id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0802.1369 | Pascal Vontobel | Pascal O. Vontobel | Interior-Point Algorithms for Linear-Programming Decoding | Essentially the paper that appeared in Proc. 2008 Information Theory
and Applications Workshop, UC San Diego, CA, USA, January 27 -- February 1,
2008 | null | null | null | cs.IT math.IT | null | Interior-point algorithms constitute a very interesting class of algorithms
for solving linear-programming problems. In this paper we study efficient
implementations of such algorithms for solving the linear program that appears
in the linear-programming decoder formulation.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 02:57:25 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Vontobel",
"Pascal O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1372 | Yoshiyuki Kabashima | Yoshiyuki Kabashima | An integral formula for large random rectangular matrices and its
application to analysis of linear vector channels | Submitted to PHYSCOMNET08 | null | null | null | cs.IT cond-mat.dis-nn math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A statistical mechanical framework for analyzing random linear vector
channels is presented in a large system limit. The framework is based on the
assumptions that the left and right singular value bases of the rectangular
channel matrix $\bH$ are generated independently from uniform distributions
over Haar measures and the eigenvalues of $\bH^{\rm T}\bH$ asymptotically
follow a certain specific distribution. These assumptions make it possible to
characterize the communication performance of the channel utilizing an integral
formula with respect to $\bH$, which is analogous to the one introduced by
Marinari {\em et. al.} in {\em J. Phys. A} {\bf 27}, 7647 (1994) for large
random square (symmetric) matrices. A computationally feasible algorithm for
approximately decoding received signals based on the integral formula is also
provided.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 04:06:50 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Feb 2008 03:19:19 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Kabashima",
"Yoshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1379 | Qing Zhao | Qing Zhao, Bhaskar Krishnamachari | Structure and Optimality of Myopic Policy in Opportunistic Access with
Noisy Observations | Submitted to IEEE Transactions on Automatic Control | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A restless multi-armed bandit problem that arises in multichannel
opportunistic communications is considered, where channels are modeled as
independent and identical Gilbert-Elliot channels and channel state
observations are subject to errors. A simple structure of the myopic policy is
established under a certain condition on the false alarm probability of the
channel state detector. It is shown that the myopic policy has a semi-universal
structure that reduces channel selection to a simple round-robin procedure and
obviates the need to know the underlying Markov transition probabilities. The
optimality of the myopic policy is proved for the case of two channels and
conjectured for the general case based on numerical examples.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 05:57:02 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Nov 2008 03:12:05 GMT"
}
] | 2008-11-13T00:00:00 | [
[
"Zhao",
"Qing",
""
],
[
"Krishnamachari",
"Bhaskar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.1380 | Haim Permuter Henry | Haim H. Permuter, Tsachy Weissman and Jun Chen | New Bounds for the Capacity Region of the Finite-State Multiple Access
Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity region of the Finite-State Multiple Access Channel (FS-MAC) with
feedback that may be an arbitrary time-invariant function of the channel output
samples is considered. We provided a sequence of inner and outer bounds for
this region. These bounds are shown to coincide, and hence yield the capacity
region, of FS-MACs where the state process is stationary and ergodic and not
affected by the inputs, and for indecomposable FS-MAC when feedback is not
allowed.
Though the capacity region is `multi-letter' in general, our results yield
explicit conclusions when applied to specific scenarios of interest.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 06:25:25 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Permuter",
"Haim H.",
""
],
[
"Weissman",
"Tsachy",
""
],
[
"Chen",
"Jun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1381 | Andrzej Kwasniewski | A. K. Kwasniewski | Comments on combinatorial interpretation of fibonomial coefficients - an
email style letter | 2 pages | Bulletin of the ICA vol. 42 September (2004) 10-11 | null | null | math.CO cs.DM math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Up to our knowledge -since about 126 years we were lacking of classical type
combinatorial interpretation of Fibonomial coefficients as it was Lukas
\cite{1} - to our knowledge -who was the first who had defined Finonomial
coefficients and derived a recurrence for them (see Historical Note in
\cite{2,3}). Here we inform that a join combinatorial interpretation was found
\cite{4} for all binomial-type coefficient - Fibonomial coefficients included.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 06:33:24 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0802.1382 | Andrzej Kwasniewski | A. K. Kwasniewski | New type Stirling like numbers - an email style letter | 3 pages | Bulletin of the ICA Vol. 49 (2007), pp. 99-102 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notion of the Fibonacci cobweb poset from [1] has been naturally extended
to any admissible sequence $F$ in [2] where it was also recognized that the
celebrated prefab notion of Bender and Goldman [3] - (see also [4,5]) - admits
such an extension so as to encompass the new type combinatorial objects from
[2] as leading examples. Recently the present author had introduced also [6]
two natural partial orders in there: one $\leq$ in grading-natural subsets of
cobweb`s prefabs sets [2] and in the second proposal one endows the set sums of
the so called "prefabiants" with such another partial order that one arrives at
Bell-like numbers including Fibonacci triad sequences introduced by the present
author in [7]. Here we quote the basic observations concerning the new type
Stirling like numbers as they appear in [6]. For more on notation, Stirling
like numbers of the first kind and for proofs - see [6].
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 06:50:05 GMT"
}
] | 2010-11-16T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1383 | Haim Permuter Henry | Haim H. Permuter, Young-Han Kim and Tsachy Weissman | On Directed Information and Gambling | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of gambling in horse races with causal side information
and show that Massey's directed information characterizes the increment in the
maximum achievable capital growth rate due to the availability of side
information. This result gives a natural interpretation of directed information
$I(Y^n \to X^n)$ as the amount of information that $Y^n$ \emph{causally}
provides about $X^n$. Extensions to stock market portfolio strategies and data
compression with causal side information are also discussed.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 06:52:47 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Permuter",
"Haim H.",
""
],
[
"Kim",
"Young-Han",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1387 | Anne Jaigu | Nathalie Mitton (INRIA Futurs), Katy Paroux (LM-Besan\c{c}on), Bruno
Sericola (IRISA), S\'ebastien Tixeuil (INRIA Futurs) | Ascending runs in dependent uniformly distributed random variables:
Application to wireless networks | null | null | null | null | cs.DM cs.NI math.CO math.PR | null | We analyze in this paper the longest increasing contiguous sequence or
maximal ascending run of random variables with common uniform distribution but
not independent. Their dependence is characterized by the fact that two
successive random variables cannot take the same value. Using a Markov chain
approach, we study the distribution of the maximal ascending run and we develop
an algorithm to compute it. This problem comes from the analysis of several
self-organizing protocols designed for large-scale wireless sensor networks,
and we show how our results apply to this domain.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 15:08:20 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 15:20:45 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Mitton",
"Nathalie",
"",
"INRIA Futurs"
],
[
"Paroux",
"Katy",
"",
"LM-Besançon"
],
[
"Sericola",
"Bruno",
"",
"IRISA"
],
[
"Tixeuil",
"Sébastien",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0802.1389 | Svante Janson | Svante Janson, Christian Lavault, Guy Louchard | Convergence of some leader election algorithms | 27 pages, 13 figures, 5 tables | null | null | null | cs.DC math.PR | null | We start with a set of n players. With some probability P(n,k), we kill n-k
players; the other ones stay alive, and we repeat with them. What is the
distribution of the number X_n of phases (or rounds) before getting only one
player? We present a probabilistic analysis of this algorithm under some
conditions on the probability distributions P(n,k), including stochastic
monotonicity and the assumption that roughly a fixed proportion alpha of the
players survive in each round.
We prove a kind of convergence in distribution for X_n-log_a n, where the
basis a=1/alpha; as in many other similar problems there are oscillations and
no true limit distribution, but suitable subsequences converge, and there is an
absolutely continuous random variable Z such that the distribution of X_n can
be approximated by Z+log_a n rounded to the nearest larger integer.
Applications of the general result include the leader election algorithm
where players are eliminated by independent coin tosses and a variation of the
leader election algorithm proposed by W.R. Franklin. We study the latter
algorithm further, including numerical results.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 11:01:11 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Janson",
"Svante",
""
],
[
"Lavault",
"Christian",
""
],
[
"Louchard",
"Guy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0802.1393 | Clement Jonquet | Cl\'ement Jonquet (LIRMM), Stefano A. Cerri (LIRMM) | Les Agents comme des interpr\'eteurs Scheme : Sp\'ecification dynamique
par la communication | null | Dans 14\`eme Congr\`es Francophone AFRIF-AFIA de Reconnaissance
des Formes et Intelligence Artificielle - RFIA'04, Toulouse : France (2004) | null | null | cs.MA cs.AI | null | We proposed in previous papers an extension and an implementation of the
STROBE model, which regards the Agents as Scheme interpreters. These Agents are
able to interpret messages in a dedicated environment including an interpreter
that learns from the current conversation therefore representing evolving
meta-level Agent's knowledge. When the Agent's interpreter is a
nondeterministic one, the dialogues may consist of subsequent refinements of
specifications in the form of constraint sets. The paper presents a worked out
example of dynamic service generation - such as necessary on Grids - by
exploiting STROBE Agents equipped with a nondeterministic interpreter. It shows
how enabling dynamic specification of a problem. Then it illustrates how these
principles could be effective for other applications. Details of the
implementation are not provided here, but are available.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 08:55:46 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Jonquet",
"Clément",
"",
"LIRMM"
],
[
"Cerri",
"Stefano A.",
"",
"LIRMM"
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0802.1412 | Mahesh Pal Dr. | Mahesh Pal | Extreme Learning Machine for land cover classification | 6 pages, mapindia 2008 conference | null | 10.1080/01431160902788636 | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the potential of extreme learning machine based
supervised classification algorithm for land cover classification. In
comparison to a backpropagation neural network, which requires setting of
several user-defined parameters and may produce local minima, extreme learning
machine require setting of one parameter and produce a unique solution. ETM+
multispectral data set (England) was used to judge the suitability of extreme
learning machine for remote sensing classifications. A back propagation neural
network was used to compare its performance in term of classification accuracy
and computational cost. Results suggest that the extreme learning machine
perform equally well to back propagation neural network in term of
classification accuracy with this data set. The computational cost using
extreme learning machine is very small in comparison to back propagation neural
network.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 11:12:06 GMT"
}
] | 2019-07-02T00:00:00 | [
[
"Pal",
"Mahesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0802.1427 | Klim Efremenko | Klim Efremenko, Ely Porat | Approximating General Metric Distances Between a Pattern and a Text | This is updated version of paper appered in SODA 2008 | SODA 2008 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $T=t_0 ... t_{n-1}$ be a text and $P = p_0 ... p_{m-1}$ a pattern taken
from some finite alphabet set $\Sigma$, and let $\dist$ be a metric on
$\Sigma$. We consider the problem of calculating the sum of distances between
the symbols of $P$ and the symbols of substrings of $T$ of length $m$ for all
possible offsets. We present an $\epsilon$-approximation algorithm for this
problem which runs in time $O(\frac{1}{\epsilon^2}n\cdot
\mathrm{polylog}(n,\abs{\Sigma}))$
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 12:36:31 GMT"
}
] | 2008-02-12T00:00:00 | [
[
"Efremenko",
"Klim",
""
],
[
"Porat",
"Ely",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1430 | Francis Bach | Jacob Abernethy, Francis Bach (INRIA Rocquencourt), Theodoros
Evgeniou, Jean-Philippe Vert (CB) | A New Approach to Collaborative Filtering: Operator Estimation with
Spectral Regularization | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general approach for collaborative filtering (CF) using spectral
regularization to learn linear operators from "users" to the "objects" they
rate. Recent low-rank type matrix completion approaches to CF are shown to be
special cases. However, unlike existing regularization based CF methods, our
approach can be used to also incorporate information such as attributes of the
users or the objects -- a limitation of existing regularization based CF
methods. We then provide novel representer theorems that we use to develop new
estimation methods. We provide learning algorithms based on low-rank
decompositions, and test them on a standard CF dataset. The experiments
indicate the advantages of generalizing the existing regularization based CF
methods to incorporate related information about users and objects. Finally, we
show that certain multi-task learning methods can be also seen as special cases
of our proposed approach.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 12:55:34 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 14:05:14 GMT"
}
] | 2008-12-19T00:00:00 | [
[
"Abernethy",
"Jacob",
"",
"INRIA Rocquencourt"
],
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
],
[
"Evgeniou",
"Theodoros",
"",
"CB"
],
[
"Vert",
"Jean-Philippe",
"",
"CB"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0802.1465 | Cyril Allauzen | Cyril Allauzen and Mehryar Mohri | 3-Way Composition of Weighted Finite-State Transducers | Added missing acknowledgments | null | null | null | cs.CC | null | Composition of weighted transducers is a fundamental algorithm used in many
applications, including for computing complex edit-distances between automata,
or string kernels in machine learning, or to combine different components of a
speech recognition, speech synthesis, or information extraction system. We
present a generalization of the composition of weighted transducers, 3-way
composition, which is dramatically faster in practice than the standard
composition algorithm when combining more than two transducers. The worst-case
complexity of our algorithm for composing three transducers $T_1$, $T_2$, and
$T_3$ resulting in $T$, \ignore{depending on the strategy used, is $O(|T|_Q
d(T_1) d(T_3) + |T|_E)$ or $(|T|_Q d(T_2) + |T|_E)$,} is $O(|T|_Q \min(d(T_1)
d(T_3), d(T_2)) + |T|_E)$, where $|\cdot|_Q$ denotes the number of states,
$|\cdot|_E$ the number of transitions, and $d(\cdot)$ the maximum out-degree.
As in regular composition, the use of perfect hashing requires a pre-processing
step with linear-time expected complexity in the size of the input transducers.
