id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0802.4284 | Man-On Pun | Man-On Pun, Weiyan Ge, Dong Zheng, Junshan Zhang and H. Vincent Poor | Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks | Proceedings of the 2008 IEEE International Conference on
Communications, Beijing, May 19-23, 2008 | null | 10.1109/ICC.2008.694 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed opportunistic scheduling (DOS) protocols are proposed for
multiple-input multiple-output (MIMO) ad-hoc networks with contention-based
medium access. The proposed scheduling protocols distinguish themselves from
other existing works by their explicit design for system throughput improvement
through exploiting spatial multiplexing and diversity in a {\em distributed}
manner. As a result, multiple links can be scheduled to simultaneously transmit
over the spatial channels formed by transmit/receiver antennas. Taking into
account the tradeoff between feedback requirements and system throughput, we
propose and compare protocols with different levels of feedback information.
Furthermore, in contrast to the conventional random access protocols that
ignore the physical channel conditions of contending links, the proposed
protocols implement a pure threshold policy derived from optimal stopping
theory, i.e. only links with threshold-exceeding channel conditions are allowed
for data transmission. Simulation results confirm that the proposed protocols
can achieve impressive throughput performance by exploiting spatial
multiplexing and diversity.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 20:56:56 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Feb 2008 21:04:54 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Pun",
"Man-On",
""
],
[
"Ge",
"Weiyan",
""
],
[
"Zheng",
"Dong",
""
],
[
"Zhang",
"Junshan",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4291 | Man-On Pun | Man-On Pun, Kyeong Jin Kim and H. Vincent Poor | Opportunistic Scheduling and Beamforming for MIMO-OFDMA Downlink Systems
with Reduced Feedback | Proceedings of the 2008 IEEE International Conference on
Communications, Beijing, May 19-23, 2008 | null | 10.1109/ICC.2008.135 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Opportunistic scheduling and beamforming schemes with reduced feedback are
proposed for MIMO-OFDMA downlink systems. Unlike the conventional beamforming
schemes in which beamforming is implemented solely by the base station (BS) in
a per-subcarrier fashion, the proposed schemes take advantages of a novel
channel decomposition technique to perform beamforming jointly by the BS and
the mobile terminal (MT). The resulting beamforming schemes allow the BS to
employ only {\em one} beamforming matrix (BFM) to form beams for {\em all}
subcarriers while each MT completes the beamforming task for each subcarrier
locally. Consequently, for a MIMO-OFDMA system with $Q$ subcarriers, the
proposed opportunistic scheduling and beamforming schemes require only one BFM
index and $Q$ supportable throughputs to be returned from each MT to the BS, in
contrast to $Q$ BFM indices and $Q$ supportable throughputs required by the
conventional schemes. The advantage of the proposed schemes becomes more
evident when a further feedback reduction is achieved by grouping adjacent
subcarriers into exclusive clusters and returning only cluster information from
each MT. Theoretical analysis and computer simulation confirm the effectiveness
of the proposed reduced-feedback schemes.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 22:12:44 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Pun",
"Man-On",
""
],
[
"Kim",
"Kyeong Jin",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4293 | Ewa Krot-Sieniawska | Ewa Krot-Sieniawska | Reduced Incidence algebras description of cobweb posets and KoDAGs | 8 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After identifying the reduced incidence algebra of an arbitrary cobweb poset
the very first properties of these algebras are being disclosed.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 05:43:27 GMT"
}
] | 2008-03-17T00:00:00 | [
[
"Krot-Sieniawska",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0802.4299 | Man-On Pun | Man-On Pun, Visa Koivunen and H. Vincent Poor | SINR Analysis of Opportunistic MIMO-SDMA Downlink Systems with Linear
Combining | Proceedings of the 2008 IEEE International Conference on
Communications, Beijing, May 19-23, 2008 | null | 10.1109/ICC.2008.699 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Opportunistic scheduling (OS) schemes have been proposed previously by the
authors for multiuser MIMO-SDMA downlink systems with linear combining. In
particular, it has been demonstrated that significant performance improvement
can be achieved by incorporating low-complexity linear combining techniques
into the design of OS schemes for MIMO-SDMA. However, this previous analysis
was performed based on the effective signal-to-interference ratio (SIR),
assuming an interference-limited scenario, which is typically a valid
assumption in SDMA-based systems. It was shown that the limiting distribution
of the effective SIR is of the Frechet type. Surprisingly, the corresponding
scaling laws were found to follow $\epsilon\log K$ with $0<\epsilon<1$, rather
than the conventional $\log\log K$ form.
Inspired by this difference between the scaling law forms, in this paper a
systematic approach is developed to derive asymptotic throughput and scaling
laws based on signal-to-interference-noise ratio (SINR) by utilizing extreme
value theory. The convergence of the limiting distribution of the effective
SINR to the Gumbel type is established. The resulting scaling law is found to
be governed by the conventional $\log\log K$ form. These novel results are
validated by simulation results. The comparison of SIR and SINR-based analysis
suggests that the SIR-based analysis is more computationally efficient for
SDMA-based systems and it captures the asymptotic system performance with
higher fidelity.
| [
{
"version": "v1",
"created": "Thu, 28 Feb 2008 21:59:45 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Pun",
"Man-On",
""
],
[
"Koivunen",
"Visa",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4307 | Moustapha Diaby | Moustapha Diaby | A O(n^8) X O(n^7) Linear Programming Model of the Quadratic Assignment
Problem | Theorem 21 and Corollary 22 are in error; The modeling needs
9-dimensional variables instead of the 8-dimensional variables defined in
notations 6.9 | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn because Theorem 21 and Corollary 22 are in
error; The modeling idea is OK, but it needs 9-dimensional variables instead of
the 8-dimensional variables defined in notations 6.9.
Examples of the correct model (with 9-index variables) are: (1) Diaby, M.,
"Linear Programming Formulation of the Set Partitioning Problem," International
Journal of Operational Research 8:4 (August 2010) pp. 399-427; (2) Diaby, M.,
"Linear Programming Formulation of the Vertex Coloring Problem," International
Journal of Mathematics in Operational Research 2:3 (May 2010) pp. 259-289; (3)
Diaby, M., "The Traveling Salesman Problem: A Linear Programming Formulation,"
WSEAS Transactions on Mathematics, 6:6 (June 2007) pp. 745-754.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 00:03:19 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 17:35:57 GMT"
},
{
"version": "v3",
"created": "Sat, 11 Sep 2010 21:07:20 GMT"
},
{
"version": "v4",
"created": "Fri, 6 Sep 2013 03:17:08 GMT"
},
{
"version": "v5",
"created": "Sun, 2 Mar 2014 15:12:49 GMT"
},
{
"version": "v6",
"created": "Tue, 18 Mar 2014 19:35:23 GMT"
}
] | 2014-03-19T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.4312 | Xiaoyang Gu | Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo | Curves That Must Be Retraced | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We exhibit a polynomial time computable plane curve GAMMA that has finite
length, does not intersect itself, and is smooth except at one endpoint, but
has the following property. For every computable parametrization f of GAMMA and
every positive integer n, there is some positive-length subcurve of GAMMA that
f retraces at least n times. In contrast, every computable curve of finite
length that does not intersect itself has a constant-speed (hence
non-retracing) parametrization that is computable relative to the halting
problem.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 00:58:26 GMT"
},
{
"version": "v2",
"created": "Tue, 19 May 2009 19:30:53 GMT"
}
] | 2009-05-19T00:00:00 | [
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Mayordomo",
"Elvira",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0802.4325 | Mirela Damian | Mirela Damian | A Simple Yao-Yao-Based Spanner of Bounded Degree | 7 pages, 5 figures | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is a standing open question to decide whether the Yao-Yao structure for
unit disk graphs (UDGs) is a length spanner of not. This question is highly
relevant to the topology control problem for wireless ad hoc networks. In this
paper we make progress towards resolving this question by showing that the
Yao-Yao structure is a length spanner for UDGs of bounded aspect ratio. We also
propose a new local algorithm, called Yao-Sparse-Sink, based on the Yao-Sink
method introduced by Li, Wan, Wang and Frieder, that computes a (1+e)-spanner
of bounded degree for a given UDG and for given e > 0. The Yao-Sparse-Sink
method enables an efficient local computation of sparse sink trees. Finally, we
show that all these structures for UDGs -- Yao, Yao-Yao, Yao-Sink and
Yao-Sparse-Sink -- have arbitrarily large weight.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 14:39:59 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2008 14:40:40 GMT"
}
] | 2008-04-04T00:00:00 | [
[
"Damian",
"Mirela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0802.4326 | Jiyou Jia Dr. | Jiyou Jia | The Generation of Textual Entailment with NLML in an Intelligent
Dialogue system for Language Learning CSIEC | null | null | null | null | cs.CL cs.AI cs.CY | null | This research report introduces the generation of textual entailment within
the project CSIEC (Computer Simulation in Educational Communication), an
interactive web-based human-computer dialogue system with natural language for
English instruction. The generation of textual entailment (GTE) is critical to
the further improvement of CSIEC project. Up to now we have found few
literatures related with GTE. Simulating the process that a human being learns
English as a foreign language we explore our naive approach to tackle the GTE
problem and its algorithm within the framework of CSIEC, i.e. rule annotation
in NLML, pattern recognition (matching), and entailment transformation. The
time and space complexity of our algorithm is tested with some entailment
examples. Further works include the rules annotation based on the English
textbooks and a GUI interface for normal users to edit the entailment rules.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 06:16:29 GMT"
}
] | 2008-03-03T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0802.4330 | Brendan Farrell | Brendan Farrell, Thomas Strohmer | Eigenvalue Estimates and Mutual Information for the Linear Time-Varying
Channel | Submitted to IEEE Transactions on Information Theory This version is
a substantial revision of the earlier version | null | 10.1109/TIT.2011.2161919 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider linear time-varying channels with additive white Gaussian noise.
