimally in polynomial time on graphs of bounded tree-width. We present a PTAS (polynomial time approximation scheme) for $\ell$-round PDS on planar graphs for $\ell=O(\tfrac{\log{n}}{\log{\log{n}}})$. Finally, we give integer programming formulations for $\ell$-round PDS.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 02:55:52 GMT" } ]
2008-02-18T00:00:00
[ [ "Aazami", "Ashkan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.2134
Kevin Buchin
Kevin Buchin
Minimizing the Maximum Interference is Hard
4 pages, 1 figure
null
null
null
cs.NI cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following interference model for wireless sensor and ad hoc networks: the receiver interference of a node is the number of transmission ranges it lies in. We model transmission ranges as disks. For this case we show that choosing transmission radii which minimize the maximum interference while maintaining a connected symmetric communication graph is NP-complete.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 03:25:37 GMT" }, { "version": "v2", "created": "Sun, 9 Oct 2011 10:12:50 GMT" } ]
2011-10-11T00:00:00
[ [ "Buchin", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0802.2138
Mahesh Pal Dr.
Mahesh Pal and Paul M. Mather
Support Vector classifiers for Land Cover Classification
11 pages, 1 figure, Published in MapIndia Conference 2003
null
10.1080/01431160802007624
null
cs.NE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Support vector machines represent a promising development in machine learning research that is not widely used within the remote sensing community. This paper reports the results of Multispectral(Landsat-7 ETM+) and Hyperspectral DAIS)data in which multi-class SVMs are compared with maximum likelihood and artificial neural network methods in terms of classification accuracy. Our results show that the SVM achieves a higher level of classification accuracy than either the maximum likelihood or the neural classifier, and that the support vector machine can be used with small training datasets and high-dimensional data.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 04:53:33 GMT" } ]
2009-11-13T00:00:00
[ [ "Pal", "Mahesh", "" ], [ "Mather", "Paul M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0802.2157
Shai Gutner
Shai Gutner
Choice numbers of graphs
null
null
null
null
cs.DM cs.CC cs.DS
null
A solution to a problem of Erd\H{o}s, Rubin and Taylor is obtained by showing that if a graph $G$ is $(a:b)$-choosable, and $c/d > a/b$, then $G$ is not necessarily $(c:d)$-choosable. The simplest case of another problem, stated by the same authors, is settled, proving that every 2-choosable graph is also $(4:2)$-choosable. Applying probabilistic methods, an upper bound for the $k^{th}$ choice number of a graph is given. We also prove that a directed graph with maximum outdegree $d$ and no odd directed cycle is $(k(d+1):k)$-choosable for every $k \geq 1$. Other results presented in this article are related to the strong choice number of graphs (a generalization of the strong chromatic number). We conclude with complexity analysis of some decision problems related to graph choosability.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 09:05:54 GMT" } ]
2008-02-18T00:00:00
[ [ "Gutner", "Shai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2158
Olivier Roustant
Jessica Franco, Laurent Carraro, Olivier Roustant, Astrid Jourdan (LMA-PAU)
A Radar-Shaped Statistic for Testing and Visualizing Uniformity Properties in Computer Experiments
null
null
null
null
cs.LG math.ST stat.TH
null
In the study of computer codes, filling space as uniformly as possible is important to describe the complexity of the investigated phenomenon. However, this property is not conserved by reducing the dimension. Some numeric experiment designs are conceived in this sense as Latin hypercubes or orthogonal arrays, but they consider only the projections onto the axes or the coordinate planes. In this article we introduce a statistic which allows studying the good distribution of points according to all 1-dimensional projections. By angularly scanning the domain, we obtain a radar type representation, allowing the uniformity defects of a design to be identified with respect to its projections onto straight lines. The advantages of this new tool are demonstrated on usual examples of space-filling designs (SFD) and a global statistic independent of the angle of rotation is studied.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 09:06:25 GMT" } ]
2008-02-19T00:00:00
[ [ "Franco", "Jessica", "", "LMA-PAU" ], [ "Carraro", "Laurent", "", "LMA-PAU" ], [ "Roustant", "Olivier", "", "LMA-PAU" ], [ "Jourdan", "Astrid", "", "LMA-PAU" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0802.2159
Walid Saad
Walid Saad, Zhu Han, Merouane Debbah and Are Hj{\o}rungnes
A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless Networks
This paper is accepted for publication at the IEEE ICC Workshop on Cooperative Communications and Networking
null
10.1109/ICCW.2008.65
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel concept from coalitional game theory which allows the dynamic formation of coalitions among wireless nodes. A simple and distributed merge and split algorithm for coalition formation is constructed. This algorithm is applied to study the gains resulting from the cooperation among single antenna transmitters for virtual MIMO formation. The aim is to find an ultimate transmitters coalition structure that allows cooperating users to maximize their utilities while accounting for the cost of coalition formation. Through this novel game theoretical framework, the wireless network transmitters are able to self-organize and form a structured network composed of disjoint stable coalitions. Simulation results show that the proposed algorithm can improve the average individual user utility by 26.4% as well as cope with the mobility of the distributed users.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 09:14:56 GMT" } ]
2016-11-17T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Debbah", "Merouane", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2175
Maria Bras-Amor\'os
Maria Bras-Amoros
Bounds on the Number of Numerical Semigroups of a Given Genus
null
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Combinatorics on multisets is used to deduce new upper and lower bounds on the number of numerical semigroups of each given genus, significantly improving existing ones. In particular, it is proved that the number $n_g$ of numerical semigroups of genus $g$ satisfies $2F_{g}\leq n_g\leq 1+3\cdot 2^{g-3}$, where $F_g$ denotes the $g$th Fibonacci number.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 10:47:05 GMT" } ]
2008-02-18T00:00:00
[ [ "Bras-Amoros", "Maria", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.2184
Jean Cardinal
Jean Cardinal, Christophe Dumeunier
Set Covering Problems with General Objective Functions
14 pages, 1 figure
null
null
null
cs.DS
null
We introduce a parameterized version of set cover that generalizes several previously studied problems. Given a ground set V and a collection of subsets S_i of V, a feasible solution is a partition of V such that each subset of the partition is included in one of the S_i. The problem involves maximizing the mean subset size of the partition, where the mean is the generalized mean of parameter p, taken over the elements. For p=-1, the problem is equivalent to the classical minimum set cover problem. For p=0, it is equivalent to the minimum entropy set cover problem, introduced by Halperin and Karp. For p=1, the problem includes the maximum-edge clique partition problem as a special case. We prove that the greedy algorithm simultaneously approximates the problem within a factor of (p+1)^1/p for any p in R^+, and that this is the best possible unless P=NP. These results both generalize and simplify previous results for special cases. We also consider the corresponding graph coloring problem, and prove several tractability and inapproximability results. Finally, we consider a further generalization of the set cover problem in which we aim at minimizing the sum of some concave function of the part sizes. As an application, we derive an approximation ratio for a Rent-or-Buy set cover problem.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 11:56:28 GMT" } ]
2008-02-18T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Dumeunier", "Christophe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2201
Murilo Baptista S.
