id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0802.3107 | EDA Publishing Association | S. Tzanova, L. Kamenova, Y. Avenas, Ch. Schaeffer (CIME) | Evaluation of the thermal and hydraulic performances of a very thin
sintered copper flat heat pipe for 3D microsystem packages | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/EDA-Publishing) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007) | null | null | cs.OH | null | The reported research work presents numerical studies validated by
experimental results of a flat micro heat pipe with sintered copper wick
structure. The objectives of this project are to produce and demonstrate the
efficiency of the passive cooling technology (heat pipe) integrated in a very
thin electronic substrate that is a part of a multifunctional 3-D electronic
package. The enhanced technology is dedicated to the thermal management of high
dissipative microsystems having heat densities of more than 10W/cm2. Future
applications are envisaged in the avionics sector. In this research 2D
numerical hydraulic model has been developed to investigate the performance of
a very thin flat micro heat pipe with sintered copper wick structure, using
water as a refrigerant. Finite difference method has been used to develop the
model. The model has been used to determine the mass transfer and fluid flow in
order to evaluate the limits of heat transport capacity as functions of the
dimensions of the wick and the vapour space and for various copper spheres
radii. The results are presented in terms of liquid and vapour pressures within
the heat pipe. The simulated results are validated by experiments and proved
that the method can be further used to predict thermal performance of the heat
pipe and to optimise its design.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2008 13:46:56 GMT"
}
] | 2008-02-22T00:00:00 | [
[
"Tzanova",
"S.",
"",
"CIME"
],
[
"Kamenova",
"L.",
"",
"CIME"
],
[
"Avenas",
"Y.",
"",
"CIME"
],
[
"Schaeffer",
"Ch.",
"",
"CIME"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0802.3110 | Christophe Vignat | J.-F. Bercher and C. Vignat | An entropic view of Pickands' theorem | 4 pages, accepted to ISIT08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that distributions arising in Renyi-Tsallis maximum entropy
setting are related to the Generalized Pareto Distributions (GPD) that are
widely used for modeling the tails of distributions. The relevance of such
modelization, as well as the ubiquity of GPD in practical situations follows
from Balkema-De Haan-Pickands theorem on the distribution of excesses (over a
high threshold). We provide an entropic view of this result, by showing that
the distribution of a suitably normalized excess variable converges to the
solution of a maximum Tsallis entropy, which is the GPD. This highlights the
relevance of the so-called Tsallis distributions in many applications as well
as some relevance to the use of the corresponding entropy.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2008 13:52:25 GMT"
},
{
"version": "v2",
"created": "Tue, 6 May 2008 14:14:48 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Bercher",
"J. -F.",
""
],
[
"Vignat",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3137 | Wolfgang Faber | Wolfgang Faber, Gerald Pfeifer, Nicola Leone, Tina Dell'Armi, Giuseppe
Ielpa | Design and Implementation of Aggregate Functions in the DLV System | 34 pages, 7 figures. This article has been accepted for publication
in Theory and Practice of Logic Programming, Cambridge University Press | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Disjunctive Logic Programming (DLP) is a very expressive formalism: it allows
for expressing every property of finite structures that is decidable in the
complexity class SigmaP2 (= NP^NP). Despite this high expressiveness, there are
some simple properties, often arising in real-world applications, which cannot
be encoded in a simple and natural manner. Especially properties that require
the use of arithmetic operators (like sum, times, or count) on a set or
multiset of elements, which satisfy some conditions, cannot be naturally
expressed in classic DLP.
To overcome this deficiency, we extend DLP by aggregate functions in a
conservative way. In particular, we avoid the introduction of constructs with
disputed semantics, by requiring aggregates to be stratified. We formally
define the semantics of the extended language (called DLP^A), and illustrate
how it can be profitably used for representing knowledge. Furthermore, we
analyze the computational complexity of DLP^A, showing that the addition of
aggregates does not bring a higher cost in that respect. Finally, we provide an
implementation of DLP^A in DLV -- a state-of-the-art DLP system -- and report
on experiments which confirm the usefulness of the proposed extension also for
the efficiency of computation.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2008 15:44:09 GMT"
}
] | 2008-02-22T00:00:00 | [
[
"Faber",
"Wolfgang",
""
],
[
"Pfeifer",
"Gerald",
""
],
[
"Leone",
"Nicola",
""
],
[
"Dell'Armi",
"Tina",
""
],
[
"Ielpa",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3235 | Arturo Berrones | Arturo Berrones | Characterization of the convergence of stationary Fokker-Planck learning | null | null | 10.1016/j.neucom.2008.12.042 | null | cs.NE cond-mat.dis-nn cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The convergence properties of the stationary Fokker-Planck algorithm for the
estimation of the asymptotic density of stochastic search processes is studied.
Theoretical and empirical arguments for the characterization of convergence of
the estimation in the case of separable and nonseparable nonlinear optimization
problems are given. Some implications of the convergence of stationary
Fokker-Planck learning for the inference of parameters in artificial neural
network models are outlined.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2008 23:41:09 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 19:37:50 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jul 2009 17:24:41 GMT"
}
] | 2009-07-02T00:00:00 | [
[
"Berrones",
"Arturo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0802.3253 | Il Han Kim | Il Han Kim and David J. Love | On the Capacity and Design of Limited Feedback Multiuser MIMO Uplinks | 25 pages, submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory of multiple-input multiple-output (MIMO) technology has been
well-developed to increase fading channel capacity over single-input
single-output (SISO) systems. This capacity gain can often be leveraged by
utilizing channel state information at the transmitter and the receiver. Users
make use of this channel state information for transmit signal adaptation. In
this correspondence, we derive the capacity region for the MIMO multiple access
channel (MIMO MAC) when partial channel state information is available at the
transmitters, where we assume a synchronous MIMO multiuser uplink. The partial
channel state information feedback has a cardinality constraint and is fed back
from the basestation to the users using a limited rate feedback channel. Using
this feedback information, we propose a finite codebook design method to
maximize sum-rate. In this correspondence, the codebook is a set of transmit
signal covariance matrices. We also derive the capacity region and codebook
design methods in the case that the covariance matrix is rank-one (i.e.,
beamforming). This is motivated by the fact that beamforming is optimal in
certain conditions. The simulation results show that when the number of
feedback bits increases, the capacity also increases. Even with a small number
of feedback bits, the performance of the proposed system is close to an optimal
solution with the full feedback.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 04:56:57 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Kim",
"Il Han",
""
],
[
"Love",
"David J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3254 | Cyril Allauzen | Cyril Allauzen and Mehryar Mohri and Ashish Rastogi | General Algorithms for Testing the Ambiguity of Finite Automata | null | null | null | null | cs.CC | null | This paper presents efficient algorithms for testing the finite, polynomial,
and exponential ambiguity of finite automata with $\epsilon$-transitions. It
gives an algorithm for testing the exponential ambiguity of an automaton $A$ in
time $O(|A|_E^2)$, and finite or polynomial ambiguity in time $O(|A|_E^3)$.
These complexities significantly improve over the previous best complexities
given for the same problem. Furthermore, the algorithms presented are simple
and are based on a general algorithm for the composition or intersection of
automata. We also give an algorithm to determine the degree of polynomial
ambiguity of a finite automaton $A$ that is polynomially ambiguous in time
$O(|A|_E^3)$. Finally, we present an application of our algorithms to an
approximate computation of the entropy of a probabilistic automaton.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 05:20:08 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Allauzen",
"Cyril",
""
],
[
"Mohri",
"Mehryar",
""
],
[
"Rastogi",
"Ashish",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.3267 | Amitabh Trehan | Tom Hayes and Navin Rustagi and Jared Saia and Amitabh Trehan | The Forgiving Tree: A Self-Healing Distributed Data Structure | Submitted to Principles of Distributed Computing (PODC) 2008 | PODC '08: Proceedings of the twenty-seventh ACM symposium on
Principles of distributed computing. 2008, pages 203--212 | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of self-healing in peer-to-peer networks that are
under repeated attack by an omniscient adversary. We assume that the following
process continues for up to n rounds where n is the total number of nodes
initially in the network: the adversary deletes an arbitrary node from the
network, then the network responds by quickly adding a small number of new
edges.
We present a distributed data structure that ensures two key properties.
First, the diameter of the network is never more than $O(\log \Delta)$ times
its original diameter, where $\Delta$ is the maximum degree of the network
initially. We note that for many peer-to-peer systems, $\Delta$ is
polylogarithmic, so the diameter increase would be a O(log log n)
multiplicative factor. Second, the degree of any node never increases by more
than 3 over its original degree. Our data structure is fully distributed, has
O(1) latency per round and requires each node to send and receive O(1) messages
per round. The data structure requires an initial setup phase that has latency
equal to the diameter of the original network, and requires, with high
probability, each node v to send O(log n) messages along every edge incident to
v. Our approach is orthogonal and complementary to traditional topology-based
approaches to defending against attack.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 08:22:33 GMT"
}
] | 2009-02-15T00:00:00 | [
[
"Hayes",
"Tom",
""
],
[
"Rustagi",
"Navin",
""
],
[
"Saia",
"Jared",
""
],
[
"Trehan",
"Amitabh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.3283 | Petter Holme | Petter Holme, Josh Karlin, Stephanie Forrest | An integrated model of traffic, geography and economy in the Internet | null | ACM SIGCOMM Computer Communication Review 38, 7-15 (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modeling Internet growth is important both for understanding the current
network and to predict and improve its future. To date, Internet models have
typically attempted to explain a subset of the following characteristics:
network structure, traffic flow, geography, and economy. In this paper we
present a discrete, agent-based model, that integrates all of them. We show
that the model generates networks with topologies, dynamics, and (more
speculatively) spatial distributions that are similar to the Internet.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 20:53:12 GMT"
}
] | 2008-06-25T00:00:00 | [
[
"Holme",
"Petter",
""
],
[
"Karlin",
"Josh",
""
],
[
"Forrest",
"Stephanie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.3284 | Hadrien M\'elot | V\'eronique Bruy\`ere, and Hadrien M\'elot | Tur\'an Graphs, Stability Number, and Fibonacci Index | 11 pages, 3 figures | null | 10.1007/978-3-540-85097-7_12 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Fibonacci index of a graph is the number of its stable sets. This
parameter is widely studied and has applications in chemical graph theory. In
this paper, we establish tight upper bounds for the Fibonacci index in terms of
the stability number and the order of general graphs and connected graphs.
Tur\'an graphs frequently appear in extremal graph theory. We show that Tur\'an
graphs and a connected variant of them are also extremal for these particular
problems.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 11:22:50 GMT"
}
] | 2024-03-11T00:00:00 | [
[
"Bruyère",
"Véronique",
""
],
[
"Mélot",
"Hadrien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.3285 | Radu Arsinte | Radu Arsinte, Ciprian Ilioaei | Some Aspects of Testing Process for Transport Streams in Digital Video
Broadcasting | 5 pages, 3 figures, 3 tables | Acta Technica Napocensis, Electronics and Telecommunications,
nr.1/2004 pp.59-74 | null | null | cs.CV cs.MM | null | This paper presents some aspects related to the DVB (Digital Video
Broadcasting) investigation. The basic aspects of DVB are presented, with an
emphasis on DVB-T version of standard. The main purpose of this research is to
analyze the way that the transmission of the transport streams is realized in
case of the Terrestrial Digital Video Broadcasting (DVB-T). To accomplish this,
first, Digital Video Broadcasting standard is presented, and then the main
aspects of DVB testing and analysis of the transport streams are investigated.