In many cases, this approach significantly improves on the complexity of
standard composition. Our algorithm also leads to a dramatically faster
composition in practice. Furthermore, standard composition can be obtained as a
special case of our algorithm. We report the results of several experiments
demonstrating this improvement. These theoretical and empirical improvements
significantly enhance performance in the applications already mentioned.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 16:18:40 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2008 18:02:27 GMT"
}
] | 2008-02-22T00:00:00 | [
[
"Allauzen",
"Cyril",
""
],
[
"Mohri",
"Mehryar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.1471 | Ronald de Wolf | Ronald de Wolf (CWI Amsterdam) | Error-Correcting Data Structures | 15 pages LaTeX; an abridged version will appear in the Proceedings of
the STACS 2009 conference | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study data structures in the presence of adversarial noise. We want to
encode a given object in a succinct data structure that enables us to
efficiently answer specific queries about the object, even if the data
structure has been corrupted by a constant fraction of errors. This new model
is the common generalization of (static) data structures and locally decodable
error-correcting codes. The main issue is the tradeoff between the space used
by the data structure and the time (number of probes) needed to answer a query
about the encoded object. We prove a number of upper and lower bounds on
various natural error-correcting data structure problems. In particular, we
show that the optimal length of error-correcting data structures for the
Membership problem (where we want to store subsets of size s from a universe of
size n) is closely related to the optimal length of locally decodable codes for
s-bit strings.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 16:35:49 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2008 14:25:48 GMT"
}
] | 2008-12-01T00:00:00 | [
[
"de Wolf",
"Ronald",
"",
"CWI Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1514 | Konstantin Kobylkin S. | K.S. Kobylkin | Minimal Committee Problem for Inconsistent Systems of Linear
Inequalities on the Plane | 29 pages, 2 figures | null | 10.1134/S1054661806040201 | null | cs.DM cs.CG | null | A representation of an arbitrary system of strict linear inequalities in R^n
as a system of points is proposed. The representation is obtained by using a
so-called polarity. Based on this representation an algorithm for constructing
a committee solution of an inconsistent plane system of linear inequalities is
given. A solution of two problems on minimal committee of a plane system is
proposed. The obtained solutions to these problems can be found by means of the
proposed algorithm.
| [
{
"version": "v1",
"created": "Mon, 11 Feb 2008 19:50:56 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Feb 2008 07:40:17 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Feb 2008 17:15:03 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Kobylkin",
"K. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0802.1555 | Shengtian Yang | Shengtian Yang, Yan Chen, Thomas Honold, Zhaoyang Zhang, Peiliang Qiu | Constructing Linear Codes with Good Joint Spectra | 6 pages, 1 figure, to appear in Proc. ChinaCom 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding good linear codes for joint source-channel coding
(JSCC) is investigated in this paper. By the code-spectrum approach, it has
been proved in the authors' previous paper that a good linear code for the
authors' JSCC scheme is a code with a good joint spectrum, so the main task in
this paper is to construct linear codes with good joint spectra. First, the
code-spectrum approach is developed further to facilitate the calculation of
spectra. Second, some general principles for constructing good linear codes are
presented. Finally, we propose an explicit construction of linear codes with
good joint spectra based on low density parity check (LDPC) codes and low
density generator matrix (LDGM) codes.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 02:23:02 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Aug 2008 02:04:53 GMT"
}
] | 2008-08-28T00:00:00 | [
[
"Yang",
"Shengtian",
""
],
[
"Chen",
"Yan",
""
],
[
"Honold",
"Thomas",
""
],
[
"Zhang",
"Zhaoyang",
""
],
[
"Qiu",
"Peiliang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1567 | Shigeaki Kuzuoka | Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu | Universal Coding for Lossless and Lossy Complementary Delivery Problems | 20 pages, one column, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with a coding problem called complementary delivery, where
messages from two correlated sources are jointly encoded and each decoder
reproduces one of two messages using the other message as the side information.
Both lossless and lossy universal complementary delivery coding schemes are
investigated. In the lossless case, it is demonstrated that a universal
complementary delivery code can be constructed by only combining two
Slepian-Wolf codes. Especially, it is shown that a universal lossless
complementary delivery code, for which error probability is exponentially
tight, can be constructed from two linear Slepian-Wolf codes. In the lossy
case, a universal complementary delivery coding scheme based on Wyner-Ziv codes
is proposed. While the proposed scheme cannot attain the optimal
rate-distortion trade-off in general, the rate-loss is upper bounded by a
universal constant under some mild conditions. The proposed schemes allows us
to apply any Slepian-Wolf and Wyner-Ziv codes to complementary delivery coding.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 05:54:27 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Kuzuoka",
"Shigeaki",
""
],
[
"Kimura",
"Akisato",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1578 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Thread extraction for polyadic instruction sequences | 21 pages; error corrected; presentation improved | Scientific Annals of Computer Science, 21(2):283--310, 2011.
http://www.infoiasi.ro/bin/download/Annals/XXI2/XXI2_4.pdf | null | PRG0803 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the phenomenon that instruction sequences are split
into fragments which somehow produce a joint behaviour. In order to bring this
phenomenon better into the picture, we formalize a simple mechanism by which
several instruction sequence fragments can produce a joint behaviour. We also
show that, even in the case of this simple mechanism, it is a non-trivial
matter to explain by means of a translation into a single instruction sequence
what takes place on execution of a collection of instruction sequence
fragments.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 07:49:27 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2009 08:59:16 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Jul 2009 07:07:45 GMT"
}
] | 2012-11-20T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0802.1586 | Mark Burgess | Demissies Aredo, Mark Burgess and Simen Hagen | Program Promises | null | null | null | null | cs.SE | null | The framework of promise theory offers an alternative way of understanding
programming models, especially in distributed systems. We show that promise
theory can express some familiar constructs and resolve some problems in
program interface design, using fewer and simpler concepts than the Unified
Modelling Language (UML).
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 08:40:51 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Aredo",
"Demissies",
""
],
[
"Burgess",
"Mark",
""
],
[
"Hagen",
"Simen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.1604 | Constantinos Daskalakis | Constantinos Daskalakis, Grant Schoenebeck, Gregory Valiant, Paul
Valiant | On the Complexity of Nash Equilibria of Action-Graph Games | null | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of computing Nash Equilibria of action-graph games
(AGGs). AGGs, introduced by Bhat and Leyton-Brown, is a succinct representation
of games that encapsulates both "local" dependencies as in graphical games, and
partial indifference to other agents' identities as in anonymous games, which
occur in many natural settings. This is achieved by specifying a graph on the
set of actions, so that the payoff of an agent for selecting a strategy depends
only on the number of agents playing each of the neighboring strategies in the
action graph. We present a Polynomial Time Approximation Scheme for computing
mixed Nash equilibria of AGGs with constant treewidth and a constant number of
agent types (and an arbitrary number of strategies), together with hardness
results for the cases when either the treewidth or the number of agent types is
unconstrained. In particular, we show that even if the action graph is a tree,
but the number of agent-types is unconstrained, it is NP-complete to decide the
existence of a pure-strategy Nash equilibrium and PPAD-complete to compute a
mixed Nash equilibrium (even an approximate one); similarly for symmetric AGGs
(all agents belong to a single type), if we allow arbitrary treewidth. These
hardness results suggest that, in some sense, our PTAS is as strong of a
positive result as one can expect.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 09:45:36 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Schoenebeck",
"Grant",
""
],
[
"Valiant",
"Gregory",
""
],
[
"Valiant",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0802.1617 | Christian Mercat | Christian Mercat (I3M) | Discrete Complex Structure on Surfel Surfaces | null | Dans 14th IAPR International Conference on Discrete Geometry for
Computer Imagery - 14th IAPR International Conference on Discrete Geometry
for Computer Imagery, Lyon : France (2008) | null | null | cs.CG cs.GR math.CV | null | This paper defines a theory of conformal parametrization of digital surfaces
made of surfels equipped with a normal vector. The main idea is to locally
project each surfel to the tangent plane, therefore deforming its aspect-ratio.
It is a generalization of the theory known for polyhedral surfaces. The main
difference is that the conformal ratios that appear are no longer real in
general. It yields a generalization of the standard Laplacian on weighted
graphs.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 11:06:38 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Mercat",
"Christian",
"",
"I3M"
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Mathematics",
"code": "math.CV",
"description": "Holomorphic functions, automorphic group actions and forms, pseudoconvexity, complex geometry, analytic spaces, analytic sheaves",
"span": "(Complex Variables)"
}
] |
0802.1661 | Marie-Annick Guillemer | Dima Grigoriev (IRMAR), Vladimir Shpilrain | Zero-knowledge authentication schemes from actions on graphs, groups, or
rings | null | null | null | 08-09 | cs.CR | null | We propose a general way of constructing zero-knowledge authentication
schemes from actions of a semigroup on a set, without exploiting any specific
algebraic properties of the set acted upon. Then we give several concrete
realizations of this general idea, and in particular, we describe several
zero-knowledge authentication schemes where forgery (a.k.a. impersonation) is
NP-hard. Computationally hard problems that can be employed in these
realizations include (Sub)graph Isomorphism, Graph Colorability, Diophantine
Problem, and many others.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 16:10:40 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Grigoriev",
"Dima",
"",
"IRMAR"
],
[
"Shpilrain",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.1685 | Christoph Durr | Marcin Bienkowski, Marek Chrobak, Christoph Durr, Mathilde Hurand,
Artur Jez, Lukasz Jez, Jakub Lopuszanski, Grzegorz Stachowiak | Generalized Whac-a-Mole | null | null | null | null | cs.DS | null | We consider online competitive algorithms for the problem of collecting
weighted items from a dynamic set S, when items are added to or deleted from S
over time. The objective is to maximize the total weight of collected items. We
study the general version, as well as variants with various restrictions,
including the following: the uniform case, when all items have the same weight,
the decremental sets, when all items are present at the beginning and only
deletion operations are allowed, and dynamic queues, where the dynamic set is
ordered and only its prefixes can be deleted (with no restriction on
insertions). The dynamic queue case is a generalization of bounded-delay packet
scheduling (also referred to as buffer management). We present several upper
and lower bounds on the competitive ratio for these variants.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 18:41:46 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Feb 2008 00:09:51 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Bienkowski",
"Marcin",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Hurand",
"Mathilde",
""
],
[
"Jez",
"Artur",
""
],
[
"Jez",
"Lukasz",
""
],
[
"Lopuszanski",
"Jakub",
""
],
[
"Stachowiak",
"Grzegorz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1690 | Andrzej Kwasniewski | A. Krzysztof Kwasniewski | More on the Bernoulli and Taylor Formula for Extended Umbral Calculus | 11 pages | Advances in Applied Clifford Algebras Volume 16, Number 1,(2006)
29-39 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One delivers here the extended Bernoulli and Taylor formula of a new sort
with the rest term of the Cauchy type recently derived by the author in the
case of the so called $\psi$-difference calculus which constitutes the
representative for the purpose case of extended umbral calculus. The central
importance of such a type formulas is beyond any doubt. Recent publications do
confirm this historically established experience. Its links via umbrality to
combinatorics are known at least since Rota and Mullin source papers then up to
recently extended by many authors to be indicated in the sequel.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 19:24:00 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Kwasniewski",
"A. Krzysztof",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1696 | Andrzej Kwasniewski | A. Krzysztof Kwa\'sniewski | First Observations on Prefab Posets Whitney Numbers | 14 pages | Advances in Applied Clifford Algebras Volume 18, Number 1 /
February, 2008, 57-73 | 10.1007/s00006-007-0054-7 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a natural partial order in structurally natural finite subsets
of the cobweb prefabs sets recently constructed by the present author. Whitney
numbers of the second kind of the corresponding subposet which constitute
Stirling like numbers triangular array are then calculated and the explicit
formula for them is provided. Next, in the second construction we endow the set
sums of prefabiants with such an another partial order that their Bell like
numbers include Fibonacci triad sequences introduced recently by the present
author in order to extend famous relation between binomial Newton coefficients
and Fibonacci numbers onto the infinity of their relatives among whom there are
also the Fibonacci triad sequences and binomial like coefficients (incidence
coefficients included). The first partial order is F sequence independent while
the second partial order is F sequence dependent where F is the so called
admissible sequence determining cobweb poset by construction. An F determined
cobweb posets Hasse diagram becomes Fibonacci tree sheathed with specific
cobweb if the sequence F is chosen to be just the Fibonacci sequence. From the
stand-point of linear algebra of formal series these are generating functions
which stay for the so called extended coherent states of quantum physics. This
information is delivered in the last section.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 19:47:18 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Kwaśniewski",
"A. Krzysztof",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.1699 | Prajakta Nimbhorkar | Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar | Longest paths in Planar DAGs in Unambiguous Logspace | null | null | null | null | cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We show via two different algorithms that finding the length of the longest
path in planar directed acyclic graph (DAG) is in unambiguous logspace UL, and
also in the complement class co-UL. The result extends to toroidal DAGs as
well.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 20:08:39 GMT"
}
] | 2008-02-13T00:00:00 | [
[
"Limaye",
"Nutan",
""
],
[
"Mahajan",
"Meena",
""
],
[
"Nimbhorkar",
"Prajakta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.1722 | Saket Saurabh | Omid Amini, Fedor V. Fomin and Saket Saurabh | Parameterized Algorithms for Partial Cover Problems | 20 page, 1 Figure | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Covering problems are fundamental classical problems in optimization,
computer science and complexity theory. Typically an input to these problems is
a family of sets over a finite universe and the goal is to cover the elements
of the universe with as few sets of the family as possible.
The variations of covering problems include well known problems like Set
Cover, Vertex Cover, Dominating Set and Facility Location to name a few.