M. S. Baptista, C. Bohn, R. Kliegl, R. Engbert, J. Kurths
Reconstruction of eye movements during blinks
null
Chaos (2008)
10.1063/1.2890843
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In eye movement research in reading, the amount of data plays a crucial role for the validation of results. A methodological problem for the analysis of the eye movement in reading are blinks, when readers close their eyes. Blinking rate increases with increasing reading time, resulting in high data losses, especially for older adults or reading impaired subjects. We present a method, based on the symbolic sequence dynamics of the eye movements, that reconstructs the horizontal position of the eyes while the reader blinks. The method makes use of an observed fact that the movements of the eyes before closing or after opening contain information about the eyes movements during blinks. Test results indicate that our reconstruction method is superior to methods that use simpler interpolation approaches. In addition, analyses of the reconstructed data show no significant deviation from the usual behavior observed in readers.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 13:37:27 GMT" }, { "version": "v2", "created": "Thu, 13 Mar 2008 09:30:11 GMT" } ]
2009-11-13T00:00:00
[ [ "Baptista", "M. S.", "" ], [ "Bohn", "C.", "" ], [ "Kliegl", "R.", "" ], [ "Engbert", "R.", "" ], [ "Kurths", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0802.2228
Sebastian Ordyniak
Stephan Kreutzer, Sebastian Ordyniak
Digraph Decompositions and Monotonicity in Digraph Searching
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider monotonicity problems for graph searching games. Variants of these games - defined by the type of moves allowed for the players - have been found to be closely connected to graph decompositions and associated width measures such as path- or tree-width. Of particular interest is the question whether these games are monotone, i.e. whether the cops can catch a robber without ever allowing the robber to reach positions that have been cleared before. The monotonicity problem for graph searching games has intensely been studied in the literature, but for two types of games the problem was left unresolved. These are the games on digraphs where the robber is invisible and lazy or visible and fast. In this paper, we solve the problems by giving examples showing that both types of games are non-monotone. Graph searching games on digraphs are closely related to recent proposals for digraph decompositions generalising tree-width to directed graphs. These proposals have partly been motivated by attempts to develop a structure theory for digraphs similar to the graph minor theory developed by Robertson and Seymour for undirected graphs, and partly by the immense number of algorithmic results using tree-width of undirected graphs and the hope that part of this success might be reproducible on digraphs using a directed tree-width. Unfortunately the number of applications for the digraphs measures introduced so far is still small. We therefore explore the limits of the algorithmic applicability of digraph decompositions. In particular, we show that various natural candidates for problems that might benefit from digraphs having small directed tree-width remain NP-complete even on almost acyclic graphs.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 15:44:34 GMT" } ]
2008-02-18T00:00:00
[ [ "Kreutzer", "Stephan", "" ], [ "Ordyniak", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2234
Christoph Schommer
Christoph Schommer, Conny Uhde
Textual Fingerprinting with Texts from Parkin, Bassewitz, and Leander
11 pages, 4 Figures
null
null
null
cs.CL cs.CR
null
Current research in author profiling to discover a legal author's fingerprint does not only follow examinations based on statistical parameters only but include more and more dynamic methods that can learn and that react adaptable to the specific behavior of an author. But the question on how to appropriately represent a text is still one of the fundamental tasks, and the problem of which attribute should be used to fingerprint the author's style is still not exactly defined. In this work, we focus on linguistic selection of attributes to fingerprint the style of the authors Parkin, Bassewitz and Leander. We use texts of the genre Fairy Tale as it has a clear style and texts of a shorter size with a straightforward story-line and a simple language.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 16:14:09 GMT" } ]
2008-02-18T00:00:00
[ [ "Schommer", "Christoph", "" ], [ "Uhde", "Conny", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.2258
Carlos Alberto Fernandez-y-Fernandez
Anthony J. H. Simons, Carlos Alberto Fernandez-y-Fernandez
Using Alloy to model-check visual design notations
8 pages
Simons, A.J.H. and Fernandez-y-Fernandez, C.A., Using Alloy to model-check visual design notations. In Sixth Mexican Int. Conf. on C S, (Mexico, 2005), IEEE, 121-128
10.1109/ENC.2005.52
null
cs.SE cs.SC
null
This paper explores the process of validation for the abstract syntax of a graphical notation. We define an unified specification for five of the UML diagrams used by the Discovery Method and, in this document, we illustrate how diagrams can be represented in Alloy and checked against our specification in order to know if these are valid under the Discovery notation.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 18:25:50 GMT" } ]
2008-02-18T00:00:00
[ [ "Simons", "Anthony J. H.", "" ], [ "Fernandez-y-Fernandez", "Carlos Alberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0802.2300
Elchanan Mossel
Per Austrin and Elchanan Mossel
Approximation Resistant Predicates From Pairwise Independence
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the approximability of predicates on $k$ variables from a domain $[q]$, and give a new sufficient condition for such predicates to be approximation resistant under the Unique Games Conjecture. Specifically, we show that a predicate $P$ is approximation resistant if there exists a balanced pairwise independent distribution over $[q]^k$ whose support is contained in the set of satisfying assignments to $P$.
[ { "version": "v1", "created": "Fri, 15 Feb 2008 23:21:05 GMT" } ]
2008-02-19T00:00:00
[ [ "Austrin", "Per", "" ], [ "Mossel", "Elchanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.2305
Ping Li
Ping Li
Compressed Counting
null
null
null
null
cs.IT cs.CC cs.DM cs.DS cs.LG math.IT
null
Counting is among the most fundamental operations in computing. For example, counting the pth frequency moment has been a very active area of research, in theoretical computer science, databases, and data mining. When p=1, the task (i.e., counting the sum) can be accomplished using a simple counter. Compressed Counting (CC) is proposed for efficiently computing the pth frequency moment of a data stream signal A_t, where 0<p<=2. CC is applicable if the streaming data follow the Turnstile model, with the restriction that at the time t for the evaluation, A_t[i]>= 0, which includes the strict Turnstile model as a special case. For natural data streams encountered in practice, this restriction is minor. The underly technique for CC is what we call skewed stable random projections, which captures the intuition that, when p=1 a simple counter suffices, and when p = 1+/\Delta with small \Delta, the sample complexity of a counter system should be low (continuously as a function of \Delta). We show at small \Delta the sample complexity (number of projections) k = O(1/\epsilon) instead of O(1/\epsilon^2). Compressed Counting can serve a basic building block for other tasks in statistics and computing, for example, estimation entropies of data streams, parameter estimations using the method of moments and maximum likelihood. Finally, another contribution is an algorithm for approximating the logarithmic norm, \sum_{i=1}^D\log A_t[i], and logarithmic distance. The logarithmic distance is useful in machine learning practice with heavy-tailed data.
[ { "version": "v1", "created": "Sun, 17 Feb 2008 16:42:52 GMT" }, { "version": "v2", "created": "Sun, 24 Feb 2008 09:51:09 GMT" } ]
2008-02-24T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2306
Gareth Baxter
G. J. Baxter, M. R. Frean
Software graphs and programmer awareness
9 pages, 8 figures
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dependencies between types in object-oriented software can be viewed as directed graphs, with types as nodes and dependencies as edges. The in-degree and out-degree distributions of such graphs have quite different forms, with the former resembling a power-law distribution and the latter an exponential distribution. This effect appears to be independent of application or type relationship. A simple generative model is proposed to explore the proposition that the difference arises because the programmer is aware of the out-degree of a type but not of its in-degree. The model reproduces the two distributions, and compares reasonably well to those observed in 14 different type relationships across 12 different Java applications.