The paper presents also the results obtained using two programs designed for
DVB analysis: Mosalina and TSA.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 10:48:44 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Arsinte",
"Radu",
""
],
[
"Ilioaei",
"Ciprian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0802.3288 | Radu Arsinte | Radu Arsinte | Implementing a Test Strategy for an Advanced Video Acquisition and
Processing Architecture | 5 pages, 17 figures | Acta Technica Napocensis, Electronics and Telecommunications,
nr.2/2005 pp.15-20 | null | null | cs.CV cs.MM | null | This paper presents some aspects related to test process of an advanced video
system used in remote IP surveillance. The system is based on a Pentium
compatible architecture using the industrial standard PC104+. First the overall
architecture of the system is presented, involving both hardware or software
aspects. The acquisition board which is developed in a special, nonstandard
architecture, is also briefly presented. The main purpose of this research was
to set a coherent set of procedures in order to test all the aspects of the
video acquisition board. To accomplish this, it was necessary to set-up a
procedure in two steps: stand alone video board test (functional test) and an
in-system test procedure verifying the compatibility with both OS: Linux and
Windows. The paper presents also the results obtained using this procedure.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 10:54:59 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Arsinte",
"Radu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0802.3293 | Haluk Bingol | Burak Cetin, Haluk Bingol | Use of Rapid Probabilistic Argumentation for Ranking on Large Complex
Networks | 11 pages, 10 figures | null | null | null | cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a family of novel ranking algorithms called ERank which run in
linear/near linear time and build on explicitly modeling a network as uncertain
evidence. The model uses Probabilistic Argumentation Systems (PAS) which are a
combination of probability theory and propositional logic, and also a special
case of Dempster-Shafer Theory of Evidence. ERank rapidly generates approximate
results for the NP-complete problem involved enabling the use of the technique
in large networks. We use a previously introduced PAS model for citation
networks generalizing it for all networks. We propose a statistical test to be
used for comparing the performances of different ranking algorithms based on a
clustering validity test. Our experimentation using this test on a real-world
network shows ERank to have the best performance in comparison to well-known
algorithms including PageRank, closeness, and betweenness.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 11:49:16 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Cetin",
"Burak",
""
],
[
"Bingol",
"Haluk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0802.3300 | Pierfrancesco La Mura | Pierfrancesco La Mura | Projective Expected Utility | 7 pages, to appear in the Proceedings of Quantum Interaction 2008 | J. of Math. Psychology, 53:5 (2009) | 10.1016/j.jmp.2009.02.001 | null | quant-ph cs.GT econ.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by several classic decision-theoretic paradoxes, and by analogies
with the paradoxes which in physics motivated the development of quantum
mechanics, we introduce a projective generalization of expected utility along
the lines of the quantum-mechanical generalization of probability theory. The
resulting decision theory accommodates the dominant paradoxes, while retaining
significant simplicity and tractability. In particular, every finite game
within this larger class of preferences still has an equilibrium.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 12:00:20 GMT"
}
] | 2024-01-18T00:00:00 | [
[
"La Mura",
"Pierfrancesco",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Economics",
"code": "econ.TH",
"description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.",
"span": "(Theoretical Economics)"
}
] |
0802.3328 | Manas Patra | Manas K Patra and Yan Zhang | An Algebraic Characterization of Security of Cryptographic Protocols | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several of the basic cryptographic constructs have associated algebraic
structures. Formal models proposed by Dolev and Yao to study the
(unconditional) security of public key protocols form a group. The security of
some types of protocols can be neatly formulated in this algebraic setting. We
investigate classes of two-party protocols. We then consider extension of the
formal algebraic framework to private-key protocols. We also discuss concrete
realization of the formal models. In this case, we propose a definition in
terms of pseudo-free groups.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 14:40:27 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Patra",
"Manas K",
""
],
[
"Zhang",
"Yan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.3355 | Francisco R Villatoro | Francisco R. Villatoro, Antonio J. Nebro, and Jose E. Fern\'andez | PVM-Distributed Implementation of the Radiance Code | 11 pages | null | null | null | cs.DC cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Parallel Virtual Machine (PVM) tool has been used for a distributed
implementation of Greg Ward's Radiance code. In order to generate exactly the
same primary rays with both the sequential and the parallel codes, the quincunx
sampling technique used in Radiance for the reduction of the number of primary
rays by interpolation, must be left untouched in the parallel implementation.
The octree of local ambient values used in Radiance for the indirect
illumination has been shared among all the processors. Both static and dynamic
image partitioning techniques which replicate the octree of the complete scene
in all the processors and have load-balancing, have been developed for one
frame rendering. Speedups larger than 7.5 have been achieved in a network of 8
workstations. For animation sequences, a new dynamic partitioning distribution
technique with superlinear speedups has also been developed.
| [
{
"version": "v1",
"created": "Fri, 22 Feb 2008 17:32:17 GMT"
}
] | 2008-02-25T00:00:00 | [
[
"Villatoro",
"Francisco R.",
""
],
[
"Nebro",
"Antonio J.",
""
],
[
"Fernández",
"Jose E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0802.3401 | Ninoslav Marina | Ninoslav Marina, Bixio Rimoldi | On the Structure of the Capacity Region of Asynchronous Memoryless
Multiple-Access Channels | 21 pages, 5 figures and 1 table. Submitted to IEEE Transactions on
Information Theory | null | 10.1109/TIT.2012.2191469 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The asynchronous capacity region of memoryless multiple-access channels is
the union of certain polytopes. It is well-known that vertices of such
polytopes may be approached via a technique called successive decoding. It is
also known that an extension of successive decoding applies to the dominant
face of such polytopes. The extension consists of forming groups of users in
such a way that users within a group are decoded jointly whereas groups are
decoded successively. This paper goes one step further. It is shown that
successive decoding extends to every face of the above mentioned polytopes. The
group composition as well as the decoding order for all rates on a face of
interest are obtained from a label assigned to that face. From the label one
can extract a number of structural properties, such as the dimension of the
corresponding face and whether or not two faces intersect. Expressions for the
the number of faces of any given dimension are also derived from the labels.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 01:30:37 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Marina",
"Ninoslav",
""
],
[
"Rimoldi",
"Bixio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3414 | Scott Kominers | Zachary Abel, Hugo A. Akitaya, Scott Duke Kominers, Matias Korman,
Frederick Stock | A Universal In-Place Reconfiguration Algorithm for Sliding Cube-Shaped
Robots in a Quadratic Number of Moves | 23 pages, 11 figures | null | null | null | cs.CG cs.MA cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the modular robot reconfiguration problem, we are given $n$ cube-shaped
modules (or robots) as well as two configurations, i.e., placements of the $n$
modules so that their union is face-connected. The goal is to find a sequence
of moves that reconfigures the modules from one configuration to the other
using "sliding moves," in which a module slides over the face or edge of a
neighboring module, maintaining connectivity of the configuration at all times.
For many years it has been known that certain module configurations in this
model require at least $\Omega(n^2)$ moves to reconfigure between them. In this
paper, we introduce the first universal reconfiguration algorithm -- i.e., we
show that any $n$-module configuration can reconfigure itself into any
specified $n$-module configuration using just sliding moves. Our algorithm
achieves reconfiguration in $O(n^2)$ moves, making it asymptotically tight. We
also present a variation that reconfigures in-place, it ensures that throughout
the reconfiguration process, all modules, except for one, will be contained in
the union of the bounding boxes of the start and end configuration.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 00:54:13 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Jun 2008 08:21:02 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Dec 2011 17:52:30 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Mar 2024 15:57:07 GMT"
}
] | 2024-03-15T00:00:00 | [
[
"Abel",
"Zachary",
""
],
[
"Akitaya",
"Hugo A.",
""
],
[
"Kominers",
"Scott Duke",
""
],
[
"Korman",
"Matias",
""
],
[
"Stock",
"Frederick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0802.3419 | N. Prasanth Anthapadmanabhan | N. Prasanth Anthapadmanabhan and Alexander Barg | Randomized Frameproof Codes: Fingerprinting Plus Validation Minus
Tracing | 5 pages, To appear in the Proceedings of Conference on Information
Sciences and Systems (CISS), Princeton, NJ, Mar 2008 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose randomized frameproof codes for content protection, which arise by
studying a variation of the Boneh-Shaw fingerprinting problem. In the modified
system, whenever a user tries to access his fingerprinted copy, the fingerprint
is submitted to a validation algorithm to verify that it is indeed permissible
before the content can be executed. We show an improvement in the achievable
rates compared to deterministic frameproof codes and traditional fingerprinting
codes.
For coalitions of an arbitrary fixed size, we construct randomized frameproof
codes which have an $O(n^2)$ complexity validation algorithm and probability of
error $\exp(-\Omega(n)),$ where $n$ denotes the length of the fingerprints.
Finally, we present a connection between linear frameproof codes and minimal
vectors for size-2 coalitions.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 03:16:19 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Anthapadmanabhan",
"N. Prasanth",
""
],
[
"Barg",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3429 | Yi Sun | Yi Sun | Quasi-Large Sparse-Sequence CDMA: Approach to Single-User Bound by
Linearly-Complex LAS Detectors | CISS 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have proposed a quasi-large random-sequence (QLRS) CDMA where K users
access a point through a common channel with spectral spreading factor N. Each
bit is extended by a temporal spreading factor B and hopped on a BN-chip random
sequence that is spread in time and frequency. Each user multiplexes and
transmits B extended bits and the total channel load is alpha = K/N bits/s/Hz.
The linearly-complex LAS detectors detect the transmitted bits. We have
obtained that as B tends to infinity, if alpha < 1/2 - 1/(4ln2), each
transmitted bit achieves the single-bit bound in BER in high SNR regime as if
there was no interference bit. In simulation, when bit number BK >= 500, each
bit can approach the single-bit bound for alpha as high as 1 bit/s/Hz. In this
paper, we further propose the quasi-large sparse-sequence (QLSS) CDMA by
replacing the dense sequence in QLRS-CDMA with sparse sequence. Simulation
results show that when the nonzero chips are as few as 16, the BER is already
near that of QLRS-CDMA while the complexity is significantly reduced due to
sequence sparsity.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 06:45:28 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Sun",
"Yi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3430 | Xiangyong Zeng | Xiangyong Zeng, Nian Li, and Lei Hu | A Class of Nonbinary Codes and Their Weight Distribution | 18 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, for an even integer $n\geq 4$ and any positive integer $k$
with ${\rm gcd}(n/2,k)={\rm gcd}(n/2-k,2k)=d$ being odd, a class of $p$-ary
codes $\mathcal{C}^k$ is defined and their weight distribution is completely
determined, where $p$ is an odd prime. As an application, a class of nonbinary
sequence families is constructed from these codes, and the correlation
distribution is also determined.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 08:14:21 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Zeng",
"Xiangyong",
""
],
[
"Li",
"Nian",
""
],
[
"Hu",
"Lei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3437 | Yuri Borissov Ph.D. | Yuri L. Borissov | On Cusick-Cheon's Conjecture About Balanced Boolean Functions in the
Cosets of the Binary Reed-Muller Code | 3 pages, Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is proved an amplification of Cusick-Cheon's conjecture on balanced
Boolean functions in the cosets of the binary Reed-Muller code RM(k,m) of order
k and length 2^m, in the cases where k = 1 or k >= (m-1)/2.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 11:08:06 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 09:17:12 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Borissov",
"Yuri L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3441 | Javier D. Garcia-Lasheras | Javier D. Garcia-Lasheras | Efficient implementation of GALS systems over commercial synchronous
FPGAs: a new approach | English version of the paper presented in the Spanish Workshop on
Reconfigurable Computing and Applications, Zaragoza (2007) | "Implementacion eficiente de sistemas GALS sobre FPGAs", Jornadas
de Computacion Reconfigurable y Aplicaciones (JCRA'07), Zaragoza (2007) | null | null | cs.AR | null | The new vision presented is aimed to overcome the logic overhead issues that
previous works exhibit when applying GALS techniques to programmable logic
devices. The proposed new view relies in a 2-phase, bundled data parity based
protocol for data transfer and clock generation tasks. The ability of the
introduced methodology for smart real-time delay selection allows the
implementation of a variety of new methodologies for electromagnetic
interference mitigation and device environment changes adaptation.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 13:11:13 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Garcia-Lasheras",
"Javier D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0802.3444 | Bruno Blanchet | Bruno Blanchet | Automatic Verification of Correspondences for Security Protocols | 95 pages | null | null | null | cs.CR cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new technique for verifying correspondences in security
protocols. In particular, correspondences can be used to formalize
authentication. Our technique is fully automatic, it can handle an unbounded
number of sessions of the protocol, and it is efficient in practice. It
significantly extends a previous technique for the verification of secrecy. The
protocol is represented in an extension of the pi calculus with fairly
arbitrary cryptographic primitives. This protocol representation includes the
specification of the correspondence to be verified, but no other annotation.
This representation is then translated into an abstract representation by Horn
clauses, which is used to prove the desired correspondence. Our technique has
been proved correct and implemented. We have tested it on various protocols
from the literature. The experimental results show that these protocols can be
verified by our technique in less than 1 s.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 14:03:56 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Blanchet",
"Bruno",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3448 | Haim Kaplan | Edith Cohen and Haim Kaplan | Sketch-Based Estimation of Subpopulation-Weight | null | null | null | null | cs.DB cs.DS cs.NI cs.PF | null | Summaries of massive data sets support approximate query processing over the
original data. A basic aggregate over a set of records is the weight of
subpopulations specified as a predicate over records' attributes. Bottom-k
sketches are a powerful summarization format of weighted items that includes
priority sampling and the classic weighted sampling without replacement. They
can be computed efficiently for many representations of the data including
distributed databases and data streams.