Recently there has been a lot of study on partial covering problems, a natural
generalization of covering problems. Here, the goal is not to cover all the
elements but to cover the specified number of elements with the minimum number
of sets.
In this paper we study partial covering problems in graphs in the realm of
parameterized complexity. Classical (non-partial) version of all these problems
have been intensively studied in planar graphs and in graphs excluding a fixed
graph $H$ as a minor. However, the techniques developed for parameterized
version of non-partial covering problems cannot be applied directly to their
partial counterparts. The approach we use, to show that various partial
covering problems are fixed parameter tractable on planar graphs, graphs of
bounded local treewidth and graph excluding some graph as a minor, is quite
different from previously known techniques. The main idea behind our approach
is the concept of implicit branching. We find implicit branching technique to
be interesting on its own and believe that it can be used for some other
problems.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 21:19:40 GMT"
}
] | 2008-02-14T00:00:00 | [
[
"Amini",
"Omid",
""
],
[
"Fomin",
"Fedor V.",
""
],
[
"Saurabh",
"Saket",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.1738 | \'Alvaro Francisco Huertas-Rosero | \'Alvaro Francisco Huertas-Rosero, Leif Azzopardi and C. J. van
Rijsbergen | Characterising through Erasing: A Theoretical Framework for Representing
Documents Inspired by Quantum Theory | 4 pages, 3 figures, Quantum Interaction Symposium 2008 | Proceedings of Quantum Interaction Symposium 2008 | null | null | cs.IR quant-ph | null | The problem of representing text documents within an Information Retrieval
system is formulated as an analogy to the problem of representing the quantum
states of a physical system. Lexical measurements of text are proposed as a way
of representing documents which are akin to physical measurements on quantum
states. Consequently, the representation of the text is only known after
measurements have been made, and because the process of measuring may destroy
parts of the text, the document is characterised through erasure. The
mathematical foundations of such a quantum representation of text are provided
in this position paper as a starting point for indexing and retrieval within a
``quantum like'' Information Retrieval system.
| [
{
"version": "v1",
"created": "Tue, 12 Feb 2008 23:43:20 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Feb 2008 18:58:00 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Huertas-Rosero",
"Álvaro Francisco",
""
],
[
"Azzopardi",
"Leif",
""
],
[
"van Rijsbergen",
"C. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0802.1754 | Jay Kumar Sundararajan | Jay Kumar Sundararajan, Devavrat Shah and Muriel M\'edard | ARQ for Network Coding | Submitted to the 2008 IEEE International Symposium on Information
Theory (ISIT 2008) | null | 10.1109/ISIT.2008.4595268 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new coding and queue management algorithm is proposed for communication
networks that employ linear network coding. The algorithm has the feature that
the encoding process is truly online, as opposed to a block-by-block approach.
The setup assumes a packet erasure broadcast channel with stochastic arrivals
and full feedback, but the proposed scheme is potentially applicable to more
general lossy networks with link-by-link feedback. The algorithm guarantees
that the physical queue size at the sender tracks the backlog in degrees of
freedom (also called the virtual queue size). The new notion of a node "seeing"
a packet is introduced. In terms of this idea, our algorithm may be viewed as a
natural extension of ARQ schemes to coded networks. Our approach, known as the
drop-when-seen algorithm, is compared with a baseline queuing approach called
drop-when-decoded. It is shown that the expected queue size for our approach is
$O(\frac1{1-\rho})$ as opposed to $\Omega(\frac1{(1-\rho)^2})$ for the baseline
approach, where $\rho$ is the load factor.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 02:01:54 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Médard",
"Muriel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1785 | Ryutaroh Matsumoto | Atsushi Okawado, Ryutaroh Matsumoto, Tomohiko Uyematsu | Near ML detection using Dijkstra's algorithm with bounded list size over
MIMO channels | 8 pages, two column, 14 figures, LaTeX2e | Proceedings of 2008 IEEE International Symposium on Information
Theory, pp. 2022-2025, 2008 | 10.1109/ISIT.2008.4595344 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose Dijkstra's algorithm with bounded list size after QR decomposition
for decreasing the computational complexity of near maximum-likelihood (ML)
detection of signals over multiple-input-multiple-output (MIMO) channels. After
that, we compare the performances of proposed algorithm, QR decomposition
M-algorithm (QRD-MLD), and its improvement. When the list size is set to
achieve the almost same symbol error rate (SER) as the QRD-MLD, the proposed
algorithm has smaller average computational complexity.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 09:43:14 GMT"
}
] | 2008-09-02T00:00:00 | [
[
"Okawado",
"Atsushi",
""
],
[
"Matsumoto",
"Ryutaroh",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1790 | Silvano Di Zenzo | Silvano Di Zenzo | SAT Has No Wizards | 19 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An (encoded) decision problem is a pair (E, F) where E=words that encode
instances of the problem, F=words to be accepted. We use "strings" in a
technical sense. With an NP problem (E, F) we associate the "logogram" of F
relative to E, which conveys structural information on E, F, and how F is
embedded in E. The kernel Ker(P) of a program P that solves (E, F) consists of
those strings in the logogram that are used by P. There are relations between
Ker(P) and the complexity of P. We develop an application to SAT that relies
upon a property of internal independence of SAT. We show that SAT cannot have
in its logogram strings serving as collective certificates. As consequence, all
programs that solve SAT have same kernel.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 14:43:40 GMT"
}
] | 2008-02-14T00:00:00 | [
[
"Di Zenzo",
"Silvano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.1815 | Ding Yang | Yang Ding | A Construction for Constant-Composition Codes | 4 pages, submitted to IEEE Infromation Theory | null | 10.1109/TIT.2008.926380 | null | cs.IT math.IT | null | By employing the residue polynomials, a construction of constant-composition
codes is given. This construction generalizes the one proposed by Xing[16]. It
turns out that when d=3 this construction gives a lower bound of
constant-composition codes improving the one in [10]. Moreover, for d>3, we
give a lower bound on maximal size of constant-composition codes. In
particular, our bound for d=5 gives the best possible size of
constant-composition codes up to magnitude.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 12:59:04 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Ding",
"Yang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1829 | Francesco Zamponi | Fabrizio Altarelli, Remi Monasson, Guilhem Semerjian and Francesco
Zamponi | A review of the Statistical Mechanics approach to Random Optimization
Problems | 26 pages, 8 figures. Contribution to the book "Handbook of
Satisfiability" to be published in 2008 by IOS press | In "Handbook of Satisfiability", published by IOS press (2009),
Volume 185 of the Series "Frontiers in Artificial Intelligence and
Applications" | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review the connection between statistical mechanics and the analysis of
random optimization problems, with particular emphasis on the random k-SAT
problem. We discuss and characterize the different phase transitions that are
met in these problems, starting from basic concepts. We also discuss how
statistical mechanics methods can be used to investigate the behavior of local
search and decimation based algorithms.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 13:45:16 GMT"
}
] | 2009-01-08T00:00:00 | [
[
"Altarelli",
"Fabrizio",
""
],
[
"Monasson",
"Remi",
""
],
[
"Semerjian",
"Guilhem",
""
],
[
"Zamponi",
"Francesco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.1884 | Henning Schnoor | Edith Hemaspaandra and Henning Schnoor | On the Complexity of Elementary Modal Logics | Full version of STACS 2008 paper | null | null | null | cs.CC cs.LO | null | Modal logics are widely used in computer science. The complexity of modal
satisfiability problems has been investigated since the 1970s, usually proving
results on a case-by-case basis. We prove a very general classification for a
wide class of relevant logics: Many important subclasses of modal logics can be
obtained by restricting the allowed models with first-order Horn formulas. We
show that the satisfiability problem for each of these logics is either
NP-complete or PSPACE-hard, and exhibit a simple classification criterion.
Further, we prove matching PSPACE upper bounds for many of the PSPACE-hard
logics.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 18:57:26 GMT"
}
] | 2008-02-14T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Schnoor",
"Henning",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.1888 | K Sreeram | K. Sreeram, S. Birenjith and P. Vijay Kumar | Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff
and Optimal Code Design | null | null | null | null | cs.IT math.IT | null | We consider single-source single-sink (ss-ss) multi-hop networks, with
slow-fading links and single-antenna half-duplex relays. We identify two
families of networks that are multi-hop generalizations of the well-studied
two-hop network: K-Parallel-Path (KPP) networks and layered networks. KPP
networks can be viewed as the union of K node-disjoint parallel relaying paths,
each of length greater than one. KPP networks are then generalized to KPP(I)
networks, which permit interference between paths and to KPP(D) networks, which
possess a direct link from source to sink. We characterize the DMT of these
families of networks completely for K > 3. Layered networks are networks
comprising of relaying layers with edges existing only within the same layer or
between adjacent layers. We prove that a linear DMT between the maximum
diversity d_{max} and the maximum multiplexing gain of 1 is achievable for
fully-connected layered networks. This is shown to be equal to the optimal DMT
if the number of layers is less than 4. For multi-antenna KPP and layered
networks, we provide an achievable DMT region.
For arbitrary ss-ss single-antenna directed-acyclic full-duplex networks, we
prove that a linear tradeoff between maximum diversity and maximum multiplexing
gain is achievable. All protocols in this paper are explicit and use only
amplify and forward (AF) relaying. We also construct codes with short
block-lengths based on cyclic division algebras that achieve the optimal DMT
for all the proposed schemes. Two key implications of the results in the paper
are that the half-duplex constraint does not entail any rate loss for a large
class of networks and that simple AF protocols are often sufficient to attain
the optimal DMT.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 20:57:54 GMT"
}
] | 2008-02-14T00:00:00 | [
[
"Sreeram",
"K.",
""
],
[
"Birenjith",
"S.",
""
],
[
"Kumar",
"P. Vijay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1893 | K Sreeram | K. Sreeram, S. Birenjith and P. Vijay Kumar | Diversity and Degrees of Freedom of Cooperative Wireless Networks | Submitted to International Symposium on Information Theory (ISIT),
2008 | null | null | null | cs.IT math.IT | null | Wireless fading networks with multiple antennas are typically studied
information-theoretically from two different perspectives - the outage
characterization and the ergodic capacity characterization. A key parameter in
the outage characterization of a network is the diversity, whereas a
first-order indicator for the ergodic capacity is the degrees of freedom (DOF),
which is the pre-log coefficient in the capacity expression. In this paper, we
present max-flow min-cut type theorems for computing both the diversity and the
degrees of freedom of arbitrary single-source single-sink multi-antenna
networks. We also show that an amplify-and-forward protocol is sufficient to
achieve this. The degrees of freedom characterization is obtained using a
conversion to a deterministic wireless network for which the capacity was
recently found. We show that the diversity result easily extends to
multi-source multi-sink networks and evaluate the DOF for multi-casting in
single-source multi-sink networks.
| [
{
"version": "v1",
"created": "Wed, 13 Feb 2008 20:52:16 GMT"
}
] | 2008-02-14T00:00:00 | [
[
"Sreeram",
"K.",
""
],
[
"Birenjith",
"S.",
""
],
[
"Kumar",
"P. Vijay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.1957 | Sudhir Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury | To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ? | 33 pages, 10 figures, new results added, substantially revised | null | null | null | cs.GT cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We initiate the study of an interesting aspect of sponsored search
advertising, namely the consequences of broad match-a feature where an ad of an
advertiser can be mapped to a broader range of relevant queries, and not
necessarily to the particular keyword(s) that ad is associated with. Starting
with a very natural setting for strategies available to the advertisers, and
via a careful look through the algorithmic lens, we first propose solution
concepts for the game originating from the strategic behavior of advertisers as
they try to optimize their budget allocation across various keywords. Next, we
consider two broad match scenarios based on factors such as information
asymmetry between advertisers and the auctioneer, and the extent of
auctioneer's control on the budget splitting. In the first scenario, the
advertisers have the full information about broad match and relevant
parameters, and can reapportion their own budgets to utilize the extra
information; in particular, the auctioneer has no direct control over budget
splitting. We show that, the same broad match may lead to different equilibria,
one leading to a revenue improvement, whereas another to a revenue loss. This
leaves the auctioneer in a dilemma - whether to broad-match or not. This
motivates us to consider another broad match scenario, where the advertisers
have information only about the current scenario, and the allocation of the
budgets unspent in the current scenario is in the control of the auctioneer. We
observe that the auctioneer can always improve his revenue by judiciously using
broad match. Thus, information seems to be a double-edged sword for the
auctioneer.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 03:45:07 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jul 2008 19:40:28 GMT"
}
] | 2008-07-21T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2001 | Uwe Aickelin | Uwe Aickelin and Kathryn Dowsland | Exploiting problem structure in a genetic algorithm approach to a nurse
rostering problem | null | Journal of Scheduling, 3(3), pp 139-153, 2000 | 10.1002/(SICI)1099-1425(200005/06)3:3<139::AID-JOS41>3.0.CO;2-2 | null | cs.NE cs.CE | null | There is considerable interest in the use of genetic algorithms to solve
problems arising in the areas of scheduling and timetabling. However, the
classical genetic algorithm paradigm is not well equipped to handle the
conflict between objectives and constraints that typically occurs in such
problems. In order to overcome this, successful implementations frequently make
use of problem specific knowledge. This paper is concerned with the development
of a GA for a nurse rostering problem at a major UK hospital. The structure of
the constraints is used as the basis for a co-evolutionary strategy using
co-operating sub-populations. Problem specific knowledge is also used to define
a system of incentives and disincentives, and a complementary mutation
operator. Empirical results based on 52 weeks of live data show how these
features are able to improve an unsuccessful canonical GA to the point where it
is able to provide a practical solution to the problem
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 11:25:37 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 16:56:56 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:44:23 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Dowsland",
"Kathryn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0802.2013 | Ayfer Ozgur | Ayfer Ozgur, Olivier Leveque | Throughput-Delay Trade-off for Hierarchical Cooperation in Ad Hoc
Wireless Networks | 9 pages, 6 figures, to appear in IEEE Transactions on Information
Theory, submitted Dec 2007 | null | 10.1109/ICTEL.2008.4652688 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hierarchical cooperation has recently been shown to achieve better throughput
scaling than classical multihop schemes under certain assumptions on the
channel model in static wireless networks. However, the end-to-end delay of
this scheme turns out to be significantly larger than those of multihop
schemes. A modification of the scheme is proposed here that achieves a
throughput-delay trade-off $D(n)=(\log n)^2 T(n)$ for T(n) between
$\Theta(\sqrt{n}/\log n)$ and $\Theta(n/\log n)$, where D(n) and T(n) are
respectively the average delay per bit and the aggregate throughput in a
network of n nodes. This trade-off complements the previous results of El Gamal
et al., which show that the throughput-delay trade-off for multihop schemes is
given by D(n)=T(n) where T(n) lies between $\Theta(1)$ and $\Theta(\sqrt{n})$.