[ { "version": "v1", "created": "Sat, 16 Feb 2008 03:38:03 GMT" } ]
2008-02-19T00:00:00
[ [ "Baxter", "G. J.", "" ], [ "Frean", "M. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0802.2317
Christophe Prieur
Christophe Prieur (LIAFA), Dominique Cardon, Jean-Samuel Beuscart, Nicolas Pissard, Pascal Pons (LIAFA)
The Stength of Weak cooperation: A Case Study on Flickr
null
null
null
null
cs.CY
null
Web 2.0 works with the principle of weak cooperation, where a huge amount of individual contributions build solid and structured sources of data. In this paper, we detail the main properties of this weak cooperation by illustrating them on the photo publication website Flickr, showing the variety of uses producing a rich content and the various procedures devised by Flickr users themselves to select quality. We underlined the interaction between small and heavy users as a specific form of collective production in large social networks communities. We also give the main statistics on the (5M-users, 150M-photos) data basis we worked on for this study, collected from Flickr website using the public API.
[ { "version": "v1", "created": "Sat, 16 Feb 2008 05:54:08 GMT" } ]
2008-02-19T00:00:00
[ [ "Prieur", "Christophe", "", "LIAFA" ], [ "Cardon", "Dominique", "", "LIAFA" ], [ "Beuscart", "Jean-Samuel", "", "LIAFA" ], [ "Pissard", "Nicolas", "", "LIAFA" ], [ "Pons", "Pascal", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0802.2345
Ioannis Chatzigeorgiou
Ioannis Chatzigeorgiou, Ian J. Wassell and Rolando Carrasco
On the Frame Error Rate of Transmission Schemes on Quasi-Static Fading Channels
5 pages, 4 figures, Proceedings of the 42nd Conference on Information Sciences and Systems, Princeton, USA, March 19-21, 2008
null
10.1109/CISS.2008.4558591
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that the frame error rate of turbo codes on quasi-static fading channels can be accurately approximated using the convergence threshold of the corresponding iterative decoder. This paper considers quasi-static fading channels and demonstrates that non-iterative schemes can also be characterized by a similar threshold based on which their frame error rate can be readily estimated. In particular, we show that this threshold is a function of the probability of successful frame detection in additive white Gaussian noise, normalized by the squared instantaneous signal-to-noise ratio. We apply our approach to uncoded binary phase shift keying, convolutional coding and turbo coding and demonstrate that the approximated frame error rate is within 0.4 dB of the simulation results. Finally, we introduce performance evaluation plots to explore the impact of the frame size on the performance of the schemes under investigation.
[ { "version": "v1", "created": "Sat, 16 Feb 2008 18:58:00 GMT" } ]
2022-03-08T00:00:00
[ [ "Chatzigeorgiou", "Ioannis", "" ], [ "Wassell", "Ian J.", "" ], [ "Carrasco", "Rolando", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2349
John B. Little
John B. Little
Algebraic geometry codes from higher dimensional varieties
26 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a general survey of literature on Goppa-type codes from higher dimensional algebraic varieties. The construction and several techniques for estimating the minimum distance are described first. Codes from various classes of varieties, including Hermitian hypersurfaces, Grassmannians, flag varieties, ruled surfaces over curves, and Deligne-Lusztig varieties are considered. Connections with the theories of toric codes and order domains are also briefly indicated.
[ { "version": "v1", "created": "Sat, 16 Feb 2008 23:45:47 GMT" } ]
2008-02-19T00:00:00
[ [ "Little", "John B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2360
Vaneet Aggarwal
Vaneet Aggarwal, Amir Bennatan and A. Robert Calderbank
On Maximizing Coverage in Gaussian Relay Networks
17 pages,8 figures, Submitted to IEEE Trans. Inf. Th, Oct. 2007
IEEE Trans. Information Theory, vol.55, no.6, pp. 2518-2536 (Jun. 2009)
10.1109/TIT.2009.2018337
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
Results for Gaussian relay channels typically focus on maximizing transmission rates for given locations of the source, relay and destination. We introduce an alternative perspective, where the objective is maximizing coverage for a given rate. The new objective captures the problem of how to deploy relays to provide a given level of service to a particular geographic area, where the relay locations become a design parameter that can be optimized. We evaluate the decode and forward (DF) and compress and forward (CF) strategies for the relay channel with respect to the new objective of maximizing coverage. When the objective is maximizing rate, different locations of the destination favor different strategies. When the objective is coverage for a given rate, and the relay is able to decode, DF is uniformly superior in that it provides coverage at any point served by CF. When the channel model is modified to include random fading, we show that the monotone ordering of coverage regions is not always maintained. While the coverage provided by DF is sensitive to changes in the location of the relay and the path loss exponent, CF exhibits a more graceful degradation with respect to such changes. The techniques used to approximate coverage regions are new and may be of independent interest.
[ { "version": "v1", "created": "Sun, 17 Feb 2008 04:38:22 GMT" } ]
2017-08-04T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Bennatan", "Amir", "" ], [ "Calderbank", "A. Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2371
Pierre Comon
P. Comon and J. ten Berge
Generic and Typical Ranks of Three-Way Arrays
null
null
null
I3S report ISRN I3S/RR-2006-29-FR
cs.OH cs.MS
http://creativecommons.org/licenses/by-nc-sa/3.0/
The concept of tensor rank, introduced in the twenties, has been popularized at the beginning of the seventies. This has allowed to carry out Factor Analysis on arrays with more than two indices. The generic rank may be seen as an upper bound to the number of factors that can be extracted from a given tensor. We explain in this short paper how to obtain numerically the generic rank of tensors of arbitrary dimensions, and compare it with the rare algebraic results already known at order three. In particular, we examine the cases of symmetric tensors, tensors with symmetric matrix slices, or tensors with free entries.
[ { "version": "v1", "created": "Sun, 17 Feb 2008 09:48:07 GMT" } ]
2008-02-19T00:00:00
[ [ "Comon", "P.", "" ], [ "Berge", "J. ten", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0802.2385
Slavcho Shtrakov
Slavcho Shtrakov
Essential variables and positions in terms
17 pages, 2 figures
J. Algebra Universalis, Vol. 61, No 3-4, (2009), pp. 381-397
null
null
math.GM cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
The paper deals with $\Sigma-$composition of terms, which allows us to extend the derivation rules in formal deduction of identities. The concept of essential variables and essential positions of terms with respect to a set of identities is a key step in the simplification of the process of formal deduction. $\Sigma-$composition of terms is defined as replacement between $\Sigma$-equal terms. This composition induces $\Sigma R-$deductively closed sets of identities. In analogy to balanced identities we introduce and investigate $\Sigma-$balanced identities for a given set of identities $\Sigma$.
[ { "version": "v1", "created": "Sun, 17 Feb 2008 15:43:24 GMT" }, { "version": "v2", "created": "Tue, 22 Jul 2008 18:30:41 GMT" }, { "version": "v3", "created": "Mon, 1 Sep 2008 07:53:14 GMT" }, { "version": "v4", "created": "Tue, 19 Jan 2010 12:51:30 GMT" } ]
2010-01-19T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
[ { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2411
Mahesh Pal Dr.