We derive novel unbiased estimators and efficient confidence bounds for
subpopulation weight. Our estimators and bounds are tailored by distinguishing
between applications (such as data streams) where the total weight of the
sketched set can be computed by the summarization algorithm without a
significant use of additional resources, and applications (such as sketches of
network neighborhoods) where this is not the case.
Our rigorous derivations are based on clever applications of the
Horvitz-Thompson estimator, and are complemented by efficient computational
methods. We demonstrate their benefit on a wide range of Pareto distributions.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 15:25:04 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Cohen",
"Edith",
""
],
[
"Kaplan",
"Haim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0802.3457 | Grenville Croll | Raymond R. Panko | Spreadsheet Errors: What We Know. What We Think We Can Do | 9 Pages, 2 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 7-17
ISBN:1 86166 158 4 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fifteen years of research studies have concluded unanimously that spreadsheet
errors are both common and non-trivial. Now we must seek ways to reduce
spreadsheet errors. Several approaches have been suggested, some of which are
promising and others, while appealing because they are easy to do, are not
likely to be effective. To date, only one technique, cell-by-cell code
inspection, has been demonstrated to be effective. We need to conduct further
research to determine the degree to which other techniques can reduce
spreadsheet errors.
| [
{
"version": "v1",
"created": "Sat, 23 Feb 2008 19:48:15 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Panko",
"Raymond R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3473 | Maciej Dziemianczuk | M. Dziemianczuk | On Cobweb Posets and Discrete F-Boxes Tilings | 24 pages, 15 figures, Affiliated to The Internet Gian-Carlo Polish
Seminar http://ii.uwb.edu.pl/akk/sem/sem_rota.htm | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | F-boxes defined in [6] as hyper-boxes in N^{\infty} discrete space were
applied here for the geometric description of the cobweb posetes Hasse diagrams
tilings. The F-boxes edges sizes are taken to be values of terms of natural
numbers' valued sequence F. The problem of partitions of hyper-boxes
represented by graphs into blocks of special form is considered and these are
to be called F-tilings. The proof of such tilings' existence for certain
sub-family of admissible sequences F is delivered. The family of F-tilings
which we consider here includes among others F = Natural numbers, Fibonacci
numbers, Gaussian integers with their corresponding F-nomial (Binomial,
Fibonomial, Gaussian) coefficients. Extension of this tiling problem onto the
general case multi F-nomial coefficients is here proposed. Reformulation of the
present cobweb tiling problem into a clique problem of a graph specially
invented for that purpose - is proposed here too. To this end we illustrate the
area of our reconnaissance by means of the Venn type map of various cobweb
sequences families.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 00:54:09 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Apr 2009 11:05:55 GMT"
}
] | 2009-04-02T00:00:00 | [
[
"Dziemianczuk",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.3475 | Grenville Croll | Patrick Kemmis, Giles Thomas | Spreadsheet Development Methodologies using Resolver: Moving
spreadsheets into the 21st Century | 12 pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 93-104
ISBN 978-905617-58-6 | null | null | cs.SE cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We intend to demonstrate the innate problems with existing spreadsheet
products and to show how to tackle these issues using a new type of spreadsheet
program called Resolver. It addresses the issues head-on and thereby moves the
1980's "VisiCalc paradigm" on to match the advances in computer languages and
user requirements. Continuous display of the spreadsheet grid and the
equivalent computer program, together with the ability to interact and add code
through either interface, provides a number of new methodologies for
spreadsheet development.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 01:16:52 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Kemmis",
"Patrick",
""
],
[
"Thomas",
"Giles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3476 | Grenville Croll | Jocelyn Paine | Fun Boy Three Were Wrong: it is what you do, not the way that you do it | 12 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 105-116
ISBN 978-905617-58-6 | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I revisit some classic publications on modularity, to show what problems its
pioneers wanted to solve. These problems occur with spreadsheets too: to
recognise them may help us avoid them.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 01:34:36 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Paine",
"Jocelyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3477 | Grenville Croll | Simon R. Thorne, David Ball, Z. Lawson | Concerning the Feasibility of Example-driven Modelling Techniques | 14 Pages, 8 Figures, 1 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 117-130
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report on a series of experiments concerning the feasibility of example
driven modelling. The main aim was to establish experimentally within an
academic environment: the relationship between error and task complexity using
a) Traditional spreadsheet modelling; b) example driven techniques. We report
on the experimental design, sampling, research methods and the tasks set for
both control and treatment groups. Analysis of the completed tasks allows
comparison of several different variables. The experimental results compare the
performance indicators for the treatment and control groups by comparing
accuracy, experience, training, confidence measures, perceived difficulty and
perceived completeness. The various results are thoroughly tested for
statistical significance using: the Chi squared test, Fisher's exact test for
significance, Cochran's Q test and McNemar's test on difficulty.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 01:49:31 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Thorne",
"Simon R.",
""
],
[
"Ball",
"David",
""
],
[
"Lawson",
"Z.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3478 | Grenville Croll | Jocelyn Paine | It Ain't What You View, But The Way That You View It: documenting
spreadsheets with Excelsior, semantic wikis, and literate programming | 12 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 131-142
ISBN 978-905617-58-6 | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I describe preliminary experiments in documenting Excelsior versions of
spreadsheets using semantic wikis and literate programming. The objective is to
create well-structured and comprehensive documentation, easy to use by those
unfamiliar with the spreadsheets documented. I discuss why so much
documentation is hard to use, and briefly explain semantic wikis and literate
programming; although parts of the paper are Excelsior-specific, these sections
may be of more general interest.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 01:57:01 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Paine",
"Jocelyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3479 | Grenville Croll | Brian Bishop, Kevin McDaid | An Empirical Study of End-User Behaviour in Spreadsheet Error Detection
& Correction | 12 Pages, 3 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 165-176
ISBN 978-905617-58-6 | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Very little is known about the process by which end-user developers detect
and correct spreadsheet errors. Any research pertaining to the development of
spreadsheet testing methodologies or auditing tools would benefit from
information on how end-users perform the debugging process in practice.
Thirteen industry-based professionals and thirty-four accounting & finance
students took part in a current ongoing experiment designed to record and
analyse end-user behaviour in spreadsheet error detection and correction.
Professionals significantly outperformed students in correcting certain error
types. Time-based cell activity analysis showed that a strong correlation
exists between the percentage of cells inspected and the number of errors
corrected. The cell activity data was gathered through a purpose written VBA
Excel plug-in that records the time and detail of all cell selection and cell
change actions of individuals.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 02:03:16 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Bishop",
"Brian",
""
],
[
"McDaid",
"Kevin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0802.3480 | Grenville Croll | Kath McGuire | Why Task-Based Training is Superior to Traditional Training Methods | 6 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 191-196
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The risks of spreadsheet use do not just come from the misuse of formulae. As
such, training needs to go beyond this technical aspect of spreadsheet use and
look at the spreadsheet in its full business context. While standard training
is by and large unable to do this, task-based training is perfectly suited to a
contextual approach to training.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 02:10:03 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"McGuire",
"Kath",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3481 | Grenville Croll | David Chadwick | Establishing A Minimum Generic Skill Set For Risk Management Teaching In
A Spreadsheet Training Course | 12 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 197-208
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Past research shows that spreadsheet models are prone to such a high
frequency of errors and data security implications that the risk management of
spreadsheet development and spreadsheet use is of great importance to both
industry and academia. The underlying rationale for this paper is that
spreadsheet training courses should specifically address risk management in the
development process both from a generic and a domain-specific viewpoint. This
research specifically focuses on one of these namely those generic issues of
risk management that should be present in a training course that attempts to
meet good-practice within industry. A pilot questionnaire was constructed
showing a possible minimum set of risk management issues and sent to academics
and industry practitioners for feedback. The findings from this pilot survey
will be used to refine the questionnaire for sending to a larger body of
possible respondents. It is expected these findings will form the basis of a
risk management teaching approach to be trialled in a number of selected
ongoing spreadsheet training courses.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 02:15:49 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Chadwick",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3483 | Grenville Croll | Derek Flood, Kevin Mc Daid | Voice-controlled Debugging of Spreadsheets | 10 Pages, 4 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 155-164
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Developments in Mobile Computing are putting pressure on the software
industry to research new modes of interaction that do not rely on the
traditional keyboard and mouse combination. Computer users suffering from
Repetitive Strain Injury also seek an alternative to keyboard and mouse devices
to reduce suffering in wrist and finger joints. Voice-control is an alternative
approach to spreadsheet development and debugging that has been researched and
used successfully in other domains. While voice-control technology for
spreadsheets is available its effectiveness has not been investigated. This
study is the first to compare the performance of a set of expert spreadsheet
developers that debugged a spreadsheet using voice-control technology and
another set that debugged the same spreadsheet using keyboard and mouse. The
study showed that voice, despite its advantages, proved to be slower and less
accurate. However, it also revealed ways in which the technology might be
improved to redress this imbalance.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 02:21:35 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Flood",
"Derek",
""
],
[
"Daid",
"Kevin Mc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3490 | Ying Jun Zhang Ph.D. | Jing Ma and Ying Jun Zhang | On capacity of wireless ad hoc networks with MIMO MMSE receivers | null | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Widely adopted at home, business places, and hot spots, wireless ad-hoc
networks are expected to provide broadband services parallel to their wired
counterparts in near future. To address this need, MIMO techniques, which are
capable of offering several-fold increase in capacity, hold significant
promise. Most previous work on capacity analysis of ad-hoc networks is based on
an implicit assumption that each node has only one antenna. Core to the
analysis therein is the characterization of a geometric area, referred to as
the exclusion region, which quantizes the amount of spatial resource occupied
by a link. When multiple antennas are deployed at each node, however, multiple
links can transmit in the vicinity of each other simultaneously, as
interference can now be suppressed by spatial signal processing. As such, a
link no longer exclusively occupies a geometric area, making the concept of
"exclusion region" not applicable any more. In this paper, we investigate
link-layer throughput capacity of MIMO ad-hoc networks. In contrast to previous
work, the amount of spatial resource occupied by each link is characterized by
the actual interference it imposes on other links. To calculate the link-layer
capacity, we first derive the probability distribution of post-detection SINR
at a receiver. The result is then used to calculate the number of active links
and the corresponding data rates that can be sustained within an area. Our
analysis will serve as a guideline for the design of medium access protocols
for MIMO ad-hoc networks. To the best of knowledge, this paper is the first
attempt to characterize the capacity of MIMO ad-hoc networks by considering the
actual PHY-layer signal and interference model.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 05:00:21 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Ma",
"Jing",
""
],
[
"Zhang",
"Ying Jun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3492 | Marko A. Rodriguez | Marko A. Rodriguez | The RDF Virtual Machine | keywords: Resource Description Framework, Virtual Machines,
Distributed Computing, Semantic Web | Knowledge-Based Systems, 24(6), 890-903, August 2011 | 10.1016/j.knosys.2011.04.004 | LA-UR-08-03925 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Resource Description Framework (RDF) is a semantic network data model
that is used to create machine-understandable descriptions of the world and is
the basis of the Semantic Web. This article discusses the application of RDF to
the representation of computer software and virtual computing machines. The
Semantic Web is posited as not only a web of data, but also as a web of
programs and processes.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 05:28:52 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Mar 2010 19:06:42 GMT"
}
] | 2011-05-26T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0802.3495 | V. Sreekanth Annapureddy | V. Sreekanth Annapureddy and Venugopal V. Veeravalli | Gaussian Interference Networks: Sum Capacity in the Low Interference
Regime and New Outer Bounds on the Capacity Region | Submitted to IEEE Transactions on Information Theory, February 2008.
Revised Nov 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Establishing the capacity region of a Gaussian interference network is an
open problem in information theory. Recent progress on this problem has led to
the characterization of the capacity region of a general two user Gaussian
interference channel within one bit. In this paper, we develop new, improved
outer bounds on the capacity region. Using these bounds, we show that treating
interference as noise achieves the sum capacity of the two user Gaussian
interference channel in a low interference regime, where the interference
parameters are below certain thresholds. We then generalize our techniques and
results to Gaussian interference networks with more than two users. In
particular, we demonstrate that the total interference threshold, below which
treating interference as noise achieves the sum capacity, increases with the
number of users.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 07:26:01 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Feb 2009 19:42:34 GMT"
}
] | 2009-02-15T00:00:00 | [
[
"Annapureddy",
"V. Sreekanth",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3513 | Dariusz Dereniowski | Dariusz Dereniowski | The Complexity of Node Blocking for Dags | 7 pages, 3 figures | Journal of Combinatorial Theory, Series A 118 (2011) 248-256 | 10.1016/j.jcta.2010.03.011 | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following modification of annihilation game called node
blocking. Given a directed graph, each vertex can be occupied by at most one
token. There are two types of tokens, each player can move his type of tokens.