Meanwhile, the present paper considers the network multiple-access problem,
which may be of interest in its own right.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 14:09:59 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 2009 10:21:23 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ozgur",
"Ayfer",
""
],
[
"Leveque",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2015 | Steven de Rooij | Wouter Koolen and Steven de Rooij | Combining Expert Advice Efficiently | 50 pages | null | null | null | cs.LG cs.DS cs.IT math.IT | null | We show how models for prediction with expert advice can be defined concisely
and clearly using hidden Markov models (HMMs); standard HMM algorithms can then
be used to efficiently calculate, among other things, how the expert
predictions should be weighted according to the model. We cast many existing
models as HMMs and recover the best known running times in each case. We also
describe two new models: the switch distribution, which was recently developed
to improve Bayesian/Minimum Description Length model selection, and a new
generalisation of the fixed share algorithm based on run-length coding. We give
loss bounds for all models and shed new light on their relationships.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 14:54:57 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Feb 2008 10:59:15 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Koolen",
"Wouter",
""
],
[
"de Rooij",
"Steven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2027 | Martin Ziegler | Martin Ziegler and Wouter M. Koolen | Kolmogorov Complexity Theory over the Reals | null | null | null | null | cs.CC cs.SC | null | Kolmogorov Complexity constitutes an integral part of computability theory,
information theory, and computational complexity theory -- in the discrete
setting of bits and Turing machines. Over real numbers, on the other hand, the
BSS-machine (aka real-RAM) has been established as a major model of
computation. This real realm has turned out to exhibit natural counterparts to
many notions and results in classical complexity and recursion theory; although
usually with considerably different proofs. The present work investigates
similarities and differences between discrete and real Kolmogorov Complexity as
introduced by Montana and Pardo (1998).
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 18:30:55 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Mar 2008 11:04:28 GMT"
}
] | 2008-03-28T00:00:00 | [
[
"Ziegler",
"Martin",
""
],
[
"Koolen",
"Wouter M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0802.2045 | Simona Settepanella | Simona Settepanella | Blocking Sets in the complement of hyperplane arrangements in projective
space | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well know that the theory of minimal blocking sets is studied by
several author. Another theory which is also studied by a large number of
researchers is the theory of hyperplane arrangements. We can remark that the
affine space $AG(n,q)$ is the complement of the line at infinity in $PG(n,q)$.
Then $AG(n,q)$ can be regarded as the complement of an hyperplane arrangement
in $PG(n,q)$! Therefore the study of blocking sets in the affine space
$AG(n,q)$ is simply the study of blocking sets in the complement of a finite
arrangement in $PG(n,q)$. In this paper the author generalizes this remark
starting to study the problem of existence of blocking sets in the complement
of a given hyperplane arrangement in $PG(n,q)$. As an example she solves the
problem for the case of braid arrangement. Moreover she poses significant
questions on this new and interesting problem.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 16:08:48 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Settepanella",
"Simona",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2108 | Anil Hirani | Evan VanderZee, Anil N. Hirani, Damrong Guoy, Edgar Ramos | Well-Centered Triangulation | Content has been added to experimental results section. Significant
edits in introduction and in summary of current and previous results. Minor
edits elsewhere | SIAM J. Sci. Comput. 31, 6 (2010) 4497-4523 | 10.1137/090748214 | UIUCDCS-R-2008-2936 | cs.CG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Meshes composed of well-centered simplices have nice orthogonal dual meshes
(the dual Voronoi diagram). This is useful for certain numerical algorithms
that prefer such primal-dual mesh pairs. We prove that well-centered meshes
also have optimality properties and relationships to Delaunay and minmax angle
triangulations. We present an iterative algorithm that seeks to transform a
given triangulation in two or three dimensions into a well-centered one by
minimizing a cost function and moving the interior vertices while keeping the
mesh connectivity and boundary vertices fixed. The cost function is a direct
result of a new characterization of well-centeredness in arbitrary dimensions
that we present. Ours is the first optimization-based heuristic for
well-centeredness, and the first one that applies in both two and three
dimensions. We show the results of applying our algorithm to small and large
two-dimensional meshes, some with a complex boundary, and obtain a
well-centered tetrahedralization of the cube. We also show numerical evidence
that our algorithm preserves gradation and that it improves the maximum and
minimum angles of acute triangulations created by the best known previous
method.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 23:04:07 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Feb 2009 21:21:40 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Aug 2009 16:48:13 GMT"
}
] | 2010-01-25T00:00:00 | [
[
"VanderZee",
"Evan",
""
],
[
"Hirani",
"Anil N.",
""
],
[
"Guoy",
"Damrong",
""
],
[
"Ramos",
"Edgar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0802.2112 | Manik Lal Das | Manik Lal Das | On the Security of ``an efficient and complete remote user
authentication scheme'' | null | null | null | null | cs.CR | null | Recently, Liaw et al. proposed a remote user authentication scheme using
smart cards. Their scheme has claimed a number of features e.g. mutual
authentication, no clock synchronization, no verifier table, flexible user
password change, etc. We show that Liaw et al.'s scheme is completely insecure.
By intercepting a valid login message in Liaw et al.'s scheme, any unregistered
user or adversary can easily login to the remote system and establish a session
key.
| [
{
"version": "v1",
"created": "Thu, 14 Feb 2008 22:28:37 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Das",
"Manik Lal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.2125 | Syed Jafar | Viveck R. Cadambe, Syed A. Jafar | Multiple Access Outerbounds and the Inseparability of Parallel
Interference Channels | null | IEEE Transactions on Information Theory, Vol. 55, No. 9, Sep.
2009,Pages: 3983-3990 | 10.1109/GLOCOM.2008.ECP.904 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is known that the capacity of parallel (multi-carrier) Gaussian
point-to-point, multiple access and broadcast channels can be achieved by
separate encoding for each subchannel (carrier) subject to a power allocation
across carriers. In this paper we show that such a separation does not apply to
parallel Gaussian interference channels in general. A counter-example is
provided in the form of a 3 user interference channel where separate encoding
can only achieve a sum capacity of $\log({SNR})+o(\log({SNR}))$ per carrier
while the actual capacity, achieved only by joint-encoding across carriers, is
$3/2\log({SNR}))+o(\log({SNR}))$ per carrier. As a byproduct of our analysis,
we propose a class of multiple-access-outerbounds on the capacity of the 3 user
interference channel.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 00:53:26 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2127 | Alexandre Riazanov | Alexandre Riazanov | New Implementation Framework for Saturation-Based Reasoning | 17 pages | null | null | null | cs.AI cs.LO | null | The saturation-based reasoning methods are among the most theoretically
developed ones and are used by most of the state-of-the-art first-order logic
reasoners. In the last decade there was a sharp increase in performance of such
systems, which I attribute to the use of advanced calculi and the intensified
research in implementation techniques. However, nowadays we are witnessing a
slowdown in performance progress, which may be considered as a sign that the
saturation-based technology is reaching its inherent limits. The position I am
trying to put forward in this paper is that such scepticism is premature and a
sharp improvement in performance may potentially be reached by adopting new
architectural principles for saturation. The top-level algorithms and
corresponding designs used in the state-of-the-art saturation-based theorem
provers have (at least) two inherent drawbacks: the insufficient flexibility of
the used inference selection mechanisms and the lack of means for intelligent
prioritising of search directions. In this position paper I analyse these
drawbacks and present two ideas on how they could be overcome. In particular, I
propose a flexible low-cost high-precision mechanism for inference selection,
intended to overcome problems associated with the currently used instances of
clause selection-based procedures. I also outline a method for intelligent
prioritising of search directions, based on probing the search space by
exploring generalised search directions. I discuss some technical issues
related to implementation of the proposed architectural principles and outline
possible solutions.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 01:51:29 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Riazanov",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.2130 | Ashkan Aazami | Ashkan Aazami | Domination in graphs with bounded propagation: algorithms, formulations
and hardness results | 24 pages | null | null | null | cs.DS cs.CC | null | We introduce a hierarchy of problems between the \textsc{Dominating Set}
problem and the \textsc{Power Dominating Set} (PDS) problem called the
$\ell$-round power dominating set ($\ell$-round PDS, for short) problem. For
$\ell=1$, this is the \textsc{Dominating Set} problem, and for $\ell\geq n-1$,
this is the PDS problem; here $n$ denotes the number of nodes in the input
graph. In PDS the goal is to find a minimum size set of nodes $S$ that power
dominates all the nodes, where a node $v$ is power dominated if (1) $v$ is in
$S$ or it has a neighbor in $S$, or (2) $v$ has a neighbor $u$ such that $u$
and all of its neighbors except $v$ are power dominated. Note that rule (1) is
the same as for the \textsc{Dominating Set} problem, and that rule (2) is a
type of propagation rule that applies iteratively. The $\ell$-round PDS problem
has the same set of rules as PDS, except we apply rule (2) in ``parallel'' in
at most $\ell-1$ rounds. We prove that $\ell$-round PDS cannot be approximated
better than $2^{\log^{1-\epsilon}{n}}$ even for $\ell=4$ in general graphs. We
provide a dynamic programming algorithm to solve $\ell$-round PDS optimally in
polynomial time on graphs of bounded tree-width. We present a PTAS (polynomial
time approximation scheme) for $\ell$-round PDS on planar graphs for
$\ell=O(\tfrac{\log{n}}{\log{\log{n}}})$. Finally, we give integer programming
formulations for $\ell$-round PDS.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 02:55:52 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Aazami",
"Ashkan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.2134 | Kevin Buchin | Kevin Buchin | Minimizing the Maximum Interference is Hard | 4 pages, 1 figure | null | null | null | cs.NI cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following interference model for wireless sensor and ad hoc
networks: the receiver interference of a node is the number of transmission
ranges it lies in. We model transmission ranges as disks. For this case we show
that choosing transmission radii which minimize the maximum interference while
maintaining a connected symmetric communication graph is NP-complete.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 03:25:37 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Oct 2011 10:12:50 GMT"
}
] | 2011-10-11T00:00:00 | [
[
"Buchin",
"Kevin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0802.2138 | Mahesh Pal Dr. | Mahesh Pal and Paul M. Mather | Support Vector classifiers for Land Cover Classification | 11 pages, 1 figure, Published in MapIndia Conference 2003 | null | 10.1080/01431160802007624 | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Support vector machines represent a promising development in machine learning
research that is not widely used within the remote sensing community. This
paper reports the results of Multispectral(Landsat-7 ETM+) and Hyperspectral
DAIS)data in which multi-class SVMs are compared with maximum likelihood and
artificial neural network methods in terms of classification accuracy. Our
results show that the SVM achieves a higher level of classification accuracy
than either the maximum likelihood or the neural classifier, and that the
support vector machine can be used with small training datasets and
high-dimensional data.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 04:53:33 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Pal",
"Mahesh",
""
],
[
"Mather",
"Paul M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0802.2157 | Shai Gutner | Shai Gutner | Choice numbers of graphs | null | null | null | null | cs.DM cs.CC cs.DS | null | A solution to a problem of Erd\H{o}s, Rubin and Taylor is obtained by showing
that if a graph $G$ is $(a:b)$-choosable, and $c/d > a/b$, then $G$ is not
necessarily $(c:d)$-choosable. The simplest case of another problem, stated by
the same authors, is settled, proving that every 2-choosable graph is also
$(4:2)$-choosable. Applying probabilistic methods, an upper bound for the
$k^{th}$ choice number of a graph is given. We also prove that a directed graph
with maximum outdegree $d$ and no odd directed cycle is $(k(d+1):k)$-choosable
for every $k \geq 1$. Other results presented in this article are related to
the strong choice number of graphs (a generalization of the strong chromatic
number). We conclude with complexity analysis of some decision problems related
to graph choosability.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 09:05:54 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Gutner",
"Shai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2158 | Olivier Roustant | Jessica Franco, Laurent Carraro, Olivier Roustant, Astrid Jourdan
(LMA-PAU) | A Radar-Shaped Statistic for Testing and Visualizing Uniformity
Properties in Computer Experiments | null | null | null | null | cs.LG math.ST stat.TH | null | In the study of computer codes, filling space as uniformly as possible is
important to describe the complexity of the investigated phenomenon. However,
this property is not conserved by reducing the dimension. Some numeric
experiment designs are conceived in this sense as Latin hypercubes or
orthogonal arrays, but they consider only the projections onto the axes or the
coordinate planes. In this article we introduce a statistic which allows
studying the good distribution of points according to all 1-dimensional
projections. By angularly scanning the domain, we obtain a radar type
representation, allowing the uniformity defects of a design to be identified
with respect to its projections onto straight lines. The advantages of this new
tool are demonstrated on usual examples of space-filling designs (SFD) and a
global statistic independent of the angle of rotation is studied.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 09:06:25 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Franco",
"Jessica",
"",
"LMA-PAU"
],
[
"Carraro",
"Laurent",
"",
"LMA-PAU"
],
[
"Roustant",
"Olivier",
"",
"LMA-PAU"
],
[
"Jourdan",
"Astrid",
"",
"LMA-PAU"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0802.2159 | Walid Saad | Walid Saad, Zhu Han, Merouane Debbah and Are Hj{\o}rungnes | A Distributed Merge and Split Algorithm for Fair Cooperation in Wireless
Networks | This paper is accepted for publication at the IEEE ICC Workshop on
Cooperative Communications and Networking | null | 10.1109/ICCW.2008.65 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a novel concept from coalitional game theory which
allows the dynamic formation of coalitions among wireless nodes. A simple and
distributed merge and split algorithm for coalition formation is constructed.
