id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0802.3107
EDA Publishing Association
S. Tzanova, L. Kamenova, Y. Avenas, Ch. Schaeffer (CIME)
Evaluation of the thermal and hydraulic performances of a very thin sintered copper flat heat pipe for 3D microsystem packages
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
The reported research work presents numerical studies validated by experimental results of a flat micro heat pipe with sintered copper wick structure. The objectives of this project are to produce and demonstrate the efficiency of the passive cooling technology (heat pipe) integrated in a very thin electronic substrate that is a part of a multifunctional 3-D electronic package. The enhanced technology is dedicated to the thermal management of high dissipative microsystems having heat densities of more than 10W/cm2. Future applications are envisaged in the avionics sector. In this research 2D numerical hydraulic model has been developed to investigate the performance of a very thin flat micro heat pipe with sintered copper wick structure, using water as a refrigerant. Finite difference method has been used to develop the model. The model has been used to determine the mass transfer and fluid flow in order to evaluate the limits of heat transport capacity as functions of the dimensions of the wick and the vapour space and for various copper spheres radii. The results are presented in terms of liquid and vapour pressures within the heat pipe. The simulated results are validated by experiments and proved that the method can be further used to predict thermal performance of the heat pipe and to optimise its design.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:46:56 GMT" } ]
2008-02-22T00:00:00
[ [ "Tzanova", "S.", "", "CIME" ], [ "Kamenova", "L.", "", "CIME" ], [ "Avenas", "Y.", "", "CIME" ], [ "Schaeffer", "Ch.", "", "CIME" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0802.3110
Christophe Vignat
J.-F. Bercher and C. Vignat
An entropic view of Pickands' theorem
4 pages, accepted to ISIT08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that distributions arising in Renyi-Tsallis maximum entropy setting are related to the Generalized Pareto Distributions (GPD) that are widely used for modeling the tails of distributions. The relevance of such modelization, as well as the ubiquity of GPD in practical situations follows from Balkema-De Haan-Pickands theorem on the distribution of excesses (over a high threshold). We provide an entropic view of this result, by showing that the distribution of a suitably normalized excess variable converges to the solution of a maximum Tsallis entropy, which is the GPD. This highlights the relevance of the so-called Tsallis distributions in many applications as well as some relevance to the use of the corresponding entropy.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:52:25 GMT" }, { "version": "v2", "created": "Tue, 6 May 2008 14:14:48 GMT" } ]
2008-05-06T00:00:00
[ [ "Bercher", "J. -F.", "" ], [ "Vignat", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3137
Wolfgang Faber
Wolfgang Faber, Gerald Pfeifer, Nicola Leone, Tina Dell'Armi, Giuseppe Ielpa
Design and Implementation of Aggregate Functions in the DLV System
34 pages, 7 figures. This article has been accepted for publication in Theory and Practice of Logic Programming, Cambridge University Press
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Disjunctive Logic Programming (DLP) is a very expressive formalism: it allows for expressing every property of finite structures that is decidable in the complexity class SigmaP2 (= NP^NP). Despite this high expressiveness, there are some simple properties, often arising in real-world applications, which cannot be encoded in a simple and natural manner. Especially properties that require the use of arithmetic operators (like sum, times, or count) on a set or multiset of elements, which satisfy some conditions, cannot be naturally expressed in classic DLP. To overcome this deficiency, we extend DLP by aggregate functions in a conservative way. In particular, we avoid the introduction of constructs with disputed semantics, by requiring aggregates to be stratified. We formally define the semantics of the extended language (called DLP^A), and illustrate how it can be profitably used for representing knowledge. Furthermore, we analyze the computational complexity of DLP^A, showing that the addition of aggregates does not bring a higher cost in that respect. Finally, we provide an implementation of DLP^A in DLV -- a state-of-the-art DLP system -- and report on experiments which confirm the usefulness of the proposed extension also for the efficiency of computation.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 15:44:09 GMT" } ]
2008-02-22T00:00:00
[ [ "Faber", "Wolfgang", "" ], [ "Pfeifer", "Gerald", "" ], [ "Leone", "Nicola", "" ], [ "Dell'Armi", "Tina", "" ], [ "Ielpa", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3235
Arturo Berrones
Arturo Berrones
Characterization of the convergence of stationary Fokker-Planck learning
null
null
10.1016/j.neucom.2008.12.042
null
cs.NE cond-mat.dis-nn cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The convergence properties of the stationary Fokker-Planck algorithm for the estimation of the asymptotic density of stochastic search processes is studied. Theoretical and empirical arguments for the characterization of convergence of the estimation in the case of separable and nonseparable nonlinear optimization problems are given. Some implications of the convergence of stationary Fokker-Planck learning for the inference of parameters in artificial neural network models are outlined.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 23:41:09 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 19:37:50 GMT" }, { "version": "v3", "created": "Thu, 2 Jul 2009 17:24:41 GMT" } ]
2009-07-02T00:00:00
[ [ "Berrones", "Arturo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0802.3253
Il Han Kim
Il Han Kim and David J. Love
On the Capacity and Design of Limited Feedback Multiuser MIMO Uplinks
25 pages, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of multiple-input multiple-output (MIMO) technology has been well-developed to increase fading channel capacity over single-input single-output (SISO) systems. This capacity gain can often be leveraged by utilizing channel state information at the transmitter and the receiver. Users make use of this channel state information for transmit signal adaptation. In this correspondence, we derive the capacity region for the MIMO multiple access channel (MIMO MAC) when partial channel state information is available at the transmitters, where we assume a synchronous MIMO multiuser uplink. The partial channel state information feedback has a cardinality constraint and is fed back from the basestation to the users using a limited rate feedback channel. Using this feedback information, we propose a finite codebook design method to maximize sum-rate. In this correspondence, the codebook is a set of transmit signal covariance matrices. We also derive the capacity region and codebook design methods in the case that the covariance matrix is rank-one (i.e., beamforming). This is motivated by the fact that beamforming is optimal in certain conditions. The simulation results show that when the number of feedback bits increases, the capacity also increases. Even with a small number of feedback bits, the performance of the proposed system is close to an optimal solution with the full feedback.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 04:56:57 GMT" } ]
2008-02-25T00:00:00
[ [ "Kim", "Il Han", "" ], [ "Love", "David J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3254
Cyril Allauzen
Cyril Allauzen and Mehryar Mohri and Ashish Rastogi
General Algorithms for Testing the Ambiguity of Finite Automata
null
null
null
null
cs.CC
null
This paper presents efficient algorithms for testing the finite, polynomial, and exponential ambiguity of finite automata with $\epsilon$-transitions. It gives an algorithm for testing the exponential ambiguity of an automaton $A$ in time $O(|A|_E^2)$, and finite or polynomial ambiguity in time $O(|A|_E^3)$. These complexities significantly improve over the previous best complexities given for the same problem. Furthermore, the algorithms presented are simple and are based on a general algorithm for the composition or intersection of automata. We also give an algorithm to determine the degree of polynomial ambiguity of a finite automaton $A$ that is polynomially ambiguous in time $O(|A|_E^3)$. Finally, we present an application of our algorithms to an approximate computation of the entropy of a probabilistic automaton.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 05:20:08 GMT" } ]
2008-02-25T00:00:00
[ [ "Allauzen", "Cyril", "" ], [ "Mohri", "Mehryar", "" ], [ "Rastogi", "Ashish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.3267
Amitabh Trehan
Tom Hayes and Navin Rustagi and Jared Saia and Amitabh Trehan
The Forgiving Tree: A Self-Healing Distributed Data Structure
Submitted to Principles of Distributed Computing (PODC) 2008
PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. 2008, pages 203--212
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up to n rounds where n is the total number of nodes initially in the network: the adversary deletes an arbitrary node from the network, then the network responds by quickly adding a small number of new edges. We present a distributed data structure that ensures two key properties. First, the diameter of the network is never more than $O(\log \Delta)$ times its original diameter, where $\Delta$ is the maximum degree of the network initially. We note that for many peer-to-peer systems, $\Delta$ is polylogarithmic, so the diameter increase would be a O(log log n) multiplicative factor. Second, the degree of any node never increases by more than 3 over its original degree. Our data structure is fully distributed, has O(1) latency per round and requires each node to send and receive O(1) messages per round. The data structure requires an initial setup phase that has latency equal to the diameter of the original network, and requires, with high probability, each node v to send O(log n) messages along every edge incident to v. Our approach is orthogonal and complementary to traditional topology-based approaches to defending against attack.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 08:22:33 GMT" } ]
2009-02-15T00:00:00
[ [ "Hayes", "Tom", "" ], [ "Rustagi", "Navin", "" ], [ "Saia", "Jared", "" ], [ "Trehan", "Amitabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.3283
Petter Holme
Petter Holme, Josh Karlin, Stephanie Forrest
An integrated model of traffic, geography and economy in the Internet
null
ACM SIGCOMM Computer Communication Review 38, 7-15 (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modeling Internet growth is important both for understanding the current network and to predict and improve its future. To date, Internet models have typically attempted to explain a subset of the following characteristics: network structure, traffic flow, geography, and economy. In this paper we present a discrete, agent-based model, that integrates all of them. We show that the model generates networks with topologies, dynamics, and (more speculatively) spatial distributions that are similar to the Internet.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 20:53:12 GMT" } ]
2008-06-25T00:00:00
[ [ "Holme", "Petter", "" ], [ "Karlin", "Josh", "" ], [ "Forrest", "Stephanie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.3284
Hadrien M\'elot
V\'eronique Bruy\`ere, and Hadrien M\'elot
Tur\'an Graphs, Stability Number, and Fibonacci Index
11 pages, 3 figures
null
10.1007/978-3-540-85097-7_12
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Fibonacci index of a graph is the number of its stable sets. This parameter is widely studied and has applications in chemical graph theory. In this paper, we establish tight upper bounds for the Fibonacci index in terms of the stability number and the order of general graphs and connected graphs. Tur\'an graphs frequently appear in extremal graph theory. We show that Tur\'an graphs and a connected variant of them are also extremal for these particular problems.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 11:22:50 GMT" } ]
2024-03-11T00:00:00
[ [ "Bruyère", "Véronique", "" ], [ "Mélot", "Hadrien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.3285
Radu Arsinte
Radu Arsinte, Ciprian Ilioaei
Some Aspects of Testing Process for Transport Streams in Digital Video Broadcasting
5 pages, 3 figures, 3 tables
Acta Technica Napocensis, Electronics and Telecommunications, nr.1/2004 pp.59-74
null
null
cs.CV cs.MM
null
This paper presents some aspects related to the DVB (Digital Video Broadcasting) investigation. The basic aspects of DVB are presented, with an emphasis on DVB-T version of standard. The main purpose of this research is to analyze the way that the transmission of the transport streams is realized in case of the Terrestrial Digital Video Broadcasting (DVB-T). To accomplish this, first, Digital Video Broadcasting standard is presented, and then the main aspects of DVB testing and analysis of the transport streams are investigated. The paper presents also the results obtained using two programs designed for DVB analysis: Mosalina and TSA.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 10:48:44 GMT" } ]
2008-02-25T00:00:00
[ [ "Arsinte", "Radu", "" ], [ "Ilioaei", "Ciprian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0802.3288
Radu Arsinte
Radu Arsinte
Implementing a Test Strategy for an Advanced Video Acquisition and Processing Architecture
5 pages, 17 figures
Acta Technica Napocensis, Electronics and Telecommunications, nr.2/2005 pp.15-20
null
null
cs.CV cs.MM
null
This paper presents some aspects related to test process of an advanced video system used in remote IP surveillance. The system is based on a Pentium compatible architecture using the industrial standard PC104+. First the overall architecture of the system is presented, involving both hardware or software aspects. The acquisition board which is developed in a special, nonstandard architecture, is also briefly presented. The main purpose of this research was to set a coherent set of procedures in order to test all the aspects of the video acquisition board. To accomplish this, it was necessary to set-up a procedure in two steps: stand alone video board test (functional test) and an in-system test procedure verifying the compatibility with both OS: Linux and Windows. The paper presents also the results obtained using this procedure.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 10:54:59 GMT" } ]
2008-02-25T00:00:00
[ [ "Arsinte", "Radu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0802.3293
Haluk Bingol
Burak Cetin, Haluk Bingol
Use of Rapid Probabilistic Argumentation for Ranking on Large Complex Networks
11 pages, 10 figures
null
null
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a family of novel ranking algorithms called ERank which run in linear/near linear time and build on explicitly modeling a network as uncertain evidence. The model uses Probabilistic Argumentation Systems (PAS) which are a combination of probability theory and propositional logic, and also a special case of Dempster-Shafer Theory of Evidence. ERank rapidly generates approximate results for the NP-complete problem involved enabling the use of the technique in large networks. We use a previously introduced PAS model for citation networks generalizing it for all networks. We propose a statistical test to be used for comparing the performances of different ranking algorithms based on a clustering validity test. Our experimentation using this test on a real-world network shows ERank to have the best performance in comparison to well-known algorithms including PageRank, closeness, and betweenness.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 11:49:16 GMT" } ]
2008-02-25T00:00:00
[ [ "Cetin", "Burak", "" ], [ "Bingol", "Haluk", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0802.3300
Pierfrancesco La Mura
Pierfrancesco La Mura
Projective Expected Utility
7 pages, to appear in the Proceedings of Quantum Interaction 2008
J. of Math. Psychology, 53:5 (2009)
10.1016/j.jmp.2009.02.001
null
quant-ph cs.GT econ.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by several classic decision-theoretic paradoxes, and by analogies with the paradoxes which in physics motivated the development of quantum mechanics, we introduce a projective generalization of expected utility along the lines of the quantum-mechanical generalization of probability theory. The resulting decision theory accommodates the dominant paradoxes, while retaining significant simplicity and tractability. In particular, every finite game within this larger class of preferences still has an equilibrium.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 12:00:20 GMT" } ]
2024-01-18T00:00:00
[ [ "La Mura", "Pierfrancesco", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Economics", "code": "econ.TH", "description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.", "span": "(Theoretical Economics)" } ]
0802.3328
Manas Patra
Manas K Patra and Yan Zhang
An Algebraic Characterization of Security of Cryptographic Protocols
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several of the basic cryptographic constructs have associated algebraic structures. Formal models proposed by Dolev and Yao to study the (unconditional) security of public key protocols form a group. The security of some types of protocols can be neatly formulated in this algebraic setting. We investigate classes of two-party protocols. We then consider extension of the formal algebraic framework to private-key protocols. We also discuss concrete realization of the formal models. In this case, we propose a definition in terms of pseudo-free groups.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 14:40:27 GMT" } ]
2008-02-25T00:00:00
[ [ "Patra", "Manas K", "" ], [ "Zhang", "Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.3355
Francisco R Villatoro
Francisco R. Villatoro, Antonio J. Nebro, and Jose E. Fern\'andez
PVM-Distributed Implementation of the Radiance Code
11 pages
null
null
null
cs.DC cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Parallel Virtual Machine (PVM) tool has been used for a distributed implementation of Greg Ward's Radiance code. In order to generate exactly the same primary rays with both the sequential and the parallel codes, the quincunx sampling technique used in Radiance for the reduction of the number of primary rays by interpolation, must be left untouched in the parallel implementation. The octree of local ambient values used in Radiance for the indirect illumination has been shared among all the processors. Both static and dynamic image partitioning techniques which replicate the octree of the complete scene in all the processors and have load-balancing, have been developed for one frame rendering. Speedups larger than 7.5 have been achieved in a network of 8 workstations. For animation sequences, a new dynamic partitioning distribution technique with superlinear speedups has also been developed.