Mahesh Pal
Multiclass Approaches for Support Vector Machine Based Land Cover Classification
16 pages, MapIndia 2005 conference
null
null
null
cs.NE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SVMs were initially developed to perform binary classification; though, applications of binary classification are very limited. Most of the practical applications involve multiclass classification, especially in remote sensing land cover classification. A number of methods have been proposed to implement SVMs to produce multiclass classification. A number of methods to generate multiclass SVMs from binary SVMs have been proposed by researchers and is still a continuing research topic. This paper compares the performance of six multi-class approaches to solve classification problem with remote sensing data in term of classification accuracy and computational cost. One vs. one, one vs. rest, Directed Acyclic Graph (DAG), and Error Corrected Output Coding (ECOC) based multiclass approaches creates many binary classifiers and combines their results to determine the class label of a test pixel. Another catogery of multi class approach modify the binary class objective function and allows simultaneous computation of multiclass classification by solving a single optimisation problem. Results from this study conclude the usefulness of One vs. One multi class approach in term of accuracy and computational cost over other multi class approaches.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 03:47:45 GMT" } ]
2008-02-19T00:00:00
[ [ "Pal", "Mahesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0802.2418
Jacob Scott
Christopher Crutchfield, Zoran Dzunic, Jeremy T. Fineman, David R. Karger, and Jacob Scott
Improved Approximations for Multiprocessor Scheduling Under Uncertainty
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents improved approximation algorithms for the problem of multiprocessor scheduling under uncertainty, or SUU, in which the execution of each job may fail probabilistically. This problem is motivated by the increasing use of distributed computing to handle large, computationally intensive tasks. In the SUU problem we are given n unit-length jobs and m machines, a directed acyclic graph G of precedence constraints among jobs, and unrelated failure probabilities q_{ij} for each job j when executed on machine i for a single timestep. Our goal is to find a schedule that minimizes the expected makespan, which is the expected time at which all jobs complete. Lin and Rajaraman gave the first approximations for this NP-hard problem for the special cases of independent jobs, precedence constraints forming disjoint chains, and precedence constraints forming trees. In this paper, we present asymptotically better approximation algorithms. In particular, we give an O(loglog min(m,n))-approximation for independent jobs (improving on the previously best O(log n)-approximation). We also give an O(log(n+m) loglog min(m,n))-approximation algorithm for precedence constraints that form disjoint chains (improving on the previously best O(log(n)log(m)log(n+m)/loglog(n+m))-approximation by a (log n/loglog n)^2 factor when n = poly(m). Our algorithm for precedence constraints forming chains can also be used as a component for precedence constraints forming trees, yielding a similar improvement over the previously best algorithms for trees.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 20:57:17 GMT" }, { "version": "v2", "created": "Tue, 19 Feb 2008 02:58:36 GMT" } ]
2008-02-19T00:00:00
[ [ "Crutchfield", "Christopher", "" ], [ "Dzunic", "Zoran", "" ], [ "Fineman", "Jeremy T.", "" ], [ "Karger", "David R.", "" ], [ "Scott", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2428
Alexandre Benoit
Oya Aran, Ismail Ari, Alexandre Benoit (GIPSA-lab), Ana Huerta Carrillo, Fran\c{c}ois-Xavier Fanard (TELE), Pavel Campr, Lale Akarun, Alice Caplier (GIPSA-lab), Michele Rombaut (GIPSA-lab), Bulent Sankur
Sign Language Tutoring Tool
eNTERFACE'06. Summer Workshop. on Multimodal Interfaces, Dubrovnik : Croatie (2007)
null
null
null
cs.LG cs.HC
null
In this project, we have developed a sign language tutor that lets users learn isolated signs by watching recorded videos and by trying the same signs. The system records the user's video and analyses it. If the sign is recognized, both verbal and animated feedback is given to the user. The system is able to recognize complex signs that involve both hand gestures and head movements and expressions. Our performance tests yield a 99% recognition rate on signs involving only manual gestures and 85% recognition rate on signs that involve both manual and non manual components, such as head movement and facial expressions.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 07:28:44 GMT" } ]
2008-09-11T00:00:00
[ [ "Aran", "Oya", "", "GIPSA-lab" ], [ "Ari", "Ismail", "", "GIPSA-lab" ], [ "Benoit", "Alexandre", "", "GIPSA-lab" ], [ "Carrillo", "Ana Huerta", "", "TELE" ], [ "Fanard", "François-Xavier", "", "TELE" ], [ "Campr", "Pavel", "", "GIPSA-lab" ], [ "Akarun", "Lale", "", "GIPSA-lab" ], [ "Caplier", "Alice", "", "GIPSA-lab" ], [ "Rombaut", "Michele", "", "GIPSA-lab" ], [ "Sankur", "Bulent", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.2429
Sebastien Verel
David Simoncini (I3S), S\'ebastien Verel (I3S), Philippe Collard (I3S), Manuel Clergue (I3S)
Anisotropic selection in cellular genetic algorithms
null
Dans Proceedings of the 8th annual conference on Genetic and evolutionary computation - Genetic And Evolutionary Computation Conference, Seatle : \'Etats-Unis d'Am\'erique (2006)
10.1145/1143997.1144098
null
cs.AI
null
In this paper we introduce a new selection scheme in cellular genetic algorithms (cGAs). Anisotropic Selection (AS) promotes diversity and allows accurate control of the selective pressure. First we compare this new scheme with the classical rectangular grid shapes solution according to the selective pressure: we can obtain the same takeover time with the two techniques although the spreading of the best individual is different. We then give experimental results that show to what extent AS promotes the emergence of niches that support low coupling and high cohesion. Finally, using a cGA with anisotropic selection on a Quadratic Assignment Problem we show the existence of an anisotropic optimal value for which the best average performance is observed. Further work will focus on the selective pressure self-adjustment ability provided by this new selection scheme.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 07:30:04 GMT" } ]
2008-02-19T00:00:00
[ [ "Simoncini", "David", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0802.2432
Andrei Romashchenko
Bruno Durand (LIF), Andrei Romashchenko (LIP), Alexander Shen (LIF)
Fixed Point and Aperiodic Tilings
v5: technical revision (positions of figures are shifted)
12th International Conference on Developments in Language Theory, Kyoto : Japan (2008)
10.1007/978-3-540-85780-8_22
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An aperiodic tile set was first constructed by R.Berger while proving the undecidability of the domino problem. It turned out that aperiodic tile sets appear in many topics ranging from logic (the Entscheidungsproblem) to physics (quasicrystals) We present a new construction of an aperiodic tile set that is based on Kleene's fixed-point construction instead of geometric arguments. This construction is similar to J. von Neumann self-reproducing automata; similar ideas were also used by P. Gacs in the context of error-correcting computations. The flexibility of this construction allows us to construct a "robust" aperiodic tile set that does not have periodic (or close to periodic) tilings even if we allow some (sparse enough) tiling errors. This property was not known for any of the existing aperiodic tile sets.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 07:50:13 GMT" }, { "version": "v2", "created": "Tue, 19 Feb 2008 15:43:21 GMT" }, { "version": "v3", "created": "Mon, 7 Jul 2008 11:16:24 GMT" }, { "version": "v4", "created": "Wed, 13 Jan 2010 13:50:04 GMT" }, { "version": "v5", "created": "Wed, 27 Jan 2010 14:15:07 GMT" } ]
2010-01-27T00:00:00
[ [ "Durand", "Bruno", "", "LIF" ], [ "Romashchenko", "Andrei", "", "LIP" ], [ "Shen", "Alexander", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.2451
Georg Bocherer