This algorithm is applied to study the gains resulting from the cooperation
among single antenna transmitters for virtual MIMO formation. The aim is to
find an ultimate transmitters coalition structure that allows cooperating users
to maximize their utilities while accounting for the cost of coalition
formation. Through this novel game theoretical framework, the wireless network
transmitters are able to self-organize and form a structured network composed
of disjoint stable coalitions. Simulation results show that the proposed
algorithm can improve the average individual user utility by 26.4% as well as
cope with the mobility of the distributed users.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 09:14:56 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Saad",
"Walid",
""
],
[
"Han",
"Zhu",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Hjørungnes",
"Are",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2175 | Maria Bras-Amor\'os | Maria Bras-Amoros | Bounds on the Number of Numerical Semigroups of a Given Genus | null | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Combinatorics on multisets is used to deduce new upper and lower bounds on
the number of numerical semigroups of each given genus, significantly improving
existing ones. In particular, it is proved that the number $n_g$ of numerical
semigroups of genus $g$ satisfies $2F_{g}\leq n_g\leq 1+3\cdot 2^{g-3}$, where
$F_g$ denotes the $g$th Fibonacci number.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 10:47:05 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Bras-Amoros",
"Maria",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.2184 | Jean Cardinal | Jean Cardinal, Christophe Dumeunier | Set Covering Problems with General Objective Functions | 14 pages, 1 figure | null | null | null | cs.DS | null | We introduce a parameterized version of set cover that generalizes several
previously studied problems. Given a ground set V and a collection of subsets
S_i of V, a feasible solution is a partition of V such that each subset of the
partition is included in one of the S_i. The problem involves maximizing the
mean subset size of the partition, where the mean is the generalized mean of
parameter p, taken over the elements. For p=-1, the problem is equivalent to
the classical minimum set cover problem. For p=0, it is equivalent to the
minimum entropy set cover problem, introduced by Halperin and Karp. For p=1,
the problem includes the maximum-edge clique partition problem as a special
case. We prove that the greedy algorithm simultaneously approximates the
problem within a factor of (p+1)^1/p for any p in R^+, and that this is the
best possible unless P=NP. These results both generalize and simplify previous
results for special cases. We also consider the corresponding graph coloring
problem, and prove several tractability and inapproximability results. Finally,
we consider a further generalization of the set cover problem in which we aim
at minimizing the sum of some concave function of the part sizes. As an
application, we derive an approximation ratio for a Rent-or-Buy set cover
problem.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 11:56:28 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Cardinal",
"Jean",
""
],
[
"Dumeunier",
"Christophe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2201 | Murilo Baptista S. | M. S. Baptista, C. Bohn, R. Kliegl, R. Engbert, J. Kurths | Reconstruction of eye movements during blinks | null | Chaos (2008) | 10.1063/1.2890843 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In eye movement research in reading, the amount of data plays a crucial role
for the validation of results. A methodological problem for the analysis of the
eye movement in reading are blinks, when readers close their eyes. Blinking
rate increases with increasing reading time, resulting in high data losses,
especially for older adults or reading impaired subjects. We present a method,
based on the symbolic sequence dynamics of the eye movements, that reconstructs
the horizontal position of the eyes while the reader blinks. The method makes
use of an observed fact that the movements of the eyes before closing or after
opening contain information about the eyes movements during blinks. Test
results indicate that our reconstruction method is superior to methods that use
simpler interpolation approaches. In addition, analyses of the reconstructed
data show no significant deviation from the usual behavior observed in readers.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 13:37:27 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Mar 2008 09:30:11 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Baptista",
"M. S.",
""
],
[
"Bohn",
"C.",
""
],
[
"Kliegl",
"R.",
""
],
[
"Engbert",
"R.",
""
],
[
"Kurths",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0802.2228 | Sebastian Ordyniak | Stephan Kreutzer, Sebastian Ordyniak | Digraph Decompositions and Monotonicity in Digraph Searching | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider monotonicity problems for graph searching games. Variants of
these games - defined by the type of moves allowed for the players - have been
found to be closely connected to graph decompositions and associated width
measures such as path- or tree-width. Of particular interest is the question
whether these games are monotone, i.e. whether the cops can catch a robber
without ever allowing the robber to reach positions that have been cleared
before. The monotonicity problem for graph searching games has intensely been
studied in the literature, but for two types of games the problem was left
unresolved. These are the games on digraphs where the robber is invisible and
lazy or visible and fast. In this paper, we solve the problems by giving
examples showing that both types of games are non-monotone. Graph searching
games on digraphs are closely related to recent proposals for digraph
decompositions generalising tree-width to directed graphs. These proposals have
partly been motivated by attempts to develop a structure theory for digraphs
similar to the graph minor theory developed by Robertson and Seymour for
undirected graphs, and partly by the immense number of algorithmic results
using tree-width of undirected graphs and the hope that part of this success
might be reproducible on digraphs using a directed tree-width. Unfortunately
the number of applications for the digraphs measures introduced so far is still
small. We therefore explore the limits of the algorithmic applicability of
digraph decompositions. In particular, we show that various natural candidates
for problems that might benefit from digraphs having small directed tree-width
remain NP-complete even on almost acyclic graphs.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 15:44:34 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Kreutzer",
"Stephan",
""
],
[
"Ordyniak",
"Sebastian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2234 | Christoph Schommer | Christoph Schommer, Conny Uhde | Textual Fingerprinting with Texts from Parkin, Bassewitz, and Leander | 11 pages, 4 Figures | null | null | null | cs.CL cs.CR | null | Current research in author profiling to discover a legal author's fingerprint
does not only follow examinations based on statistical parameters only but
include more and more dynamic methods that can learn and that react adaptable
to the specific behavior of an author. But the question on how to appropriately
represent a text is still one of the fundamental tasks, and the problem of
which attribute should be used to fingerprint the author's style is still not
exactly defined. In this work, we focus on linguistic selection of attributes
to fingerprint the style of the authors Parkin, Bassewitz and Leander. We use
texts of the genre Fairy Tale as it has a clear style and texts of a shorter
size with a straightforward story-line and a simple language.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 16:14:09 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Schommer",
"Christoph",
""
],
[
"Uhde",
"Conny",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.2258 | Carlos Alberto Fernandez-y-Fernandez | Anthony J. H. Simons, Carlos Alberto Fernandez-y-Fernandez | Using Alloy to model-check visual design notations | 8 pages | Simons, A.J.H. and Fernandez-y-Fernandez, C.A., Using Alloy to
model-check visual design notations. In Sixth Mexican Int. Conf. on C S,
(Mexico, 2005), IEEE, 121-128 | 10.1109/ENC.2005.52 | null | cs.SE cs.SC | null | This paper explores the process of validation for the abstract syntax of a
graphical notation. We define an unified specification for five of the UML
diagrams used by the Discovery Method and, in this document, we illustrate how
diagrams can be represented in Alloy and checked against our specification in
order to know if these are valid under the Discovery notation.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 18:25:50 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Simons",
"Anthony J. H.",
""
],
[
"Fernandez-y-Fernandez",
"Carlos Alberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0802.2300 | Elchanan Mossel | Per Austrin and Elchanan Mossel | Approximation Resistant Predicates From Pairwise Independence | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the approximability of predicates on $k$ variables from a domain
$[q]$, and give a new sufficient condition for such predicates to be
approximation resistant under the Unique Games Conjecture. Specifically, we
show that a predicate $P$ is approximation resistant if there exists a balanced
pairwise independent distribution over $[q]^k$ whose support is contained in
the set of satisfying assignments to $P$.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2008 23:21:05 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Austrin",
"Per",
""
],
[
"Mossel",
"Elchanan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.2305 | Ping Li | Ping Li | Compressed Counting | null | null | null | null | cs.IT cs.CC cs.DM cs.DS cs.LG math.IT | null | Counting is among the most fundamental operations in computing. For example,
counting the pth frequency moment has been a very active area of research, in
theoretical computer science, databases, and data mining. When p=1, the task
(i.e., counting the sum) can be accomplished using a simple counter.
Compressed Counting (CC) is proposed for efficiently computing the pth
frequency moment of a data stream signal A_t, where 0<p<=2. CC is applicable if
the streaming data follow the Turnstile model, with the restriction that at the
time t for the evaluation, A_t[i]>= 0, which includes the strict Turnstile
model as a special case. For natural data streams encountered in practice, this
restriction is minor.
The underly technique for CC is what we call skewed stable random
projections, which captures the intuition that, when p=1 a simple counter
suffices, and when p = 1+/\Delta with small \Delta, the sample complexity of a
counter system should be low (continuously as a function of \Delta). We show at
small \Delta the sample complexity (number of projections) k = O(1/\epsilon)
instead of O(1/\epsilon^2).
Compressed Counting can serve a basic building block for other tasks in
statistics and computing, for example, estimation entropies of data streams,
parameter estimations using the method of moments and maximum likelihood.
Finally, another contribution is an algorithm for approximating the
logarithmic norm, \sum_{i=1}^D\log A_t[i], and logarithmic distance. The
logarithmic distance is useful in machine learning practice with heavy-tailed
data.
| [
{
"version": "v1",
"created": "Sun, 17 Feb 2008 16:42:52 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Feb 2008 09:51:09 GMT"
}
] | 2008-02-24T00:00:00 | [
[
"Li",
"Ping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2306 | Gareth Baxter | G. J. Baxter, M. R. Frean | Software graphs and programmer awareness | 9 pages, 8 figures | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dependencies between types in object-oriented software can be viewed as
directed graphs, with types as nodes and dependencies as edges. The in-degree
and out-degree distributions of such graphs have quite different forms, with
the former resembling a power-law distribution and the latter an exponential
distribution. This effect appears to be independent of application or type
relationship. A simple generative model is proposed to explore the proposition
that the difference arises because the programmer is aware of the out-degree of
a type but not of its in-degree. The model reproduces the two distributions,
and compares reasonably well to those observed in 14 different type
relationships across 12 different Java applications.
| [
{
"version": "v1",
"created": "Sat, 16 Feb 2008 03:38:03 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Baxter",
"G. J.",
""
],
[
"Frean",
"M. R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0802.2317 | Christophe Prieur | Christophe Prieur (LIAFA), Dominique Cardon, Jean-Samuel Beuscart,
Nicolas Pissard, Pascal Pons (LIAFA) | The Stength of Weak cooperation: A Case Study on Flickr | null | null | null | null | cs.CY | null | Web 2.0 works with the principle of weak cooperation, where a huge amount of
individual contributions build solid and structured sources of data. In this
paper, we detail the main properties of this weak cooperation by illustrating
them on the photo publication website Flickr, showing the variety of uses
producing a rich content and the various procedures devised by Flickr users
themselves to select quality. We underlined the interaction between small and
heavy users as a specific form of collective production in large social
networks communities. We also give the main statistics on the (5M-users,
150M-photos) data basis we worked on for this study, collected from Flickr
website using the public API.
| [
{
"version": "v1",
"created": "Sat, 16 Feb 2008 05:54:08 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Prieur",
"Christophe",
"",
"LIAFA"
],
[
"Cardon",
"Dominique",
"",
"LIAFA"
],
[
"Beuscart",
"Jean-Samuel",
"",
"LIAFA"
],
[
"Pissard",
"Nicolas",
"",
"LIAFA"
],
[
"Pons",
"Pascal",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0802.2345 | Ioannis Chatzigeorgiou | Ioannis Chatzigeorgiou, Ian J. Wassell and Rolando Carrasco | On the Frame Error Rate of Transmission Schemes on Quasi-Static Fading
Channels | 5 pages, 4 figures, Proceedings of the 42nd Conference on Information
Sciences and Systems, Princeton, USA, March 19-21, 2008 | null | 10.1109/CISS.2008.4558591 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is known that the frame error rate of turbo codes on quasi-static fading
channels can be accurately approximated using the convergence threshold of the
corresponding iterative decoder. This paper considers quasi-static fading
channels and demonstrates that non-iterative schemes can also be characterized
by a similar threshold based on which their frame error rate can be readily
estimated. In particular, we show that this threshold is a function of the
probability of successful frame detection in additive white Gaussian noise,
normalized by the squared instantaneous signal-to-noise ratio. We apply our
approach to uncoded binary phase shift keying, convolutional coding and turbo
coding and demonstrate that the approximated frame error rate is within 0.4 dB
of the simulation results. Finally, we introduce performance evaluation plots
to explore the impact of the frame size on the performance of the schemes under
investigation.
| [
{
"version": "v1",
"created": "Sat, 16 Feb 2008 18:58:00 GMT"
}
] | 2022-03-08T00:00:00 | [
[
"Chatzigeorgiou",
"Ioannis",
""
],
[
"Wassell",
"Ian J.",
""
],
[
"Carrasco",
"Rolando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2349 | John B. Little | John B. Little | Algebraic geometry codes from higher dimensional varieties | 26 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is a general survey of literature on Goppa-type codes from higher
dimensional algebraic varieties. The construction and several techniques for
estimating the minimum distance are described first. Codes from various classes
of varieties, including Hermitian hypersurfaces, Grassmannians, flag varieties,
ruled surfaces over curves, and Deligne-Lusztig varieties are considered.