For a large class of such channels we derive rigorous estimates of the
eigenvalues of the correlation matrix of the effective channel in terms of the
sampled time-varying transfer function and, thus, provide a theoretical
justification for a relationship that has been frequently observed in the
literature. We then use this eigenvalue estimate to derive an estimate of the
mutual information of the channel. Our approach is constructive and is based on
a careful balance of the trade-off between approximate operator
diagonalization, signal dimension loss, and accuracy of eigenvalue estimates.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 06:48:12 GMT"
},
{
"version": "v2",
"created": "Mon, 9 May 2011 19:55:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Farrell",
"Brendan",
""
],
[
"Strohmer",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4344 | Luca Sanguinetti | Luca Sanguinetti, Michele Morelli and H. Vincent Poor | An Improved Scheme for Initial Ranging in OFDMA-based Networks | 6 pages, 3 figures, To appear in the Proceedings of the 2008 IEEE
International Conference on Communications, Beijing, May 19 - 23, 2008 | null | 10.1109/ICC.2008.652 | null | cs.IT cs.OH math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An efficient scheme for initial ranging has recently been proposed by X. Fu
et al. in the context of orthogonal frequency-division multiple-access (OFDMA)
networks based on the IEEE 802.16e-2005 standard. The proposed solution aims at
estimating the power levels and timing offsets of the ranging subscriber
stations (RSSs) without taking into account the effect of possible carrier
frequency offsets (CFOs) between the received signals and the base station
local reference. Motivated by the above problem, in the present work we design
a novel ranging scheme for OFDMA in which the ranging signals are assumed to be
misaligned both in time and frequency. Our goal is to estimate the timing
errors and CFOs of each active RSS. Specifically, CFO estimation is
accomplished by resorting to subspacebased methods while a least-squares
approach is employed for timing recovery. Computer simulations are used to
assess the effectiveness of the proposed solution and to make comparisons with
existing alternatives.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 20:09:34 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sanguinetti",
"Luca",
""
],
[
"Morelli",
"Michele",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4350 | Ricardo Lopez-Ruiz | Carmen Pellicer-Lostao and Ricardo Lopez-Ruiz | Role of Symmetry and Geometry in a chaotic Pseudo-Random Bit Generator | 21 pages, 10 figures, 3 tables | null | null | null | nlin.CD cs.CR physics.comp-ph stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, Pseudo-Random Bit Generation (PRBG) based on 2D chaotic
mappings of logistic type is considered. The sequences generated with two
Pseudorandom Bit Generators (PRBGs) of this type are statistically tested and
the computational effectiveness of the generators is estimated. The role played
by the symmetry and the geometrical properties of the underlying chaotic
attractors is also explored. Considering these PRBGs valid for cryptography,
the size of the available key spaces are calculated. Additionally, a novel
mechanism called 'symmetry-swap' is introduced in order to enhance the PRBG
algorithm. It is shown that it can increase the degrees of freedom of the key
space, while maintaining the speed and performance in the PRBG.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 09:50:34 GMT"
}
] | 2008-03-03T00:00:00 | [
[
"Pellicer-Lostao",
"Carmen",
""
],
[
"Lopez-Ruiz",
"Ricardo",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0802.4363 | Ioannis Kontoyiannis | Y. Gao, I. Kontoyiannis and E. Bienenstock | Estimating the entropy of binary time series: Methodology, some theory
and a simulation study | 34 pages, 3 figures | null | 10.3390/entropy-e10020071 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partly motivated by entropy-estimation problems in neuroscience, we present a
detailed and extensive comparison between some of the most popular and
effective entropy estimation methods used in practice: The plug-in method, four
different estimators based on the Lempel-Ziv (LZ) family of data compression
algorithms, an estimator based on the Context-Tree Weighting (CTW) method, and
the renewal entropy estimator.
**Methodology. Three new entropy estimators are introduced. For two of the
four LZ-based estimators, a bootstrap procedure is described for evaluating
their standard error, and a practical rule of thumb is heuristically derived
for selecting the values of their parameters. ** Theory. We prove that, unlike
their earlier versions, the two new LZ-based estimators are consistent for
every finite-valued, stationary and ergodic process. An effective method is
derived for the accurate approximation of the entropy rate of a finite-state
HMM with known distribution. Heuristic calculations are presented and
approximate formulas are derived for evaluating the bias and the standard error
of each estimator. ** Simulation. All estimators are applied to a wide range of
data generated by numerous different processes with varying degrees of
dependence and memory. Some conclusions drawn from these experiments include:
(i) For all estimators considered, the main source of error is the bias. (ii)
The CTW method is repeatedly and consistently seen to provide the most accurate
results. (iii) The performance of the LZ-based estimators is often comparable
to that of the plug-in method. (iv) The main drawback of the plug-in method is
its computational inefficiency.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 11:22:31 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Gao",
"Y.",
""
],
[
"Kontoyiannis",
"I.",
""
],
[
"Bienenstock",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0802.4390 | Doron Ezri | Vadim Neder, Doron Ezri and Motti Haridim | Low Complexity Sphere Decoding for Spatial Multiplexing MIMO | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a novel method for decoding multiple input -
multiple output (MIMO) transmission, which combines sphere decoding (SD) and
zero forcing (ZF) techniques to provide near optimal low complexity and high
performance constant time modified sphere decoding algorithm. This algorithm
was designed especially for large number of transmit antennas, and allows
efficient implementation in hardware. We do this by limiting the number of
overall SD iterations. Moreover, we make sure that matrices with high condition
number are more likely to undergo SD.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 13:42:14 GMT"
}
] | 2008-03-03T00:00:00 | [
[
"Neder",
"Vadim",
""
],
[
"Ezri",
"Doron",
""
],
[
"Haridim",
"Motti",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0802.4450 | Tamas Keviczky | Tamas Keviczky, Karl Henrik Johansson | A Study On Distributed Model Predictive Consensus | 20 pages, 4 figures, longer version of paper presented at 17th IFAC
World Congress | null | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate convergence properties of a proposed distributed model
predictive control (DMPC) scheme, where agents negotiate to compute an optimal
consensus point using an incremental subgradient method based on primal
decomposition as described in Johansson et al. [2006, 2007]. The objective of
the distributed control strategy is to agree upon and achieve an optimal common
output value for a group of agents in the presence of constraints on the agent
dynamics using local predictive controllers. Stability analysis using a
receding horizon implementation of the distributed optimal consensus scheme is
performed. Conditions are given under which convergence can be obtained even if
the negotiations do not reach full consensus.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 19:05:31 GMT"
}
] | 2008-03-03T00:00:00 | [
[
"Keviczky",
"Tamas",
""
],
[
"Johansson",
"Karl Henrik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.0011 | Grenville Croll | Keith Bishop | Qtier-Rapor: Managing Spreadsheet Systems & Improving Corporate
Performance, Compliance and Governance | 12 Pages, 6 Colour Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 33-44
ISBN:1-905617-08-9 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Much of what EuSpRIG discusses is concerned with the integrity of individual
spreadsheets. In businesses, interlocking spreadsheets are regularly used to
fill functional gaps in core administrative systems. The growth and deployment
of such integrated spreadsheet SYSTEMS raises the scale of issues to a whole
new level. The correct management of spreadsheet systems is necessary to ensure
that the business achieves its goals of improved performance and good corporate
governance, within the constraints of legislative compliance - poor management
will deliver the opposite. This paper is an anatomy of the real-life issues of
the commercial use of spreadsheets in business, and demonstrates how
Qtier-Rapor has been used to instil best practice in the use of integrated
commercial spreadsheet systems.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 21:39:29 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Bishop",
"Keith",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.0014 | Peter Schneider-Kamp | P. Schneider-Kamp, J. Giesl, A. Serebrenik, R. Thiemann | Automated Termination Proofs for Logic Programs by Term Rewriting | 49 pages | null | null | null | cs.LO cs.AI cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are two kinds of approaches for termination analysis of logic programs:
"transformational" and "direct" ones. Direct approaches prove termination
directly on the basis of the logic program. Transformational approaches
transform a logic program into a term rewrite system (TRS) and then analyze
termination of the resulting TRS instead. Thus, transformational approaches
make all methods previously developed for TRSs available for logic programs as
well. However, the applicability of most existing transformations is quite
restricted, as they can only be used for certain subclasses of logic programs.