Georg Bocherer and Valdemar Cardoso da Rocha Junior and Cecilio Pimentel
Capacity of General Discrete Noiseless Channels
4 pages. Essentially the paper that appeared in Proc. ISCTA '07, 2007. From v1 to v2, one error was corrected
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper concerns the capacity of the discrete noiseless channel introduced by Shannon. A sufficient condition is given for the capacity to be well-defined. For a general discrete noiseless channel allowing non-integer valued symbol weights, it is shown that the capacity--if well-defined--can be determined from the radius of convergence of its generating function, from the smallest positive pole of its generating function, or from the rightmost real singularity of its complex generating function. A generalisation is given for Pringsheim's Theorem and for the Exponential Growth Formula to generating functions of combinatorial structures with non-integer valued symbol weights.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 11:06:47 GMT" }, { "version": "v2", "created": "Thu, 10 Jun 2010 11:08:11 GMT" } ]
2010-06-11T00:00:00
[ [ "Bocherer", "Georg", "" ], [ "Junior", "Valdemar Cardoso da Rocha", "" ], [ "Pimentel", "Cecilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2476
Georg B\"ocherer
Georg B\"ocherer and Daniel Bielefeld
Theoretical Analysis of the Energy Capture in Strictly Bandlimited Ultra-Wideband Channels
5 pages. Changes from 2nd version: minor corrections. Essentially the paper to be presented at ISWCS 2008 in Reykjavik
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The frequency selectivity of wireless communication channels can be characterized by the delay spread Ds of the channel impulse response. If the delay spread is small compared to the bandwidth W of the input signal, that is, Ds*W approximately equal to 1, the channel appears to be flat fading. For Ds*W >> 1, the channel appears to be frequency selective, which is usually the case for wideband signals. In the first case, small scale synchronization with a precision much higher than the sampling time T = 1/W is crucial. In this paper, it is shown by analytical means that this is different in the wideband regime. Here synchronization with a precision of T is sufficient and small scale synchronization cannot further increase the captured energy at the receiver. Simulation results show that this effect already occurs for W > 50MHz for the IEEE 802.15.4a channel model.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 13:34:44 GMT" }, { "version": "v2", "created": "Wed, 28 May 2008 09:59:39 GMT" }, { "version": "v3", "created": "Thu, 7 Aug 2008 14:03:44 GMT" } ]
2008-08-07T00:00:00
[ [ "Böcherer", "Georg", "" ], [ "Bielefeld", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2528
Nitish Korula
Chandra Chekuri, Nitish Korula
Min-Cost 2-Connected Subgraphs With k Terminals
18 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the k-2VC problem, we are given an undirected graph G with edge costs and an integer k; the goal is to find a minimum-cost 2-vertex-connected subgraph of G containing at least k vertices. A slightly more general version is obtained if the input also specifies a subset S \subseteq V of terminals and the goal is to find a subgraph containing at least k terminals. Closely related to the k-2VC problem, and in fact a special case of it, is the k-2EC problem, in which the goal is to find a minimum-cost 2-edge-connected subgraph containing k vertices. The k-2EC problem was introduced by Lau et al., who also gave a poly-logarithmic approximation for it. No previous approximation algorithm was known for the more general k-2VC problem. We describe an O(\log n \log k) approximation for the k-2VC problem.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 18:34:28 GMT" } ]
2008-02-19T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Korula", "Nitish", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2543
Novella Bartolini
Novella Bartolini, Giancarlo Bongiovanni, Simone Silvestri (Department of Computer Science University of Rome Sapienza, Italy)
Self-* overload control for distributed web systems
The full version of this paper, titled "Self-* through self-learning: overload control for distributed web systems", has been published on Computer Networks, Elsevier. The simulator used for the evaluation of the proposed algorithm is available for download at the address: http://www.dsi.uniroma1.it/~novella/qos_web/
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unexpected increases in demand and most of all flash crowds are considered the bane of every web application as they may cause intolerable delays or even service unavailability. Proper quality of service policies must guarantee rapid reactivity and responsiveness even in such critical situations. Previous solutions fail to meet common performance requirements when the system has to face sudden and unpredictable surges of traffic. Indeed they often rely on a proper setting of key parameters which requires laborious manual tuning, preventing a fast adaptation of the control policies. We contribute an original Self-* Overload Control (SOC) policy. This allows the system to self-configure a dynamic constraint on the rate of admitted sessions in order to respect service level agreements and maximize the resource utilization at the same time. Our policy does not require any prior information on the incoming traffic or manual configuration of key parameters. We ran extensive simulations under a wide range of operating conditions, showing that SOC rapidly adapts to time varying traffic and self-optimizes the resource utilization. It admits as many new sessions as possible in observance of the agreements, even under intense workload variations. We compared our algorithm to previously proposed approaches highlighting a more stable behavior and a better performance.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 21:18:17 GMT" }, { "version": "v2", "created": "Thu, 29 Jan 2009 15:14:20 GMT" } ]
2009-01-29T00:00:00
[ [ "Bartolini", "Novella", "", "Department\n of Computer Science University of Rome Sapienza, Italy" ], [ "Bongiovanni", "Giancarlo", "", "Department\n of Computer Science University of Rome Sapienza, Italy" ], [ "Silvestri", "Simone", "", "Department\n of Computer Science University of Rome Sapienza, Italy" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0802.2574
Terence H. Chan
Laurent Guille, Terence Chan and Alex Grant
The minimal set of Ingleton inequalities
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Ingleton-LP bound is an outer bound for the multicast capacity region, assuming the use of linear network codes. Computation of the bound is performed on a polyhedral cone obtained by taking the intersection of half-spaces induced by the basic (Shannon-type) inequalities and Ingleton inequalities. This paper simplifies the characterization of this cone, by obtaining the unique minimal set of Ingleton inequalities. As a result, the effort required for computation of the Ingleton-LP bound can be greatly reduced.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 01:55:23 GMT" } ]
2008-02-20T00:00:00
[ [ "Guille", "Laurent", "" ], [ "Chan", "Terence", "" ], [ "Grant", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2587
Alexandros Dimakis
F. Benezit, A.G. Dimakis, P. Thiran, M. Vetterli
Order-Optimal Consensus through Randomized Path Averaging
26 pages
null
null
null
cs.IT cs.NI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gossip algorithms have recently received significant attention, mainly because they constitute simple and robust message-passing schemes for distributed information processing over networks. However for many topologies that are realistic for wireless ad-hoc and sensor networks (like grids and random geometric graphs), the standard nearest-neighbor gossip converges as slowly as flooding ($O(n^2)$ messages). A recently proposed algorithm called geographic gossip improves gossip efficiency by a $\sqrt{n}$ factor, by exploiting geographic information to enable multi-hop long distance communications. In this paper we prove that a variation of geographic gossip that averages along routed paths, improves efficiency by an additional $\sqrt{n}$ factor and is order optimal ($O(n)$ messages) for grids and random geometric graphs. We develop a general technique (travel agency method) based on Markov chain mixing time inequalities, which can give bounds on the performance of randomized message-passing algorithms operating over various graph topologies.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 04:37:51 GMT" } ]