[ { "version": "v1", "created": "Fri, 22 Feb 2008 17:32:17 GMT" } ]
2008-02-25T00:00:00
[ [ "Villatoro", "Francisco R.", "" ], [ "Nebro", "Antonio J.", "" ], [ "Fernández", "Jose E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0802.3401
Ninoslav Marina
Ninoslav Marina, Bixio Rimoldi
On the Structure of the Capacity Region of Asynchronous Memoryless Multiple-Access Channels
21 pages, 5 figures and 1 table. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2012.2191469
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The asynchronous capacity region of memoryless multiple-access channels is the union of certain polytopes. It is well-known that vertices of such polytopes may be approached via a technique called successive decoding. It is also known that an extension of successive decoding applies to the dominant face of such polytopes. The extension consists of forming groups of users in such a way that users within a group are decoded jointly whereas groups are decoded successively. This paper goes one step further. It is shown that successive decoding extends to every face of the above mentioned polytopes. The group composition as well as the decoding order for all rates on a face of interest are obtained from a label assigned to that face. From the label one can extract a number of structural properties, such as the dimension of the corresponding face and whether or not two faces intersect. Expressions for the the number of faces of any given dimension are also derived from the labels.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 01:30:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Marina", "Ninoslav", "" ], [ "Rimoldi", "Bixio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3414
Scott Kominers
Zachary Abel, Hugo A. Akitaya, Scott Duke Kominers, Matias Korman, Frederick Stock
A Universal In-Place Reconfiguration Algorithm for Sliding Cube-Shaped Robots in a Quadratic Number of Moves
23 pages, 11 figures
null
null
null
cs.CG cs.MA cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the modular robot reconfiguration problem, we are given $n$ cube-shaped modules (or robots) as well as two configurations, i.e., placements of the $n$ modules so that their union is face-connected. The goal is to find a sequence of moves that reconfigures the modules from one configuration to the other using "sliding moves," in which a module slides over the face or edge of a neighboring module, maintaining connectivity of the configuration at all times. For many years it has been known that certain module configurations in this model require at least $\Omega(n^2)$ moves to reconfigure between them. In this paper, we introduce the first universal reconfiguration algorithm -- i.e., we show that any $n$-module configuration can reconfigure itself into any specified $n$-module configuration using just sliding moves. Our algorithm achieves reconfiguration in $O(n^2)$ moves, making it asymptotically tight. We also present a variation that reconfigures in-place, it ensures that throughout the reconfiguration process, all modules, except for one, will be contained in the union of the bounding boxes of the start and end configuration.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 00:54:13 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2008 08:21:02 GMT" }, { "version": "v3", "created": "Fri, 30 Dec 2011 17:52:30 GMT" }, { "version": "v4", "created": "Thu, 14 Mar 2024 15:57:07 GMT" } ]
2024-03-15T00:00:00
[ [ "Abel", "Zachary", "" ], [ "Akitaya", "Hugo A.", "" ], [ "Kominers", "Scott Duke", "" ], [ "Korman", "Matias", "" ], [ "Stock", "Frederick", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0802.3419
N. Prasanth Anthapadmanabhan
N. Prasanth Anthapadmanabhan and Alexander Barg
Randomized Frameproof Codes: Fingerprinting Plus Validation Minus Tracing
5 pages, To appear in the Proceedings of Conference on Information Sciences and Systems (CISS), Princeton, NJ, Mar 2008
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose randomized frameproof codes for content protection, which arise by studying a variation of the Boneh-Shaw fingerprinting problem. In the modified system, whenever a user tries to access his fingerprinted copy, the fingerprint is submitted to a validation algorithm to verify that it is indeed permissible before the content can be executed. We show an improvement in the achievable rates compared to deterministic frameproof codes and traditional fingerprinting codes. For coalitions of an arbitrary fixed size, we construct randomized frameproof codes which have an $O(n^2)$ complexity validation algorithm and probability of error $\exp(-\Omega(n)),$ where $n$ denotes the length of the fingerprints. Finally, we present a connection between linear frameproof codes and minimal vectors for size-2 coalitions.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 03:16:19 GMT" } ]
2008-02-26T00:00:00
[ [ "Anthapadmanabhan", "N. Prasanth", "" ], [ "Barg", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3429
Yi Sun
Yi Sun
Quasi-Large Sparse-Sequence CDMA: Approach to Single-User Bound by Linearly-Complex LAS Detectors
CISS 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have proposed a quasi-large random-sequence (QLRS) CDMA where K users access a point through a common channel with spectral spreading factor N. Each bit is extended by a temporal spreading factor B and hopped on a BN-chip random sequence that is spread in time and frequency. Each user multiplexes and transmits B extended bits and the total channel load is alpha = K/N bits/s/Hz. The linearly-complex LAS detectors detect the transmitted bits. We have obtained that as B tends to infinity, if alpha < 1/2 - 1/(4ln2), each transmitted bit achieves the single-bit bound in BER in high SNR regime as if there was no interference bit. In simulation, when bit number BK >= 500, each bit can approach the single-bit bound for alpha as high as 1 bit/s/Hz. In this paper, we further propose the quasi-large sparse-sequence (QLSS) CDMA by replacing the dense sequence in QLRS-CDMA with sparse sequence. Simulation results show that when the nonzero chips are as few as 16, the BER is already near that of QLRS-CDMA while the complexity is significantly reduced due to sequence sparsity.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 06:45:28 GMT" } ]
2008-02-26T00:00:00
[ [ "Sun", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3430
Xiangyong Zeng
Xiangyong Zeng, Nian Li, and Lei Hu
A Class of Nonbinary Codes and Their Weight Distribution
18 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, for an even integer $n\geq 4$ and any positive integer $k$ with ${\rm gcd}(n/2,k)={\rm gcd}(n/2-k,2k)=d$ being odd, a class of $p$-ary codes $\mathcal{C}^k$ is defined and their weight distribution is completely determined, where $p$ is an odd prime. As an application, a class of nonbinary sequence families is constructed from these codes, and the correlation distribution is also determined.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 08:14:21 GMT" } ]
2008-02-26T00:00:00
[ [ "Zeng", "Xiangyong", "" ], [ "Li", "Nian", "" ], [ "Hu", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3437
Yuri Borissov Ph.D.