(Most of them are restricted to well-moded programs.) In this paper we improve
these transformations such that they become applicable for any definite logic
program. To simulate the behavior of logic programs by TRSs, we slightly modify
the notion of rewriting by permitting infinite terms. We show that our
transformation results in TRSs which are indeed suitable for automated
termination analysis. In contrast to most other methods for termination of
logic programs, our technique is also sound for logic programming without occur
check, which is typically used in practice. We implemented our approach in the
termination prover AProVE and successfully evaluated it on a large collection
of examples.
| [
{
"version": "v1",
"created": "Sun, 2 Mar 2008 14:53:01 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2008 09:50:07 GMT"
}
] | 2008-09-01T00:00:00 | [
[
"Schneider-Kamp",
"P.",
""
],
[
"Giesl",
"J.",
""
],
[
"Serebrenik",
"A.",
""
],
[
"Thiemann",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0803.0015 | Grenville Croll | Simon Murphy | EuSpRIG 2006 Commercial Spreadsheet Review | 8 Pages, 9 Colour Diagrams | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 45-52
ISBN:1-905617-08-9 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This management summary provides an outline of a commercial spreadsheet
review process. The aim of this process is to ensure remedial or enhancement
work can safely be undertaken on a spreadsheet with a commercially acceptable
level of risk of introducing new errors.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 21:49:18 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Murphy",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.0018 | Deepak Ponvel Chermakani Mr | Deepak Ponvel Chermakani | Another approach to decide on real root existence for univariate
Polynomials, and a multivariate extension for 3-SAT | 8 pages, 6 Theorems on Univariate Polynomials, 1 Theorem on
Multivariate Polynomial for 3SAT, 2 Conjectures | null | null | null | cs.NA cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present six Theorems on the univariate real Polynomial, using which we
develop a new algorithm for deciding the existence of atleast one real root for
univariate integer Polynomials. Our algorithm outputs that no positive real
root exists, if and only if, the given Polynomial is a factor of a real
Polynomial with positive coefficients. Next, we define a transformation that
transforms any instance of 3-SAT into a multivariate real Polynomial with
positive coefficients, if and only if, the instance is not satisfiable.
| [
{
"version": "v1",
"created": "Fri, 29 Feb 2008 22:12:53 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2008 19:54:08 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Apr 2008 03:46:04 GMT"
},
{
"version": "v4",
"created": "Tue, 29 Apr 2008 17:18:46 GMT"
},
{
"version": "v5",
"created": "Fri, 5 Sep 2008 05:11:48 GMT"
}
] | 2008-09-05T00:00:00 | [
[
"Chermakani",
"Deepak Ponvel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0032 | Srivatsava Ranjit Ganta | Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam Smith | Composition Attacks and Auxiliary Information in Data Privacy | null | null | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Privacy is an increasingly important aspect of data publishing. Reasoning
about privacy, however, is fraught with pitfalls. One of the most significant
is the auxiliary information (also called external knowledge, background
knowledge, or side information) that an adversary gleans from other channels
such as the web, public records, or domain knowledge. This paper explores how
one can reason about privacy in the face of rich, realistic sources of
auxiliary information. Specifically, we investigate the effectiveness of
current anonymization schemes in preserving privacy when multiple organizations
independently release anonymized data about overlapping populations. 1. We
investigate composition attacks, in which an adversary uses independent
anonymized releases to breach privacy. We explain why recently proposed models
of limited auxiliary information fail to capture composition attacks. Our
experiments demonstrate that even a simple instance of a composition attack can
breach privacy in practice, for a large class of currently proposed techniques.
The class includes k-anonymity and several recent variants. 2. On a more
positive note, certain randomization-based notions of privacy (such as
differential privacy) provably resist composition attacks and, in fact, the use
of arbitrary side information. This resistance enables stand-alone design of
anonymization schemes, without the need for explicitly keeping track of other
releases. We provide a precise formulation of this property, and prove that an
important class of relaxations of differential privacy also satisfy the
property. This significantly enlarges the class of protocols known to enable
modular design.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 00:36:12 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2008 16:23:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ganta",
"Srivatsava Ranjit",
""
],
[
"Kasiviswanathan",
"Shiva Prasad",
""
],
[
"Smith",
"Adam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.0034 | Leonid Andreev V | Leonid Andreev | From a set of parts to an indivisible whole. Part I: Operations in a
closed mode | 28 pages, 10 figures; typos in equations (4) and (5) corrected | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides a description of a new method for information processing
based on holistic approach wherein analysis is a direct product of synthesis.
The core of the method is iterative averaging of all the elements of a system
according to all the parameters describing the elements. Contrary to common
logic, the iterative averaging of a system's elements does not result in
homogenization of the system; instead, it causes an obligatory subdivision of
the system into two alternative subgroups, leaving no outliers. Within each of
the formed subgroups, similarity coefficients between the elements reach the
value of 1, whereas similarity coefficients between the elements of different
subgroups equal a certain constant value greater than 0 but lower than 1. When
subjected to iterative averaging, any system consisting of three or more
elements of which at least two elements are not completely identical undergo
such a process of bifurcation that occurs non-linearly. Successive iterative
averaging of each of the forming subgroups eventually provides a hierarchical
system that reflects relationships between the elements of an input system
under analysis. We propose a definition of a natural hierarchy that can exist
only in conditions of closeness of a system and can be discovered upon
providing such an effect onto a system which allows its elements interact with
each other based on the principle of self-organization. Self-organization can
be achieved through an overall and total cross-averaging of a system's
elements. We demonstrate the application potentials of the proposed technology
on a number of examples, including a system of scattered points, randomized
datasets, as well as meteorological and demographical datasets.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 01:58:59 GMT"
},
{
"version": "v2",
"created": "Wed, 28 May 2008 04:43:14 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Andreev",
"Leonid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.0037 | Abedelaziz Mohaisen | Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang | A Survey on Deep Packet Inspection for Intrusion Detection Systems | 10 pages, 7 figures, 1 table | Magazine of Korea Telecommunication Society, vol. 24, No. 11, pp.