2008-02-20T00:00:00
[ [ "Benezit", "F.", "" ], [ "Dimakis", "A. G.", "" ], [ "Thiran", "P.", "" ], [ "Vetterli", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0802.2594
Menelaos Karavelas
Menelaos I. Karavelas and Elias P. Tsigaridas
Guarding curvilinear art galleries with vertex or point guards
35 pages, 24 figures
Comput. Geom. Theory Appl. 42(6-7):522-535, 2009
10.1016/j.comgeo.2008.11.002
null
cs.CG
null
One of the earliest and most well known problems in computational geometry is the so-called art gallery problem. The goal is to compute the minimum possible number guards placed on the vertices of a simple polygon in such a way that they cover the interior of the polygon. In this paper we consider the problem of guarding an art gallery which is modeled as a polygon with curvilinear walls. Our main focus is on polygons the edges of which are convex arcs pointing towards the exterior or interior of the polygon (but not both), named piecewise-convex and piecewise-concave polygons. We prove that, in the case of piecewise-convex polygons, if we only allow vertex guards, $\lfloor\frac{4n}{7}\rfloor-1$ guards are sometimes necessary, and $\lfloor\frac{2n}{3}\rfloor$ guards are always sufficient. Moreover, an $O(n\log{}n)$ time and O(n) space algorithm is described that produces a vertex guarding set of size at most $\lfloor\frac{2n}{3}\rfloor$. When we allow point guards the afore-mentioned lower bound drops down to $\lfloor\frac{n}{2}\rfloor$. In the special case of monotone piecewise-convex polygons we can show that $\lfloor\frac{n}{2}\rfloor$ vertex guards are always sufficient and sometimes necessary; these bounds remain valid even if we allow point guards. In the case of piecewise-concave polygons, we show that $2n-4$ point guards are always sufficient and sometimes necessary, whereas it might not be possible to guard such polygons by vertex guards. We conclude with bounds for other types of curvilinear polygons and future work.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 06:10:17 GMT" } ]
2009-11-25T00:00:00
[ [ "Karavelas", "Menelaos I.", "" ], [ "Tsigaridas", "Elias P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0802.2612
Sergey Gubin
Sergey Gubin
On Subgraph Isomorphism
Simplified, 6 pages
Polynomial size asymmetric linear model for Subgraph Isomorphism, Proceedings WCECS 2008, ISBN: 978-988-98671-0-2, pp.241-246
null
null
cs.DM cs.CC cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Article explicitly expresses Subgraph Isomorphism by a polynomial size asymmetric linear system.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 09:06:40 GMT" }, { "version": "v2", "created": "Thu, 14 Aug 2008 22:22:49 GMT" } ]
2008-11-10T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0802.2655
Gilles Stoltz
S\'ebastien Bubeck (INRIA Futurs), R\'emi Munos (INRIA Futurs), Gilles Stoltz (DMA, GREGH)
Pure Exploration for Multi-Armed Bandit Problems
null
null
null
null
math.ST cs.LG stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of forecasters that perform an on-line exploration of the arms. These forecasters are assessed in terms of their simple regret, a regret notion that captures the fact that exploration is only constrained by the number of available rounds (not necessarily known in advance), in contrast to the case when the cumulative regret is considered and when exploitation needs to be performed at the same time. We believe that this performance criterion is suited to situations when the cost of pulling an arm is expressed in terms of resources rather than rewards. We discuss the links between the simple and the cumulative regret. One of the main results in the case of a finite number of arms is a general lower bound on the simple regret of a forecaster in terms of its cumulative regret: the smaller the latter, the larger the former. Keeping this result in mind, we then exhibit upper bounds on the simple regret of some forecasters. The paper ends with a study devoted to continuous-armed bandit problems; we show that the simple regret can be minimized with respect to a family of probability distributions if and only if the cumulative regret can be minimized for it. Based on this equivalence, we are able to prove that the separable metric spaces are exactly the metric spaces on which these regrets can be minimized with respect to the family of all probability distributions with continuous mean-payoff functions.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 14:05:22 GMT" }, { "version": "v2", "created": "Fri, 13 Jun 2008 07:03:22 GMT" }, { "version": "v3", "created": "Tue, 17 Jun 2008 07:07:03 GMT" }, { "version": "v4", "created": "Thu, 19 Feb 2009 10:33:29 GMT" }, { "version": "v5", "created": "Tue, 26 Jan 2010 10:10:42 GMT" }, { "version": "v6", "created": "Wed, 9 Jun 2010 09:08:50 GMT" } ]
2010-07-26T00:00:00
[ [ "Bubeck", "Sébastien", "", "INRIA Futurs" ], [ "Munos", "Rémi", "", "INRIA Futurs" ], [ "Stoltz", "Gilles", "", "DMA, GREGH" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0802.2666
Vaneet Aggarwal
Vaneet Aggarwal
Distributed Joint Source-Channel Coding for arbitrary memoryless correlated sources and Source coding for Markov correlated sources using LDPC codes
7 pages, 10 figures, Results have been taken from the Course Project Report for ELE 539B (Instructor: Prof. Robert Calderbank), May 2006
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give a distributed joint source channel coding scheme for arbitrary correlated sources for arbitrary point in the Slepian-Wolf rate region, and arbitrary link capacities using LDPC codes. We consider the Slepian-Wolf setting of two sources and one destination, with one of the sources derived from the other source by some correlation model known at the decoder. Distributed encoding and separate decoding is used for the two sources. We also give a distributed source coding scheme when the source correlation has memory to achieve any point in the Slepian-Wolf rate achievable region. In this setting, we perform separate encoding but joint decoding.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 15:33:43 GMT" } ]
2008-02-20T00:00:00
[ [ "Aggarwal", "Vaneet", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2668
Shai Gutner
Shai Gutner
The complexity of planar graph choosability
null
Discrete Math. 159 (1996), 119-130
null
null
cs.DM cs.CC cs.DS
null
A graph $G$ is {\em $k$-choosable} if for every assignment of a set $S(v)$ of $k$ colors to every vertex $v$ of $G$, there is a proper coloring of $G$ that assigns to each vertex $v$ a color from $S(v)$. We consider the complexity of deciding whether a given graph is $k$-choosable for some constant $k$. In particular, it is shown that deciding whether a given planar graph is 4-choosable is NP-hard, and so is the problem of deciding whether a given planar triangle-free graph is 3-choosable. We also obtain simple constructions of a planar graph which is not 4-choosable and a planar triangle-free graph which is not 3-choosable.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 15:26:19 GMT" } ]
2008-02-20T00:00:00
[ [ "Gutner", "Shai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2684
Yijia Fan
Yijia Fan, Abdulkareem Adinoyi, John S Thompson, Halim Yanikomeroglu, H. Vincent Poor
A Simple Distributed Antenna Processing Scheme for Cooperative Diversity
To appear in the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this letter the performance of multiple relay channels is analyzed for the situation in which multiple antennas are deployed only at the relays. The simple repetition-coded decodeand- forward protocol with two different antenna processing techniques at the relays is investigated. The antenna combining techniques are maximum ratio combining (MRC) for reception and transmit beamforming (TB) for transmission. It is shown that these distributed antenna combining techniques can exploit the full spatial diversity of the relay channels regardless of the number of relays and antennas at each relay, and offer significant power gain over distributed space-time coding techniques.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 17:05:54 GMT" } ]