The players alternate their moves and the current player $i$ selects one token
of type $i$ and moves the token along a directed edge to an unoccupied vertex.
If a player cannot make a move then he loses. We consider the problem of
determining the complexity of the game: given an arbitrary configuration of
tokens in a directed acyclic graph, does the current player has a winning
strategy? We prove that the problem is PSPACE-complete.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 15:29:57 GMT"
}
] | 2021-03-05T00:00:00 | [
[
"Dereniowski",
"Dariusz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.3522 | Pierre-Francois Marteau | Pierre-Fran\c{c}ois Marteau (VALORIA) | Time Warp Edit Distance | Pattern Recognition - Clustering - Algorithms - Similarity Measures | null | null | VALORIA.2008.1V5 | cs.IR | null | This technical report details a family of time warp distances on the set of
discrete time series. This family is constructed as an editing distance whose
elementary operations apply on linear segments. A specific parameter allows
controlling the stiffness of the elastic matching. It is well suited for the
processing of event data for which each data sample is associated with a
timestamp, not necessarily obtained according to a constant sampling rate. Some
properties verified by these distances are proposed and proved in this report.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 17:18:50 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Mar 2008 08:32:36 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Mar 2008 15:13:42 GMT"
},
{
"version": "v4",
"created": "Fri, 4 Apr 2008 13:07:21 GMT"
},
{
"version": "v5",
"created": "Mon, 23 Jun 2008 04:45:59 GMT"
}
] | 2008-06-23T00:00:00 | [
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0802.3528 | Fionn Murtagh | Fionn Murtagh and Jean-Luc Starck | Wavelet and Curvelet Moments for Image Classification: Application to
Aggregate Mixture Grading | Submitted to Pattern Recognition Letters | Pattern Recognition Letters, 29, 1557-1564, 2008 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show the potential for classifying images of mixtures of aggregate, based
themselves on varying, albeit well-defined, sizes and shapes, in order to
provide a far more effective approach compared to the classification of
individual sizes and shapes. While a dominant (additive, stationary) Gaussian
noise component in image data will ensure that wavelet coefficients are of
Gaussian distribution, long tailed distributions (symptomatic, for example, of
extreme values) may well hold in practice for wavelet coefficients. Energy (2nd
order moment) has often been used for image characterization for image
content-based retrieval, and higher order moments may be important also, not
least for capturing long tailed distributional behavior. In this work, we
assess 2nd, 3rd and 4th order moments of multiresolution transform -- wavelet
and curvelet transform -- coefficients as features. As analysis methodology,
taking account of image types, multiresolution transforms, and moments of
coefficients in the scales or bands, we use correspondence analysis as well as
k-nearest neighbors supervised classification.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 18:25:51 GMT"
}
] | 2010-11-16T00:00:00 | [
[
"Murtagh",
"Fionn",
""
],
[
"Starck",
"Jean-Luc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0802.3535 | Salman Avestimehr | Amir Salman Avestimehr, Suhas N. Diggavi and David N C. Tse | Approximate Capacity of Gaussian Relay Networks | This paper is submited to 2008 IEEE International Symposium on
Information Theory (ISIT 2008) -In the revised format the approximation gap
(\kappa) is sharpened | null | 10.1109/ISIT.2008.4595031 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an achievable rate for general Gaussian relay networks. We show
that the achievable rate is within a constant number of bits from the
information-theoretic cut-set upper bound on the capacity of these networks.
This constant depends on the topology of the network, but not the values of the
channel gains. Therefore, we uniformly characterize the capacity of Gaussian
relay networks within a constant number of bits, for all channel parameters.
| [
{
"version": "v1",
"created": "Sun, 24 Feb 2008 19:47:56 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jun 2008 23:01:38 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Avestimehr",
"Amir Salman",
""
],
[
"Diggavi",
"Suhas N.",
""
],
[
"Tse",
"David N C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3554 | Reginald Smith | Reginald D. Smith | Data Traffic Dynamics and Saturation on a Single Link | 10 pages, 5 figures | International Journal of Computer, Information, and Systems
Science, and Engineering, vol 3, no. 1, 11-16 2009 | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dynamics of User Datagram Protocol (UDP) traffic over Ethernet between
two computers are analyzed using nonlinear dynamics which shows that there are
two clear regimes in the data flow: free flow and saturated. The two most
important variables affecting this are the packet size and packet flow rate.
However, this transition is due to a transcritical bifurcation rather than
phase transition in models such as in vehicle traffic or theorized large-scale
computer network congestion. It is hoped this model will help lay the
groundwork for further research on the dynamics of networks, especially
computer networks.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 03:23:33 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Mar 2008 01:11:26 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Feb 2009 13:16:50 GMT"
}
] | 2011-12-08T00:00:00 | [
[
"Smith",
"Reginald D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0802.3563 | Usman Khan | Usman A. Khan, Soummya Kar, and Jose' M. F. Moura | Distributed Sensor Localization in Random Environments using Minimal
Number of Anchor Nodes | 30 pages, submitted to IEEE Transactions on Signal Processing | U. A. Khan, S. Kar, and J. M. F. Moura, "Distributed sensor
localization in random environments using minimal number of anchor nodes,"
IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 2000-2016, May
2009 | 10.1109/TSP.2009.2014812 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper develops DILOC, a \emph{distributive}, \emph{iterative} algorithm
that locates M sensors in $\mathbb{R}^m, m\geq 1$, with respect to a minimal
number of m+1 anchors with known locations. The sensors exchange data with
their neighbors only; no centralized data processing or communication occurs,
nor is there centralized knowledge about the sensors' locations. DILOC uses the
barycentric coordinates of a sensor with respect to its neighbors that are
computed using the Cayley-Menger determinants. These are the determinants of
matrices of inter-sensor distances. We show convergence of DILOC by associating
with it an absorbing Markov chain whose absorbing states are the anchors. We
introduce a stochastic approximation version extending DILOC to random
environments when the knowledge about the intercommunications among sensors and
the inter-sensor distances are noisy, and the communication links among
neighbors fail at random times. We show a.s. convergence of the modified DILOC
and characterize the error between the final estimates and the true values of
the sensors' locations. Numerical studies illustrate DILOC under a variety of
deterministic and random operating conditions.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 07:29:19 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Aug 2008 03:07:12 GMT"
}
] | 2013-12-19T00:00:00 | [
[
"Khan",
"Usman A.",
""
],
[
"Kar",
"Soummya",
""
],
[
"Moura",
"Jose' M. F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3569 | Ying Jun Zhang Ph.D. | Ying Jun Zhang, Soung Chang Liew, and Darui Chen | Delay Analysis for Wireless Local Area Networks with Multipacket
Reception under Finite Load | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To date, most analysis of WLANs has been focused on their operation under
saturation condition. This work is an attempt to understand the fundamental
performance of WLANs under unsaturated condition. In particular, we are
interested in the delay performance when collisions of packets are resolved by
an exponential backoff mechanism. Using a multiple-vacation queueing model, we
derive an explicit expression for packet delay distribution, from which
necessary conditions for finite mean delay and delay jitter are established. It
is found that under some circumstances, mean delay and delay jitter may
approach infinity even when the traffic load is way below the saturation
throughput. Saturation throughput is therefore not a sound measure of WLAN
capacity when the underlying applications are delay sensitive. To bridge the
gap, we define safe-bounded-mean-delay (SBMD) throughput and
safe-bounded-delay-jitter (SBDJ) throughput that reflect the actual network
capacity users can enjoy when they require bounded mean delay and delay jitter,
respectively. The analytical model in this paper is general enough to cover
both single-packet reception (SPR) and multi-packet reception (MPR) WLANs, as
well as carrier-sensing and non-carrier-sensing networks. We show that the SBMD
and SBDJ throughputs scale super-linearly with the MPR capability of a network.
Together with our earlier work that proves super-linear throughput scaling
under saturation condition, our results here complete the demonstration of MPR
as a powerful capacity-enhancement technique for both delay-sensitive and
delay-tolerant applications.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 08:44:10 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Zhang",
"Ying Jun",
""
],
[
"Liew",
"Soung Chang",
""
],
[
"Chen",
"Darui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.3570 | {\O}yvind Ryan | {\O}yvind Ryan, Merouane Debbah | Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the
Unit Circle | 28 pages. To appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analytical methods for finding moments of random Vandermonde matrices with
entries on the unit circle are developed. Vandermonde Matrices play an
important role in signal processing and wireless applications such as direction
of arrival estimation, precoding, and sparse sampling theory, just to name a
few. Within this framework, we extend classical freeness results on random
matrices with independent, identically distributed (i.i.d.) entries and show
that Vandermonde structured matrices can be treated in the same vein with
different tools. We focus on various types of matrices, such as Vandermonde
matrices with and without uniform phase distributions, as well as generalized
Vandermonde matrices. In each case, we provide explicit expressions of the
moments of the associated Gram matrix, as well as more advanced models
involving the Vandermonde matrix. Comparisons with classical i.i.d. random
matrix theory are provided, and deconvolution results are discussed. We review
some applications of the results to the fields of signal processing and
wireless communications.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 09:06:13 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2008 18:50:27 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Mar 2009 15:50:42 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Ryan",
"Øyvind",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3572 | {\O}yvind Ryan | {\O}yvind Ryan, Merouane Debbah | Random Vandermonde Matrices-Part II: Applications | This paper has been withdrawn | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the authors, since it has been merged with
Part I (ID 0802.3570)
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 09:09:39 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2008 18:57:34 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Ryan",
"Øyvind",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3582 | Erich Schikuta | Erich Schikuta | Neural Networks and Database Systems | 19 pages, Festschrift Informationssysteme, in honor of G. Vinek | pp. 133-152, 2007, publisher Austrian Computer Society | null | null | cs.DB cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object-oriented database systems proved very valuable at handling and
administrating complex objects. In the following guidelines for embedding
neural networks into such systems are presented. It is our goal to treat
networks as normal data in the database system. From the logical point of view,
a neural network is a complex data value and can be stored as a normal data
object. It is generally accepted that rule-based reasoning will play an
important role in future database applications. The knowledge base consists of
facts and rules, which are both stored and handled by the underlying database
system. Neural networks can be seen as representation of intensional knowledge
of intelligent database systems. So they are part of a rule based knowledge
pool and can be used like conventional rules. The user has a unified view about
his knowledge base regardless of the origin of the unique rules.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 09:57:31 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Schikuta",
"Erich",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.3597 | Vyacheslav Yukalov | V.I. Yukalov and D. Sornette | Processing Information in Quantum Decision Theory | Review article, 49 pages, Latex file | Entropy 11 (2009) 1073-1120 | 10.3390/e11041073 | null | physics.soc-ph cs.AI quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A survey is given summarizing the state of the art of describing information
processing in Quantum Decision Theory, which has been recently advanced as a
novel variant of decision making, based on the mathematical theory of separable
Hilbert spaces. This mathematical structure captures the effect of
superposition of composite prospects, including many incorporated intended
actions. The theory characterizes entangled decision making, non-commutativity
of subsequent decisions, and intention interference. The self-consistent
procedure of decision making, in the frame of the quantum decision theory,
takes into account both the available objective information as well as
subjective contextual effects. This quantum approach avoids any paradox typical
of classical decision theory. Conditional maximization of entropy, equivalent
to the minimization of an information functional, makes it possible to connect
the quantum and classical decision theories, showing that the latter is the
limit of the former under vanishing interference terms.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 11:08:19 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2010 10:10:38 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Mar 2010 12:43:43 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Yukalov",
"V. I.",
""
],
[
"Sornette",
"D.",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0802.3611 | Khoa Nguyen | Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen | Power Allocation for Fading Channels with Peak-to-Average Power
Constraints | 26 pages, 6 figures, submitted to IEEE Transaction on Wireless
Communication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Power allocation with peak-to-average power ratio constraints is investigated
for transmission over Nakagami-m fading channels with arbitrary input
distributions. In the case of delay-limited block-fading channels, we find the
solution to the minimum outage power allocation scheme with peak-to-average
power constraints and arbitrary input distributions, and show that the
signal-to-noise ratio exponent for any finite peak-to-average power ratio is
the same as that of the peak-power limited problem, resulting in an error
floor. In the case of the ergodic fully-interleaved channel, we find the power
allocation rule that yields the maximal information rate for an arbitrary input
distribution and show that capacities with peak-to-average power ratio
constraints, even for small ratios, are very close to capacities without
peak-power restrictions.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 12:26:47 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Nguyen",
"Khoa D.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Rasmussen",
"Lars K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3617 | Mark van der Zwaag | Jan A. Bergstra, Sanne Nolst Trenit\'e, Mark B. van der Zwaag | Towards a formalization of budgets | null | null | null | PRG0712 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We go into the need for, and the requirements on, a formal theory of budgets.