25-36, November 2007 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep packet inspection is widely recognized as a powerful way which is used
for intrusion detection systems for inspecting, deterring and deflecting
malicious attacks over the network. Fundamentally, almost intrusion detection
systems have the ability to search through packets and identify contents that
match with known attacks. In this paper, we survey the deep packet inspection
implementations techniques, research challenges and algorithms. Finally, we
provide a comparison between the different applied systems.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 02:56:13 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"AbuHmed",
"Tamer",
""
],
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Nyang",
"DaeHun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.0046 | Nithin Nagaraj | Nithin Nagaraj and Prabhakar G. Vaidya | One-Time Pad, Arithmetic Coding and Logic Gates: An unifying theme using
Dynamical Systems | 9 pages, 7 figures, 1 table | null | null | null | nlin.CD cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this letter, we prove that the perfectly secure One-Time Pad (OTP)
encryption can be seen as finding the initial condition on the binary map under
a random switch based on the perfectly random pad. This turns out to be a
special case of Grangetto's randomized arithmetic coding performed on the
Binary Map. Furthermore, we derive the set of possible perfect secrecy systems
using such an approach. Since OTP encryption is an XOR operation, we thus have
a dynamical systems implementation of the XOR gate. We show similar
implementations for other gates such as NOR, NAND, OR, XNOR, AND and NOT. The
dynamical systems framework unifies the three areas to which Shannon made
foundational contributions: lossless compression (Source Coding), perfect
encryption (Cryptography), and design of logic gates (Computation)
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 05:54:08 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Nagaraj",
"Nithin",
""
],
[
"Vaidya",
"Prabhakar G.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.0048 | Xin Dong | Xin Dong, Gene Cooperman | A Bit-Compatible Shared Memory Parallelization for ILU(k)
Preconditioning and a Bit-Compatible Generalization to Distributed Memory | 25 pages | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | ILU(k) is a commonly used preconditioner for iterative linear solvers for
sparse, non-symmetric systems. It is often preferred for the sake of its
stability. We present TPILU(k), the first efficiently parallelized ILU(k)
preconditioner that maintains this important stability property. Even better,
TPILU(k) preconditioning produces an answer that is bit-compatible with the
sequential ILU(k) preconditioning. In terms of performance, the TPILU(k)
preconditioning is shown to run faster whenever more cores are made available
to it --- while continuing to be as stable as sequential ILU(k). This is in
contrast to some competing methods that may become unstable if the degree of
thread parallelism is raised too far. Where Block Jacobi ILU(k) fails in an
application, it can be replaced by TPILU(k) in order to maintain good
performance, while also achieving full stability. As a further optimization,
TPILU(k) offers an optional level-based incomplete inverse method as a fast
approximation for the original ILU(k) preconditioned matrix. Although this
enhancement is not bit-compatible with classical ILU(k), it is bit-compatible
with the output from the single-threaded version of the same algorithm. In
experiments on a 16-core computer, the enhanced TPILU(k)-based iterative linear
solver performed up to 9 times faster. As we approach an era of many-core
computing, the ability to efficiently take advantage of many cores will become
ever more important. TPILU(k) also demonstrates good performance on cluster or
Grid. For example, the new algorithm achieves 50 times speedup with 80 nodes
for general sparse matrices of dimension 160,000 that are diagonally dominant.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 07:21:27 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2010 05:30:32 GMT"
},
{
"version": "v3",
"created": "Tue, 3 May 2011 19:48:42 GMT"
},
{
"version": "v4",
"created": "Thu, 12 May 2011 06:02:29 GMT"
}
] | 2011-05-13T00:00:00 | [
[
"Dong",
"Xin",
""
],
[
"Cooperman",
"Gene",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.0053 | M Sabu THAMPI | Sabu M. Thampi, K. Chandra Sekaran | Mobile Agents for Content-Based WWW Distributed Image Retrieval | null | null | null | null | cs.DC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At present, the de-facto standard for providing contents in the Internet is
the World Wide Web. A technology, which is now emerging on the Web, is
Content-Based Image Retrieval (CBIR). CBIR applies methods and algorithms from
computer science to analyse and index images based on their visual content.
Mobile agents push the flexibility of distributed systems to their limits since
not only computations are dynamically distributed but also the code that
performs them. The current commercial applet-based methodologies for accessing
image database systems offer limited flexibility, scalability and robustness.
In this paper the author proposes a new framework for content-based WWW
distributed image retrieval based on Java-based mobile agents. The
implementation of the framework shows that its performance is comparable to,
and in some cases outperforms, the current approach.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 08:27:59 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
],
[
"Sekaran",
"K. Chandra",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.0055 | Benoit Masson | Alberto Dennunzio (DISCo), Pierre Guillon (IGM), Beno\^it Masson (LIF) | A compact topology for sand automata | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we exhibit a strong relation between the sand automata
configuration space and the cellular automata configuration space. This
relation induces a compact topology for sand automata, and a new context in
which sand automata are homeomorphic to cellular automata acting on a specific
subshift. We show that the existing topological results for sand automata,
including the Hedlund-like representation theorem, still hold. In this context,
we give a characterization of the cellular automata which are sand automata,
and study some dynamical behaviors such as equicontinuity. Furthermore, we deal
with the nilpotency. We show that the classical definition is not meaningful
for sand automata. Then, we introduce a suitable new notion of nilpotency for
sand automata. Finally, we prove that this simple dynamical behavior is
undecidable.
| [
{
"version": "v1",
"created": "Sat, 1 Mar 2008 08:36:39 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Dennunzio",
"Alberto",
"",
"DISCo"
],
[
"Guillon",
"Pierre",
"",
"IGM"
],
[
"Masson",
"Benoît",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.0134 | Vahan Mkrtchyan | Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N. Vardanyan | On disjoint matchings in cubic graphs | 41 pages, 8 figures, minor chages | Discrete Mathematics, 310/10-11 (2010), pp. 1588-1613 | 10.1016/j.disc.2010.02.007 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For $i=2,3$ and a cubic graph $G$ let $\nu_{i}(G)$ denote the maximum number
of edges that can be covered by $i$ matchings. We show that $\nu_{2}(G)\geq
{4/5}| V(G)| $ and $\nu_{3}(G)\geq {7/6}| V(G)| $. Moreover, it turns out that
$\nu_{2}(G)\leq \frac{|V(G)|+2\nu_{3}(G)}{4}$.
| [
{
"version": "v1",
"created": "Sun, 2 Mar 2008 17:40:01 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 12:56:15 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Mar 2009 00:08:19 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Feb 2010 18:34:23 GMT"
}
] | 2010-03-17T00:00:00 | [
[
"Mkrtchyan",
"Vahan V.",
""
],
[
"Petrosyan",
"Samvel S.",
""
],
[
"Vardanyan",
"Gagik N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0146 | Dorit Hochbaum | Dorit S. Hochbaum | Polynomial time algorithms for bi-criteria, multi-objective and ratio
problems in clustering and imaging. Part I: Normalized cut and ratio regions | 15 pages, 4 figures | IEEE Transactions on Pattern Analysis and Machine Intelligence,
May 2010 32:5 889-898 | null | null | cs.CV cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partitioning and grouping of similar objects plays a fundamental role in
image segmentation and in clustering problems. In such problems a typical goal
is to group together similar objects, or pixels in the case of image
processing. At the same time another goal is to have each group distinctly
dissimilar from the rest and possibly to have the group size fairly large.
These goals are often combined as a ratio optimization problem. One example of
such problem is the normalized cut problem, another is the ratio regions
problem. We devise here the first polynomial time algorithms solving these
problems optimally. The algorithms are efficient and combinatorial. This
contrasts with the heuristic approaches used in the image segmentation
literature that formulate those problems as nonlinear optimization problems,
which are then relaxed and solved with spectral techniques in real numbers.
These approaches not only fail to deliver an optimal solution, but they are
also computationally expensive. The algorithms presented here use as a
subroutine a minimum $s,t-cut procedure on a related graph which is of
polynomial size. The output consists of the optimal solution to the respective
ratio problem, as well as a sequence of nested solution with respect to any
relative weighting of the objectives of the numerator and denominator.
An extension of the results here to bi-criteria and multi-criteria objective
functions is presented in part II.
| [
{
"version": "v1",
"created": "Sun, 2 Mar 2008 21:30:58 GMT"
}
] | 2010-10-12T00:00:00 | [
[
"Hochbaum",
"Dorit S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0159 | Grenville Croll | V.R. Vemula, David Ball, Simon Thorne | Towards a Spreadsheet Engineering | 12 Pages, One Figure | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 53-64
ISBN:1-905617-08-9 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we report some on-going focused research, but are further keen
to set it in the context of a proposed bigger picture, as follows. There is a
certain depressing pattern about the attitude of industry to spreadsheet error
research and a certain pattern about conferences highlighting these issues. Is
it not high time to move on from measuring spreadsheet errors to developing an
armoury of disciplines and controls? In short, we propose the need to
rigorously lay the foundations of a spreadsheet engineering discipline.
Clearly, multiple research teams would be required to tackle such a big task.
This suggests the need for both national and international collaborative
research, since any given group can only address a small segment of the whole.