2008-02-20T00:00:00
[ [ "Fan", "Yijia", "" ], [ "Adinoyi", "Abdulkareem", "" ], [ "Thompson", "John S", "" ], [ "Yanikomeroglu", "Halim", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2685
Maziar Nekovee
C. J. Rhodes and M. Nekovee
The Opportunistic Transmission of Wireless Worms between Mobile Devices
Submitted for publication
null
10.1016/j.physa.2008.09.017
null
cs.NI cond-mat.stat-mech cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of spreading between spatially proximal devices. The potential exists for worms to be opportunistically transmitted between devices as they move around, so human mobility patterns will have an impact on epidemic spread. The scenario we address in this paper is proximity attacks from fleetingly in-contact wireless devices with short-range communication range, such as Bluetooth-enabled smart phones. An individual-based model of mobile devices is introduced and the effect of population characteristics and device behaviour on the outbreak dynamics is investigated. We show through extensive simulations that in the above scenario the resulting mass-action epidemic models remain applicable provided the contact rate is derived consistently from the underlying mobility model. The model gives useful analytical expressions against which more refined simulations of worm spread can be developed and tested.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 17:07:32 GMT" } ]
2009-11-13T00:00:00
[ [ "Rhodes", "C. J.", "" ], [ "Nekovee", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.2696
Ewa Krot-Sieniawska
Ewa Krot-Sieniawska
On Characteristic Polynomials of the Family of Cobweb Posets
7 pages, 1 figure
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This note is a response to one of problems posed by A.K. Kwasniewski in one of his recent papers. Namely for the sequence of finite cobweb subposets, the looked for explicit formulas for corresponding sequence of characteristic polynomials are discovered and delivered here. The recurrence relation defining arbitrary family of charactristic polynomials of finite cobweb posets is also derived.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 18:53:38 GMT" } ]
2008-02-21T00:00:00
[ [ "Krot-Sieniawska", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.2701
Lifeng Lai
Lifeng Lai, Hesham El Gamal and H. Vincent Poor
Authentication over Noisy Channels
Appeared in the Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios, lower and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 20:01:52 GMT" } ]
2008-02-20T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2703
Lifeng Lai
Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor
Optimal Medium Access Protocols for Cognitive Radio Networks
To appear in the Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt08), Berlin, Germany, March 31-April 4, 2008
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands is first considered. In this scenario, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring (learning) the availability probability of the channels and exploiting the knowledge of the availability probability identified thus far. For this scenario, an optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is developed. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike an optimal balance between exploration and exploitation in such competitive environments, are developed.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 20:08:38 GMT" } ]
2008-02-20T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Jiang", "Hai", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2723
Kenneth Mackenthun Jr.
Kenneth M. Mackenthun Jr
On strongly controllable group codes and mixing group shifts: solvable groups, translation nets, and algorithms
Improved algorithm included and paper rewritten; 26 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The branch group of a strongly controllable group code is a shift group. We show that a shift group can be characterized in a very simple way. In addition it is shown that if a strongly controllable group code is labeled with Latin squares, a strongly controllable Latin group code, then the shift group is solvable. Moreover the mathematical structure of a Latin square (as a translation net) and the shift group of a strongly controllable Latin group code are closely related. Thus a strongly controllable Latin group code can be viewed as a natural extension of a Latin square to a sequence space. Lastly we construct shift groups. We show that it is sufficient to construct a simpler group, the state group of a shift group. We give an algorithm to find the state group, and from this it is easy to construct a stronlgy controllable Latin group code.
[ { "version": "v1", "created": "Tue, 19 Feb 2008 21:45:59 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2008 02:48:01 GMT" } ]
2008-10-06T00:00:00
[ [ "Mackenthun", "Kenneth M.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2736
Fran\c{c}ois Nicolas
Sylvain Guillemot, Francois Nicolas, Vincent Berry and Christophe Paul
On the approximability of the Maximum Agreement SubTree and Maximum Compatible Tree problems
Published in Discrete Applied Mathematics
null
10.1016/j.dam.2008.06.007
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the corresponding author because the newest version is now published in Discrete Applied Mathematics.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 15:49:45 GMT" }, { "version": "v2", "created": "Sun, 4 May 2008 17:59:33 GMT" }, { "version": "v3", "created": "Tue, 6 May 2008 13:54:03 GMT" }, { "version": "v4", "created": "Sat, 24 May 2008 05:26:46 GMT" }, { "version": "v5", "created": "Sun, 14 Dec 2008 07:03:21 GMT" }, { "version": "v6", "created": "Wed, 18 Aug 2010 01:01:15 GMT" }, { "version": "v7", "created": "Wed, 1 Sep 2010 13:21:35 GMT" } ]
2010-09-02T00:00:00
[ [ "Guillemot", "Sylvain", "" ], [ "Nicolas", "Francois", "" ], [ "Berry", "Vincent", "" ], [ "Paul", "Christophe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.2755
Naoyuki Kamiyama
Naoyuki Kamiyama, Naoki Katoh
Covering Directed Graphs by In-trees
15 pages, 12 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a directed graph $D=(V,A)$ with a set of $d$ specified vertices $S=\{s_1,...,s_d\}\subseteq V$ and a function $f\colon S \to \mathbb{Z}_+$ where $\mathbb{Z}_+$ denotes the set of non-negative integers, we consider the problem which asks whether there exist $\sum_{i=1}^d f(s_i)$ in-trees denoted by $T_{i,1},T_{i,2},..., T_{i,f(s_i)}$ for every $i=1,...,d$ such that $T_{i,1},...,T_{i,f(s_i)}$ are rooted at $s_i$, each $T_{i,j}$ spans vertices from which $s_i$ is reachable and the union of all arc sets of $T_{i,j}$ for $i=1,...,d$ and $j=1,...,f(s_i)$ covers $A$. In this paper, we prove that such set of in-trees covering $A$ can be found by using an algorithm for the weighted matroid intersection problem in time bounded by a polynomial in $\sum_{i=1}^df(s_i)$ and the size of $D$. Furthermore, for the case where $D$ is acyclic, we present another characterization of the existence of in-trees covering $A$, and then we prove that in-trees covering $A$ can be computed more efficiently than the general case by finding maximum matchings in a series of bipartite graphs.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 09:37:14 GMT" } ]
2008-02-21T00:00:00
[ [ "Kamiyama", "Naoyuki", "" ], [ "Katoh", "Naoki", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.2773
Damien Chablat
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Stiffness Analysis of 3-d.o.f. Overconstrained Translational Parallel Manipulators
null
Dans IEEE Int. Conference on Robotics and Automation - ICRA IEEE Int. Conference on Robotics and Automation, Pasadena : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.RO physics.class-ph
null
The paper presents a new stiffness modelling method for overconstrained parallel manipulators, which is applied to 3-d.o.f. translational mechanisms. It is based on a multidimensional lumped-parameter model that replaces the link flexibility by localized 6-d.o.f. virtual springs. In contrast to other works, the method includes a FEA-based link stiffness evaluation and employs a new solution strategy of the kinetostatic equations, which allows computing the stiffness matrix for the overconstrained architectures and for the singular manipulator postures. The advantages of the developed technique are confirmed by application examples, which deal with comparative stiffness analysis of two translational parallel manipulators.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 09:30:13 GMT" } ]