We present a simple algebraic theory of rational budgets, i.e., budgets in
which amounts of money are specified by functions on the rational numbers. This
theory is based on the tuplix calculus. We go into the importance of using
totalized models for the rational numbers. We present a case study on the
educational budget of a university department offering master programs.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 13:11:32 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Trenité",
"Sanne Nolst",
""
],
[
"van der Zwaag",
"Mark B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3626 | Sudhakar Sahoo | Birendra Kumar Nayak, Sudhakar Sahoo, Sushant Kumar Rout | Color Graphs: An Efficient Model For Two-Dimensional Cellular Automata
Linear Rules | 14 pages, presented at Orissa Mathematical Society Conference, 2008 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two-dimensional nine neighbor hood rectangular Cellular Automata rules can be
modeled using many different techniques like Rule matrices, State Transition
Diagrams, Boolean functions, Algebraic Normal Form etc. In this paper, a new
model is introduced using color graphs to model all the 512 linear rules. The
graph theoretic properties therefore studied in this paper simplifies the
analysis of all linear rules in comparison with other ways of its study.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 13:54:50 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Nayak",
"Birendra Kumar",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Rout",
"Sushant Kumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3627 | Guilhem Semerjian | Andrea Montanari, Federico Ricci-Tersenghi, Guilhem Semerjian | Clusters of solutions and replica symmetry breaking in random
k-satisfiability | 30 pages, 14 figures, typos corrected, discussion of appendix C
expanded with a new figure | J. Stat. Mech. P04004 (2008) | 10.1088/1742-5468/2008/04/P04004 | null | cond-mat.dis-nn cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the set of solutions of random k-satisfiability formulae through the
cavity method. It is known that, for an interval of the clause-to-variables
ratio, this decomposes into an exponential number of pure states (clusters). We
refine substantially this picture by: (i) determining the precise location of
the clustering transition; (ii) uncovering a second `condensation' phase
transition in the structure of the solution set for k larger or equal than 4.
These results both follow from computing the large deviation rate of the
internal entropy of pure states. From a technical point of view our main
contributions are a simplified version of the cavity formalism for special
values of the Parisi replica symmetry breaking parameter m (in particular for
m=1 via a correspondence with the tree reconstruction problem) and new large-k
expansions.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 14:17:25 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Feb 2008 10:25:44 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Ricci-Tersenghi",
"Federico",
""
],
[
"Semerjian",
"Guilhem",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.3628 | Pierre Thierry | Pierre Thierry and Simon E. B. Thierry | Dynamic data models: an application of MOP-based persistence in Common
Lisp | Presented at the 4th European Lisp Workshop, co-located with ECOOP
2007. No proceedings | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The data model of an application, the nature and format of data stored across
executions, is typically a very rigid part of its early specification, even
when prototyping, and changing it after code that relies on it was written can
prove quite expensive and error-prone.
Code and data in a running Lisp image can be dynamically modified. A
MOP-based persistence library can bring this dynamicity to the data model. This
enables to extend the easy prototyping way of development to the storage of
data and helps avoiding interruptions of service. This article presents the
conditions to do this portably and transparently.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 14:20:18 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Thierry",
"Pierre",
""
],
[
"Thierry",
"Simon E. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3634 | Bernard Kujawski | B. Kujawski, G.J. Rodgers, and Bosiljka Tadi\'c | Local Information Based Algorithms for Packet Transport in Complex
Networks | null | In V.N. Alexnandrov et l., editor, ICCS 2006, volume \textbf{3993}
of Lecture Notes in Computer Science, pages 1024-1031, Berlin, 2006, Springer | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce four algorithms for packet transport in complex networks. These
algorithms use deterministic rules which depend, in different ways, on the
degree of the node, the number of packets posted down each edge, the mean
delivery time of packets sent down each edge to each destination and the time
since an edge last transmitted a packet. On scale-free networks all our
algorithms are considerably more efficient and can handle a larger load than
the random walk algorithm. We consider in detail various attributes of our
algorithms, for instance we show that an algorithm that bases its decisions on
the mean delivery time jams unless it incorporates information about the degree
of the destination node.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 15:23:31 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Kujawski",
"B.",
""
],
[
"Rodgers",
"G. J.",
""
],
[
"Tadić",
"Bosiljka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.3665 | Luciano da Fontoura Costa | Bruno Augusto Nassif Traven\c{c}olo and Luciano da Fontoura Costa | Outward Accessibility in Urban Street Networks: Characterization and
Improvements | 4 pages, 2 figures. The following article has been submitted to
Applied Physics Letters. After it is published, it will be found at
http://apl.aip.org | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dynamics of transportation through towns and cities is strongly affected
by the topology of the connections and routes. The current work describes an
approach combining complex networks and self-avoiding random walk dynamics in
order to quantify in objective and accurate manner, along a range of spatial
scales, the accessibility of places in towns and cities. The transition
probabilities are estimated for several lengths of the walks and used to
calculate the outward accessibility of each node. The potential of the
methodology is illustrated with respect to the characterization and
improvements of the accessibility of the town of Sao Carlos.
| [
{
"version": "v1",
"created": "Mon, 25 Feb 2008 18:35:44 GMT"
}
] | 2008-02-26T00:00:00 | [
[
"Travençolo",
"Bruno Augusto Nassif",
""
],
[
"Costa",
"Luciano da Fontoura",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0802.3703 | Ewa Krot-Sieniawska | Ewa Krot-Sieniawska | On incidence algebras description of cobweb posets | 9 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The explicite formulas for Mobius function and some other important elements
of the incidence algebra of an arbitrary cobweb poset are delivered. For that
to do one uses Kwasniewski's construction of his cobweb posets . The digraph
representation of these cobweb posets constitutes a newly discovered class of
orderable DAG's named here down KoDAGs with a kind of universality now being
investigated. Namely cobweb posets' and thus KoDAGs's defining di-bicliques are
links of any complete relations' chains.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 13:12:43 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Krot-Sieniawska",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.3718 | Joaquin Garcia-Alfaro | Joaquin Garcia-Alfaro, Michael A. Jaeger, Gero Muehl, and Joan Borrell | Preventing Coordinated Attacks Via Distributed Alert Exchange | 19 pages, proposal reviewed | IFIP International Conference on Intelligence in Communication
Systems (INTELLCOMM 2005) (17/10/2005) 87-98 | null | null | cs.CR cs.NI | null | Attacks on information systems followed by intrusions may cause large revenue
losses. The prevention of both is not always possible by just considering
information from isolated sources of the network. A global view of the whole
system is necessary to recognize and react to the different actions of such an
attack. The design and deployment of a decentralized system targeted at
detecting as well as reacting to information system attacks might benefit from
the loose coupling realized by publish/subscribe middleware. In this paper, we
present the advantages and convenience in using this communication paradigm for
a general decentralized attack prevention framework. Furthermore, we present
the design and implementation of our approach based on existing
publish/subscribe middleware and evaluate our approach for GNU/Linux systems.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 11:45:43 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Garcia-Alfaro",
"Joaquin",
""
],
[
"Jaeger",
"Michael A.",
""
],
[
"Muehl",
"Gero",
""
],
[
"Borrell",
"Joan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0802.3734 | Alex Myasnikov | Alex D. Myasnikov | Generic case complexity and One-Way functions | null | null | null | null | cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to introduce ideas and methodology of the generic
case complexity to cryptography community. This relatively new approach allows
one to analyze the behavior of an algorithm on ''most'' inputs in a simple and
intuitive fashion which has some practical advantages over classical methods
based on averaging. We present an alternative definition of one-way function
using the concepts of generic case complexity and show its equivalence to the
standard definition. In addition we demonstrate the convenience of the new
approach by giving a short proof that extending adversaries to a larger class
of partial algorithms with errors does not change the strength of the security
assumption.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 02:23:53 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Myasnikov",
"Alex D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.3746 | M Sabu THAMPI | Sabu M. Thampi | Information Hiding Techniques: A Tutorial Review | null | null | null | null | cs.CR cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this tutorial is to present an overview of various information
hiding techniques. A brief history of steganography is provided along with
techniques that were used to hide information. Text, image and audio based
information hiding techniques are discussed. This paper also provides a basic
introduction to digital watermarking.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 05:22:30 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0802.3767 | EDA Publishing Association | H. Mathias (IEF), F. Parrain (IEF), J.-P. Gilles (IEF), S. Megherbi
(IEF), M. Zhang (IEF), Ph. Coste (IEF), A. Dupret (IEF) | Architecture for Integrated Mems Resonators Quality Factor Measurement | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/EDA-Publishing) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007) | null | null | cs.OH | null | In this paper, an architecture designed for electrical measurement of the
quality factor of MEMS resonators is proposed. An estimation of the measurement
performance is made using PSPICE simulations taking into account the
component's non-idealities. An error on the measured Q value of only several
percent is achievable, at a small integration cost, for sufficiently high
quality factor values (Q > 100).
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 08:39:41 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Mathias",
"H.",
"",
"IEF"
],
[
"Parrain",
"F.",
"",
"IEF"
],
[
"Gilles",
"J. -P.",
"",
"IEF"
],
[
"Megherbi",
"S.",
"",
"IEF"
],
[
"Zhang",
"M.",
"",
"IEF"
],
[
"Coste",
"Ph.",
"",
"IEF"
],
[
"Dupret",
"A.",
"",
"IEF"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0802.3768 | EDA Publishing Association | N. Izadi, R. K. Jaganatharaja, J. Floris, G. Krijnen | Optimization of Cricket-inspired, Biomimetic Artificial Hair Sensors for
Flow Sensing | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/EDA-Publishing) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007) | null | null | cs.OH | null | High density arrays of artificial hair sensors, biomimicking the extremely
sensitive mechanoreceptive filiform hairs found on cerci of crickets have been
fabricated successfully. We assess the sensitivity of these artificial sensors
and present a scheme for further optimization addressing the deteriorating
effects of stress in the structures. We show that, by removing a portion of
chromium electrodes close to the torsional beams, the upward lift at the edges
of the membrane due to the stress, will decrease hence increase the
sensitivity.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 08:44:02 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Izadi",
"N.",
""
],
[
"Jaganatharaja",
"R. K.",
""
],
[
"Floris",
"J.",
""
],
[
"Krijnen",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0802.3784 | Jerry Overton | Jerry Overton | Pattern-Oriented Analysis and Design (POAD) Theory | null | null | null | null | cs.SE cs.IT math.IT | null | Pattern-Oriented Analysis and Design (POAD) is the practice of building
complex software by applying proven designs to specific problem domains.
Although a great deal of research and practice has been devoted to formalizing
existing design patterns and discovering new ones, there has been relatively
little research into methods for combining these patterns into software
applications. This is partly because the creation of complex software
applications is so expensive. This paper proposes a mathematical model of POAD
that may allow future research in pattern-oriented techniques to be performed
using less expensive formal techniques rather than expensive, complex software
development.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 13:51:39 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Overton",
"Jerry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3789 | Viviana Sica | Nick Milton | Knowledge Technologies | 130 pages, ISBN 978-88-7699-099-1 (Printed edition), ISBN
978-88-7699-100-4 (Electronic edition), printed edition available at
http://stores.lulu.com/polimetrica and on http://www.amazon.com/ | "Publishing studies" book series, edited by Giandomenico Sica,
ISSN 1973-6061 (Printed edition), ISSN 1973-6053 (Electronic edition) | null | null | cs.CY cs.AI cs.LG cs.SE | null | Several technologies are emerging that provide new ways to capture, store,
present and use knowledge. This book is the first to provide a comprehensive
introduction to five of the most important of these technologies: Knowledge
Engineering, Knowledge Based Engineering, Knowledge Webs, Ontologies and
Semantic Webs. For each of these, answers are given to a number of key
questions (What is it? How does it operate? How is a system developed? What can
it be used for? What tools are available? What are the main issues?). The book
is aimed at students, researchers and practitioners interested in Knowledge
Management, Artificial Intelligence, Design Engineering and Web Technologies.