There are already a small number of examples of such on-going international
collaborative research. Having established the need for a directed research
effort, the rest of the paper then attempts to act as an exemplar in
demonstrating and applying this focus. With regard to one such of research, in
a recent paper, Panko (2005) stated that: "...group development and testing
appear to be promising areas to pursue". Of particular interest to us are some
gaps in the published research record on techniques to reduce errors. We
further report on the topics: techniques for cross-checking, time constraints
effects, and some aspects of developer perception.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 00:56:03 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Vemula",
"V. R.",
""
],
[
"Ball",
"David",
""
],
[
"Thorne",
"Simon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.0162 | Grenville Croll | Andrew Kumiega, Ben Van Vliet | A Software Development Methodology for Research and Prototyping in
Financial Markets | 22 Pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 107-127
ISBN:1-905617-08-9 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objective of this paper is to develop a standardized methodology for
software development in the very unique industry and culture of financial
markets. The prototyping process we present allows the development team to
deliver for review and comment intermediate-level models based upon clearly
defined customer requirements. This spreadsheet development methodology is
presented within a larger business context, that of trading system development,
the subject of an upcoming book by the authors of this paper.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:05:40 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Kumiega",
"Andrew",
""
],
[
"Van Vliet",
"Ben",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.0163 | Grenville Croll | Jocelyn Paine, Emre Tek, Duncan Williamson | Rapid Spreadsheet Reshaping with Excelsior: multiple drastic changes to
content and layout are easy when you represent enough structure | 18 Pages, code examples | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 129-146
ISBN:1-905617-08-9 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spreadsheets often need changing in ways made tedious and risky by Excel. For
example: simultaneously altering many tables' size, orientation, and position;
inserting cross-tabulations; moving data between sheets; splitting and merging
sheets. A safer, faster restructuring tool is, we claim, Excelsior. The result
of a research project into reducing spreadsheet risk, Excelsior is the first
ever tool for modularising spreadsheets; i.e. for building them from components
which can be independently created, tested, debugged, and updated. It
represents spreadsheets in a way that makes these components explicit,
separates them from layout, and allows both components and layout to be changed
without breaking dependent formulae. Here, we report experiments to test that
this does indeed make such changes easier. In one, we automatically generated a
cross-tabulation and added it to a spreadsheet. In the other, we generated new
versions of a 10,000-cell housing-finance spreadsheet containing many
interconnected 20*40 tables. We varied table sizes from 5*10 to 200*2,000;
moved tables between sheets; and flipped table orientations. Each change
generated a spreadsheet with different structure but identical outputs; each
change took just a few minutes.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:11:39 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Paine",
"Jocelyn",
""
],
[
"Tek",
"Emre",
""
],
[
"Williamson",
"Duncan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.0164 | Grenville Croll | Simon Thorne, David Ball | Considering Functional Spreadsheet Operator Usage Suggests the Value of
Example Driven Modelling for Decision Support Systems | 12 Pages, 6 Figures, 3 Tables | roc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 147-158
ISBN:1-905617-08-9 | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most spreadsheet surveys both for reporting use and error focus on the
practical application of the spreadsheet in a particular industry. Typically
these studies will illustrate that a particular percentage of spreadsheets are
used for optimisation and a further percentage are used for 'What if' analysis.
Much less common is examining the classes of function, as defined by the
vendor, used by modellers to build their spreadsheet models. This alternative
analysis allows further insight into the programming nature of spreadsheets and
may assist researchers in targeting particular structures in spreadsheet
software for further investigation. Further, understanding the functional
make-up of spreadsheets allows effective evaluation of novel approaches from a
programming point of view. It allows greater insight into studies that report
what spreadsheets are used for since it is explicit which functional structures
are in use in spreadsheets. We conclude that a deeper understanding of the use
of operators and the operator's relationship to error would provide fresh
insight into the spreadsheet error problem. Considering functional spreadsheet
operator usage suggests the value of Example Driven Modelling for Decision
Support Systems
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:25:41 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Thorne",
"Simon",
""
],
[
"Ball",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.0165 | Grenville Croll | Raymond Payette | Documenting Spreadsheets | 12 Pages, 15 screen shots | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 163-173
ISBN:1-905617-08-9 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses spreadsheets documentation and new means to achieve this
end by using Excel's built-in "Comment" function. By structuring comments, they
can be used as an essential tool to fully explain spreadsheet. This will
greatly facilitate spreadsheet change control, risk management and auditing. It
will fill a crucial gap in corporate governance by adding essential information
that can be managed in order to satisfy internal controls and accountability
standards.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:34:30 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Payette",
"Raymond",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0166 | Grenville Croll | Richard Brath, Michael Peters | Spreadsheet Validation and Analysis through Content Visualization | 10 Pages, 11 Colour Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 175-183
ISBN:1-905617-08-9 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visualizing spreadsheet content provides analytic insight and visual
validation of large amounts of spreadsheet data. Oculus Excel Visualizer is a
point and click data visualization experiment which directly visualizes Excel
data and re-uses the layout and formatting already present in the spreadsheet.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:40:31 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Brath",
"Richard",
""
],
[
"Peters",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0167 | Grenville Croll | Michael Purser, David Chadwick | Does an awareness of differing types of spreadsheet errors aid end-users
in identifying spreadsheets errors? | 20 Pages, 14 Tables and Figures, many in colour | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 185-204
ISBN:1-905617-08-9 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The research presented in this paper establishes a valid, and simplified,
revision of previous spreadsheet error classifications. This investigation is
concerned with the results of a web survey and two web-based gender and
domain-knowledge free spreadsheet error identification exercises. The
participants of the survey and exercises were a test group of professionals
(all of whom regularly use spreadsheets) and a control group of students from
the University of Greenwich (UK). The findings show that over 85% of users are
also the spreadsheet's developer, supporting the revised spreadsheet error
classification. The findings also show that spreadsheet error identification
ability is directly affected both by spreadsheet experience and by error-type
awareness. In particular, that spreadsheet error-type awareness significantly
improves the user's ability to identify, the more surreptitious, qualitative
error.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:49:03 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Purser",
"Michael",
""
],
[
"Chadwick",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0168 | Grenville Croll | Kenneth R. Baker, Stephen G. Powell, Barry Lawson, and Lynn
Foster-Johnson | Comparison of Characteristics and Practices amongst Spreadsheet Users
with Different Levels of Experience | 16 Pages, 11 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 205-219
ISBN:1-905617-08-9 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We developed an internet-based questionnaire on spreadsheet use that we
administered to a large number of users in several companies and organizations
to document how spreadsheets are currently being developed and used in
business. In this paper, we discuss the results drawn from of a comparison of
responses from individuals with the most experience and expertise with those
from individuals with the least. These results describe two views of
spreadsheet design and use in organizations, and reflect gaps between these two
groups and between these groups and the entire population of nearly 1600
respondents. Moreover, our results indicate that these gaps have multiple
dimensions: they reflect not only the context, skill, and practices of
individual users but also the policies of large organizations.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 01:55:40 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Baker",
"Kenneth R.",
""
],
[
"Powell",
"Stephen G.",
""
],
[
"Lawson",
"Barry",
""
],
[
"Foster-Johnson",
"Lynn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0169 | Grenville Croll | Paul J. Blayney | An Investigation of the Incidence and Effect of Spreadsheet Errors
Caused by the Hard Coding of Input Data Values into Formulas | 10 Pages, 5 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 22-230
ISBN:1-905617-08-9 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hard coding of input data or constants into spreadsheet formulas is
widely recognised as poor spreadsheet model design. However, the importance of
avoiding such practice appears to be underestimated perhaps in light of the
lack of quantitative error at the time of occurrence and the recognition that
this design defect may never result in a bottom-line error. The paper examines
both the academic and practitioner view of such hard coding design flaws. The
practitioner or industry viewpoint is gained indirectly through a review of
commercial spreadsheet auditing software. The development of an automated
(electronic) means for detecting such hard coding is described together with a
discussion of some results obtained through analysis of a number of student and
practitioner spreadsheet models.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 02:00:53 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Blayney",
"Paul J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0189 | Sebastien Tixeuil | Toshimitsu Masuzawa, S\'ebastien Tixeuil (LIP6, INRIA Futurs) | Quiescence of Self-stabilizing Gossiping among Mobile Agents in Graphs | null | null | null | null | cs.DC cs.PF cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers gossiping among mobile agents in graphs: agents move on
the graph and have to disseminate their initial information to every other
agent. We focus on self-stabilizing solutions for the gossip problem, where
agents may start from arbitrary locations in arbitrary states.
Self-stabilization requires (some of the) participating agents to keep moving
forever, hinting at maximizing the number of agents that could be allowed to
stop moving eventually. This paper formalizes the self-stabilizing agent gossip
problem, introduces the quiescence number (i.e., the maximum number of
eventually stopping agents) of self-stabilizing solutions and investigates the
quiescence number with respect to several assumptions related to agent
anonymity, synchrony, link duplex capacity, and whiteboard capacity.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 09:14:21 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Mar 2008 19:19:25 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Masuzawa",
"Toshimitsu",
"",
"LIP6, INRIA Futurs"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6, INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0803.0194 | Radu Arsinte | Radu Arsinte, Costin Miron | Acquisition Accuracy Evaluation in Visual Inspection Systems - a
Practical Approach | 6 pages, 4 figures, ETc'96 Conference paper | Proceeedings of ETc '96 Conference, 1996, Timisoara, Romania | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper draws a proposal of a set of parameters and methods for accuracy
evaluation of visual inspection systems. The case of a monochrome board is
treated, but practically all conclusions and methods may be extended for colour
acquisition. Basically, the proposed parameters are grouped in five sets as
follows:Internal noise;Video ADC cuantisation parameters;Analogue processing
section parameters;Dominant frequencies;Synchronisation (lock-in) accuracy. On
basis of this set of parameters was developed a software environment, in
conjunction with a test signal generator that allows the "test" images. The
paper also presents conclusions of evaluation for two types of video
acquisition boards
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 08:57:10 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Arsinte",
"Radu",
""
],
[
"Miron",
"Costin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0803.0197 | Radu Arsinte | Radu Arsinte, Attila Ferencz, Costin Miron | DSP Based System for Real time Voice Synthesis Applications Development | 4 pages, 3 figures, SPECOM' 96 Conference | Proceedings of SPECOM' 96 Conference, 1996, St. Petersburg, Russia | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes an experimental system designed for development of real
time voice synthesis applications. The system is composed from a DSP
coprocessor card, equipped with an TMS320C25 or TMS320C50 chip, voice
acquisition module (ADDA2),host computer (IBM-PC compatible), software specific
tools.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 09:04:46 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Arsinte",
"Radu",
""
],
[
"Ferencz",
"Attila",
""
],
[
"Miron",
"Costin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0803.0225 | Tsiriniaina Andriamampianina | Tsiriniaina Andriamampianina | Random hypergraphs and algorithmics | 103 pages, french | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hypergraphs are structures that can be decomposed or described; in other
words they are recursively countable. Here, we get exact and asymptotic
enumeration results on hypergraphs by means of exponential generating
functions. The number of hypergraph component is bounded, as a generalisation
of Wright inequalities for graphs: the proof is a combinatorial understanding
of the structure by inclusion exclusion. Asymptotic results are obtained,
thanks to generating functions proofs are at the end very easy to read, through
complex analysis by saddle point method. By this way, we characterized:
- the components with a given number of vertices and of hyperedges by the
expected size of a random hypermatching in these structures.