2008-02-21T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0802.2823
Pascal Weil
Jacques Sakarovitch (LTCI), Rodrigo De Souza (LTCI)
On the decomposition of k-valued rational relations
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.IT math.IT
null
We give a new, and hopefully more easily understandable, structural proof of the decomposition of a $k$-valued transducer into $k$ unambiguous functional ones, a result established by A. Weber in 1996. Our construction is based on a lexicographic ordering of computations of automata and on two coverings that can be build by means of this ordering. The complexity of the construction, measured as the number of states of the transducers involved in the decomposition, improves the original one by one exponential. Moreover, this method allows further generalisation that solves the problem of decomposition of rational relations with bounded length-degree, which was left open in Weber's paper.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 13:59:49 GMT" } ]
2008-02-21T00:00:00
[ [ "Sakarovitch", "Jacques", "", "LTCI" ], [ "De Souza", "Rodrigo", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2825
Pascal Weil
Thomas Thierauf, Fabian Wagner
The Isomorphism Problem for Planar 3-Connected Graphs is in Unambiguous Logspace
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DS cs.CC
null
The isomorphism problem for planar graphs is known to be efficiently solvable. For planar 3-connected graphs, the isomorphism problem can be solved by efficient parallel algorithms, it is in the class $AC^1$. In this paper we improve the upper bound for planar 3-connected graphs to unambiguous logspace, in fact to $UL \cap coUL$. As a consequence of our method we get that the isomorphism problem for oriented graphs is in $NL$. We also show that the problems are hard for $L$.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:03:55 GMT" } ]
2008-02-21T00:00:00
[ [ "Thierauf", "Thomas", "" ], [ "Wagner", "Fabian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.2826
Pascal Weil
Antti Valmari, Petri Lehtinen
Efficient Minimization of DFAs with Partial Transition Functions
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.IT cs.DS math.IT
null
Let PT-DFA mean a deterministic finite automaton whose transition relation is a partial function. We present an algorithm for minimizing a PT-DFA in $O(m \lg n)$ time and $O(m+n+\alpha)$ memory, where $n$ is the number of states, $m$ is the number of defined transitions, and $\alpha$ is the size of the alphabet. Time consumption does not depend on $\alpha$, because the $\alpha$ term arises from an array that is accessed at random and never initialized. It is not needed, if transitions are in a suitable order in the input. The algorithm uses two instances of an array-based data structure for maintaining a refinable partition. Its operations are all amortized constant time. One instance represents the classical blocks and the other a partition of transitions. Our measurements demonstrate the speed advantage of our algorithm on PT-DFAs over an $O(\alpha n \lg n)$ time, $O(\alpha n)$ memory algorithm.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:04:34 GMT" } ]
2008-02-21T00:00:00
[ [ "Valmari", "Antti", "" ], [ "Lehtinen", "Petri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.2827
Pascal Weil
Johan M. M. Van Rooij, Hans L. Bodlaender
Design by Measure and Conquer, A Faster Exact Algorithm for Dominating Set
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DS
null
The measure and conquer approach has proven to be a powerful tool to analyse exact algorithms for combinatorial problems, like Dominating Set and Independent Set. In this paper, we propose to use measure and conquer also as a tool in the design of algorithms. In an iterative process, we can obtain a series of branch and reduce algorithms. A mathematical analysis of an algorithm in the series with measure and conquer results in a quasiconvex programming problem. The solution by computer to this problem not only gives a bound on the running time, but also can give a new reduction rule, thus giving a new, possibly faster algorithm. This makes design by measure and conquer a form of computer aided algorithm design. When we apply the methodology to a Set Cover modelling of the Dominating Set problem, we obtain the currently fastest known exact algorithms for Dominating Set: an algorithm that uses $O(1.5134^n)$ time and polynomial space, and an algorithm that uses $O(1.5063^n)$ time.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:05:58 GMT" } ]
2008-02-21T00:00:00
[ [ "Van Rooij", "Johan M. M.", "" ], [ "Bodlaender", "Hans L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.2828
Pascal Weil
Alexis Ballier (LIF), Bruno Durand (LIF), Emmanuel Jeandel (LIF)
Structural aspects of tilings
11 pages
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.OH
null
In this paper, we study the structure of the set of tilings produced by any given tile-set. For better understanding this structure, we address the set of finite patterns that each tiling contains. This set of patterns can be analyzed in two different contexts: the first one is combinatorial and the other topological. These two approaches have independent merits and, once combined, provide somehow surprising results. The particular case where the set of produced tilings is countable is deeply investigated while we prove that the uncountable case may have a completely different structure. We introduce a pattern preorder and also make use of Cantor-Bendixson rank. Our first main result is that a tile-set that produces only periodic tilings produces only a finite number of them. Our second main result exhibits a tiling with exactly one vector of periodicity in the countable case.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:06:56 GMT" } ]
2008-02-21T00:00:00
[ [ "Ballier", "Alexis", "", "LIF" ], [ "Durand", "Bruno", "", "LIF" ], [ "Jeandel", "Emmanuel", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0802.2829
Pascal Weil
Maxime Crochemore (IGM), Lucian Ilie
Understanding maximal repetitions in strings
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DS math.CO
null
The cornerstone of any algorithm computing all repetitions in a string of length n in O(n) time is the fact that the number of runs (or maximal repetitions) is O(n). We give a simple proof of this result. As a consequence of our approach, the stronger result concerning the linearity of the sum of exponents of all runs follows easily.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:10:15 GMT" } ]
2008-02-21T00:00:00
[ [ "Crochemore", "Maxime", "", "IGM" ], [ "Ilie", "Lucian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0802.2831
Pascal Weil
Mihalis Yannakakis
Equilibria, Fixed Points, and Complexity Classes
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.CC cs.GT
null
Many models from a variety of areas involve the computation of an equilibrium or fixed point of some kind. Examples include Nash equilibria in games; market equilibria; computing optimal strategies and the values of competitive games (stochastic and other games); stable configurations of neural networks; analysing basic stochastic models for evolution like branching processes and for language like stochastic context-free grammars; and models that incorporate the basic primitives of probability and recursion like recursive Markov chains. It is not known whether these problems can be solved in polynomial time. There are certain common computational principles underlying different types of equilibria, which are captured by the complexity classes PLS, PPAD, and FIXP. Representative complete problems for these classes are respectively, pure Nash equilibria in games where they are guaranteed to exist, (mixed) Nash equilibria in 2-player normal form games, and (mixed) Nash equilibria in normal form games with 3 (or more) players. This paper reviews the underlying computational principles and the corresponding classes.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:11:10 GMT" } ]
2008-02-21T00:00:00
[ [ "Yannakakis", "Mihalis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]