Yuri L. Borissov
On Cusick-Cheon's Conjecture About Balanced Boolean Functions in the Cosets of the Binary Reed-Muller Code
3 pages, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is proved an amplification of Cusick-Cheon's conjecture on balanced Boolean functions in the cosets of the binary Reed-Muller code RM(k,m) of order k and length 2^m, in the cases where k = 1 or k >= (m-1)/2.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 11:08:06 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 09:17:12 GMT" } ]
2008-04-14T00:00:00
[ [ "Borissov", "Yuri L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3441
Javier D. Garcia-Lasheras
Javier D. Garcia-Lasheras
Efficient implementation of GALS systems over commercial synchronous FPGAs: a new approach
English version of the paper presented in the Spanish Workshop on Reconfigurable Computing and Applications, Zaragoza (2007)
"Implementacion eficiente de sistemas GALS sobre FPGAs", Jornadas de Computacion Reconfigurable y Aplicaciones (JCRA'07), Zaragoza (2007)
null
null
cs.AR
null
The new vision presented is aimed to overcome the logic overhead issues that previous works exhibit when applying GALS techniques to programmable logic devices. The proposed new view relies in a 2-phase, bundled data parity based protocol for data transfer and clock generation tasks. The ability of the introduced methodology for smart real-time delay selection allows the implementation of a variety of new methodologies for electromagnetic interference mitigation and device environment changes adaptation.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 13:11:13 GMT" } ]
2008-02-26T00:00:00
[ [ "Garcia-Lasheras", "Javier D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0802.3444
Bruno Blanchet
Bruno Blanchet
Automatic Verification of Correspondences for Security Protocols
95 pages
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully automatic, it can handle an unbounded number of sessions of the protocol, and it is efficient in practice. It significantly extends a previous technique for the verification of secrecy. The protocol is represented in an extension of the pi calculus with fairly arbitrary cryptographic primitives. This protocol representation includes the specification of the correspondence to be verified, but no other annotation. This representation is then translated into an abstract representation by Horn clauses, which is used to prove the desired correspondence. Our technique has been proved correct and implemented. We have tested it on various protocols from the literature. The experimental results show that these protocols can be verified by our technique in less than 1 s.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 14:03:56 GMT" } ]
2008-02-26T00:00:00
[ [ "Blanchet", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3448
Haim Kaplan
Edith Cohen and Haim Kaplan
Sketch-Based Estimation of Subpopulation-Weight
null
null
null
null
cs.DB cs.DS cs.NI cs.PF
null
Summaries of massive data sets support approximate query processing over the original data. A basic aggregate over a set of records is the weight of subpopulations specified as a predicate over records' attributes. Bottom-k sketches are a powerful summarization format of weighted items that includes priority sampling and the classic weighted sampling without replacement. They can be computed efficiently for many representations of the data including distributed databases and data streams. We derive novel unbiased estimators and efficient confidence bounds for subpopulation weight. Our estimators and bounds are tailored by distinguishing between applications (such as data streams) where the total weight of the sketched set can be computed by the summarization algorithm without a significant use of additional resources, and applications (such as sketches of network neighborhoods) where this is not the case. Our rigorous derivations are based on clever applications of the Horvitz-Thompson estimator, and are complemented by efficient computational methods. We demonstrate their benefit on a wide range of Pareto distributions.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 15:25:04 GMT" } ]
2008-02-26T00:00:00
[ [ "Cohen", "Edith", "" ], [ "Kaplan", "Haim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0802.3457
Grenville Croll
Raymond R. Panko
Spreadsheet Errors: What We Know. What We Think We Can Do
9 Pages, 2 Tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 7-17 ISBN:1 86166 158 4
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fifteen years of research studies have concluded unanimously that spreadsheet errors are both common and non-trivial. Now we must seek ways to reduce spreadsheet errors. Several approaches have been suggested, some of which are promising and others, while appealing because they are easy to do, are not likely to be effective. To date, only one technique, cell-by-cell code inspection, has been demonstrated to be effective. We need to conduct further research to determine the degree to which other techniques can reduce spreadsheet errors.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 19:48:15 GMT" } ]
2008-03-10T00:00:00
[ [ "Panko", "Raymond R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3473
Maciej Dziemianczuk
M. Dziemianczuk
On Cobweb Posets and Discrete F-Boxes Tilings
24 pages, 15 figures, Affiliated to The Internet Gian-Carlo Polish Seminar http://ii.uwb.edu.pl/akk/sem/sem_rota.htm
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
F-boxes defined in [6] as hyper-boxes in N^{\infty} discrete space were applied here for the geometric description of the cobweb posetes Hasse diagrams tilings. The F-boxes edges sizes are taken to be values of terms of natural numbers' valued sequence F. The problem of partitions of hyper-boxes represented by graphs into blocks of special form is considered and these are to be called F-tilings. The proof of such tilings' existence for certain sub-family of admissible sequences F is delivered. The family of F-tilings which we consider here includes among others F = Natural numbers, Fibonacci numbers, Gaussian integers with their corresponding F-nomial (Binomial, Fibonomial, Gaussian) coefficients. Extension of this tiling problem onto the general case multi F-nomial coefficients is here proposed. Reformulation of the present cobweb tiling problem into a clique problem of a graph specially invented for that purpose - is proposed here too. To this end we illustrate the area of our reconnaissance by means of the Venn type map of various cobweb sequences families.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 00:54:09 GMT" }, { "version": "v2", "created": "Thu, 2 Apr 2009 11:05:55 GMT" } ]
2009-04-02T00:00:00
[ [ "Dziemianczuk", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.3475
Grenville Croll
Patrick Kemmis, Giles Thomas
Spreadsheet Development Methodologies using Resolver: Moving spreadsheets into the 21st Century
12 pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 93-104 ISBN 978-905617-58-6
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We intend to demonstrate the innate problems with existing spreadsheet products and to show how to tackle these issues using a new type of spreadsheet program called Resolver. It addresses the issues head-on and thereby moves the 1980's "VisiCalc paradigm" on to match the advances in computer languages and user requirements. Continuous display of the spreadsheet grid and the equivalent computer program, together with the ability to interact and add code through either interface, provides a number of new methodologies for spreadsheet development.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 01:16:52 GMT" } ]
2008-03-10T00:00:00
[ [ "Kemmis", "Patrick", "" ], [ "Thomas", "Giles", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3476
Grenville Croll
Jocelyn Paine
Fun Boy Three Were Wrong: it is what you do, not the way that you do it
12 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 105-116 ISBN 978-905617-58-6
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I revisit some classic publications on modularity, to show what problems its pioneers wanted to solve. These problems occur with spreadsheets too: to recognise them may help us avoid them.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 01:34:36 GMT" } ]
2008-03-10T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3477
Grenville Croll
Simon R. Thorne, David Ball, Z. Lawson
Concerning the Feasibility of Example-driven Modelling Techniques
14 Pages, 8 Figures, 1 Tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 117-130 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on a series of experiments concerning the feasibility of example driven modelling. The main aim was to establish experimentally within an academic environment: the relationship between error and task complexity using a) Traditional spreadsheet modelling; b) example driven techniques. We report on the experimental design, sampling, research methods and the tasks set for both control and treatment groups. Analysis of the completed tasks allows comparison of several different variables. The experimental results compare the performance indicators for the treatment and control groups by comparing accuracy, experience, training, confidence measures, perceived difficulty and perceived completeness. The various results are thoroughly tested for statistical significance using: the Chi squared test, Fisher's exact test for significance, Cochran's Q test and McNemar's test on difficulty.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 01:49:31 GMT" } ]
2008-03-10T00:00:00
[ [ "Thorne", "Simon R.", "" ], [ "Ball", "David", "" ], [ "Lawson", "Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3478
Grenville Croll
Jocelyn Paine
It Ain't What You View, But The Way That You View It: documenting spreadsheets with Excelsior, semantic wikis, and literate programming
12 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 131-142 ISBN 978-905617-58-6
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I describe preliminary experiments in documenting Excelsior versions of spreadsheets using semantic wikis and literate programming. The objective is to create well-structured and comprehensive documentation, easy to use by those unfamiliar with the spreadsheets documented. I discuss why so much documentation is hard to use, and briefly explain semantic wikis and literate programming; although parts of the paper are Excelsior-specific, these sections may be of more general interest.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 01:57:01 GMT" } ]
2008-03-10T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3479
Grenville Croll
Brian Bishop, Kevin McDaid
An Empirical Study of End-User Behaviour in Spreadsheet Error Detection & Correction
12 Pages, 3 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 165-176 ISBN 978-905617-58-6
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Very little is known about the process by which end-user developers detect and correct spreadsheet errors. Any research pertaining to the development of spreadsheet testing methodologies or auditing tools would benefit from information on how end-users perform the debugging process in practice. Thirteen industry-based professionals and thirty-four accounting & finance students took part in a current ongoing experiment designed to record and analyse end-user behaviour in spreadsheet error detection and correction. Professionals significantly outperformed students in correcting certain error types. Time-based cell activity analysis showed that a strong correlation exists between the percentage of cells inspected and the number of errors corrected. The cell activity data was gathered through a purpose written VBA Excel plug-in that records the time and detail of all cell selection and cell change actions of individuals.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 02:03:16 GMT" } ]
2008-03-10T00:00:00
[ [ "Bishop", "Brian", "" ], [ "McDaid", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0802.3480
Grenville Croll
Kath McGuire
Why Task-Based Training is Superior to Traditional Training Methods
6 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 191-196 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The risks of spreadsheet use do not just come from the misuse of formulae. As such, training needs to go beyond this technical aspect of spreadsheet use and look at the spreadsheet in its full business context. While standard training is by and large unable to do this, task-based training is perfectly suited to a contextual approach to training.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 02:10:03 GMT" } ]
2008-02-26T00:00:00
[ [ "McGuire", "Kath", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3481
Grenville Croll
David Chadwick
Establishing A Minimum Generic Skill Set For Risk Management Teaching In A Spreadsheet Training Course
12 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 197-208 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Past research shows that spreadsheet models are prone to such a high frequency of errors and data security implications that the risk management of spreadsheet development and spreadsheet use is of great importance to both industry and academia. The underlying rationale for this paper is that spreadsheet training courses should specifically address risk management in the development process both from a generic and a domain-specific viewpoint. This research specifically focuses on one of these namely those generic issues of risk management that should be present in a training course that attempts to meet good-practice within industry. A pilot questionnaire was constructed showing a possible minimum set of risk management issues and sent to academics and industry practitioners for feedback. The findings from this pilot survey will be used to refine the questionnaire for sending to a larger body of possible respondents. It is expected these findings will form the basis of a risk management teaching approach to be trialled in a number of selected ongoing spreadsheet training courses.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 02:15:49 GMT" } ]
2008-02-26T00:00:00
[ [ "Chadwick", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3483
Grenville Croll
Derek Flood, Kevin Mc Daid
Voice-controlled Debugging of Spreadsheets
10 Pages, 4 Tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 155-164 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developments in Mobile Computing are putting pressure on the software industry to research new modes of interaction that do not rely on the traditional keyboard and mouse combination. Computer users suffering from Repetitive Strain Injury also seek an alternative to keyboard and mouse devices to reduce suffering in wrist and finger joints. Voice-control is an alternative approach to spreadsheet development and debugging that has been researched and used successfully in other domains. While voice-control technology for spreadsheets is available its effectiveness has not been investigated. This study is the first to compare the performance of a set of expert spreadsheet developers that debugged a spreadsheet using voice-control technology and another set that debugged the same spreadsheet using keyboard and mouse. The study showed that voice, despite its advantages, proved to be slower and less accurate. However, it also revealed ways in which the technology might be improved to redress this imbalance.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 02:21:35 GMT" } ]
2008-02-26T00:00:00
[ [ "Flood", "Derek", "" ], [ "Daid", "Kevin Mc", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3490
Ying Jun Zhang Ph.D.
Jing Ma and Ying Jun Zhang
On capacity of wireless ad hoc networks with MIMO MMSE receivers
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Widely adopted at home, business places, and hot spots, wireless ad-hoc networks are expected to provide broadband services parallel to their wired counterparts in near future. To address this need, MIMO techniques, which are capable of offering several-fold increase in capacity, hold significant promise. Most previous work on capacity analysis of ad-hoc networks is based on an implicit assumption that each node has only one antenna. Core to the analysis therein is the characterization of a geometric area, referred to as the exclusion region, which quantizes the amount of spatial resource occupied by a link. When multiple antennas are deployed at each node, however, multiple links can transmit in the vicinity of each other simultaneously, as interference can now be suppressed by spatial signal processing. As such, a link no longer exclusively occupies a geometric area, making the concept of "exclusion region" not applicable any more. In this paper, we investigate link-layer throughput capacity of MIMO ad-hoc networks. In contrast to previous work, the amount of spatial resource occupied by each link is characterized by the actual interference it imposes on other links. To calculate the link-layer capacity, we first derive the probability distribution of post-detection SINR at a receiver. The result is then used to calculate the number of active links and the corresponding data rates that can be sustained within an area. Our analysis will serve as a guideline for the design of medium access protocols for MIMO ad-hoc networks. To the best of knowledge, this paper is the first attempt to characterize the capacity of MIMO ad-hoc networks by considering the actual PHY-layer signal and interference model.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 05:00:21 GMT" } ]
2008-02-26T00:00:00
[ [ "Ma", "Jing", "" ], [ "Zhang", "Ying Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3492
Marko A. Rodriguez
Marko A. Rodriguez
The RDF Virtual Machine
keywords: Resource Description Framework, Virtual Machines, Distributed Computing, Semantic Web
Knowledge-Based Systems, 24(6), 890-903, August 2011
10.1016/j.knosys.2011.04.004
LA-UR-08-03925
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Resource Description Framework (RDF) is a semantic network data model that is used to create machine-understandable descriptions of the world and is the basis of the Semantic Web. This article discusses the application of RDF to the representation of computer software and virtual computing machines. The Semantic Web is posited as not only a web of data, but also as a web of programs and processes.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 05:28:52 GMT" }, { "version": "v2", "created": "Thu, 25 Mar 2010 19:06:42 GMT" } ]