- the random hypergraphs (evolving hyperedge by hyperedge) according to the
expected number of hyperedges when the first cycle appears in the evolving
structure.
This work is an open road to further works on random hypergraphs such as
threshold phenomenon, tools used here seem to be sufficient at first sight.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 12:13:17 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jun 2008 12:59:13 GMT"
}
] | 2008-06-20T00:00:00 | [
[
"Andriamampianina",
"Tsiriniaina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0241 | Ariel Daliot | Ariel Daliot, Danny Dolev, and Hanna Parnas | Self-Stabilizing Pulse Synchronization Inspired by Biological Pacemaker
Networks | This is the full and revised version. A previous (obsolete) version
appeared as TR2003-1, The Hebrew University of Jerusalem, 2003 | In Proceedings of the Sixth Symposium on Self-Stabilizing Systems
(SSS'03), San Francisco, June 2003. See also LNCS 2704 | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define the ``Pulse Synchronization'' problem that requires nodes to
achieve tight synchronization of regular pulse events, in the settings of
distributed computing systems. Pulse-coupled synchronization is a phenomenon
displayed by a large variety of biological systems, typically overcoming a high
level of noise. Inspired by such biological models, a robust and
self-stabilizing Byzantine pulse synchronization algorithm for distributed
computer systems is presented. The algorithm attains near optimal
synchronization tightness while tolerating up to a third of the nodes
exhibiting Byzantine behavior concurrently. Pulse synchronization has been
previously shown to be a powerful building block for designing algorithms in
this severe fault model. We have previously shown how to stabilize general
Byzantine algorithms, using pulse synchronization. To the best of our knowledge
there is no other scheme to do this without the use of synchronized pulses.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 13:46:45 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Mar 2008 18:07:32 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
],
[
"Parnas",
"Hanna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.0248 | Emmanuelle Lebhar | Augustin Chaintreau, Pierre Fraigniaud, Emmanuelle Lebhar | Networks become navigable as nodes move and forget | 21 pages, 1 figure | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a dynamical process for network evolution, aiming at explaining
the emergence of the small world phenomenon, i.e., the statistical observation
that any pair of individuals are linked by a short chain of acquaintances
computable by a simple decentralized routing algorithm, known as greedy
routing. Previously proposed dynamical processes enabled to demonstrate
experimentally (by simulations) that the small world phenomenon can emerge from
local dynamics. However, the analysis of greedy routing using the probability
distributions arising from these dynamics is quite complex because of mutual
dependencies. In contrast, our process enables complete formal analysis. It is
based on the combination of two simple processes: a random walk process, and an
harmonic forgetting process. Both processes reflect natural behaviors of the
individuals, viewed as nodes in the network of inter-individual acquaintances.
We prove that, in k-dimensional lattices, the combination of these two
processes generates long-range links mutually independently distributed as a
k-harmonic distribution. We analyze the performances of greedy routing at the
stationary regime of our process, and prove that the expected number of steps
for routing from any source to any target in any multidimensional lattice is a
polylogarithmic function of the distance between the two nodes in the lattice.
Up to our knowledge, these results are the first formal proof that navigability
in small worlds can emerge from a dynamical process for network evolution. Our
dynamical process can find practical applications to the design of spatial
gossip and resource location protocols.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 14:44:08 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Chaintreau",
"Augustin",
""
],
[
"Fraigniaud",
"Pierre",
""
],
[
"Lebhar",
"Emmanuelle",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0265 | Pierre Moulin | Ying Wang and Pierre Moulin | Blind Fingerprinting | 36 pages, submitted for publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study blind fingerprinting, where the host sequence into which
fingerprints are embedded is partially or completely unknown to the decoder.
This problem relates to a multiuser version of the Gel'fand-Pinsker problem.
The number of colluders and the collusion channel are unknown, and the
colluders and the fingerprint embedder are subject to distortion constraints.
We propose a conditionally constant-composition random binning scheme and a
universal decoding rule and derive the corresponding false-positive and
false-negative error exponents. The encoder is a stacked binning scheme and
makes use of an auxiliary random sequence. The decoder is a {\em maximum
doubly-penalized mutual information decoder}, where the significance of each
candidate coalition is assessed relative to a threshold that trades off
false-positive and false-negative error exponents. The penalty is proportional
to coalition size and is a function of the conditional type of host sequence.
Positive exponents are obtained at all rates below a certain value, which is
therefore a lower bound on public fingerprinting capacity. We conjecture that
this value is the public fingerprinting capacity. A simpler threshold decoder
is also given, which has similar universality properties but also lower
achievable rates. An upper bound on public fingerprinting capacity is also
derived.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 15:45:27 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Wang",
"Ying",
""
],
[
"Moulin",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0316 | Sandor P. Fekete | Erik D. Demaine, Martin L. Demaine, Sandor P. Fekete, Mashhood
Ishaque, Eynat Rafalin, Robert T. Schweller and Diane Souvaine | Staged Self-Assembly:Nanomanufacture of Arbitrary Shapes with O(1) Glues | 22 pages, 15 figures, 1table, PDFLatex; conference version in
Proceedings of the 13th International Meeting on DNA Computing (DNA13), 2007,
pp. 46-55, full version to appear in Natural Computing | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce staged self-assembly of Wang tiles, where tiles can be added
dynamically in sequence and where intermediate constructions can be stored for
later mixing. This model and its various constraints and performance measures
are motivated by a practical nanofabrication scenario through protein-based
bioengineering. Staging allows us to break through the traditional lower bounds
in tile self-assembly by encoding the shape in the staging algorithm instead of
the tiles. All of our results are based on the practical assumption that only a
constant number of glues, and thus only a constant number of tiles, can be
engineered, as each new glue type requires significant biochemical research and
experiments. Under this assumption, traditional tile self-assembly cannot even
manufacture an n*n square; in contrast, we show how staged assembly enables
manufacture of arbitrary orthogonal shapes in a variety of precise formulations
of the model.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2008 20:20:52 GMT"
}
] | 2008-03-04T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Ishaque",
"Mashhood",
""
],
[
"Rafalin",
"Eynat",
""
],
[
"Schweller",
"Robert T.",
""
],
[
"Souvaine",
"Diane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0803.0378 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Thread algebra for poly-threading | 24 pages, sections 9, 10, and 11 are added | Formal Aspects of Computing, 23(4):567--583, 2011 | 10.1007/s00165-011-0178-3 | PRG0810 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Threads as considered in basic thread algebra are primarily looked upon as
behaviours exhibited by sequential programs on execution. It is a fact of life
that sequential programs are often fragmented. Consequently, fragmented program
behaviours are frequently found. In this paper, we consider this phenomenon. We
extend basic thread algebra with the barest mechanism for sequencing of threads
that are taken for fragments. This mechanism, called poly-threading, supports
both autonomous and non-autonomous thread selection in sequencing. We relate
the resulting theory to the algebraic theory of processes known as ACP and use
it to describe analytic execution architectures suited for fragmented programs.
We also consider the case where the steps of fragmented program behaviours are
interleaved in the ways of non-distributed and distributed multi-threading.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 07:18:46 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Jul 2008 12:31:50 GMT"
}
] | 2011-06-17T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.0398 | Andrea Baronchelli | Andrea Baronchelli, Vittorio Loreto, Luc Steels | In-depth analysis of the Naming Game dynamics: the homogeneous mixing
case | 30 pages, 19 figures (few in reduced definition). In press in IJMPC | Int. J. Mod. Phys. C 19, 785 (2008) | 10.1142/S0129183108012522 | null | physics.soc-ph cond-mat.stat-mech cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language emergence and evolution has recently gained growing attention
through multi-agent models and mathematical frameworks to study their behavior.