Connections with the theories of toric codes and order domains are also briefly
indicated.
| [
{
"version": "v1",
"created": "Sat, 16 Feb 2008 23:45:47 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Little",
"John B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2360 | Vaneet Aggarwal | Vaneet Aggarwal, Amir Bennatan and A. Robert Calderbank | On Maximizing Coverage in Gaussian Relay Networks | 17 pages,8 figures, Submitted to IEEE Trans. Inf. Th, Oct. 2007 | IEEE Trans. Information Theory, vol.55, no.6, pp. 2518-2536 (Jun.
2009) | 10.1109/TIT.2009.2018337 | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Results for Gaussian relay channels typically focus on maximizing
transmission rates for given locations of the source, relay and destination. We
introduce an alternative perspective, where the objective is maximizing
coverage for a given rate. The new objective captures the problem of how to
deploy relays to provide a given level of service to a particular geographic
area, where the relay locations become a design parameter that can be
optimized. We evaluate the decode and forward (DF) and compress and forward
(CF) strategies for the relay channel with respect to the new objective of
maximizing coverage. When the objective is maximizing rate, different locations
of the destination favor different strategies. When the objective is coverage
for a given rate, and the relay is able to decode, DF is uniformly superior in
that it provides coverage at any point served by CF. When the channel model is
modified to include random fading, we show that the monotone ordering of
coverage regions is not always maintained. While the coverage provided by DF is
sensitive to changes in the location of the relay and the path loss exponent,
CF exhibits a more graceful degradation with respect to such changes. The
techniques used to approximate coverage regions are new and may be of
independent interest.
| [
{
"version": "v1",
"created": "Sun, 17 Feb 2008 04:38:22 GMT"
}
] | 2017-08-04T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Bennatan",
"Amir",
""
],
[
"Calderbank",
"A. Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2371 | Pierre Comon | P. Comon and J. ten Berge | Generic and Typical Ranks of Three-Way Arrays | null | null | null | I3S report ISRN I3S/RR-2006-29-FR | cs.OH cs.MS | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The concept of tensor rank, introduced in the twenties, has been popularized
at the beginning of the seventies. This has allowed to carry out Factor
Analysis on arrays with more than two indices. The generic rank may be seen as
an upper bound to the number of factors that can be extracted from a given
tensor. We explain in this short paper how to obtain numerically the generic
rank of tensors of arbitrary dimensions, and compare it with the rare algebraic
results already known at order three. In particular, we examine the cases of
symmetric tensors, tensors with symmetric matrix slices, or tensors with free
entries.
| [
{
"version": "v1",
"created": "Sun, 17 Feb 2008 09:48:07 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Comon",
"P.",
""
],
[
"Berge",
"J. ten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0802.2385 | Slavcho Shtrakov | Slavcho Shtrakov | Essential variables and positions in terms | 17 pages, 2 figures | J. Algebra Universalis, Vol. 61, No 3-4, (2009), pp. 381-397 | null | null | math.GM cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | The paper deals with $\Sigma-$composition of terms, which allows us to extend
the derivation rules in formal deduction of identities.
The concept of essential variables and essential positions of terms with
respect to a set of identities is a key step in the simplification of the
process of formal deduction. $\Sigma-$composition of terms is defined as
replacement between $\Sigma$-equal terms. This composition induces $\Sigma
R-$deductively closed sets of identities. In analogy to balanced identities we
introduce and investigate $\Sigma-$balanced identities for a given set of
identities $\Sigma$.
| [
{
"version": "v1",
"created": "Sun, 17 Feb 2008 15:43:24 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jul 2008 18:30:41 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Sep 2008 07:53:14 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Jan 2010 12:51:30 GMT"
}
] | 2010-01-19T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2411 | Mahesh Pal Dr. | Mahesh Pal | Multiclass Approaches for Support Vector Machine Based Land Cover
Classification | 16 pages, MapIndia 2005 conference | null | null | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | SVMs were initially developed to perform binary classification; though,
applications of binary classification are very limited. Most of the practical
applications involve multiclass classification, especially in remote sensing
land cover classification. A number of methods have been proposed to implement
SVMs to produce multiclass classification. A number of methods to generate
multiclass SVMs from binary SVMs have been proposed by researchers and is still
a continuing research topic. This paper compares the performance of six
multi-class approaches to solve classification problem with remote sensing data
in term of classification accuracy and computational cost. One vs. one, one vs.
rest, Directed Acyclic Graph (DAG), and Error Corrected Output Coding (ECOC)
based multiclass approaches creates many binary classifiers and combines their
results to determine the class label of a test pixel. Another catogery of multi
class approach modify the binary class objective function and allows
simultaneous computation of multiclass classification by solving a single
optimisation problem. Results from this study conclude the usefulness of One
vs. One multi class approach in term of accuracy and computational cost over
other multi class approaches.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 03:47:45 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Pal",
"Mahesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0802.2418 | Jacob Scott | Christopher Crutchfield, Zoran Dzunic, Jeremy T. Fineman, David R.
Karger, and Jacob Scott | Improved Approximations for Multiprocessor Scheduling Under Uncertainty | null | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents improved approximation algorithms for the problem of
multiprocessor scheduling under uncertainty, or SUU, in which the execution of
each job may fail probabilistically. This problem is motivated by the
increasing use of distributed computing to handle large, computationally
intensive tasks. In the SUU problem we are given n unit-length jobs and m
machines, a directed acyclic graph G of precedence constraints among jobs, and
unrelated failure probabilities q_{ij} for each job j when executed on machine
i for a single timestep. Our goal is to find a schedule that minimizes the
expected makespan, which is the expected time at which all jobs complete.
Lin and Rajaraman gave the first approximations for this NP-hard problem for
the special cases of independent jobs, precedence constraints forming disjoint
chains, and precedence constraints forming trees. In this paper, we present
asymptotically better approximation algorithms. In particular, we give an
O(loglog min(m,n))-approximation for independent jobs (improving on the
previously best O(log n)-approximation). We also give an O(log(n+m) loglog
min(m,n))-approximation algorithm for precedence constraints that form disjoint
chains (improving on the previously best
O(log(n)log(m)log(n+m)/loglog(n+m))-approximation by a (log n/loglog n)^2
factor when n = poly(m). Our algorithm for precedence constraints forming
chains can also be used as a component for precedence constraints forming
trees, yielding a similar improvement over the previously best algorithms for
trees.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 20:57:17 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Feb 2008 02:58:36 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Crutchfield",
"Christopher",
""
],
[
"Dzunic",
"Zoran",
""
],
[
"Fineman",
"Jeremy T.",
""
],
[
"Karger",
"David R.",
""
],
[
"Scott",
"Jacob",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2428 | Alexandre Benoit | Oya Aran, Ismail Ari, Alexandre Benoit (GIPSA-lab), Ana Huerta
Carrillo, Fran\c{c}ois-Xavier Fanard (TELE), Pavel Campr, Lale Akarun, Alice
Caplier (GIPSA-lab), Michele Rombaut (GIPSA-lab), Bulent Sankur | Sign Language Tutoring Tool | eNTERFACE'06. Summer Workshop. on Multimodal Interfaces, Dubrovnik :
Croatie (2007) | null | null | null | cs.LG cs.HC | null | In this project, we have developed a sign language tutor that lets users
learn isolated signs by watching recorded videos and by trying the same signs.
The system records the user's video and analyses it. If the sign is recognized,
both verbal and animated feedback is given to the user. The system is able to
recognize complex signs that involve both hand gestures and head movements and
expressions. Our performance tests yield a 99% recognition rate on signs
involving only manual gestures and 85% recognition rate on signs that involve
both manual and non manual components, such as head movement and facial
expressions.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 07:28:44 GMT"
}
] | 2008-09-11T00:00:00 | [
[
"Aran",
"Oya",
"",
"GIPSA-lab"
],
[
"Ari",
"Ismail",
"",
"GIPSA-lab"
],
[
"Benoit",
"Alexandre",
"",
"GIPSA-lab"
],
[
"Carrillo",
"Ana Huerta",
"",
"TELE"
],
[
"Fanard",
"François-Xavier",
"",
"TELE"
],
[
"Campr",
"Pavel",
"",
"GIPSA-lab"
],
[
"Akarun",
"Lale",
"",
"GIPSA-lab"
],
[
"Caplier",
"Alice",
"",
"GIPSA-lab"
],
[
"Rombaut",
"Michele",
"",
"GIPSA-lab"
],
[
"Sankur",
"Bulent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.2429 | Sebastien Verel | David Simoncini (I3S), S\'ebastien Verel (I3S), Philippe Collard
(I3S), Manuel Clergue (I3S) | Anisotropic selection in cellular genetic algorithms | null | Dans Proceedings of the 8th annual conference on Genetic and
evolutionary computation - Genetic And Evolutionary Computation Conference,
Seatle : \'Etats-Unis d'Am\'erique (2006) | 10.1145/1143997.1144098 | null | cs.AI | null | In this paper we introduce a new selection scheme in cellular genetic
algorithms (cGAs). Anisotropic Selection (AS) promotes diversity and allows
accurate control of the selective pressure. First we compare this new scheme
with the classical rectangular grid shapes solution according to the selective
pressure: we can obtain the same takeover time with the two techniques although
the spreading of the best individual is different. We then give experimental
results that show to what extent AS promotes the emergence of niches that
support low coupling and high cohesion. Finally, using a cGA with anisotropic
selection on a Quadratic Assignment Problem we show the existence of an
anisotropic optimal value for which the best average performance is observed.
Further work will focus on the selective pressure self-adjustment ability
provided by this new selection scheme.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 07:30:04 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Simoncini",
"David",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0802.2432 | Andrei Romashchenko | Bruno Durand (LIF), Andrei Romashchenko (LIP), Alexander Shen (LIF) | Fixed Point and Aperiodic Tilings | v5: technical revision (positions of figures are shifted) | 12th International Conference on Developments in Language Theory,
Kyoto : Japan (2008) | 10.1007/978-3-540-85780-8_22 | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An aperiodic tile set was first constructed by R.Berger while proving the
undecidability of the domino problem. It turned out that aperiodic tile sets
appear in many topics ranging from logic (the Entscheidungsproblem) to physics
(quasicrystals) We present a new construction of an aperiodic tile set that is
based on Kleene's fixed-point construction instead of geometric arguments. This
construction is similar to J. von Neumann self-reproducing automata; similar
ideas were also used by P. Gacs in the context of error-correcting
computations. The flexibility of this construction allows us to construct a
"robust" aperiodic tile set that does not have periodic (or close to periodic)
tilings even if we allow some (sparse enough) tiling errors. This property was
not known for any of the existing aperiodic tile sets.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 07:50:13 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Feb 2008 15:43:21 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Jul 2008 11:16:24 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Jan 2010 13:50:04 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Jan 2010 14:15:07 GMT"
}
] | 2010-01-27T00:00:00 | [
[
"Durand",
"Bruno",
"",
"LIF"
],
[
"Romashchenko",
"Andrei",
"",
"LIP"
],
[
"Shen",
"Alexander",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.2451 | Georg Bocherer | Georg Bocherer and Valdemar Cardoso da Rocha Junior and Cecilio
Pimentel | Capacity of General Discrete Noiseless Channels | 4 pages. Essentially the paper that appeared in Proc. ISCTA '07,
2007. From v1 to v2, one error was corrected | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper concerns the capacity of the discrete noiseless channel introduced
by Shannon. A sufficient condition is given for the capacity to be
well-defined. For a general discrete noiseless channel allowing non-integer
valued symbol weights, it is shown that the capacity--if well-defined--can be
determined from the radius of convergence of its generating function, from the
smallest positive pole of its generating function, or from the rightmost real
singularity of its complex generating function. A generalisation is given for
Pringsheim's Theorem and for the Exponential Growth Formula to generating
functions of combinatorial structures with non-integer valued symbol weights.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 11:06:47 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jun 2010 11:08:11 GMT"
}
] | 2010-06-11T00:00:00 | [
[
"Bocherer",
"Georg",
""
],
[
"Junior",
"Valdemar Cardoso da Rocha",
""
],
[
"Pimentel",
"Cecilio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2476 | Georg B\"ocherer | Georg B\"ocherer and Daniel Bielefeld | Theoretical Analysis of the Energy Capture in Strictly Bandlimited
Ultra-Wideband Channels | 5 pages. Changes from 2nd version: minor corrections. Essentially the
paper to be presented at ISWCS 2008 in Reykjavik | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The frequency selectivity of wireless communication channels can be
characterized by the delay spread Ds of the channel impulse response. If the
delay spread is small compared to the bandwidth W of the input signal, that is,
Ds*W approximately equal to 1, the channel appears to be flat fading. For Ds*W
>> 1, the channel appears to be frequency selective, which is usually the case
for wideband signals. In the first case, small scale synchronization with a
precision much higher than the sampling time T = 1/W is crucial. In this paper,
it is shown by analytical means that this is different in the wideband regime.
Here synchronization with a precision of T is sufficient and small scale
synchronization cannot further increase the captured energy at the receiver.