2011-05-26T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0802.3495
V. Sreekanth Annapureddy
V. Sreekanth Annapureddy and Venugopal V. Veeravalli
Gaussian Interference Networks: Sum Capacity in the Low Interference Regime and New Outer Bounds on the Capacity Region
Submitted to IEEE Transactions on Information Theory, February 2008. Revised Nov 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Establishing the capacity region of a Gaussian interference network is an open problem in information theory. Recent progress on this problem has led to the characterization of the capacity region of a general two user Gaussian interference channel within one bit. In this paper, we develop new, improved outer bounds on the capacity region. Using these bounds, we show that treating interference as noise achieves the sum capacity of the two user Gaussian interference channel in a low interference regime, where the interference parameters are below certain thresholds. We then generalize our techniques and results to Gaussian interference networks with more than two users. In particular, we demonstrate that the total interference threshold, below which treating interference as noise achieves the sum capacity, increases with the number of users.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 07:26:01 GMT" }, { "version": "v2", "created": "Sun, 15 Feb 2009 19:42:34 GMT" } ]
2009-02-15T00:00:00
[ [ "Annapureddy", "V. Sreekanth", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3513
Dariusz Dereniowski
Dariusz Dereniowski
The Complexity of Node Blocking for Dags
7 pages, 3 figures
Journal of Combinatorial Theory, Series A 118 (2011) 248-256
10.1016/j.jcta.2010.03.011
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following modification of annihilation game called node blocking. Given a directed graph, each vertex can be occupied by at most one token. There are two types of tokens, each player can move his type of tokens. The players alternate their moves and the current player $i$ selects one token of type $i$ and moves the token along a directed edge to an unoccupied vertex. If a player cannot make a move then he loses. We consider the problem of determining the complexity of the game: given an arbitrary configuration of tokens in a directed acyclic graph, does the current player has a winning strategy? We prove that the problem is PSPACE-complete.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 15:29:57 GMT" } ]
2021-03-05T00:00:00
[ [ "Dereniowski", "Dariusz", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.3522
Pierre-Francois Marteau
Pierre-Fran\c{c}ois Marteau (VALORIA)
Time Warp Edit Distance
Pattern Recognition - Clustering - Algorithms - Similarity Measures
null
null
VALORIA.2008.1V5
cs.IR
null
This technical report details a family of time warp distances on the set of discrete time series. This family is constructed as an editing distance whose elementary operations apply on linear segments. A specific parameter allows controlling the stiffness of the elastic matching. It is well suited for the processing of event data for which each data sample is associated with a timestamp, not necessarily obtained according to a constant sampling rate. Some properties verified by these distances are proposed and proved in this report.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 17:18:50 GMT" }, { "version": "v2", "created": "Sat, 1 Mar 2008 08:32:36 GMT" }, { "version": "v3", "created": "Tue, 18 Mar 2008 15:13:42 GMT" }, { "version": "v4", "created": "Fri, 4 Apr 2008 13:07:21 GMT" }, { "version": "v5", "created": "Mon, 23 Jun 2008 04:45:59 GMT" } ]
2008-06-23T00:00:00
[ [ "Marteau", "Pierre-François", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0802.3528
Fionn Murtagh
Fionn Murtagh and Jean-Luc Starck
Wavelet and Curvelet Moments for Image Classification: Application to Aggregate Mixture Grading
Submitted to Pattern Recognition Letters
Pattern Recognition Letters, 29, 1557-1564, 2008
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show the potential for classifying images of mixtures of aggregate, based themselves on varying, albeit well-defined, sizes and shapes, in order to provide a far more effective approach compared to the classification of individual sizes and shapes. While a dominant (additive, stationary) Gaussian noise component in image data will ensure that wavelet coefficients are of Gaussian distribution, long tailed distributions (symptomatic, for example, of extreme values) may well hold in practice for wavelet coefficients. Energy (2nd order moment) has often been used for image characterization for image content-based retrieval, and higher order moments may be important also, not least for capturing long tailed distributional behavior. In this work, we assess 2nd, 3rd and 4th order moments of multiresolution transform -- wavelet and curvelet transform -- coefficients as features. As analysis methodology, taking account of image types, multiresolution transforms, and moments of coefficients in the scales or bands, we use correspondence analysis as well as k-nearest neighbors supervised classification.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 18:25:51 GMT" } ]
2010-11-16T00:00:00
[ [ "Murtagh", "Fionn", "" ], [ "Starck", "Jean-Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0802.3535
Salman Avestimehr
Amir Salman Avestimehr, Suhas N. Diggavi and David N C. Tse
Approximate Capacity of Gaussian Relay Networks
This paper is submited to 2008 IEEE International Symposium on Information Theory (ISIT 2008) -In the revised format the approximation gap (\kappa) is sharpened
null
10.1109/ISIT.2008.4595031
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an achievable rate for general Gaussian relay networks. We show that the achievable rate is within a constant number of bits from the information-theoretic cut-set upper bound on the capacity of these networks. This constant depends on the topology of the network, but not the values of the channel gains. Therefore, we uniformly characterize the capacity of Gaussian relay networks within a constant number of bits, for all channel parameters.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 19:47:56 GMT" }, { "version": "v2", "created": "Thu, 5 Jun 2008 23:01:38 GMT" } ]
2016-11-17T00:00:00
[ [ "Avestimehr", "Amir Salman", "" ], [ "Diggavi", "Suhas N.", "" ], [ "Tse", "David N C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3554
Reginald Smith
Reginald D. Smith
Data Traffic Dynamics and Saturation on a Single Link
10 pages, 5 figures
International Journal of Computer, Information, and Systems Science, and Engineering, vol 3, no. 1, 11-16 2009
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamics of User Datagram Protocol (UDP) traffic over Ethernet between two computers are analyzed using nonlinear dynamics which shows that there are two clear regimes in the data flow: free flow and saturated. The two most important variables affecting this are the packet size and packet flow rate. However, this transition is due to a transcritical bifurcation rather than phase transition in models such as in vehicle traffic or theorized large-scale computer network congestion. It is hoped this model will help lay the groundwork for further research on the dynamics of networks, especially computer networks.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 03:23:33 GMT" }, { "version": "v2", "created": "Tue, 11 Mar 2008 01:11:26 GMT" }, { "version": "v3", "created": "Fri, 20 Feb 2009 13:16:50 GMT" } ]
2011-12-08T00:00:00
[ [ "Smith", "Reginald D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0802.3563
Usman Khan
Usman A. Khan, Soummya Kar, and Jose' M. F. Moura
Distributed Sensor Localization in Random Environments using Minimal Number of Anchor Nodes
30 pages, submitted to IEEE Transactions on Signal Processing
U. A. Khan, S. Kar, and J. M. F. Moura, "Distributed sensor localization in random environments using minimal number of anchor nodes," IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 2000-2016, May 2009
10.1109/TSP.2009.2014812
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper develops DILOC, a \emph{distributive}, \emph{iterative} algorithm that locates M sensors in $\mathbb{R}^m, m\geq 1$, with respect to a minimal number of m+1 anchors with known locations. The sensors exchange data with their neighbors only; no centralized data processing or communication occurs, nor is there centralized knowledge about the sensors' locations. DILOC uses the barycentric coordinates of a sensor with respect to its neighbors that are computed using the Cayley-Menger determinants. These are the determinants of matrices of inter-sensor distances. We show convergence of DILOC by associating with it an absorbing Markov chain whose absorbing states are the anchors. We introduce a stochastic approximation version extending DILOC to random environments when the knowledge about the intercommunications among sensors and the inter-sensor distances are noisy, and the communication links among neighbors fail at random times. We show a.s. convergence of the modified DILOC and characterize the error between the final estimates and the true values of the sensors' locations. Numerical studies illustrate DILOC under a variety of deterministic and random operating conditions.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 07:29:19 GMT" }, { "version": "v2", "created": "Thu, 7 Aug 2008 03:07:12 GMT" } ]
2013-12-19T00:00:00
[ [ "Khan", "Usman A.", "" ], [ "Kar", "Soummya", "" ], [ "Moura", "Jose' M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3569
Ying Jun Zhang Ph.D.
Ying Jun Zhang, Soung Chang Liew, and Darui Chen
Delay Analysis for Wireless Local Area Networks with Multipacket Reception under Finite Load
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To date, most analysis of WLANs has been focused on their operation under saturation condition. This work is an attempt to understand the fundamental performance of WLANs under unsaturated condition. In particular, we are interested in the delay performance when collisions of packets are resolved by an exponential backoff mechanism. Using a multiple-vacation queueing model, we derive an explicit expression for packet delay distribution, from which necessary conditions for finite mean delay and delay jitter are established. It is found that under some circumstances, mean delay and delay jitter may approach infinity even when the traffic load is way below the saturation throughput. Saturation throughput is therefore not a sound measure of WLAN capacity when the underlying applications are delay sensitive. To bridge the gap, we define safe-bounded-mean-delay (SBMD) throughput and safe-bounded-delay-jitter (SBDJ) throughput that reflect the actual network capacity users can enjoy when they require bounded mean delay and delay jitter, respectively. The analytical model in this paper is general enough to cover both single-packet reception (SPR) and multi-packet reception (MPR) WLANs, as well as carrier-sensing and non-carrier-sensing networks. We show that the SBMD and SBDJ throughputs scale super-linearly with the MPR capability of a network. Together with our earlier work that proves super-linear throughput scaling under saturation condition, our results here complete the demonstration of MPR as a powerful capacity-enhancement technique for both delay-sensitive and delay-tolerant applications.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 08:44:10 GMT" } ]
2008-02-26T00:00:00
[ [ "Zhang", "Ying Jun", "" ], [ "Liew", "Soung Chang", "" ], [ "Chen", "Darui", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.3570
{\O}yvind Ryan
{\O}yvind Ryan, Merouane Debbah
Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the Unit Circle
28 pages. To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analytical methods for finding moments of random Vandermonde matrices with entries on the unit circle are developed. Vandermonde Matrices play an important role in signal processing and wireless applications such as direction of arrival estimation, precoding, and sparse sampling theory, just to name a few. Within this framework, we extend classical freeness results on random matrices with independent, identically distributed (i.i.d.) entries and show that Vandermonde structured matrices can be treated in the same vein with different tools. We focus on various types of matrices, such as Vandermonde matrices with and without uniform phase distributions, as well as generalized Vandermonde matrices. In each case, we provide explicit expressions of the moments of the associated Gram matrix, as well as more advanced models involving the Vandermonde matrix. Comparisons with classical i.i.d. random matrix theory are provided, and deconvolution results are discussed. We review some applications of the results to the fields of signal processing and wireless communications.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 09:06:13 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2008 18:50:27 GMT" }, { "version": "v3", "created": "Tue, 17 Mar 2009 15:50:42 GMT" } ]
2016-08-14T00:00:00
[ [ "Ryan", "Øyvind", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3572
{\O}yvind Ryan
{\O}yvind Ryan, Merouane Debbah
Random Vandermonde Matrices-Part II: Applications
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the authors, since it has been merged with Part I (ID 0802.3570)
[ { "version": "v1", "created": "Mon, 25 Feb 2008 09:09:39 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2008 18:57:34 GMT" } ]
2016-08-14T00:00:00
[ [ "Ryan", "Øyvind", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3582
Erich Schikuta
Erich Schikuta
Neural Networks and Database Systems
19 pages, Festschrift Informationssysteme, in honor of G. Vinek
pp. 133-152, 2007, publisher Austrian Computer Society
null
null
cs.DB cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object-oriented database systems proved very valuable at handling and administrating complex objects. In the following guidelines for embedding neural networks into such systems are presented. It is our goal to treat networks as normal data in the database system. From the logical point of view, a neural network is a complex data value and can be stored as a normal data object. It is generally accepted that rule-based reasoning will play an important role in future database applications. The knowledge base consists of facts and rules, which are both stored and handled by the underlying database system. Neural networks can be seen as representation of intensional knowledge of intelligent database systems. So they are part of a rule based knowledge pool and can be used like conventional rules. The user has a unified view about his knowledge base regardless of the origin of the unique rules.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 09:57:31 GMT" } ]
2008-02-26T00:00:00
[ [ "Schikuta", "Erich", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0802.3597
Vyacheslav Yukalov
V.I. Yukalov and D. Sornette
Processing Information in Quantum Decision Theory
Review article, 49 pages, Latex file
Entropy 11 (2009) 1073-1120
10.3390/e11041073
null
physics.soc-ph cs.AI quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A survey is given summarizing the state of the art of describing information processing in Quantum Decision Theory, which has been recently advanced as a novel variant of decision making, based on the mathematical theory of separable Hilbert spaces. This mathematical structure captures the effect of superposition of composite prospects, including many incorporated intended actions. The theory characterizes entangled decision making, non-commutativity of subsequent decisions, and intention interference. The self-consistent procedure of decision making, in the frame of the quantum decision theory, takes into account both the available objective information as well as subjective contextual effects. This quantum approach avoids any paradox typical of classical decision theory. Conditional maximization of entropy, equivalent to the minimization of an information functional, makes it possible to connect the quantum and classical decision theories, showing that the latter is the limit of the former under vanishing interference terms.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 11:08:19 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2010 10:10:38 GMT" }, { "version": "v3", "created": "Wed, 17 Mar 2010 12:43:43 GMT" } ]
2015-05-13T00:00:00
[ [ "Yukalov", "V. I.", "" ], [ "Sornette", "D.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0802.3611
Khoa Nguyen
Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen
Power Allocation for Fading Channels with Peak-to-Average Power Constraints
26 pages, 6 figures, submitted to IEEE Transaction on Wireless Communication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Power allocation with peak-to-average power ratio constraints is investigated for transmission over Nakagami-m fading channels with arbitrary input distributions. In the case of delay-limited block-fading channels, we find the solution to the minimum outage power allocation scheme with peak-to-average power constraints and arbitrary input distributions, and show that the signal-to-noise ratio exponent for any finite peak-to-average power ratio is the same as that of the peak-power limited problem, resulting in an error floor. In the case of the ergodic fully-interleaved channel, we find the power allocation rule that yields the maximal information rate for an arbitrary input distribution and show that capacities with peak-to-average power ratio constraints, even for small ratios, are very close to capacities without peak-power restrictions.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 12:26:47 GMT" } ]
2008-02-26T00:00:00
[ [ "Nguyen", "Khoa D.", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Rasmussen", "Lars K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3617
Mark van der Zwaag
Jan A. Bergstra, Sanne Nolst Trenit\'e, Mark B. van der Zwaag
Towards a formalization of budgets
null
null
null
PRG0712