During the 1990s, Nick worked at the University of Nottingham on the
application of AI techniques to knowledge management and on various knowledge
acquisition projects to develop expert systems for military applications. In
1999, he joined Epistemics where he worked on numerous knowledge projects and
helped establish knowledge management programmes at large organisations in the
engineering, technology and legal sectors. He is author of the book "Knowledge
Acquisition in Practice", which describes a step-by-step procedure for
acquiring and implementing expertise. He maintains strong links with leading
research organisations working on knowledge technologies, such as
knowledge-based engineering, ontologies and semantic technologies.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 11:26:09 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Milton",
"Nick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3820 | Arkadiy Skopenkov | A. Skopenkov | On the Kuratowski graph planarity criterion | English version: 4 pages and 4 figures, Russian version: 10 pages and
13 figures. Exposition improved | Mat. Prosveschenie, 9 (2005), 116-128, and 11 (2007), 159--160 | null | null | math.GT cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is purely expositional. The statement of the Kuratowski graph
planarity criterion is simple and well-known. However, its classical proof is
not easy. In this paper we present the Makarychev proof (with further
simplifications by Prasolov, Telishev, Zaslavski and the author) which is
possibly the simplest. In the Rusian version before the proof we present all
the necessary definitions, and afterwards we state some close results on graphs
and more general spaces. The paper is accessible for students familiar with the
notion of a graph, and could be an interesting easy reading for mature
mathematicians.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 15:17:51 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Aug 2009 12:48:28 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jul 2012 12:10:30 GMT"
}
] | 2014-11-27T00:00:00 | [
[
"Skopenkov",
"A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.3851 | Makesh Pravin John Wilson | Makesh Pravin Wilson, Krishna Narayanan and Giuseppe Caire | Joint Source Channel Coding with Side Information Using Hybrid Digital
Analog Codes | 22 pages, 10 figures, submitted to IEEE Transactions on Information
Theory(Oct 2007) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the joint source channel coding problem of transmitting an analog
source over a Gaussian channel in two cases - (i) the presence of interference
known only to the transmitter and (ii) in the presence of side information
known only to the receiver. We introduce hybrid digital analog forms of the
Costa and Wyner-Ziv coding schemes. Our schemes are based on random coding
arguments and are different from the nested lattice schemes by Kochman and
Zamir that use dithered quantization. We also discuss superimposed digital and
analog schemes for the above problems which show that there are infinitely many
schemes for achieving the optimal distortion for these problems. This provides
an extension of the schemes by Bross et al to the interference/side information
case. We then discuss applications of the hybrid digital analog schemes for
transmitting under a channel signal-to-noise ratio mismatch and for
broadcasting a Gaussian source with bandwidth compression.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 17:26:14 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Wilson",
"Makesh Pravin",
""
],
[
"Narayanan",
"Krishna",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3855 | Sumanth Gangasani | Sumanth Kumar Reddy Gangasani | The Discrete Hilbert Transform for Non-Periodic Signals | 5 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note investigates the size of the guard band for non-periodic discrete
Hilbert transform, which has recently been proposed for data hiding and
security applications. It is shown that a guard band equal to the duration of
the message is sufficient for a variety of analog signals and is, therefore,
likely to be adequate for discrete or digital data.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 17:41:25 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Gangasani",
"Sumanth Kumar Reddy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.3860 | Matei David | Matei David and Toniann Pitassi | Separating NOF communication complexity classes RP and NP | null | null | null | null | cs.CC | null | We provide a non-explicit separation of the number-on-forehead communication
complexity classes RP and NP when the number of players is up to \delta log(n)
for any \delta<1. Recent lower bounds on Set-Disjointness [LS08,CA08] provide
an explicit separation between these classes when the number of players is only
up to o(loglog(n)).
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 19:58:26 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"David",
"Matei",
""
],
[
"Pitassi",
"Toniann",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.3875 | Andrew Adamatzky | Andy Adamatzky and Larry Bull | Are complex systems hard to evolve? | null | Volume 14, Issue 6, pages 15-20, July/August 2009 | 10.1002/cplx.20269 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evolutionary complexity is here measured by the number of trials/evaluations
needed for evolving a logical gate in a non-linear medium. Behavioural
complexity of the gates evolved is characterised in terms of cellular automata
behaviour. We speculate that hierarchies of behavioural and evolutionary
complexities are isomorphic up to some degree, subject to substrate specificity
of evolution and the spectrum of evolution parameters.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 19:07:53 GMT"
}
] | 2010-11-23T00:00:00 | [
[
"Adamatzky",
"Andy",
""
],
[
"Bull",
"Larry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0802.3881 | Jorge Sousa Pinto | Jos\'e Bacelar Almeida, Jorge Sousa Pinto | Deriving Sorting Algorithms | Technical Report | null | null | DI-PURe-06.04.01 | cs.DS cs.LO | null | This paper proposes new derivations of three well-known sorting algorithms,
in their functional formulation. The approach we use is based on three main
ingredients: first, the algorithms are derived from a simpler algorithm, i.e.
the specification is already a solution to the problem (in this sense our
derivations are program transformations). Secondly, a mixture of inductive and
coinductive arguments are used in a uniform, algebraic style in our reasoning.
Finally, the approach uses structural invariants so as to strengthen the
equational reasoning with logical arguments that cannot be captured in the
algebraic framework.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 19:47:57 GMT"
}
] | 2008-02-27T00:00:00 | [
[
"Almeida",
"José Bacelar",
""
],
[
"Pinto",
"Jorge Sousa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3885 | Amy Glen | Aldo de Luca, Amy Glen, Luca Q. Zamboni | Rich, Sturmian, and trapezoidal words | 7 pages | Theoretical Computer Science 407 (2008) 569--573 | 10.1016/j.tcs.2008.06.009 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we explore various interconnections between rich words,
Sturmian words, and trapezoidal words. Rich words, first introduced in
arXiv:0801.1656 by the second and third authors together with J. Justin and S.
Widmer, constitute a new class of finite and infinite words characterized by
having the maximal number of palindromic factors. Every finite Sturmian word is
rich, but not conversely. Trapezoidal words were first introduced by the first
author in studying the behavior of the subword complexity of finite Sturmian
words. Unfortunately this property does not characterize finite Sturmian words.
In this note we show that the only trapezoidal palindromes are Sturmian. More
generally we show that Sturmian palindromes can be characterized either in
terms of their subword complexity (the trapezoidal property) or in terms of
their palindromic complexity. We also obtain a similar characterization of rich
palindromes in terms of a relation between palindromic complexity and subword
complexity.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 19:51:32 GMT"
}
] | 2010-04-08T00:00:00 | [
[
"de Luca",
"Aldo",
""
],
[
"Glen",
"Amy",
""
],
[
"Zamboni",
"Luca Q.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.3888 | Amy Glen | Amy Glen, Florence Lev\'e, Gw\'ena\"el Richomme | Directive words of episturmian words: equivalences and normalization | 15 pages | RAIRO - Theoretical Informatics and Applications 43 (2009) 299-319 | 10.1051/ita:2008029 | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Episturmian morphisms constitute a powerful tool to study episturmian words.
Indeed, any episturmian word can be infinitely decomposed over the set of pure
episturmian morphisms. Thus, an episturmian word can be defined by one of its
morphic decompositions or, equivalently, by a certain directive word. Here we
characterize pairs of words directing a common episturmian word. We also
propose a way to uniquely define any episturmian word through a normalization
of its directive words. As a consequence of these results, we characterize
episturmian words having a unique directive word.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 20:15:46 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
],
[
"Levé",
"Florence",
""
],
[
"Richomme",
"Gwénaël",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0802.3895 | Grenville Croll | Andrej Bregar | Complexity Metrics for Spreadsheet Models | 9 pages, 5 figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 85-93
ISBN 1 902724 94 1 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several complexity metrics are described which are related to logic
structure, data structure and size of spreadsheet models. They primarily
concentrate on the dispersion of cell references and cell paths. Most metrics
are newly defined, while some are adapted from traditional software
engineering. Their purpose is the identification of cells which are liable to
errors. In addition, they can be used to estimate the values of dependent
process metrics, such as the development duration and effort, and especially to
adjust the cell error rate in accordance with the contents of each individual
cell, in order to accurately asses the reliability of a model. Finally, two
conceptual constructs - the reference branching condition cell and the
condition block - are discussed, aiming at improving the reliability,
modifiability, auditability and comprehensibility of logical tests.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 00:37:56 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Bregar",
"Andrej",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3919 | Grenville Croll | Thomas A. Grossman, Ozgur Ozluk | A Paradigm for Spreadsheet Engineering Methodologies | 11 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 23-33
ISBN 1 902724 94 1 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spreadsheet engineering methodologies are diverse and sometimes
contradictory. It is difficult for spreadsheet developers to identify a
spreadsheet engineering methodology that is appropriate for their class of
spreadsheet, with its unique combination of goals, type of problem, and
available time and resources. There is a lack of well-organized, proven
methodologies with known costs and benefits for well-defined spreadsheet
classes. It is difficult to compare and critically evaluate methodologies. We
present a paradigm for organizing and interpreting spreadsheet engineering
recommendations. It systematically addresses the myriad choices made when
developing a spreadsheet, and explicitly considers resource constraints and
other development parameters. This paradigm provides a framework for
evaluation, comparison, and selection of methodologies, and a list of essential
elements for developers or codifiers of new methodologies. This paradigm
identifies gaps in our knowledge that merit further research.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 21:58:26 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Grossman",
"Thomas A.",
""
],
[
"Ozluk",
"Ozgur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3924 | Grenville Croll | Markus Clermont | A Toolkit for Scalable Spreadsheet Visualization | 12 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 95-106
ISBN 1 902724 94 1 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a toolkit for spreadsheet visualization based on logical
areas, semantic classes and data modules. Logical areas, semantic classes and
data modules are abstract representations of spreadsheet programs that are
meant to reduce the auditing and comprehension effort, especially for large and
regular spreadsheets. The toolkit is integrated as a plug-in in the Gnumeric
spreadsheet system for Linux. It can process large, industry scale spreadsheet
programs in reasonable time and is tightly integrated with its host spreadsheet
system. Users can generate hierarchical and graph-based representations of
their spreadsheets. This allows them to spot conceptual similarities in
different regions of the spreadsheet, that would otherwise not fit on a screen.
As it is assumed that the learning effort for effective use of such a tool
should be kept low, we aim for intuitive handling of most of the tool's
functions.
| [
{
"version": "v1",
"created": "Tue, 26 Feb 2008 22:11:24 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Clermont",
"Markus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3939 | Grenville Croll | Sabine Hipfl | Using Layout Information for Spreadsheet Visualization | 13 pages, 3 colour figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 107-119
ISBN 1 902724 94 1 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper extends a spreadsheet visualization technique by using layout
information. The original approach identifies logically or semantically related
cells by relying exclusively on the content of cells for identifying semantic
classes. A disadvantage of semantic classes is that users have to supply
parameters which describe the possible shapes of these blocks. The correct
parametrization requires a certain degree of experience and is thus not
suitable for untrained users. To avoid this constraint, the approach reported
in this paper uses row/column-labels as well as common format information for
locating areas with common, recurring semantics. Heuristics are provided to
distinguish between cell groups with intended common semantics and cell groups
related in an ad-hoc manner.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 00:14:34 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Hipfl",
"Sabine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.3940 | Grenville Croll | Jocelyn Paine | Spreadsheet Structure Discovery with Logic Programming | 11 pages, code fragments | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 121-133
ISBN 1 902724 94 1 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our term "structure discovery" denotes the recovery of structure, such as the
grouping of cells, that was intended by a spreadsheet's author but is not
explicit in the spreadsheet. We are implementing structure discovery tools in
the logic-programming language Prolog for our spreadsheet analysis program
Model Master, by writing grammars for spreadsheet structures. The objective is
an "intelligent structure monitor" to run beside Excel, allowing users to
reconfigure spreadsheets to the representational needs of the task at hand.
This could revolutionise spreadsheet "best practice". We also describe a
formulation of spreadsheet reverse-engineering based on "arrows".
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 00:25:47 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Paine",
"Jocelyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0802.3950 | Razvan Teodorescu | Michael Chertkov, Vladimir Y. Chernyak and Razvan Teodorescu | Belief Propagation and Loop Series on Planar Graphs | Accepted for publication in Journal of Statistical Mechanics: theory
and experiment | J. Stat. Mech. (2008) P05003 | 10.1088/1742-5468/2008/05/P05003 | null | cond-mat.stat-mech cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss a generic model of Bayesian inference with binary variables
defined on edges of a planar graph. The Loop Calculus approach of [1, 2] is
used to evaluate the resulting series expansion for the partition function. We
show that, for planar graphs, truncating the series at single-connected loops
reduces, via a map reminiscent of the Fisher transformation [3], to evaluating
the partition function of the dimer matching model on an auxiliary planar
graph. Thus, the truncated series can be easily re-summed, using the Pfaffian
formula of Kasteleyn [4]. This allows to identify a big class of
computationally tractable planar models reducible to a dimer model via the
Belief Propagation (gauge) transformation. The Pfaffian representation can also
be extended to the full Loop Series, in which case the expansion becomes a sum
of Pfaffian contributions, each associated with dimer matchings on an extension
to a subgraph of the original graph. Algorithmic consequences of the Pfaffian
representation, as well as relations to quantum and non-planar models, are
discussed.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 05:30:51 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 21:11:28 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Chertkov",
"Michael",
""
],
[
"Chernyak",
"Vladimir Y.",
""
],
[
"Teodorescu",
"Razvan",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.3974 | Vladimir Lapshin A | Vladimir Lapshin | Syntax diagrams as a formalism for representation of syntactic relations
of formal languages | 10 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The new approach to representation of syntax of formal languages-- a
formalism of syntax diagrams is offered. Syntax diagrams look a convenient
language for the description of syntactic relations in the languages having
nonlinear representation of texts, for example, for representation of syntax
lows of the language of structural chemical formulas. The formalism of
neighbourhood grammar is used to describe the set of correct syntax constructs.