Simulation results show that this effect already occurs for W > 50MHz for the
IEEE 802.15.4a channel model.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 13:34:44 GMT"
},
{
"version": "v2",
"created": "Wed, 28 May 2008 09:59:39 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Aug 2008 14:03:44 GMT"
}
] | 2008-08-07T00:00:00 | [
[
"Böcherer",
"Georg",
""
],
[
"Bielefeld",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2528 | Nitish Korula | Chandra Chekuri, Nitish Korula | Min-Cost 2-Connected Subgraphs With k Terminals | 18 pages, 3 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the k-2VC problem, we are given an undirected graph G with edge costs and
an integer k; the goal is to find a minimum-cost 2-vertex-connected subgraph of
G containing at least k vertices. A slightly more general version is obtained
if the input also specifies a subset S \subseteq V of terminals and the goal is
to find a subgraph containing at least k terminals. Closely related to the
k-2VC problem, and in fact a special case of it, is the k-2EC problem, in which
the goal is to find a minimum-cost 2-edge-connected subgraph containing k
vertices. The k-2EC problem was introduced by Lau et al., who also gave a
poly-logarithmic approximation for it. No previous approximation algorithm was
known for the more general k-2VC problem. We describe an O(\log n \log k)
approximation for the k-2VC problem.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 18:34:28 GMT"
}
] | 2008-02-19T00:00:00 | [
[
"Chekuri",
"Chandra",
""
],
[
"Korula",
"Nitish",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2543 | Novella Bartolini | Novella Bartolini, Giancarlo Bongiovanni, Simone Silvestri (Department
of Computer Science University of Rome Sapienza, Italy) | Self-* overload control for distributed web systems | The full version of this paper, titled "Self-* through self-learning:
overload control for distributed web systems", has been published on Computer
Networks, Elsevier. The simulator used for the evaluation of the proposed
algorithm is available for download at the address:
http://www.dsi.uniroma1.it/~novella/qos_web/ | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unexpected increases in demand and most of all flash crowds are considered
the bane of every web application as they may cause intolerable delays or even
service unavailability. Proper quality of service policies must guarantee rapid
reactivity and responsiveness even in such critical situations. Previous
solutions fail to meet common performance requirements when the system has to
face sudden and unpredictable surges of traffic. Indeed they often rely on a
proper setting of key parameters which requires laborious manual tuning,
preventing a fast adaptation of the control policies. We contribute an original
Self-* Overload Control (SOC) policy. This allows the system to self-configure
a dynamic constraint on the rate of admitted sessions in order to respect
service level agreements and maximize the resource utilization at the same
time. Our policy does not require any prior information on the incoming traffic
or manual configuration of key parameters. We ran extensive simulations under a
wide range of operating conditions, showing that SOC rapidly adapts to time
varying traffic and self-optimizes the resource utilization. It admits as many
new sessions as possible in observance of the agreements, even under intense
workload variations. We compared our algorithm to previously proposed
approaches highlighting a more stable behavior and a better performance.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2008 21:18:17 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 15:14:20 GMT"
}
] | 2009-01-29T00:00:00 | [
[
"Bartolini",
"Novella",
"",
"Department\n of Computer Science University of Rome Sapienza, Italy"
],
[
"Bongiovanni",
"Giancarlo",
"",
"Department\n of Computer Science University of Rome Sapienza, Italy"
],
[
"Silvestri",
"Simone",
"",
"Department\n of Computer Science University of Rome Sapienza, Italy"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0802.2574 | Terence H. Chan | Laurent Guille, Terence Chan and Alex Grant | The minimal set of Ingleton inequalities | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Ingleton-LP bound is an outer bound for the multicast capacity region,
assuming the use of linear network codes. Computation of the bound is performed
on a polyhedral cone obtained by taking the intersection of half-spaces induced
by the basic (Shannon-type) inequalities and Ingleton inequalities. This paper
simplifies the characterization of this cone, by obtaining the unique minimal
set of Ingleton inequalities. As a result, the effort required for computation
of the Ingleton-LP bound can be greatly reduced.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 01:55:23 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Guille",
"Laurent",
""
],
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2587 | Alexandros Dimakis | F. Benezit, A.G. Dimakis, P. Thiran, M. Vetterli | Order-Optimal Consensus through Randomized Path Averaging | 26 pages | null | null | null | cs.IT cs.NI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gossip algorithms have recently received significant attention, mainly
because they constitute simple and robust message-passing schemes for
distributed information processing over networks. However for many topologies
that are realistic for wireless ad-hoc and sensor networks (like grids and
random geometric graphs), the standard nearest-neighbor gossip converges as
slowly as flooding ($O(n^2)$ messages).
A recently proposed algorithm called geographic gossip improves gossip
efficiency by a $\sqrt{n}$ factor, by exploiting geographic information to
enable multi-hop long distance communications. In this paper we prove that a
variation of geographic gossip that averages along routed paths, improves
efficiency by an additional $\sqrt{n}$ factor and is order optimal ($O(n)$
messages) for grids and random geometric graphs.
We develop a general technique (travel agency method) based on Markov chain
mixing time inequalities, which can give bounds on the performance of
randomized message-passing algorithms operating over various graph topologies.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 04:37:51 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Benezit",
"F.",
""
],
[
"Dimakis",
"A. G.",
""
],
[
"Thiran",
"P.",
""
],
[
"Vetterli",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0802.2594 | Menelaos Karavelas | Menelaos I. Karavelas and Elias P. Tsigaridas | Guarding curvilinear art galleries with vertex or point guards | 35 pages, 24 figures | Comput. Geom. Theory Appl. 42(6-7):522-535, 2009 | 10.1016/j.comgeo.2008.11.002 | null | cs.CG | null | One of the earliest and most well known problems in computational geometry is
the so-called art gallery problem. The goal is to compute the minimum possible
number guards placed on the vertices of a simple polygon in such a way that
they cover the interior of the polygon.
In this paper we consider the problem of guarding an art gallery which is
modeled as a polygon with curvilinear walls. Our main focus is on polygons the
edges of which are convex arcs pointing towards the exterior or interior of the
polygon (but not both), named piecewise-convex and piecewise-concave polygons.
We prove that, in the case of piecewise-convex polygons, if we only allow
vertex guards, $\lfloor\frac{4n}{7}\rfloor-1$ guards are sometimes necessary,
and $\lfloor\frac{2n}{3}\rfloor$ guards are always sufficient. Moreover, an
$O(n\log{}n)$ time and O(n) space algorithm is described that produces a vertex
guarding set of size at most $\lfloor\frac{2n}{3}\rfloor$. When we allow point
guards the afore-mentioned lower bound drops down to
$\lfloor\frac{n}{2}\rfloor$. In the special case of monotone piecewise-convex
polygons we can show that $\lfloor\frac{n}{2}\rfloor$ vertex guards are always
sufficient and sometimes necessary; these bounds remain valid even if we allow
point guards.
In the case of piecewise-concave polygons, we show that $2n-4$ point guards
are always sufficient and sometimes necessary, whereas it might not be possible
to guard such polygons by vertex guards. We conclude with bounds for other
types of curvilinear polygons and future work.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 06:10:17 GMT"
}
] | 2009-11-25T00:00:00 | [
[
"Karavelas",
"Menelaos I.",
""
],
[
"Tsigaridas",
"Elias P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0802.2612 | Sergey Gubin | Sergey Gubin | On Subgraph Isomorphism | Simplified, 6 pages | Polynomial size asymmetric linear model for Subgraph Isomorphism,
Proceedings WCECS 2008, ISBN: 978-988-98671-0-2, pp.241-246 | null | null | cs.DM cs.CC cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Article explicitly expresses Subgraph Isomorphism by a polynomial size
asymmetric linear system.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 09:06:40 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Aug 2008 22:22:49 GMT"
}
] | 2008-11-10T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.2655 | Gilles Stoltz | S\'ebastien Bubeck (INRIA Futurs), R\'emi Munos (INRIA Futurs), Gilles
Stoltz (DMA, GREGH) | Pure Exploration for Multi-Armed Bandit Problems | null | null | null | null | math.ST cs.LG stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the framework of stochastic multi-armed bandit problems and study
the possibilities and limitations of forecasters that perform an on-line
exploration of the arms. These forecasters are assessed in terms of their
simple regret, a regret notion that captures the fact that exploration is only
constrained by the number of available rounds (not necessarily known in
advance), in contrast to the case when the cumulative regret is considered and
when exploitation needs to be performed at the same time. We believe that this
performance criterion is suited to situations when the cost of pulling an arm
is expressed in terms of resources rather than rewards. We discuss the links
between the simple and the cumulative regret. One of the main results in the
case of a finite number of arms is a general lower bound on the simple regret
of a forecaster in terms of its cumulative regret: the smaller the latter, the
larger the former. Keeping this result in mind, we then exhibit upper bounds on
the simple regret of some forecasters. The paper ends with a study devoted to
continuous-armed bandit problems; we show that the simple regret can be
minimized with respect to a family of probability distributions if and only if
the cumulative regret can be minimized for it. Based on this equivalence, we
are able to prove that the separable metric spaces are exactly the metric
spaces on which these regrets can be minimized with respect to the family of
all probability distributions with continuous mean-payoff functions.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 14:05:22 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jun 2008 07:03:22 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Jun 2008 07:07:03 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Feb 2009 10:33:29 GMT"
},
{
"version": "v5",
"created": "Tue, 26 Jan 2010 10:10:42 GMT"
},
{
"version": "v6",
"created": "Wed, 9 Jun 2010 09:08:50 GMT"
}
] | 2010-07-26T00:00:00 | [
[
"Bubeck",
"Sébastien",
"",
"INRIA Futurs"
],
[
"Munos",
"Rémi",
"",
"INRIA Futurs"
],
[
"Stoltz",
"Gilles",
"",
"DMA, GREGH"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0802.2666 | Vaneet Aggarwal | Vaneet Aggarwal | Distributed Joint Source-Channel Coding for arbitrary memoryless
correlated sources and Source coding for Markov correlated sources using LDPC
codes | 7 pages, 10 figures, Results have been taken from the Course Project
Report for ELE 539B (Instructor: Prof. Robert Calderbank), May 2006 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we give a distributed joint source channel coding scheme for
arbitrary correlated sources for arbitrary point in the Slepian-Wolf rate
region, and arbitrary link capacities using LDPC codes. We consider the
Slepian-Wolf setting of two sources and one destination, with one of the
sources derived from the other source by some correlation model known at the
decoder. Distributed encoding and separate decoding is used for the two
sources. We also give a distributed source coding scheme when the source
correlation has memory to achieve any point in the Slepian-Wolf rate achievable
region. In this setting, we perform separate encoding but joint decoding.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 15:33:43 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2668 | Shai Gutner | Shai Gutner | The complexity of planar graph choosability | null | Discrete Math. 159 (1996), 119-130 | null | null | cs.DM cs.CC cs.DS | null | A graph $G$ is {\em $k$-choosable} if for every assignment of a set $S(v)$ of
$k$ colors to every vertex $v$ of $G$, there is a proper coloring of $G$ that
assigns to each vertex $v$ a color from $S(v)$. We consider the complexity of
deciding whether a given graph is $k$-choosable for some constant $k$. In
particular, it is shown that deciding whether a given planar graph is
4-choosable is NP-hard, and so is the problem of deciding whether a given
planar triangle-free graph is 3-choosable. We also obtain simple constructions
of a planar graph which is not 4-choosable and a planar triangle-free graph
which is not 3-choosable.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 15:26:19 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Gutner",
"Shai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2684 | Yijia Fan | Yijia Fan, Abdulkareem Adinoyi, John S Thompson, Halim Yanikomeroglu,
H. Vincent Poor | A Simple Distributed Antenna Processing Scheme for Cooperative Diversity | To appear in the IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this letter the performance of multiple relay channels is analyzed for the
situation in which multiple antennas are deployed only at the relays. The
simple repetition-coded decodeand- forward protocol with two different antenna
processing techniques at the relays is investigated. The antenna combining
techniques are maximum ratio combining (MRC) for reception and transmit
beamforming (TB) for transmission. It is shown that these distributed antenna
combining techniques can exploit the full spatial diversity of the relay
channels regardless of the number of relays and antennas at each relay, and
offer significant power gain over distributed space-time coding techniques.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 17:05:54 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Fan",
"Yijia",
""
],
[
"Adinoyi",
"Abdulkareem",
""
],
[
"Thompson",
"John S",
""
],
[
"Yanikomeroglu",
"Halim",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2685 | Maziar Nekovee | C. J. Rhodes and M. Nekovee | The Opportunistic Transmission of Wireless Worms between Mobile Devices | Submitted for publication | null | 10.1016/j.physa.2008.09.017 | null | cs.NI cond-mat.stat-mech cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ubiquity of portable wireless-enabled computing and communications
devices has stimulated the emergence of malicious codes (wireless worms) that
are capable of spreading between spatially proximal devices. The potential
exists for worms to be opportunistically transmitted between devices as they
move around, so human mobility patterns will have an impact on epidemic spread.