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We go into the need for, and the requirements on, a formal theory of budgets. We present a simple algebraic theory of rational budgets, i.e., budgets in which amounts of money are specified by functions on the rational numbers. This theory is based on the tuplix calculus. We go into the importance of using totalized models for the rational numbers. We present a case study on the educational budget of a university department offering master programs.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 13:11:32 GMT" } ]
2008-02-26T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Trenité", "Sanne Nolst", "" ], [ "van der Zwaag", "Mark B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3626
Sudhakar Sahoo
Birendra Kumar Nayak, Sudhakar Sahoo, Sushant Kumar Rout
Color Graphs: An Efficient Model For Two-Dimensional Cellular Automata Linear Rules
14 pages, presented at Orissa Mathematical Society Conference, 2008
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-dimensional nine neighbor hood rectangular Cellular Automata rules can be modeled using many different techniques like Rule matrices, State Transition Diagrams, Boolean functions, Algebraic Normal Form etc. In this paper, a new model is introduced using color graphs to model all the 512 linear rules. The graph theoretic properties therefore studied in this paper simplifies the analysis of all linear rules in comparison with other ways of its study.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 13:54:50 GMT" } ]
2008-02-28T00:00:00
[ [ "Nayak", "Birendra Kumar", "" ], [ "Sahoo", "Sudhakar", "" ], [ "Rout", "Sushant Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3627
Guilhem Semerjian
Andrea Montanari, Federico Ricci-Tersenghi, Guilhem Semerjian
Clusters of solutions and replica symmetry breaking in random k-satisfiability
30 pages, 14 figures, typos corrected, discussion of appendix C expanded with a new figure
J. Stat. Mech. P04004 (2008)
10.1088/1742-5468/2008/04/P04004
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the set of solutions of random k-satisfiability formulae through the cavity method. It is known that, for an interval of the clause-to-variables ratio, this decomposes into an exponential number of pure states (clusters). We refine substantially this picture by: (i) determining the precise location of the clustering transition; (ii) uncovering a second `condensation' phase transition in the structure of the solution set for k larger or equal than 4. These results both follow from computing the large deviation rate of the internal entropy of pure states. From a technical point of view our main contributions are a simplified version of the cavity formalism for special values of the Parisi replica symmetry breaking parameter m (in particular for m=1 via a correspondence with the tree reconstruction problem) and new large-k expansions.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 14:17:25 GMT" }, { "version": "v2", "created": "Fri, 29 Feb 2008 10:25:44 GMT" } ]
2009-11-13T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Ricci-Tersenghi", "Federico", "" ], [ "Semerjian", "Guilhem", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.3628
Pierre Thierry
Pierre Thierry and Simon E. B. Thierry
Dynamic data models: an application of MOP-based persistence in Common Lisp
Presented at the 4th European Lisp Workshop, co-located with ECOOP 2007. No proceedings
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The data model of an application, the nature and format of data stored across executions, is typically a very rigid part of its early specification, even when prototyping, and changing it after code that relies on it was written can prove quite expensive and error-prone. Code and data in a running Lisp image can be dynamically modified. A MOP-based persistence library can bring this dynamicity to the data model. This enables to extend the easy prototyping way of development to the storage of data and helps avoiding interruptions of service. This article presents the conditions to do this portably and transparently.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 14:20:18 GMT" } ]
2008-02-26T00:00:00
[ [ "Thierry", "Pierre", "" ], [ "Thierry", "Simon E. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3634
Bernard Kujawski
B. Kujawski, G.J. Rodgers, and Bosiljka Tadi\'c
Local Information Based Algorithms for Packet Transport in Complex Networks
null
In V.N. Alexnandrov et l., editor, ICCS 2006, volume \textbf{3993} of Lecture Notes in Computer Science, pages 1024-1031, Berlin, 2006, Springer
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce four algorithms for packet transport in complex networks. These algorithms use deterministic rules which depend, in different ways, on the degree of the node, the number of packets posted down each edge, the mean delivery time of packets sent down each edge to each destination and the time since an edge last transmitted a packet. On scale-free networks all our algorithms are considerably more efficient and can handle a larger load than the random walk algorithm. We consider in detail various attributes of our algorithms, for instance we show that an algorithm that bases its decisions on the mean delivery time jams unless it incorporates information about the degree of the destination node.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 15:23:31 GMT" } ]
2008-02-26T00:00:00
[ [ "Kujawski", "B.", "" ], [ "Rodgers", "G. J.", "" ], [ "Tadić", "Bosiljka", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.3665
Luciano da Fontoura Costa
Bruno Augusto Nassif Traven\c{c}olo and Luciano da Fontoura Costa
Outward Accessibility in Urban Street Networks: Characterization and Improvements
4 pages, 2 figures. The following article has been submitted to Applied Physics Letters. After it is published, it will be found at http://apl.aip.org
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamics of transportation through towns and cities is strongly affected by the topology of the connections and routes. The current work describes an approach combining complex networks and self-avoiding random walk dynamics in order to quantify in objective and accurate manner, along a range of spatial scales, the accessibility of places in towns and cities. The transition probabilities are estimated for several lengths of the walks and used to calculate the outward accessibility of each node. The potential of the methodology is illustrated with respect to the characterization and improvements of the accessibility of the town of Sao Carlos.
[ { "version": "v1", "created": "Mon, 25 Feb 2008 18:35:44 GMT" } ]
2008-02-26T00:00:00
[ [ "Travençolo", "Bruno Augusto Nassif", "" ], [ "Costa", "Luciano da Fontoura", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0802.3703
Ewa Krot-Sieniawska
Ewa Krot-Sieniawska
On incidence algebras description of cobweb posets
9 pages
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The explicite formulas for Mobius function and some other important elements of the incidence algebra of an arbitrary cobweb poset are delivered. For that to do one uses Kwasniewski's construction of his cobweb posets . The digraph representation of these cobweb posets constitutes a newly discovered class of orderable DAG's named here down KoDAGs with a kind of universality now being investigated. Namely cobweb posets' and thus KoDAGs's defining di-bicliques are links of any complete relations' chains.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 13:12:43 GMT" } ]
2008-02-28T00:00:00
[ [ "Krot-Sieniawska", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.3718
Joaquin Garcia-Alfaro
Joaquin Garcia-Alfaro, Michael A. Jaeger, Gero Muehl, and Joan Borrell
Preventing Coordinated Attacks Via Distributed Alert Exchange
19 pages, proposal reviewed
IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005) (17/10/2005) 87-98
null
null
cs.CR cs.NI
null
Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 11:45:43 GMT" } ]
2008-02-27T00:00:00
[ [ "Garcia-Alfaro", "Joaquin", "" ], [ "Jaeger", "Michael A.", "" ], [ "Muehl", "Gero", "" ], [ "Borrell", "Joan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0802.3734
Alex Myasnikov
Alex D. Myasnikov
Generic case complexity and One-Way functions
null
null
null
null
cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to introduce ideas and methodology of the generic case complexity to cryptography community. This relatively new approach allows one to analyze the behavior of an algorithm on ''most'' inputs in a simple and intuitive fashion which has some practical advantages over classical methods based on averaging. We present an alternative definition of one-way function using the concepts of generic case complexity and show its equivalence to the standard definition. In addition we demonstrate the convenience of the new approach by giving a short proof that extending adversaries to a larger class of partial algorithms with errors does not change the strength of the security assumption.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 02:23:53 GMT" } ]
2008-02-27T00:00:00
[ [ "Myasnikov", "Alex D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.3746
M Sabu THAMPI
Sabu M. Thampi
Information Hiding Techniques: A Tutorial Review
null
null
null
null
cs.CR cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 05:22:30 GMT" } ]
2008-02-27T00:00:00
[ [ "Thampi", "Sabu M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0802.3767
EDA Publishing Association
H. Mathias (IEF), F. Parrain (IEF), J.-P. Gilles (IEF), S. Megherbi (IEF), M. Zhang (IEF), Ph. Coste (IEF), A. Dupret (IEF)
Architecture for Integrated Mems Resonators Quality Factor Measurement
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this paper, an architecture designed for electrical measurement of the quality factor of MEMS resonators is proposed. An estimation of the measurement performance is made using PSPICE simulations taking into account the component's non-idealities. An error on the measured Q value of only several percent is achievable, at a small integration cost, for sufficiently high quality factor values (Q > 100).
[ { "version": "v1", "created": "Tue, 26 Feb 2008 08:39:41 GMT" } ]
2008-02-27T00:00:00
[ [ "Mathias", "H.", "", "IEF" ], [ "Parrain", "F.", "", "IEF" ], [ "Gilles", "J. -P.", "", "IEF" ], [ "Megherbi", "S.", "", "IEF" ], [ "Zhang", "M.", "", "IEF" ], [ "Coste", "Ph.", "", "IEF" ], [ "Dupret", "A.", "", "IEF" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0802.3768
EDA Publishing Association
N. Izadi, R. K. Jaganatharaja, J. Floris, G. Krijnen
Optimization of Cricket-inspired, Biomimetic Artificial Hair Sensors for Flow Sensing
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
High density arrays of artificial hair sensors, biomimicking the extremely sensitive mechanoreceptive filiform hairs found on cerci of crickets have been fabricated successfully. We assess the sensitivity of these artificial sensors and present a scheme for further optimization addressing the deteriorating effects of stress in the structures. We show that, by removing a portion of chromium electrodes close to the torsional beams, the upward lift at the edges of the membrane due to the stress, will decrease hence increase the sensitivity.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 08:44:02 GMT" } ]
2008-02-27T00:00:00
[ [ "Izadi", "N.", "" ], [ "Jaganatharaja", "R. K.", "" ], [ "Floris", "J.", "" ], [ "Krijnen", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0802.3784
Jerry Overton
Jerry Overton
Pattern-Oriented Analysis and Design (POAD) Theory
null
null
null
null
cs.SE cs.IT math.IT
null
Pattern-Oriented Analysis and Design (POAD) is the practice of building complex software by applying proven designs to specific problem domains. Although a great deal of research and practice has been devoted to formalizing existing design patterns and discovering new ones, there has been relatively little research into methods for combining these patterns into software applications. This is partly because the creation of complex software applications is so expensive. This paper proposes a mathematical model of POAD that may allow future research in pattern-oriented techniques to be performed using less expensive formal techniques rather than expensive, complex software development.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 13:51:39 GMT" } ]
2008-02-27T00:00:00
[ [ "Overton", "Jerry", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3789
Viviana Sica
Nick Milton
Knowledge Technologies
130 pages, ISBN 978-88-7699-099-1 (Printed edition), ISBN 978-88-7699-100-4 (Electronic edition), printed edition available at http://stores.lulu.com/polimetrica and on http://www.amazon.com/
"Publishing studies" book series, edited by Giandomenico Sica, ISSN 1973-6061 (Printed edition), ISSN 1973-6053 (Electronic edition)
null
null
cs.CY cs.AI cs.LG cs.SE
null
Several technologies are emerging that provide new ways to capture, store, present and use knowledge. This book is the first to provide a comprehensive introduction to five of the most important of these technologies: Knowledge Engineering, Knowledge Based Engineering, Knowledge Webs, Ontologies and Semantic Webs. For each of these, answers are given to a number of key questions (What is it? How does it operate? How is a system developed? What can it be used for? What tools are available? What are the main issues?). The book is aimed at students, researchers and practitioners interested in Knowledge Management, Artificial Intelligence, Design Engineering and Web Technologies. During the 1990s, Nick worked at the University of Nottingham on the application of AI techniques to knowledge management and on various knowledge acquisition projects to develop expert systems for military applications. In 1999, he joined Epistemics where he worked on numerous knowledge projects and helped establish knowledge management programmes at large organisations in the engineering, technology and legal sectors. He is author of the book "Knowledge Acquisition in Practice", which describes a step-by-step procedure for acquiring and implementing expertise. He maintains strong links with leading research organisations working on knowledge technologies, such as knowledge-based engineering, ontologies and semantic technologies.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 11:26:09 GMT" } ]
2008-02-27T00:00:00
[ [ "Milton", "Nick", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3820
Arkadiy Skopenkov
A. Skopenkov
On the Kuratowski graph planarity criterion
English version: 4 pages and 4 figures, Russian version: 10 pages and 13 figures. Exposition improved
Mat. Prosveschenie, 9 (2005), 116-128, and 11 (2007), 159--160
null
null
math.GT cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is purely expositional. The statement of the Kuratowski graph planarity criterion is simple and well-known. However, its classical proof is not easy. In this paper we present the Makarychev proof (with further simplifications by Prasolov, Telishev, Zaslavski and the author) which is possibly the simplest. In the Rusian version before the proof we present all the necessary definitions, and afterwards we state some close results on graphs and more general spaces. The paper is accessible for students familiar with the notion of a graph, and could be an interesting easy reading for mature mathematicians.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 15:17:51 GMT" }, { "version": "v2", "created": "Sun, 23 Aug 2009 12:48:28 GMT" }, { "version": "v3", "created": "Wed, 18 Jul 2012 12:10:30 GMT" } ]
2014-11-27T00:00:00
[ [ "Skopenkov", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0802.3851
Makesh Pravin John Wilson
Makesh Pravin Wilson, Krishna Narayanan and Giuseppe Caire
Joint Source Channel Coding with Side Information Using Hybrid Digital Analog Codes
22 pages, 10 figures, submitted to IEEE Transactions on Information Theory(Oct 2007)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the joint source channel coding problem of transmitting an analog source over a Gaussian channel in two cases - (i) the presence of interference known only to the transmitter and (ii) in the presence of side information known only to the receiver. We introduce hybrid digital analog forms of the Costa and Wyner-Ziv coding schemes. Our schemes are based on random coding arguments and are different from the nested lattice schemes by Kochman and Zamir that use dithered quantization. We also discuss superimposed digital and analog schemes for the above problems which show that there are infinitely many schemes for achieving the optimal distortion for these problems. This provides an extension of the schemes by Bross et al to the interference/side information case. We then discuss applications of the hybrid digital analog schemes for transmitting under a channel signal-to-noise ratio mismatch and for broadcasting a Gaussian source with bandwidth compression.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 17:26:14 GMT" } ]
2016-09-08T00:00:00
[ [ "Wilson", "Makesh Pravin", "" ], [ "Narayanan", "Krishna", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3855
Sumanth Gangasani
Sumanth Kumar Reddy Gangasani
The Discrete Hilbert Transform for Non-Periodic Signals
5 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This note investigates the size of the guard band for non-periodic discrete Hilbert transform, which has recently been proposed for data hiding and security applications. It is shown that a guard band equal to the duration of the message is sufficient for a variety of analog signals and is, therefore, likely to be adequate for discrete or digital data.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 17:41:25 GMT" } ]
2008-02-27T00:00:00
[ [ "Gangasani", "Sumanth Kumar Reddy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.3860
Matei David
Matei David and Toniann Pitassi
Separating NOF communication complexity classes RP and NP
null
null
null
null
cs.CC
null
We provide a non-explicit separation of the number-on-forehead communication complexity classes RP and NP when the number of players is up to \delta log(n) for any \delta<1. Recent lower bounds on Set-Disjointness [LS08,CA08] provide an explicit separation between these classes when the number of players is only up to o(loglog(n)).