The neighbourhood the grammar consists of a set of families of
"neighbourhoods"-- the diagrams defined for each symbol of the language's
alphabet. The syntax diagram is correct if each symbol is included into this
diagram together with some neighbourhood. In other words, correct diagrams are
needed to be covered by elements of the neighbourhood grammar. Thus, the
grammar of formal language can be represented as system of the covers defined
for each correct syntax diagram.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 08:59:58 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Feb 2008 09:28:59 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Lapshin",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.3992 | Effrosyni Kokiopoulou | Effrosyni Kokiopoulou and Pascal Frossard | Polynomial Filtering for Fast Convergence in Distributed Consensus | submitted to IEEE Transactions on Signal Processing | null | 10.1109/TSP.2008.2006147 | LTS-2008-005 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the past few years, the problem of distributed consensus has received a
lot of attention, particularly in the framework of ad hoc sensor networks. Most
methods proposed in the literature address the consensus averaging problem by
distributed linear iterative algorithms, with asymptotic convergence of the
consensus solution. The convergence rate of such distributed algorithms
typically depends on the network topology and the weights given to the edges
between neighboring sensors, as described by the network matrix. In this paper,
we propose to accelerate the convergence rate for given network matrices by the
use of polynomial filtering algorithms. The main idea of the proposed
methodology is to apply a polynomial filter on the network matrix that will
shape its spectrum in order to increase the convergence rate. Such an algorithm
is equivalent to periodic updates in each of the sensors by aggregating a few
of its previous estimates. We formulate the computation of the coefficients of
the optimal polynomial as a semi-definite program that can be efficiently and
globally solved for both static and dynamic network topologies. We finally
provide simulation results that demonstrate the effectiveness of the proposed
solutions in accelerating the convergence of distributed consensus averaging
problems.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 11:35:02 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Kokiopoulou",
"Effrosyni",
""
],
[
"Frossard",
"Pascal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4002 | Uwe Aickelin | Uwe Aickelin and Julie Greensmith | Sensing Danger: Innate Immunology for Intrusion Detection | null | Information Security Technical Report, 12(4), pp 218-227, 2007 | 10.1016/j.istr.2007.10.003 | null | cs.NE cs.CR | null | The immune system provides an ideal metaphor for anomaly detection in general
and computer security in particular. Based on this idea, artificial immune
systems have been used for a number of years for intrusion detection,
unfortunately so far with little success. However, these previous systems were
largely based on immunological theory from the 1970s and 1980s and over the
last decade our understanding of immunological processes has vastly improved.
In this paper we present two new immune inspired algorithms based on the latest
immunological discoveries, such as the behaviour of Dendritic Cells. The
resultant algorithms are applied to real world intrusion problems and show
encouraging results. Overall, we believe there is a bright future for these
next generation artificial immune algorithms.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 12:15:08 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 16:59:24 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:45:07 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Greensmith",
"Julie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0802.4010 | Marcus Kaiser | Marcus Kaiser | Brain architecture: A design for natural computation | null | Philosophical Transactions of The Royal Society A, 365: 3033-3045,
2007 | 10.1098/rsta.2007.0007 | null | q-bio.NC cs.AI cs.NE physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fifty years ago, John von Neumann compared the architecture of the brain with
that of computers that he invented and which is still in use today. In those
days, the organisation of computers was based on concepts of brain
organisation. Here, we give an update on current results on the global
organisation of neural systems. For neural systems, we outline how the spatial
and topological architecture of neuronal and cortical networks facilitates
robustness against failures, fast processing, and balanced network activation.
Finally, we discuss mechanisms of self-organization for such architectures.
After all, the organization of the brain might again inspire computer
architecture.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 13:00:38 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Kaiser",
"Marcus",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0802.4018 | Luc Maranget | Qin Ma and Luc Maranget | Algebraic Pattern Matching in Join Calculus | null | Logical Methods in Computer Science, Volume 4, Issue 1 (March 21,
2008) lmcs:770 | 10.2168/LMCS-4(1:7)2008 | null | cs.PL cs.DC | null | We propose an extension of the join calculus with pattern matching on
algebraic data types. Our initial motivation is twofold: to provide an
intuitive semantics of the interaction between concurrency and pattern
matching; to define a practical compilation scheme from extended join
definitions into ordinary ones plus ML pattern matching. To assess the
correctness of our compilation scheme, we develop a theory of the applied join
calculus, a calculus with value passing and value matching. We implement this
calculus as an extension of the current JoCaml system.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 13:21:51 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Mar 2008 11:22:39 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Ma",
"Qin",
""
],
[
"Maranget",
"Luc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0802.4040 | Stephan Mertens | Stefan Boettcher, Stephan Mertens | Analysis of the Karmarkar-Karp Differencing Algorithm | 9 pages, 8 figures; minor changes | European Physics Journal B 65, 131-140 (2008) | 10.1140/epjb/e2008-00320-9 | null | cs.NA cond-mat.dis-nn cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Karmarkar-Karp differencing algorithm is the best known polynomial time
heuristic for the number partitioning problem, fundamental in both theoretical
computer science and statistical physics. We analyze the performance of the
differencing algorithm on random instances by mapping it to a nonlinear rate
equation. Our analysis reveals strong finite size effects that explain why the
precise asymptotics of the differencing solution is hard to establish by
simulations. The asymptotic series emerging from the rate equation satisfies
all known bounds on the Karmarkar-Karp algorithm and projects a scaling
$n^{-c\ln n}$, where $c=1/(2\ln2)=0.7213...$. Our calculations reveal subtle
relations between the algorithm and Fibonacci-like sequences, and we establish
an explicit identity to that effect.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 17:24:07 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2008 09:48:52 GMT"
}
] | 2008-10-03T00:00:00 | [
[
"Boettcher",
"Stefan",
""
],
[
"Mertens",
"Stephan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.4057 | Andrea Masini | Andrea Masini, Luca Vigan\`o, Margherita Zorzi | A Qualitative Modal Representation of Quantum Register Transformations | null | null | null | null | cs.LO | null | We introduce two modal natural deduction systems that are suitable to
represent and reason about transformations of quantum registers in an abstract,
qualitative, way. Quantum registers represent quantum systems, and can be
viewed as the structure of quantum data for quantum operations. Our systems
provide a modal framework for reasoning about operations on quantum registers
(unitary transformations and measurements), in terms of possible worlds (as
abstractions of quantum registers) and accessibility relations between these
worlds. We give a Kripke--style semantics that formally describes quantum
register transformations and prove the soundness and completeness of our
systems with respect to this semantics.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 17:43:23 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Mar 2008 11:10:41 GMT"
}
] | 2008-03-05T00:00:00 | [
[
"Masini",
"Andrea",
""
],
[
"Viganò",
"Luca",
""
],
[
"Zorzi",
"Margherita",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.4079 | Salah A. Aly | Salah A. Aly | Families of LDPC Codes Derived from Nonprimitive BCH Codes and
Cyclotomic Cosets | Private comments are welcome | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-density parity check (LDPC) codes are an important class of codes with
many applications. Two algebraic methods for constructing regular LDPC codes
are derived -- one based on nonprimitive narrow-sense BCH codes and the other
directly based on cyclotomic cosets. The constructed codes have high rates and
are free of cycles of length four; consequently, they can be decoded using
standard iterative decoding algorithms. The exact dimension and bounds for the
minimum distance and stopping distance are derived. These constructed codes can
be used to derive quantum error-correcting codes.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 20:44:41 GMT"
}
] | 2008-02-28T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4089 | Joel Ratsaby | Joel Ratsaby | An algorithmic complexity interpretation of Lin's third law of
information theory | null | null | 10.3390/entropy-e10010006 | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Instead of static entropy we assert that the Kolmogorov complexity of a
static structure such as a solid is the proper measure of disorder (or
chaoticity). A static structure in a surrounding perfectly-random universe acts
as an interfering entity which introduces local disruption in randomness. This
is modeled by a selection rule $R$ which selects a subsequence of the random
input sequence that hits the structure. Through the inequality that relates
stochasticity and chaoticity of random binary sequences we maintain that Lin's
notion of stability corresponds to the stability of the frequency of 1s in the
selected subsequence. This explains why more complex static structures are less
stable. Lin's third law is represented as the inevitable change that static
structure undergo towards conforming to the universe's perfect randomness.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 12:41:08 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Mar 2008 15:50:02 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Ratsaby",
"Joel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4095 | Narad Rampersad | James D. Currie, Narad Rampersad | For each $\alpha$ > 2 there is an infinite binary word with critical
exponent $\alpha$ | 5 pages | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For each $\alpha > 2$ there is a binary word with critical exponent $\alpha$.
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 21:38:31 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Currie",
"James D.",
""
],
[
"Rampersad",
"Narad",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0802.4101 | Rahul Jain | Rahul Jain and Shengyu Zhang | New bounds on classical and quantum one-way communication complexity | ver 1, 19 pages | null | null | null | cs.IT cs.DC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we provide new bounds on classical and quantum distributional
communication complexity in the two-party, one-way model of communication. In
the classical model, our bound extends the well known upper bound of Kremer,
Nisan and Ron to include non-product distributions. We show that for a boolean
function f:X x Y -> {0,1} and a non-product distribution mu on X x Y and
epsilon in (0,1/2) constant: D_{epsilon}^{1, mu}(f)= O((I(X:Y)+1) vc(f)), where
D_{epsilon}^{1, mu}(f) represents the one-way distributional communication
complexity of f with error at most epsilon under mu; vc(f) represents the
Vapnik-Chervonenkis dimension of f and I(X:Y) represents the mutual
information, under mu, between the random inputs of the two parties. For a
non-boolean function f:X x Y ->[k], we show a similar upper bound on
D_{epsilon}^{1, mu}(f) in terms of k, I(X:Y) and the pseudo-dimension of f' =
f/k. In the quantum one-way model we provide a lower bound on the
distributional communication complexity, under product distributions, of a
function f, in terms the well studied complexity measure of f referred to as
the rectangle bound or the corruption bound of f . We show for a non-boolean
total function f : X x Y -> Z and a product distribution mu on XxY,
Q_{epsilon^3/8}^{1, mu}(f) = Omega(rec_ epsilon^{1, mu}(f)), where
Q_{epsilon^3/8}^{1, mu}(f) represents the quantum one-way distributional
communication complexity of f with error at most epsilon^3/8 under mu and rec_
epsilon^{1, mu}(f) represents the one-way rectangle bound of f with error at
most epsilon under mu . Similarly for a non-boolean partial function f:XxY -> Z
U {*} and a product distribution mu on X x Y, we show, Q_{epsilon^6/(2 x
15^4)}^{1, mu}(f) = Omega(rec_ epsilon^{1, mu}(f)).
| [
{
"version": "v1",
"created": "Wed, 27 Feb 2008 22:28:52 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Jain",
"Rahul",
""
],
[
"Zhang",
"Shengyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4112 | Hanna E. Makaruk | Hanna E. Makaruk, Robert Owczarek | Hubs in Languages: Scale Free Networks of Synonyms | null | null | null | LA-UR-08-0084 | physics.soc-ph cs.CL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Natural languages are described in this paper in terms of networks of
synonyms: a word is identified with a node, and synonyms are connected by
undirected links. Our statistical analysis of the network of synonyms in Polish
language showed it is scale-free; similar to what is known for English. The
statistical properties of the networks are also similar. Thus, the statistical
aspects of the networks are good candidates for culture independent elements of
human language. We hypothesize that optimization for robustness and efficiency
is responsible for this universality. Despite the statistical similarity, there
is no one-to-one mapping between networks of these two languages. Although many
hubs in Polish are translated into similarly highly connected hubs in English,
there are also hubs specific to one of these languages only: a single word in
one language is equivalent to many different and disconnected words in the
other, in accordance with the Whorf hypothesis about language relativity.