The scenario we address in this paper is proximity attacks from fleetingly
in-contact wireless devices with short-range communication range, such as
Bluetooth-enabled smart phones. An individual-based model of mobile devices is
introduced and the effect of population characteristics and device behaviour on
the outbreak dynamics is investigated. We show through extensive simulations
that in the above scenario the resulting mass-action epidemic models remain
applicable provided the contact rate is derived consistently from the
underlying mobility model. The model gives useful analytical expressions
against which more refined simulations of worm spread can be developed and
tested.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 17:07:32 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Rhodes",
"C. J.",
""
],
[
"Nekovee",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.2696 | Ewa Krot-Sieniawska | Ewa Krot-Sieniawska | On Characteristic Polynomials of the Family of Cobweb Posets | 7 pages, 1 figure | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note is a response to one of problems posed by A.K. Kwasniewski in one
of his recent papers. Namely for the sequence of finite cobweb subposets, the
looked for explicit formulas for corresponding sequence of characteristic
polynomials are discovered and delivered here. The recurrence relation defining
arbitrary family of charactristic polynomials of finite cobweb posets is also
derived.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 18:53:38 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Krot-Sieniawska",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.2701 | Lifeng Lai | Lifeng Lai, Hesham El Gamal and H. Vincent Poor | Authentication over Noisy Channels | Appeared in the Proceedings of the 45th Annual Allerton Conference on
Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, message authentication over noisy channels is studied. The
model developed in this paper is the authentication theory counterpart of
Wyner's wiretap channel model. Two types of opponent attacks, namely
impersonation attacks and substitution attacks, are investigated for both
single message and multiple message authentication scenarios. For each
scenario, information theoretic lower and upper bounds on the opponent's
success probability are derived. Remarkably, in both scenarios, lower and upper
bounds are shown to match, and hence the fundamental limit of message
authentication over noisy channels is fully characterized. The opponent's
success probability is further shown to be smaller than that derived in the
classic authentication model in which the channel is assumed to be noiseless.
These results rely on a proposed novel authentication scheme in which key
information is used to provide simultaneous protection again both types of
attacks.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 20:01:52 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2703 | Lifeng Lai | Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor | Optimal Medium Access Protocols for Cognitive Radio Networks | To appear in the Proceedings of the 6th International Symposium on
Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt08),
Berlin, Germany, March 31-April 4, 2008 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the design of medium access control protocols for
cognitive radio networks. The scenario in which a single cognitive user wishes
to opportunistically exploit the availability of empty frequency bands within
parts of the radio spectrum having multiple bands is first considered. In this
scenario, the availability probability of each channel is unknown a priori to
the cognitive user. Hence efficient medium access strategies must strike a
balance between exploring (learning) the availability probability of the
channels and exploiting the knowledge of the availability probability
identified thus far. For this scenario, an optimal medium access strategy is
derived and its underlying recursive structure is illustrated via examples. To
avoid the prohibitive computational complexity of this optimal strategy, a low
complexity asymptotically optimal strategy is developed. Next, the
multi-cognitive user scenario is considered and low complexity medium access
protocols, which strike an optimal balance between exploration and exploitation
in such competitive environments, are developed.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 20:08:38 GMT"
}
] | 2008-02-20T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Jiang",
"Hai",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2723 | Kenneth Mackenthun Jr. | Kenneth M. Mackenthun Jr | On strongly controllable group codes and mixing group shifts: solvable
groups, translation nets, and algorithms | Improved algorithm included and paper rewritten; 26 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The branch group of a strongly controllable group code is a shift group. We
show that a shift group can be characterized in a very simple way. In addition
it is shown that if a strongly controllable group code is labeled with Latin
squares, a strongly controllable Latin group code, then the shift group is
solvable. Moreover the mathematical structure of a Latin square (as a
translation net) and the shift group of a strongly controllable Latin group
code are closely related. Thus a strongly controllable Latin group code can be
viewed as a natural extension of a Latin square to a sequence space. Lastly we
construct shift groups. We show that it is sufficient to construct a simpler
group, the state group of a shift group. We give an algorithm to find the state
group, and from this it is easy to construct a stronlgy controllable Latin
group code.
| [
{
"version": "v1",
"created": "Tue, 19 Feb 2008 21:45:59 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2008 02:48:01 GMT"
}
] | 2008-10-06T00:00:00 | [
[
"Mackenthun",
"Kenneth M.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2736 | Fran\c{c}ois Nicolas | Sylvain Guillemot, Francois Nicolas, Vincent Berry and Christophe Paul | On the approximability of the Maximum Agreement SubTree and Maximum
Compatible Tree problems | Published in Discrete Applied Mathematics | null | 10.1016/j.dam.2008.06.007 | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the corresponding author because the newest
version is now published in Discrete Applied Mathematics.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 15:49:45 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2008 17:59:33 GMT"
},
{
"version": "v3",
"created": "Tue, 6 May 2008 13:54:03 GMT"
},
{
"version": "v4",
"created": "Sat, 24 May 2008 05:26:46 GMT"
},
{
"version": "v5",
"created": "Sun, 14 Dec 2008 07:03:21 GMT"
},
{
"version": "v6",
"created": "Wed, 18 Aug 2010 01:01:15 GMT"
},
{
"version": "v7",
"created": "Wed, 1 Sep 2010 13:21:35 GMT"
}
] | 2010-09-02T00:00:00 | [
[
"Guillemot",
"Sylvain",
""
],
[
"Nicolas",
"Francois",
""
],
[
"Berry",
"Vincent",
""
],
[
"Paul",
"Christophe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.2755 | Naoyuki Kamiyama | Naoyuki Kamiyama, Naoki Katoh | Covering Directed Graphs by In-trees | 15 pages, 12 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a directed graph $D=(V,A)$ with a set of $d$ specified vertices
$S=\{s_1,...,s_d\}\subseteq V$ and a function $f\colon S \to \mathbb{Z}_+$
where $\mathbb{Z}_+$ denotes the set of non-negative integers, we consider the
problem which asks whether there exist $\sum_{i=1}^d f(s_i)$ in-trees denoted
by $T_{i,1},T_{i,2},..., T_{i,f(s_i)}$ for every $i=1,...,d$ such that
$T_{i,1},...,T_{i,f(s_i)}$ are rooted at $s_i$, each $T_{i,j}$ spans vertices
from which $s_i$ is reachable and the union of all arc sets of $T_{i,j}$ for
$i=1,...,d$ and $j=1,...,f(s_i)$ covers $A$. In this paper, we prove that such
set of in-trees covering $A$ can be found by using an algorithm for the
weighted matroid intersection problem in time bounded by a polynomial in
$\sum_{i=1}^df(s_i)$ and the size of $D$. Furthermore, for the case where $D$
is acyclic, we present another characterization of the existence of in-trees
covering $A$, and then we prove that in-trees covering $A$ can be computed more
efficiently than the general case by finding maximum matchings in a series of
bipartite graphs.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 09:37:14 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Kamiyama",
"Naoyuki",
""
],
[
"Katoh",
"Naoki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.2773 | Damien Chablat | Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN) | Stiffness Analysis of 3-d.o.f. Overconstrained Translational Parallel
Manipulators | null | Dans IEEE Int. Conference on Robotics and Automation - ICRA IEEE
Int. Conference on Robotics and Automation, Pasadena : \'Etats-Unis
d'Am\'erique (2008) | null | null | cs.RO physics.class-ph | null | The paper presents a new stiffness modelling method for overconstrained
parallel manipulators, which is applied to 3-d.o.f. translational mechanisms.
It is based on a multidimensional lumped-parameter model that replaces the link
flexibility by localized 6-d.o.f. virtual springs. In contrast to other works,
the method includes a FEA-based link stiffness evaluation and employs a new
solution strategy of the kinetostatic equations, which allows computing the
stiffness matrix for the overconstrained architectures and for the singular
manipulator postures. The advantages of the developed technique are confirmed
by application examples, which deal with comparative stiffness analysis of two
translational parallel manipulators.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 09:30:13 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0802.2823 | Pascal Weil | Jacques Sakarovitch (LTCI), Rodrigo De Souza (LTCI) | On the decomposition of k-valued rational relations | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.IT math.IT | null | We give a new, and hopefully more easily understandable, structural proof of
the decomposition of a $k$-valued transducer into $k$ unambiguous functional
ones, a result established by A. Weber in 1996. Our construction is based on a
lexicographic ordering of computations of automata and on two coverings that
can be build by means of this ordering. The complexity of the construction,
measured as the number of states of the transducers involved in the
decomposition, improves the original one by one exponential. Moreover, this
method allows further generalisation that solves the problem of decomposition
of rational relations with bounded length-degree, which was left open in
Weber's paper.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 13:59:49 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Sakarovitch",
"Jacques",
"",
"LTCI"
],
[
"De Souza",
"Rodrigo",
"",
"LTCI"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2825 | Pascal Weil | Thomas Thierauf, Fabian Wagner | The Isomorphism Problem for Planar 3-Connected Graphs is in Unambiguous
Logspace | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.DS cs.CC | null | The isomorphism problem for planar graphs is known to be efficiently
solvable. For planar 3-connected graphs, the isomorphism problem can be solved
by efficient parallel algorithms, it is in the class $AC^1$. In this paper we
improve the upper bound for planar 3-connected graphs to unambiguous logspace,
in fact to $UL \cap coUL$. As a consequence of our method we get that the
isomorphism problem for oriented graphs is in $NL$. We also show that the
problems are hard for $L$.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:03:55 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Thierauf",
"Thomas",
""
],
[
"Wagner",
"Fabian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.2826 | Pascal Weil | Antti Valmari, Petri Lehtinen | Efficient Minimization of DFAs with Partial Transition Functions | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.IT cs.DS math.IT | null | Let PT-DFA mean a deterministic finite automaton whose transition relation is
a partial function. We present an algorithm for minimizing a PT-DFA in $O(m \lg
n)$ time and $O(m+n+\alpha)$ memory, where $n$ is the number of states, $m$ is
the number of defined transitions, and $\alpha$ is the size of the alphabet.
Time consumption does not depend on $\alpha$, because the $\alpha$ term arises
from an array that is accessed at random and never initialized. It is not
needed, if transitions are in a suitable order in the input. The algorithm uses
two instances of an array-based data structure for maintaining a refinable
partition. Its operations are all amortized constant time. One instance
represents the classical blocks and the other a partition of transitions. Our
measurements demonstrate the speed advantage of our algorithm on PT-DFAs over
an $O(\alpha n \lg n)$ time, $O(\alpha n)$ memory algorithm.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:04:34 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Valmari",
"Antti",
""
],
[
"Lehtinen",
"Petri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.2827 | Pascal Weil | Johan M. M. Van Rooij, Hans L. Bodlaender | Design by Measure and Conquer, A Faster Exact Algorithm for Dominating
Set | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.DS | null | The measure and conquer approach has proven to be a powerful tool to analyse
exact algorithms for combinatorial problems, like Dominating Set and
Independent Set. In this paper, we propose to use measure and conquer also as a
tool in the design of algorithms. In an iterative process, we can obtain a
series of branch and reduce algorithms. A mathematical analysis of an algorithm
in the series with measure and conquer results in a quasiconvex programming
problem. The solution by computer to this problem not only gives a bound on the
running time, but also can give a new reduction rule, thus giving a new,
possibly faster algorithm. This makes design by measure and conquer a form of
computer aided algorithm design. When we apply the methodology to a Set Cover
modelling of the Dominating Set problem, we obtain the currently fastest known
exact algorithms for Dominating Set: an algorithm that uses $O(1.5134^n)$ time
and polynomial space, and an algorithm that uses $O(1.5063^n)$ time.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:05:58 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Van Rooij",
"Johan M. M.",
""
],
[
"Bodlaender",
"Hans L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.2828 | Pascal Weil | Alexis Ballier (LIF), Bruno Durand (LIF), Emmanuel Jeandel (LIF) | Structural aspects of tilings | 11 pages | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.OH | null | In this paper, we study the structure of the set of tilings produced by any
given tile-set. For better understanding this structure, we address the set of
finite patterns that each tiling contains. This set of patterns can be analyzed
in two different contexts: the first one is combinatorial and the other
topological. These two approaches have independent merits and, once combined,
provide somehow surprising results. The particular case where the set of
produced tilings is countable is deeply investigated while we prove that the
uncountable case may have a completely different structure. We introduce a
pattern preorder and also make use of Cantor-Bendixson rank. Our first main
result is that a tile-set that produces only periodic tilings produces only a
finite number of them. Our second main result exhibits a tiling with exactly
one vector of periodicity in the countable case.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:06:56 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Ballier",
"Alexis",
"",
"LIF"
],
[
"Durand",
"Bruno",
"",
"LIF"
],
[
"Jeandel",
"Emmanuel",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0802.2829 | Pascal Weil | Maxime Crochemore (IGM), Lucian Ilie | Understanding maximal repetitions in strings | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.DS math.CO | null | The cornerstone of any algorithm computing all repetitions in a string of
length n in O(n) time is the fact that the number of runs (or maximal
repetitions) is O(n). We give a simple proof of this result. As a consequence
of our approach, the stronger result concerning the linearity of the sum of
exponents of all runs follows easily.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:10:15 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Crochemore",
"Maxime",
"",
"IGM"
],
[
"Ilie",
"Lucian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.2831 | Pascal Weil | Mihalis Yannakakis | Equilibria, Fixed Points, and Complexity Classes | null | Dans Proceedings of the 25th Annual Symposium on the Theoretical
Aspects of Computer Science - STACS 2008, Bordeaux : France (2008) | null | null | cs.CC cs.GT | null | Many models from a variety of areas involve the computation of an equilibrium
or fixed point of some kind. Examples include Nash equilibria in games; market
equilibria; computing optimal strategies and the values of competitive games
(stochastic and other games); stable configurations of neural networks;
analysing basic stochastic models for evolution like branching processes and
for language like stochastic context-free grammars; and models that incorporate
the basic primitives of probability and recursion like recursive Markov chains.
It is not known whether these problems can be solved in polynomial time. There
are certain common computational principles underlying different types of
equilibria, which are captured by the complexity classes PLS, PPAD, and FIXP.
Representative complete problems for these classes are respectively, pure Nash
equilibria in games where they are guaranteed to exist, (mixed) Nash equilibria
in 2-player normal form games, and (mixed) Nash equilibria in normal form games
with 3 (or more) players. This paper reviews the underlying computational
principles and the corresponding classes.
| [
{
"version": "v1",
"created": "Wed, 20 Feb 2008 14:11:10 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Yannakakis",
"Mihalis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.