[ { "version": "v1", "created": "Tue, 26 Feb 2008 19:58:26 GMT" } ]
2008-02-27T00:00:00
[ [ "David", "Matei", "" ], [ "Pitassi", "Toniann", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0802.3875
Andrew Adamatzky
Andy Adamatzky and Larry Bull
Are complex systems hard to evolve?
null
Volume 14, Issue 6, pages 15-20, July/August 2009
10.1002/cplx.20269
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evolutionary complexity is here measured by the number of trials/evaluations needed for evolving a logical gate in a non-linear medium. Behavioural complexity of the gates evolved is characterised in terms of cellular automata behaviour. We speculate that hierarchies of behavioural and evolutionary complexities are isomorphic up to some degree, subject to substrate specificity of evolution and the spectrum of evolution parameters.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 19:07:53 GMT" } ]
2010-11-23T00:00:00
[ [ "Adamatzky", "Andy", "" ], [ "Bull", "Larry", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0802.3881
Jorge Sousa Pinto
Jos\'e Bacelar Almeida, Jorge Sousa Pinto
Deriving Sorting Algorithms
Technical Report
null
null
DI-PURe-06.04.01
cs.DS cs.LO
null
This paper proposes new derivations of three well-known sorting algorithms, in their functional formulation. The approach we use is based on three main ingredients: first, the algorithms are derived from a simpler algorithm, i.e. the specification is already a solution to the problem (in this sense our derivations are program transformations). Secondly, a mixture of inductive and coinductive arguments are used in a uniform, algebraic style in our reasoning. Finally, the approach uses structural invariants so as to strengthen the equational reasoning with logical arguments that cannot be captured in the algebraic framework.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 19:47:57 GMT" } ]
2008-02-27T00:00:00
[ [ "Almeida", "José Bacelar", "" ], [ "Pinto", "Jorge Sousa", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3885
Amy Glen
Aldo de Luca, Amy Glen, Luca Q. Zamboni
Rich, Sturmian, and trapezoidal words
7 pages
Theoretical Computer Science 407 (2008) 569--573
10.1016/j.tcs.2008.06.009
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we explore various interconnections between rich words, Sturmian words, and trapezoidal words. Rich words, first introduced in arXiv:0801.1656 by the second and third authors together with J. Justin and S. Widmer, constitute a new class of finite and infinite words characterized by having the maximal number of palindromic factors. Every finite Sturmian word is rich, but not conversely. Trapezoidal words were first introduced by the first author in studying the behavior of the subword complexity of finite Sturmian words. Unfortunately this property does not characterize finite Sturmian words. In this note we show that the only trapezoidal palindromes are Sturmian. More generally we show that Sturmian palindromes can be characterized either in terms of their subword complexity (the trapezoidal property) or in terms of their palindromic complexity. We also obtain a similar characterization of rich palindromes in terms of a relation between palindromic complexity and subword complexity.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 19:51:32 GMT" } ]
2010-04-08T00:00:00
[ [ "de Luca", "Aldo", "" ], [ "Glen", "Amy", "" ], [ "Zamboni", "Luca Q.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0802.3888
Amy Glen
Amy Glen, Florence Lev\'e, Gw\'ena\"el Richomme
Directive words of episturmian words: equivalences and normalization
15 pages
RAIRO - Theoretical Informatics and Applications 43 (2009) 299-319
10.1051/ita:2008029
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Episturmian morphisms constitute a powerful tool to study episturmian words. Indeed, any episturmian word can be infinitely decomposed over the set of pure episturmian morphisms. Thus, an episturmian word can be defined by one of its morphic decompositions or, equivalently, by a certain directive word. Here we characterize pairs of words directing a common episturmian word. We also propose a way to uniquely define any episturmian word through a normalization of its directive words. As a consequence of these results, we characterize episturmian words having a unique directive word.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 20:15:46 GMT" } ]
2010-03-16T00:00:00
[ [ "Glen", "Amy", "" ], [ "Levé", "Florence", "" ], [ "Richomme", "Gwénaël", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0802.3895
Grenville Croll
Andrej Bregar
Complexity Metrics for Spreadsheet Models
9 pages, 5 figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 85-93 ISBN 1 902724 94 1
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several complexity metrics are described which are related to logic structure, data structure and size of spreadsheet models. They primarily concentrate on the dispersion of cell references and cell paths. Most metrics are newly defined, while some are adapted from traditional software engineering. Their purpose is the identification of cells which are liable to errors. In addition, they can be used to estimate the values of dependent process metrics, such as the development duration and effort, and especially to adjust the cell error rate in accordance with the contents of each individual cell, in order to accurately asses the reliability of a model. Finally, two conceptual constructs - the reference branching condition cell and the condition block - are discussed, aiming at improving the reliability, modifiability, auditability and comprehensibility of logical tests.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 00:37:56 GMT" } ]
2008-02-28T00:00:00
[ [ "Bregar", "Andrej", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3919
Grenville Croll
Thomas A. Grossman, Ozgur Ozluk
A Paradigm for Spreadsheet Engineering Methodologies
11 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 23-33 ISBN 1 902724 94 1
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheet engineering methodologies are diverse and sometimes contradictory. It is difficult for spreadsheet developers to identify a spreadsheet engineering methodology that is appropriate for their class of spreadsheet, with its unique combination of goals, type of problem, and available time and resources. There is a lack of well-organized, proven methodologies with known costs and benefits for well-defined spreadsheet classes. It is difficult to compare and critically evaluate methodologies. We present a paradigm for organizing and interpreting spreadsheet engineering recommendations. It systematically addresses the myriad choices made when developing a spreadsheet, and explicitly considers resource constraints and other development parameters. This paradigm provides a framework for evaluation, comparison, and selection of methodologies, and a list of essential elements for developers or codifiers of new methodologies. This paradigm identifies gaps in our knowledge that merit further research.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 21:58:26 GMT" } ]
2008-02-28T00:00:00
[ [ "Grossman", "Thomas A.", "" ], [ "Ozluk", "Ozgur", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3924
Grenville Croll
Markus Clermont
A Toolkit for Scalable Spreadsheet Visualization
12 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 95-106 ISBN 1 902724 94 1
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a toolkit for spreadsheet visualization based on logical areas, semantic classes and data modules. Logical areas, semantic classes and data modules are abstract representations of spreadsheet programs that are meant to reduce the auditing and comprehension effort, especially for large and regular spreadsheets. The toolkit is integrated as a plug-in in the Gnumeric spreadsheet system for Linux. It can process large, industry scale spreadsheet programs in reasonable time and is tightly integrated with its host spreadsheet system. Users can generate hierarchical and graph-based representations of their spreadsheets. This allows them to spot conceptual similarities in different regions of the spreadsheet, that would otherwise not fit on a screen. As it is assumed that the learning effort for effective use of such a tool should be kept low, we aim for intuitive handling of most of the tool's functions.
[ { "version": "v1", "created": "Tue, 26 Feb 2008 22:11:24 GMT" } ]
2008-02-28T00:00:00
[ [ "Clermont", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3939
Grenville Croll
Sabine Hipfl
Using Layout Information for Spreadsheet Visualization
13 pages, 3 colour figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 107-119 ISBN 1 902724 94 1
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper extends a spreadsheet visualization technique by using layout information. The original approach identifies logically or semantically related cells by relying exclusively on the content of cells for identifying semantic classes. A disadvantage of semantic classes is that users have to supply parameters which describe the possible shapes of these blocks. The correct parametrization requires a certain degree of experience and is thus not suitable for untrained users. To avoid this constraint, the approach reported in this paper uses row/column-labels as well as common format information for locating areas with common, recurring semantics. Heuristics are provided to distinguish between cell groups with intended common semantics and cell groups related in an ad-hoc manner.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 00:14:34 GMT" } ]
2008-03-10T00:00:00
[ [ "Hipfl", "Sabine", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.3940
Grenville Croll
Jocelyn Paine
Spreadsheet Structure Discovery with Logic Programming
11 pages, code fragments
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 121-133 ISBN 1 902724 94 1
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our term "structure discovery" denotes the recovery of structure, such as the grouping of cells, that was intended by a spreadsheet's author but is not explicit in the spreadsheet. We are implementing structure discovery tools in the logic-programming language Prolog for our spreadsheet analysis program Model Master, by writing grammars for spreadsheet structures. The objective is an "intelligent structure monitor" to run beside Excel, allowing users to reconfigure spreadsheets to the representational needs of the task at hand. This could revolutionise spreadsheet "best practice". We also describe a formulation of spreadsheet reverse-engineering based on "arrows".