Identifying language-specific hubs is vitally important for automatic
translation, and for understanding contextual, culturally related messages that
are frequently missed or twisted in a naive, literary translation.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 00:15:54 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Makaruk",
"Hanna E.",
""
],
[
"Owczarek",
"Robert",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0802.4126 | Alexei Botchkarev | Peter Andru, Alexei Botchkarev | Hospital Case Cost Estimates Modelling - Algorithm Comparison | null | null | null | null | cs.CE cs.DB | http://creativecommons.org/licenses/publicdomain/ | Ontario (Canada) Health System stakeholders support the idea and necessity of
the integrated source of data that would include both clinical (e.g. diagnosis,
intervention, length of stay, case mix group) and financial (e.g. cost per
weighted case, cost per diem) characteristics of the Ontario healthcare system
activities at the patient-specific level. At present, the actual patient-level
case costs in the explicit form are not available in the financial databases
for all hospitals. The goal of this research effort is to develop financial
models that will assign each clinical case in the patient-specific data
warehouse a dollar value, representing the cost incurred by the Ontario health
care facility which treated the patient. Five mathematical models have been
developed and verified using real dataset. All models can be classified into
two groups based on their underlying method: 1. Models based on using relative
intensity weights of the cases, and 2. Models based on using cost per diem.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 04:56:48 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Andru",
"Peter",
""
],
[
"Botchkarev",
"Alexei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0802.4130 | Zhi Quan | Zhi Quan, Shuguang Cui, Ali H. Sayed, and H. Vincent Poor | Wideband Spectrum Sensing in Cognitive Radio Networks | null | Proceedings of the 2008 IEEE International Conference on
Communications, Beijing, May 19-23, 2008 | 10.1109/ICC.2008.177 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sensing is an essential enabling functionality for cognitive radio
networks to detect spectrum holes and opportunistically use the under-utilized
frequency bands without causing harmful interference to legacy networks. This
paper introduces a novel wideband spectrum sensing technique, called multiband
joint detection, which jointly detects the signal energy levels over multiple
frequency bands rather than consider one band at a time. The proposed strategy
is efficient in improving the dynamic spectrum utilization and reducing
interference to the primary users. The spectrum sensing problem is formulated
as a class of optimization problems in interference limited cognitive radio
networks. By exploiting the hidden convexity in the seemingly non-convex
problem formulations, optimal solutions for multiband joint detection are
obtained under practical conditions. Simulation results show that the proposed
spectrum sensing schemes can considerably improve the system performance. This
paper establishes important principles for the design of wideband spectrum
sensing algorithms in cognitive radio networks.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 06:49:09 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Quan",
"Zhi",
""
],
[
"Cui",
"Shuguang",
""
],
[
"Sayed",
"Ali H.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4131 | Sudhakar Sahoo | Birendra Kumar Nayak (1), Sudhakar Sahoo (2) | Language of Boolean functions its Grammar and Machine | 5 pages, two tables, presented in Orissa Mathematical Society
Conference, January, 2008 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper an algorithm is designed which generates in-equivalent Boolean
functions of any number of variables from the four Boolean functions of single
variable. The grammar for such set of Boolean function is provided. The Turing
Machine that accepts such set is constructed.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 06:21:49 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Nayak",
"Birendra Kumar",
""
],
[
"Sahoo",
"Sudhakar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.4191 | Christine Plumejeaud | Christine Plumejeaud (INRIA Rh\^one-Alpes / LIG Laboratoire
d'Informatique de Grenoble), Jean-Marc Vincent (INRIA Rh\^one-Alpes / LIG
laboratoire d'Informatique de Grenoble), Claude Grasland (GC, RIATE),
J\'er\^ome Gensel (LSR - IMAG), H\'el\`ene Mathian (GC), Serge Guelton (INRIA
Rh\^one-Alpes / LIG laboratoire d'Informatique de Grenoble), Jo\"el Boulier
(GC) | HyperSmooth : calcul et visualisation de cartes de potentiel
interactives | null | Dans SAGEO 2007, Rencontres internationales G\'eomatique et
territoire. CdRom. - SAGEO 2007, Rencontres internationales G\'eomatique et
territoire, France (2007) | null | null | stat.AP cs.HC | null | The HyperCarte research group wishes to offer a new cartographic tool for
spatial analysis of social data, using the potential smoothing method. The
purpose of this method is to view the spreading of phenomena's in a continuous
way, at a macroscopic scale, basing on data sampled on administrative areas. We
aim to offer an interactive tool, accessible via the Web, but guarantying the
confidentiality of data. The major difficulty is induced by the high complexity
of the calculus, working on a great amount of data. We present our solution to
such a technical challenge, and our perspectives of enhancements.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 12:36:41 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Plumejeaud",
"Christine",
"",
"INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble"
],
[
"Vincent",
"Jean-Marc",
"",
"INRIA Rhône-Alpes / LIG\n laboratoire d'Informatique de Grenoble"
],
[
"Grasland",
"Claude",
"",
"GC, RIATE"
],
[
"Gensel",
"Jérôme",
"",
"LSR - IMAG"
],
[
"Mathian",
"Hélène",
"",
"GC"
],
[
"Guelton",
"Serge",
"",
"INRIA\n Rhône-Alpes / LIG laboratoire d'Informatique de Grenoble"
],
[
"Boulier",
"Joël",
"",
"GC"
]
] | [
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0802.4198 | Andrij Rovenchak | Solomija Buk, J\'an Ma\v{c}utek, Andrij Rovenchak | Some properties of the Ukrainian writing system | 17 pages | Glottometrics 16, 63-79 (2008) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the grapheme-phoneme relation in Ukrainian and some properties
of the Ukrainian version of the Cyrillic alphabet.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 12:58:49 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Buk",
"Solomija",
""
],
[
"Mačutek",
"Ján",
""
],
[
"Rovenchak",
"Andrij",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0802.4215 | Marcel Ausloos | M. Ausloos | Equilibrium (Zipf) and Dynamic (Grasseberg-Procaccia) method based
analyses of human texts. A comparison of natural (english) and artificial
(esperanto) languages | 22 pages, 87 references, 5 tables, 8 figures | Physica A 387 (25) 6411-6420 (2008) | 10.1016/j.physa.2008.07.016 | null | physics.soc-ph cs.CL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A comparison of two english texts from Lewis Carroll, one (Alice in
wonderland), also translated into esperanto, the other (Through a looking
glass) are discussed in order to observe whether natural and artificial
languages significantly differ from each other. One dimensional time series
like signals are constructed using only word frequencies (FTS) or word lengths
(LTS). The data is studied through (i) a Zipf method for sorting out
correlations in the FTS and (ii) a Grassberger-Procaccia (GP) technique based
method for finding correlations in LTS. Features are compared : different power
laws are observed with characteristic exponents for the ranking properties, and
the {\it phase space attractor dimensionality}. The Zipf exponent can take
values much less than unity ($ca.$ 0.50 or 0.30) depending on how a sentence is
defined. This non-universality is conjectured to be a measure of the author
$style$. Moreover the attractor dimension $r$ is a simple function of the so
called phase space dimension $n$, i.e., $r = n^{\lambda}$, with $\lambda =
0.79$. Such an exponent should also conjecture to be a measure of the author
$creativity$. However, even though there are quantitative differences between
the original english text and its esperanto translation, the qualitative
differences are very minutes, indicating in this case a translation relatively
well respecting, along our analysis lines, the content of the author writing.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 11:49:48 GMT"
}
] | 2012-09-04T00:00:00 | [
[
"Ausloos",
"M.",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0802.4233 | Rajiv Soundararajan Mr. | Rajiv Soundararajan and Sriram Vishwanath | Adaptive Sum Power Iterative Waterfilling for MIMO Cognitive Radio
Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the sum capacity of the Gaussian Multiple Input Multiple
Output (MIMO) Cognitive Radio Channel (MCC) is expressed as a convex problem
with finite number of linear constraints, allowing for polynomial time interior
point techniques to find the solution. In addition, a specialized class of sum
power iterative waterfilling algorithms is determined that exploits the
inherent structure of the sum capacity problem. These algorithms not only
determine the maximizing sum capacity value, but also the transmit policies
that achieve this optimum. The paper concludes by providing numerical results
which demonstrate that the algorithm takes very few iterations to converge to
the optimum.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 16:37:07 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Soundararajan",
"Rajiv",
""
],
[
"Vishwanath",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4237 | Ranko Lazic | Ranko Lazic | Safety alternating automata on data words | 23 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A data word is a sequence of pairs of a letter from a finite alphabet and an
element from an infinite set, where the latter can only be compared for
equality. Safety one-way alternating automata with one register on infinite
data words are considered, their nonemptiness is shown EXPSPACE-complete, and
their inclusion decidable but not primitive recursive. The same complexity
bounds are obtained for satisfiability and refinement, respectively, for the
safety fragment of linear temporal logic with freeze quantification. Dropping
the safety restriction, adding past temporal operators, or adding one more
register, each causes undecidability.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 16:54:31 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Mar 2009 18:52:17 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Apr 2010 15:20:30 GMT"
}
] | 2010-04-12T00:00:00 | [
[
"Lazic",
"Ranko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0802.4244 | Dimitris Papamichail | Christos Tryfonas, Dimitris Papamichail, Andrew Mehler, Steven Skiena | Call Admission Control Algorithm for pre-stored VBR video streams | 12 pages, 9 figures, includes appendix | null | null | null | cs.NI cs.DS | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We examine the problem of accepting a new request for a pre-stored VBR video
stream that has been smoothed using any of the smoothing algorithms found in
the literature. The output of these algorithms is a piecewise constant-rate
schedule for a Variable Bit-Rate (VBR) stream. The schedule guarantees that the
decoder buffer does not overflow or underflow. The problem addressed in this
paper is the determination of the minimal time displacement of each new
requested VBR stream so that it can be accomodated by the network and/or the
video server without overbooking the committed traffic. We prove that this
call-admission control problem for multiple requested VBR streams is
NP-complete and inapproximable within a constant factor, by reducing it from
the VERTEX COLOR problem. We also present a deterministic morphology-sensitive
algorithm that calculates the minimal time displacement of a VBR stream
request. The complexity of the proposed algorithm make it suitable for
real-time determination of the time displacement parameter during the call
admission phase.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 17:45:03 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Tryfonas",
"Christos",
""
],
[
"Papamichail",
"Dimitris",
""
],
[
"Mehler",
"Andrew",
""
],
[
"Skiena",
"Steven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.4270 | Salah A. Aly | Salah A. Aly | Propagation Rules of Subsystem Codes | Private comments are welcome | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate propagation rules of subsystem code constructions by
extending, shortening and combining given subsystem codes. Given an
$[[n,k,r,d]]_q$ subsystem code, we drive new subsystem codes with parameters
$[[n+1,k,r,\geq d]]_q$, $[[n-1,k+1,r,\geq d-1]]_q$, $[[n,k-1,r+1,d]]_q$. The
interested readers shall consult our companion papers for upper and lower
bounds on subsystem codes parameters, and introduction, trading dimensions,
families, and references on subsystem codes [1][2][3] and references therein.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 20:59:54 GMT"
}
] | 2008-11-11T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4282 | Man-On Pun | Dong Zheng, Man-On Pun, Weiyan Ge, Junshan Zhang and H. Vincent Poor | Distributed Opportunistic Scheduling For Ad-Hoc Communications Under
Noisy Channel Estimation | Proceedings of the 2008 IEEE International Conference on
Communications, Beijing, May 19-23, 2008 | null | 10.1109/ICC.2008.698 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed opportunistic scheduling is studied for wireless ad-hoc networks,
where many links contend for one channel using random access. In such networks,
distributed opportunistic scheduling (DOS) involves a process of joint channel
probing and distributed scheduling. It has been shown that under perfect
channel estimation, the optimal DOS for maximizing the network throughput is a
pure threshold policy. In this paper, this formalism is generalized to explore
DOS under noisy channel estimation, where the transmission rate needs to be
backed off from the estimated rate to reduce the outage. It is shown that the
optimal scheduling policy remains to be threshold-based, and that the rate
threshold turns out to be a function of the variance of the estimation error
and be a functional of the backoff rate function. Since the optimal backoff
rate is intractable, a suboptimal linear backoff scheme that backs off the
estimated signal-to-noise ratio (SNR) and hence the rate is proposed. The
corresponding optimal backoff ratio and rate threshold can be obtained via an
iterative algorithm. Finally, simulation results are provided to illustrate the
tradeoff caused by increasing training time to improve channel estimation at
the cost of probing efficiency.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 20:36:43 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Zheng",
"Dong",
""
],
[
"Pun",
"Man-On",
""
],
[
"Ge",
"Weiyan",
""
],
[
"Zhang",
"Junshan",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.