Here we investigate further the Naming Game, a model able to account for the
emergence of a shared vocabulary of form-meaning associations through
social/cultural learning. Due to the simplicity of both the structure of the
agents and their interaction rules, the dynamics of this model can be analyzed
in great detail using numerical simulations and analytical arguments. This
paper first reviews some existing results and then presents a new overall
understanding.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 13:35:28 GMT"
}
] | 2008-07-21T00:00:00 | [
[
"Baronchelli",
"Andrea",
""
],
[
"Loreto",
"Vittorio",
""
],
[
"Steels",
"Luc",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.0404 | Maria Serna | Josep Freixas, Xavier Molinero, Martin Olsen, Maria Serna | The Complexity of Testing Properties of Simple Games | 18 pages, LaTex file | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simple games cover voting systems in which a single alternative, such as a
bill or an amendment, is pitted against the status quo. A simple game or a
yes-no voting system is a set of rules that specifies exactly which collections
of ``yea'' votes yield passage of the issue at hand. A collection of ``yea''
voters forms a winning coalition.
We are interested on performing a complexity analysis of problems on such
games depending on the game representation. We consider four natural explicit
representations, winning, loosing, minimal winning, and maximal loosing. We
first analyze the computational complexity of obtaining a particular
representation of a simple game from a different one. We show that some cases
this transformation can be done in polynomial time while the others require
exponential time. The second question is classifying the complexity for testing
whether a game is simple or weighted. We show that for the four types of
representation both problem can be solved in polynomial time. Finally, we
provide results on the complexity of testing whether a simple game or a
weighted game is of a special type. In this way, we analyze strongness,
properness, decisiveness and homogeneity, which are desirable properties to be
fulfilled for a simple game.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 10:20:04 GMT"
}
] | 2008-03-05T00:00:00 | [
[
"Freixas",
"Josep",
""
],
[
"Molinero",
"Xavier",
""
],
[
"Olsen",
"Martin",
""
],
[
"Serna",
"Maria",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.0405 | Giulia Menconi | Marco Franciosi, Giulia Menconi | Multi-dimensional sparse time series: feature extraction | Keywords: multimedia mining, trend, entropy, Zipf law | null | null | null | cs.MM cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show an analysis of multi-dimensional time series via entropy and
statistical linguistic techniques. We define three markers encoding the
behavior of the series, after it has been translated into a multi-dimensional
symbolic sequence. The leading component and the trend of the series with
respect to a mobile window analysis result from the entropy analysis and label
the dynamical evolution of the series. The diversification formalizes the
differentiation in the use of recurrent patterns, from a Zipf law point of
view. These markers are the starting point of further analysis such as
classification or clustering of large database of multi-dimensional time
series, prediction of future behavior and attribution of new data. We also
present an application to economic data. We deal with measurements of money
investments of some business companies in advertising market for different
media sources.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 10:27:59 GMT"
}
] | 2008-03-05T00:00:00 | [
[
"Franciosi",
"Marco",
""
],
[
"Menconi",
"Giulia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.0412 | Alex Feigel | A. Feigel | Essential conditions for evolution of communication within a species | Final version to appear in Journal of Theoretical Biology, see DOI
Extended introduction, notation is changed to fit the standard | null | 10.1016/j.jtbi.2008.07.005 | null | q-bio.PE cs.GT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A major obstacle in analyzing the evolution of information exchange and
processing is our insufficient understanding of the underlying signaling and
decision-making biological mechanisms. For instance, it is unclear why are
humans unique in developing such extensive communication abilities. To treat
this problem, a method based on the mutual information approach is developed
that evaluates the information content of communication between interacting
individuals through correlations of their behavior patterns (rather than
calculating the information load of exchanged discrete signals, e.g. Shannon
entropy). It predicts that correlated interactions of the indirect reciprocity
type together with affective behavior and selection rules changing with time
are necessary conditions for the emergence of significant information exchange.
Population size variations accelerate this development. These results are
supported by evidence of demographic bottlenecks, distinguishing human from
other species' (e.g. apes) evolution line. They indicate as well new pathways
for evolution of information based phenomena, such as intelligence and
complexity.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 17:04:24 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Sep 2008 15:38:13 GMT"
}
] | 2008-09-06T00:00:00 | [
[
"Feigel",
"A.",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0803.0428 | Sander Wahls | Sander Wahls, Holger Boche, Volker Pohl | Zero-Forcing Precoding for Frequency Selective MIMO Channels with
$H^\infty$ Criterion and Causality Constraint | Minor Revisions, mainly in introduction and problem statement.
Submitted to Signal Processing | Signal Processing, Vol. 89, No. 9, pp. 1754-1761, Sep. 2009 | 10.1016/j.sigpro.2009.03.010 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider zero-forcing equalization of frequency selective MIMO channels by
causal and linear time-invariant precoders in the presence of intersymbol
interference. Our motivation is twofold. First, we are concerned with the
optimal performance of causal precoders from a worst case point of view.
Therefore we construct an optimal causal precoder, whereas contrary to other
works our construction is not limited to finite or rational impulse responses.
Moreover we derive a novel numerical approach to computation of the optimal
perfomance index achievable by causal precoders for given channels. This
quantity is important in the numerical determination of optimal precoders.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 12:34:43 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2008 15:05:22 GMT"
}
] | 2009-05-12T00:00:00 | [
[
"Wahls",
"Sander",
""
],
[
"Boche",
"Holger",
""
],
[
"Pohl",
"Volker",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0439 | Christoph Lauter | Florent De Dinechin (LIP), Christoph Quirin Lauter (LIP) | Optimizing polynomials for floating-point implementation | 12 pages | null | null | null | cs.NA cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The floating-point implementation of a function on an interval often reduces
to polynomial approximation, the polynomial being typically provided by Remez
algorithm. However, the floating-point evaluation of a Remez polynomial
sometimes leads to catastrophic cancellations. This happens when some of the
polynomial coefficients are very small in magnitude with respects to others. In
this case, it is better to force these coefficients to zero, which also reduces
the operation count. This technique, classically used for odd or even
functions, may be generalized to a much larger class of functions. An algorithm
is presented that forces to zero the smaller coefficients of the initial
polynomial thanks to a modified Remez algorithm targeting an incomplete
monomial basis. One advantage of this technique is that it is purely numerical,
the function being used as a numerical black box. This algorithm is implemented
within a larger polynomial implementation tool that is demonstrated on a range
of examples, resulting in polynomials with less coefficients than those
obtained the usual way.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 13:49:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"De Dinechin",
"Florent",
"",
"LIP"
],
[
"Lauter",
"Christoph Quirin",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0803.0450 | Debprakash Patnaik | Debprakash Patnaik (Electical Engg. Dept., Indian Institute of
Science, Bangalore), and P. S. Sastry (Electrical Engg. Dept., Indian
Institute of Science, Bangalore), and K. P. Unnikrishnan (General Motors R&D,
Warren) | Inferring Neuronal Network Connectivity from Spike Data: A Temporal
Datamining Approach | null | null | null | null | cs.DB q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the functioning of a neural system in terms of its underlying
circuitry is an important problem in neuroscience. Recent developments in
electrophysiology and imaging allow one to simultaneously record activities of
hundreds of neurons. Inferring the underlying neuronal connectivity patterns
from such multi-neuronal spike train data streams is a challenging statistical
and computational problem. This task involves finding significant temporal
patterns from vast amounts of symbolic time series data. In this paper we show
that the frequent episode mining methods from the field of temporal data mining
can be very useful in this context. In the frequent episode discovery
framework, the data is viewed as a sequence of events, each of which is
characterized by an event type and its time of occurrence and episodes are
certain types of temporal patterns in such data. Here we show that, using the
set of discovered frequent episodes from multi-neuronal data, one can infer
different types of connectivity patterns in the neural system that generated
it. For this purpose, we introduce the notion of mining for frequent episodes
under certain temporal constraints; the structure of these temporal constraints
is motivated by the application. We present algorithms for discovering serial
and parallel episodes under these temporal constraints. Through extensive
simulation studies we demonstrate that these methods are useful for unearthing
patterns of neuronal network connectivity.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 14:11:38 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Mar 2008 02:24:13 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Patnaik",
"Debprakash",
"",
"Electical Engg. Dept., Indian Institute of\n Science, Bangalore"
],
[
"Sastry",
"P. S.",
"",
"Electrical Engg. Dept., Indian\n Institute of Science, Bangalore"
],
[
"Unnikrishnan",
"K. P.",
"",
"General Motors R&D,\n Warren"
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0803.0473 | Edith Cohen | Edith Cohen, Nick Duffield, Haim Kaplan, Carsten Lund, and Mikkel
Thorup | Stream sampling for variance-optimal estimation of subset sums | 31 pages. An extended abstract appeared in the proceedings of the
20th ACM-SIAM Symposium on Discrete Algorithms (SODA 2009) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From a high volume stream of weighted items, we want to maintain a generic
sample of a certain limited size $k$ that we can later use to estimate the
total weight of arbitrary subsets. This is the classic context of on-line
reservoir sampling, thinking of the generic sample as a reservoir. We present
an efficient reservoir sampling scheme, $\varoptk$, that dominates all previous
schemes in terms of estimation quality.