[ { "version": "v1", "created": "Wed, 27 Feb 2008 00:25:47 GMT" } ]
2008-03-10T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0802.3950
Razvan Teodorescu
Michael Chertkov, Vladimir Y. Chernyak and Razvan Teodorescu
Belief Propagation and Loop Series on Planar Graphs
Accepted for publication in Journal of Statistical Mechanics: theory and experiment
J. Stat. Mech. (2008) P05003
10.1088/1742-5468/2008/05/P05003
null
cond-mat.stat-mech cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss a generic model of Bayesian inference with binary variables defined on edges of a planar graph. The Loop Calculus approach of [1, 2] is used to evaluate the resulting series expansion for the partition function. We show that, for planar graphs, truncating the series at single-connected loops reduces, via a map reminiscent of the Fisher transformation [3], to evaluating the partition function of the dimer matching model on an auxiliary planar graph. Thus, the truncated series can be easily re-summed, using the Pfaffian formula of Kasteleyn [4]. This allows to identify a big class of computationally tractable planar models reducible to a dimer model via the Belief Propagation (gauge) transformation. The Pfaffian representation can also be extended to the full Loop Series, in which case the expansion becomes a sum of Pfaffian contributions, each associated with dimer matchings on an extension to a subgraph of the original graph. Algorithmic consequences of the Pfaffian representation, as well as relations to quantum and non-planar models, are discussed.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 05:30:51 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2008 21:11:28 GMT" } ]
2008-05-21T00:00:00
[ [ "Chertkov", "Michael", "" ], [ "Chernyak", "Vladimir Y.", "" ], [ "Teodorescu", "Razvan", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.3974
Vladimir Lapshin A
Vladimir Lapshin
Syntax diagrams as a formalism for representation of syntactic relations of formal languages
10 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The new approach to representation of syntax of formal languages-- a formalism of syntax diagrams is offered. Syntax diagrams look a convenient language for the description of syntactic relations in the languages having nonlinear representation of texts, for example, for representation of syntax lows of the language of structural chemical formulas. The formalism of neighbourhood grammar is used to describe the set of correct syntax constructs. The neighbourhood the grammar consists of a set of families of "neighbourhoods"-- the diagrams defined for each symbol of the language's alphabet. The syntax diagram is correct if each symbol is included into this diagram together with some neighbourhood. In other words, correct diagrams are needed to be covered by elements of the neighbourhood grammar. Thus, the grammar of formal language can be represented as system of the covers defined for each correct syntax diagram.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 08:59:58 GMT" }, { "version": "v2", "created": "Thu, 28 Feb 2008 09:28:59 GMT" } ]
2008-02-28T00:00:00
[ [ "Lapshin", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.3992
Effrosyni Kokiopoulou
Effrosyni Kokiopoulou and Pascal Frossard
Polynomial Filtering for Fast Convergence in Distributed Consensus
submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2008.2006147
LTS-2008-005
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years, the problem of distributed consensus has received a lot of attention, particularly in the framework of ad hoc sensor networks. Most methods proposed in the literature address the consensus averaging problem by distributed linear iterative algorithms, with asymptotic convergence of the consensus solution. The convergence rate of such distributed algorithms typically depends on the network topology and the weights given to the edges between neighboring sensors, as described by the network matrix. In this paper, we propose to accelerate the convergence rate for given network matrices by the use of polynomial filtering algorithms. The main idea of the proposed methodology is to apply a polynomial filter on the network matrix that will shape its spectrum in order to increase the convergence rate. Such an algorithm is equivalent to periodic updates in each of the sensors by aggregating a few of its previous estimates. We formulate the computation of the coefficients of the optimal polynomial as a semi-definite program that can be efficiently and globally solved for both static and dynamic network topologies. We finally provide simulation results that demonstrate the effectiveness of the proposed solutions in accelerating the convergence of distributed consensus averaging problems.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 11:35:02 GMT" } ]
2009-11-13T00:00:00
[ [ "Kokiopoulou", "Effrosyni", "" ], [ "Frossard", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4002
Uwe Aickelin
Uwe Aickelin and Julie Greensmith
Sensing Danger: Innate Immunology for Intrusion Detection
null
Information Security Technical Report, 12(4), pp 218-227, 2007
10.1016/j.istr.2007.10.003
null
cs.NE cs.CR
null
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 12:15:08 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2008 16:59:24 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 10:45:07 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Greensmith", "Julie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0802.4010
Marcus Kaiser
Marcus Kaiser
Brain architecture: A design for natural computation
null
Philosophical Transactions of The Royal Society A, 365: 3033-3045, 2007
10.1098/rsta.2007.0007
null
q-bio.NC cs.AI cs.NE physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fifty years ago, John von Neumann compared the architecture of the brain with that of computers that he invented and which is still in use today. In those days, the organisation of computers was based on concepts of brain organisation. Here, we give an update on current results on the global organisation of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing, and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures. After all, the organization of the brain might again inspire computer architecture.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 13:00:38 GMT" } ]
2008-02-28T00:00:00
[ [ "Kaiser", "Marcus", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0802.4018
Luc Maranget
Qin Ma and Luc Maranget
Algebraic Pattern Matching in Join Calculus
null
Logical Methods in Computer Science, Volume 4, Issue 1 (March 21, 2008) lmcs:770
10.2168/LMCS-4(1:7)2008
null
cs.PL cs.DC
null
We propose an extension of the join calculus with pattern matching on algebraic data types. Our initial motivation is twofold: to provide an intuitive semantics of the interaction between concurrency and pattern matching; to define a practical compilation scheme from extended join definitions into ordinary ones plus ML pattern matching. To assess the correctness of our compilation scheme, we develop a theory of the applied join calculus, a calculus with value passing and value matching. We implement this calculus as an extension of the current JoCaml system.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 13:21:51 GMT" }, { "version": "v2", "created": "Fri, 21 Mar 2008 11:22:39 GMT" } ]
2015-07-01T00:00:00
[ [ "Ma", "Qin", "" ], [ "Maranget", "Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0802.4040
Stephan Mertens
Stefan Boettcher, Stephan Mertens
Analysis of the Karmarkar-Karp Differencing Algorithm
9 pages, 8 figures; minor changes
European Physics Journal B 65, 131-140 (2008)
10.1140/epjb/e2008-00320-9
null
cs.NA cond-mat.dis-nn cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Karmarkar-Karp differencing algorithm is the best known polynomial time heuristic for the number partitioning problem, fundamental in both theoretical computer science and statistical physics. We analyze the performance of the differencing algorithm on random instances by mapping it to a nonlinear rate equation. Our analysis reveals strong finite size effects that explain why the precise asymptotics of the differencing solution is hard to establish by simulations. The asymptotic series emerging from the rate equation satisfies all known bounds on the Karmarkar-Karp algorithm and projects a scaling $n^{-c\ln n}$, where $c=1/(2\ln2)=0.7213...$. Our calculations reveal subtle relations between the algorithm and Fibonacci-like sequences, and we establish an explicit identity to that effect.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 17:24:07 GMT" }, { "version": "v2", "created": "Fri, 3 Oct 2008 09:48:52 GMT" } ]
2008-10-03T00:00:00
[ [ "Boettcher", "Stefan", "" ], [ "Mertens", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.4057
Andrea Masini
Andrea Masini, Luca Vigan\`o, Margherita Zorzi
A Qualitative Modal Representation of Quantum Register Transformations
null
null
null
null
cs.LO
null
We introduce two modal natural deduction systems that are suitable to represent and reason about transformations of quantum registers in an abstract, qualitative, way. Quantum registers represent quantum systems, and can be viewed as the structure of quantum data for quantum operations. Our systems provide a modal framework for reasoning about operations on quantum registers (unitary transformations and measurements), in terms of possible worlds (as abstractions of quantum registers) and accessibility relations between these worlds. We give a Kripke--style semantics that formally describes quantum register transformations and prove the soundness and completeness of our systems with respect to this semantics.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 17:43:23 GMT" }, { "version": "v2", "created": "Wed, 5 Mar 2008 11:10:41 GMT" } ]
2008-03-05T00:00:00
[ [ "Masini", "Andrea", "" ], [ "Viganò", "Luca", "" ], [ "Zorzi", "Margherita", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.4079
Salah A. Aly
Salah A. Aly
Families of LDPC Codes Derived from Nonprimitive BCH Codes and Cyclotomic Cosets
Private comments are welcome
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity check (LDPC) codes are an important class of codes with many applications. Two algebraic methods for constructing regular LDPC codes are derived -- one based on nonprimitive narrow-sense BCH codes and the other directly based on cyclotomic cosets. The constructed codes have high rates and are free of cycles of length four; consequently, they can be decoded using standard iterative decoding algorithms. The exact dimension and bounds for the minimum distance and stopping distance are derived. These constructed codes can be used to derive quantum error-correcting codes.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 20:44:41 GMT" } ]
2008-02-28T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4089
Joel Ratsaby
Joel Ratsaby
An algorithmic complexity interpretation of Lin's third law of information theory
null
null
10.3390/entropy-e10010006
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Instead of static entropy we assert that the Kolmogorov complexity of a static structure such as a solid is the proper measure of disorder (or chaoticity). A static structure in a surrounding perfectly-random universe acts as an interfering entity which introduces local disruption in randomness. This is modeled by a selection rule $R$ which selects a subsequence of the random input sequence that hits the structure. Through the inequality that relates stochasticity and chaoticity of random binary sequences we maintain that Lin's notion of stability corresponds to the stability of the frequency of 1s in the selected subsequence. This explains why more complex static structures are less stable. Lin's third law is represented as the inevitable change that static structure undergo towards conforming to the universe's perfect randomness.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 12:41:08 GMT" }, { "version": "v2", "created": "Sun, 16 Mar 2008 15:50:02 GMT" } ]
2015-05-13T00:00:00
[ [ "Ratsaby", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4095
Narad Rampersad
James D. Currie, Narad Rampersad
For each $\alpha$ > 2 there is an infinite binary word with critical exponent $\alpha$
5 pages
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For each $\alpha > 2$ there is a binary word with critical exponent $\alpha$.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 21:38:31 GMT" } ]
2009-04-14T00:00:00
[ [ "Currie", "James D.", "" ], [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0802.4101
Rahul Jain
Rahul Jain and Shengyu Zhang
New bounds on classical and quantum one-way communication complexity
ver 1, 19 pages
null
null
null
cs.IT cs.DC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide new bounds on classical and quantum distributional communication complexity in the two-party, one-way model of communication. In the classical model, our bound extends the well known upper bound of Kremer, Nisan and Ron to include non-product distributions. We show that for a boolean function f:X x Y -> {0,1} and a non-product distribution mu on X x Y and epsilon in (0,1/2) constant: D_{epsilon}^{1, mu}(f)= O((I(X:Y)+1) vc(f)), where D_{epsilon}^{1, mu}(f) represents the one-way distributional communication complexity of f with error at most epsilon under mu; vc(f) represents the Vapnik-Chervonenkis dimension of f and I(X:Y) represents the mutual information, under mu, between the random inputs of the two parties. For a non-boolean function f:X x Y ->[k], we show a similar upper bound on D_{epsilon}^{1, mu}(f) in terms of k, I(X:Y) and the pseudo-dimension of f' = f/k. In the quantum one-way model we provide a lower bound on the distributional communication complexity, under product distributions, of a function f, in terms the well studied complexity measure of f referred to as the rectangle bound or the corruption bound of f . We show for a non-boolean total function f : X x Y -> Z and a product distribution mu on XxY, Q_{epsilon^3/8}^{1, mu}(f) = Omega(rec_ epsilon^{1, mu}(f)), where Q_{epsilon^3/8}^{1, mu}(f) represents the quantum one-way distributional communication complexity of f with error at most epsilon^3/8 under mu and rec_ epsilon^{1, mu}(f) represents the one-way rectangle bound of f with error at most epsilon under mu . Similarly for a non-boolean partial function f:XxY -> Z U {*} and a product distribution mu on X x Y, we show, Q_{epsilon^6/(2 x 15^4)}^{1, mu}(f) = Omega(rec_ epsilon^{1, mu}(f)).
[ { "version": "v1", "created": "Wed, 27 Feb 2008 22:28:52 GMT" } ]
2008-02-29T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Zhang", "Shengyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4112
Hanna E. Makaruk
Hanna E. Makaruk, Robert Owczarek
Hubs in Languages: Scale Free Networks of Synonyms
null
null
null
LA-UR-08-0084
physics.soc-ph cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural languages are described in this paper in terms of networks of synonyms: a word is identified with a node, and synonyms are connected by undirected links. Our statistical analysis of the network of synonyms in Polish language showed it is scale-free; similar to what is known for English. The statistical properties of the networks are also similar. Thus, the statistical aspects of the networks are good candidates for culture independent elements of human language. We hypothesize that optimization for robustness and efficiency is responsible for this universality. Despite the statistical similarity, there is no one-to-one mapping between networks of these two languages. Although many hubs in Polish are translated into similarly highly connected hubs in English, there are also hubs specific to one of these languages only: a single word in one language is equivalent to many different and disconnected words in the other, in accordance with the Whorf hypothesis about language relativity. Identifying language-specific hubs is vitally important for automatic translation, and for understanding contextual, culturally related messages that are frequently missed or twisted in a naive, literary translation.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 00:15:54 GMT" } ]
2008-02-29T00:00:00
[ [ "Makaruk", "Hanna E.", "" ], [ "Owczarek", "Robert", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0802.4126
Alexei Botchkarev
Peter Andru, Alexei Botchkarev
Hospital Case Cost Estimates Modelling - Algorithm Comparison
null
null
null
null
cs.CE cs.DB
http://creativecommons.org/licenses/publicdomain/
Ontario (Canada) Health System stakeholders support the idea and necessity of the integrated source of data that would include both clinical (e.g. diagnosis, intervention, length of stay, case mix group) and financial (e.g. cost per weighted case, cost per diem) characteristics of the Ontario healthcare system activities at the patient-specific level. At present, the actual patient-level case costs in the explicit form are not available in the financial databases for all hospitals. The goal of this research effort is to develop financial models that will assign each clinical case in the patient-specific data warehouse a dollar value, representing the cost incurred by the Ontario health care facility which treated the patient. Five mathematical models have been developed and verified using real dataset. All models can be classified into two groups based on their underlying method: 1. Models based on using relative intensity weights of the cases, and 2. Models based on using cost per diem.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 04:56:48 GMT" } ]
2008-02-29T00:00:00
[ [ "Andru", "Peter", "" ], [ "Botchkarev", "Alexei", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0802.4130
Zhi Quan
Zhi Quan, Shuguang Cui, Ali H. Sayed, and H. Vincent Poor
Wideband Spectrum Sensing in Cognitive Radio Networks
null
Proceedings of the 2008 IEEE International Conference on Communications, Beijing, May 19-23, 2008
10.1109/ICC.2008.177
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is an essential enabling functionality for cognitive radio networks to detect spectrum holes and opportunistically use the under-utilized frequency bands without causing harmful interference to legacy networks. This paper introduces a novel wideband spectrum sensing technique, called multiband joint detection, which jointly detects the signal energy levels over multiple frequency bands rather than consider one band at a time. The proposed strategy is efficient in improving the dynamic spectrum utilization and reducing interference to the primary users. The spectrum sensing problem is formulated as a class of optimization problems in interference limited cognitive radio networks. By exploiting the hidden convexity in the seemingly non-convex problem formulations, optimal solutions for multiband joint detection are obtained under practical conditions. Simulation results show that the proposed spectrum sensing schemes can considerably improve the system performance. This paper establishes important principles for the design of wideband spectrum sensing algorithms in cognitive radio networks.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 06:49:09 GMT" } ]
2016-11-18T00:00:00
[ [ "Quan", "Zhi", "" ], [ "Cui", "Shuguang", "" ], [ "Sayed", "Ali H.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4131
Sudhakar Sahoo
Birendra Kumar Nayak (1), Sudhakar Sahoo (2)
Language of Boolean functions its Grammar and Machine
5 pages, two tables, presented in Orissa Mathematical Society Conference, January, 2008
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper an algorithm is designed which generates in-equivalent Boolean functions of any number of variables from the four Boolean functions of single variable. The grammar for such set of Boolean function is provided. The Turing Machine that accepts such set is constructed.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 06:21:49 GMT" } ]
2008-02-29T00:00:00
[ [ "Nayak", "Birendra Kumar", "" ], [ "Sahoo", "Sudhakar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.4191
Christine Plumejeaud
Christine Plumejeaud (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), Jean-Marc Vincent (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique de Grenoble), Claude Grasland (GC, RIATE), J\'er\^ome Gensel (LSR - IMAG), H\'el\`ene Mathian (GC), Serge Guelton (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique de Grenoble), Jo\"el Boulier (GC)
HyperSmooth : calcul et visualisation de cartes de potentiel interactives
null
Dans SAGEO 2007, Rencontres internationales G\'eomatique et territoire. CdRom. - SAGEO 2007, Rencontres internationales G\'eomatique et territoire, France (2007)
null
null
stat.AP cs.HC
null
The HyperCarte research group wishes to offer a new cartographic tool for spatial analysis of social data, using the potential smoothing method. The purpose of this method is to view the spreading of phenomena's in a continuous way, at a macroscopic scale, basing on data sampled on administrative areas. We aim to offer an interactive tool, accessible via the Web, but guarantying the confidentiality of data. The major difficulty is induced by the high complexity of the calculus, working on a great amount of data. We present our solution to such a technical challenge, and our perspectives of enhancements.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 12:36:41 GMT" } ]
2008-02-29T00:00:00
[ [ "Plumejeaud", "Christine", "", "INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble" ], [ "Vincent", "Jean-Marc", "", "INRIA Rhône-Alpes / LIG\n laboratoire d'Informatique de Grenoble" ], [ "Grasland", "Claude", "", "GC, RIATE" ], [ "Gensel", "Jérôme", "", "LSR - IMAG" ], [ "Mathian", "Hélène", "", "GC" ], [ "Guelton", "Serge", "", "INRIA\n Rhône-Alpes / LIG laboratoire d'Informatique de Grenoble" ], [ "Boulier", "Joël", "", "GC" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0802.4198
Andrij Rovenchak
Solomija Buk, J\'an Ma\v{c}utek, Andrij Rovenchak
Some properties of the Ukrainian writing system
17 pages
Glottometrics 16, 63-79 (2008)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the grapheme-phoneme relation in Ukrainian and some properties of the Ukrainian version of the Cyrillic alphabet.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 12:58:49 GMT" } ]
2008-03-18T00:00:00
[ [ "Buk", "Solomija", "" ], [ "Mačutek", "Ján", "" ], [ "Rovenchak", "Andrij", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0802.4215
Marcel Ausloos
M. Ausloos
Equilibrium (Zipf) and Dynamic (Grasseberg-Procaccia) method based analyses of human texts. A comparison of natural (english) and artificial (esperanto) languages
22 pages, 87 references, 5 tables, 8 figures
Physica A 387 (25) 6411-6420 (2008)
10.1016/j.physa.2008.07.016
null
physics.soc-ph cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A comparison of two english texts from Lewis Carroll, one (Alice in wonderland), also translated into esperanto, the other (Through a looking glass) are discussed in order to observe whether natural and artificial languages significantly differ from each other. One dimensional time series like signals are constructed using only word frequencies (FTS) or word lengths (LTS). The data is studied through (i) a Zipf method for sorting out correlations in the FTS and (ii) a Grassberger-Procaccia (GP) technique based method for finding correlations in LTS. Features are compared : different power laws are observed with characteristic exponents for the ranking properties, and the {\it phase space attractor dimensionality}. The Zipf exponent can take values much less than unity ($ca.$ 0.50 or 0.30) depending on how a sentence is defined. This non-universality is conjectured to be a measure of the author $style$. Moreover the attractor dimension $r$ is a simple function of the so called phase space dimension $n$, i.e., $r = n^{\lambda}$, with $\lambda = 0.79$. Such an exponent should also conjecture to be a measure of the author $creativity$. However, even though there are quantitative differences between the original english text and its esperanto translation, the qualitative differences are very minutes, indicating in this case a translation relatively well respecting, along our analysis lines, the content of the author writing.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 11:49:48 GMT" } ]
2012-09-04T00:00:00
[ [ "Ausloos", "M.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0802.4233
Rajiv Soundararajan Mr.
Rajiv Soundararajan and Sriram Vishwanath
Adaptive Sum Power Iterative Waterfilling for MIMO Cognitive Radio Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the sum capacity of the Gaussian Multiple Input Multiple Output (MIMO) Cognitive Radio Channel (MCC) is expressed as a convex problem with finite number of linear constraints, allowing for polynomial time interior point techniques to find the solution. In addition, a specialized class of sum power iterative waterfilling algorithms is determined that exploits the inherent structure of the sum capacity problem. These algorithms not only determine the maximizing sum capacity value, but also the transmit policies that achieve this optimum. The paper concludes by providing numerical results which demonstrate that the algorithm takes very few iterations to converge to the optimum.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 16:37:07 GMT" } ]
2008-02-29T00:00:00
[ [ "Soundararajan", "Rajiv", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4237
Ranko Lazic
Ranko Lazic
Safety alternating automata on data words
23 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data word is a sequence of pairs of a letter from a finite alphabet and an element from an infinite set, where the latter can only be compared for equality. Safety one-way alternating automata with one register on infinite data words are considered, their nonemptiness is shown EXPSPACE-complete, and their inclusion decidable but not primitive recursive. The same complexity bounds are obtained for satisfiability and refinement, respectively, for the safety fragment of linear temporal logic with freeze quantification. Dropping the safety restriction, adding past temporal operators, or adding one more register, each causes undecidability.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 16:54:31 GMT" }, { "version": "v2", "created": "Tue, 31 Mar 2009 18:52:17 GMT" }, { "version": "v3", "created": "Fri, 9 Apr 2010 15:20:30 GMT" } ]
2010-04-12T00:00:00
[ [ "Lazic", "Ranko", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0802.4244
Dimitris Papamichail
Christos Tryfonas, Dimitris Papamichail, Andrew Mehler, Steven Skiena
Call Admission Control Algorithm for pre-stored VBR video streams
12 pages, 9 figures, includes appendix
null
null
null
cs.NI cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
We examine the problem of accepting a new request for a pre-stored VBR video stream that has been smoothed using any of the smoothing algorithms found in the literature. The output of these algorithms is a piecewise constant-rate schedule for a Variable Bit-Rate (VBR) stream. The schedule guarantees that the decoder buffer does not overflow or underflow. The problem addressed in this paper is the determination of the minimal time displacement of each new requested VBR stream so that it can be accomodated by the network and/or the video server without overbooking the committed traffic. We prove that this call-admission control problem for multiple requested VBR streams is NP-complete and inapproximable within a constant factor, by reducing it from the VERTEX COLOR problem. We also present a deterministic morphology-sensitive algorithm that calculates the minimal time displacement of a VBR stream request. The complexity of the proposed algorithm make it suitable for real-time determination of the time displacement parameter during the call admission phase.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 17:45:03 GMT" } ]
2008-02-29T00:00:00
[ [ "Tryfonas", "Christos", "" ], [ "Papamichail", "Dimitris", "" ], [ "Mehler", "Andrew", "" ], [ "Skiena", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0802.4270
Salah A. Aly
Salah A. Aly
Propagation Rules of Subsystem Codes
Private comments are welcome
null
null
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate propagation rules of subsystem code constructions by extending, shortening and combining given subsystem codes. Given an $[[n,k,r,d]]_q$ subsystem code, we drive new subsystem codes with parameters $[[n+1,k,r,\geq d]]_q$, $[[n-1,k+1,r,\geq d-1]]_q$, $[[n,k-1,r+1,d]]_q$. The interested readers shall consult our companion papers for upper and lower bounds on subsystem codes parameters, and introduction, trading dimensions, families, and references on subsystem codes [1][2][3] and references therein.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 20:59:54 GMT" } ]
2008-11-11T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0802.4282
Man-On Pun
Dong Zheng, Man-On Pun, Weiyan Ge, Junshan Zhang and H. Vincent Poor
Distributed Opportunistic Scheduling For Ad-Hoc Communications Under Noisy Channel Estimation
Proceedings of the 2008 IEEE International Conference on Communications, Beijing, May 19-23, 2008
null
10.1109/ICC.2008.698
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed opportunistic scheduling is studied for wireless ad-hoc networks, where many links contend for one channel using random access. In such networks, distributed opportunistic scheduling (DOS) involves a process of joint channel probing and distributed scheduling. It has been shown that under perfect channel estimation, the optimal DOS for maximizing the network throughput is a pure threshold policy. In this paper, this formalism is generalized to explore DOS under noisy channel estimation, where the transmission rate needs to be backed off from the estimated rate to reduce the outage. It is shown that the optimal scheduling policy remains to be threshold-based, and that the rate threshold turns out to be a function of the variance of the estimation error and be a functional of the backoff rate function. Since the optimal backoff rate is intractable, a suboptimal linear backoff scheme that backs off the estimated signal-to-noise ratio (SNR) and hence the rate is proposed. The corresponding optimal backoff ratio and rate threshold can be obtained via an iterative algorithm. Finally, simulation results are provided to illustrate the tradeoff caused by increasing training time to improve channel estimation at the cost of probing efficiency.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 20:36:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Zheng", "Dong", "" ], [ "Pun", "Man-On", "" ], [ "Ge", "Weiyan", "" ], [ "Zhang", "Junshan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]