$\varoptk$ provides {\em variance optimal unbiased estimation of subset
sums}. More precisely, if we have seen $n$ items of the stream, then for {\em
any} subset size $m$, our scheme based on $k$ samples minimizes the average
variance over all subsets of size $m$. In fact, the optimality is against any
off-line scheme with $k$ samples tailored for the concrete set of items seen.
In addition to optimal average variance, our scheme provides tighter worst-case
bounds on the variance of {\em particular} subsets than previously possible. It
is efficient, handling each new item of the stream in $O(\log k)$ time.
Finally, it is particularly well suited for combination of samples from
different streams in a distributed setting.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 15:12:24 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Nov 2010 16:43:54 GMT"
}
] | 2010-11-16T00:00:00 | [
[
"Cohen",
"Edith",
""
],
[
"Duffield",
"Nick",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Lund",
"Carsten",
""
],
[
"Thorup",
"Mikkel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0476 | Renaud Lambiotte | Vincent D. Blondel, Jean-Loup Guillaume, Renaud Lambiotte and Etienne
Lefebvre | Fast unfolding of communities in large networks | 6 pages, 5 figures, 1 table; new version with new figures in order to
clarify our method, where we look more carefully at the role played by the
ordering of the nodes and where we compare our method with that of Wakita and
Tsurumi | J. Stat. Mech. (2008) P10008 | 10.1088/1742-5468/2008/10/P10008 | null | physics.soc-ph cond-mat.stat-mech cs.CY cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a simple method to extract the community structure of large
networks. Our method is a heuristic method that is based on modularity
optimization. It is shown to outperform all other known community detection
method in terms of computation time. Moreover, the quality of the communities
detected is very good, as measured by the so-called modularity. This is shown
first by identifying language communities in a Belgian mobile phone network of
2.6 million customers and by analyzing a web graph of 118 million nodes and
more than one billion links. The accuracy of our algorithm is also verified on
ad-hoc modular networks. .
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 15:29:44 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jul 2008 09:52:42 GMT"
}
] | 2008-12-01T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Guillaume",
"Jean-Loup",
""
],
[
"Lambiotte",
"Renaud",
""
],
[
"Lefebvre",
"Etienne",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0515 | Christopher Pearson | Christopher Pearson, Celina Gibbs, Yvonne Coady | Intuitive Source Code Visualization Tools for Improving Student
Comprehension: BRICS | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Even relatively simple code analysis can be a daunting task for many first
year students. Perceived complexity, coupled with foreign and harsh syntax,
often outstrips the ability for students to take in what they are seeing in
terms of their verbal memory. That is, first year students often lack the
experience to encode critical building blocks in source code, and their
interrelationships, into their own words. We believe this argues for the need
for IDEs to provide additional support for representations that would appeal
directly to visual memory. In this paper, we examine this need for intuitive
source code visualization tools that are easily accessible to novice
programmers, discuss the requirements for such a tool, and suggest a novel idea
that takes advantage of human peripheral vision to achieve stronger overall
code structure awareness.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 18:46:49 GMT"
}
] | 2008-03-05T00:00:00 | [
[
"Pearson",
"Christopher",
""
],
[
"Gibbs",
"Celina",
""
],
[
"Coady",
"Yvonne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.0528 | Abdelhamid Mellouk | Said Hoceini (LISSI - Ea 3956), Abdelhamid Mellouk (LISSI - Ea 3956),
Hayet Hafi (LISSI - Ea 3956) | Une approche modulaire probabiliste pour le routage \`a Qualit\'e de
Service int\'egr\'ee | null | Colloque Francophone sur l'Ing\'enierie des Protocoles (CFIP), Les
Arcs : France (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to emerging real-time and multimedia applications, efficient routing of
information packets in dynamically changing communication network requires that
as the load levels, traffic patterns and topology of the network change, the
routing policy also adapts. We focused in this paper on QoS based routing by
developing a neuro-dynamic programming to construct dynamic state dependent
routing policies. We propose an approach based on adaptive algorithm for packet
routing using reinforcement learning which optimizes two criteria: cumulative
cost path and end-to-end delay. Numerical results obtained with OPNET simulator
for different packet interarrival times statistical distributions with
different levels of traffic's load show that the proposed approach gives better
results compared to standard optimal path routing algorithms.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 19:43:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hoceini",
"Said",
"",
"LISSI - Ea 3956"
],
[
"Mellouk",
"Abdelhamid",
"",
"LISSI - Ea 3956"
],
[
"Hafi",
"Hayet",
"",
"LISSI - Ea 3956"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.0529 | Michel Martinez | M. Barcikowski (INRIA Sophia Antipolis), P. Pernelle, A. Lefebvre
(AIB_ERN), M. Martinez, J. Renaud | Evaluation and exploitation of knowledge robustness in knowledge-based
systems | null | Dans Proceedings - 9th IFAC (IEEE Control Systems Society) Symp.
Automated Syst. Based on Human Skill and Knowledge (ASBoHS'06), Nancy :
France (2006) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Industrial knowledge is complex, difficult to formalize and very dynamic in
reason of the continuous development of techniques and technologies. The
verification of the validity of the knowledge base at the time of its
elaboration is not sufficient. To be exploitable, this knowledge must then be
able to be used under conditions (slightly) different from the conditions in
which it was formalized. So, it becomes vital for the company to permanently
evaluate the quality of the industrial knowledge implemented in the system.
This evaluation is founded on the concept of robustness of the knowledge
formalized by conceptual graphs. The evaluation method is supported by a
computerized tool.
| [
{
"version": "v1",
"created": "Tue, 4 Mar 2008 19:46:23 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Barcikowski",
"M.",
"",
"INRIA Sophia Antipolis"
],
[
"Pernelle",
"P.",
"",
"AIB_ERN"
],
[
"Lefebvre",
"A.",
"",
"AIB_ERN"
],
[
"Martinez",
"M.",
""
],
[
"Renaud",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.0597 | Leonardo Cardoso | L. S. Cardoso, M. Debbah, P. Bianchi, J. Najim | Cooperative Spectrum Sensing Using Random Matrix Theory | Submitted to International Symposium on Wireless Pervasive Computing
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, using tools from asymptotic random matrix theory, a new
cooperative scheme for frequency band sensing is introduced for both AWGN and
fading channels. Unlike previous works in the field, the new scheme does not
require the knowledge of the noise statistics or its variance and is related to
the behavior of the largest and smallest eigenvalue of random matrices.
Remarkably, simulations show that the asymptotic claims hold even for a small
number of observations (which makes it convenient for time-varying topologies),
outperforming classical energy detection techniques.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 07:07:31 GMT"
}
] | 2008-03-06T00:00:00 | [
[
"Cardoso",
"L. S.",
""
],
[
"Debbah",
"M.",
""
],
[
"Bianchi",
"P.",
""
],
[
"Najim",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0610 | Peter Jung | Peter Jung | On the Approximate Eigenstructure of Time-Varying Channels | 30 onecolumn-pages, 2 figures, replaced with revised version,
submitted (Dec07) to Signal Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we consider the approximate description of doubly--dispersive
channels by its symbol. We focus on channel operators with compactly supported
spreading, which are widely used to represent fast fading multipath
communication channels. The concept of approximate eigenstructure is
introduced, which measures the accuracy E_p of the approximation of the channel
operation as a pure multiplication in a given L_p-norm. Two variants of such an
approximate Weyl symbol calculus are studied, which have important applications
in several models for time--varying mobile channels. Typically, such channels
have random spreading functions (inverse Weyl transform) defined on a common
support U of finite non--zero size such that approximate eigenstructure has to
be measured with respect to certain norms of the spreading process. We derive
several explicit relations to the size |U| of the support. We show that the
characterization of the ratio of E_p to some L_q-norm of the spreading function
is related to weighted norms of ambiguity and Wigner functions. We present the
connection to localization operators and give new bounds on the ability of
localization of ambiguity functions and Wigner functions in U. Our analysis
generalizes and improves recent results for the case p=2 and q=1.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 09:07:30 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jul 2008 14:13:05 GMT"
}
] | 2008-07-10T00:00:00 | [
[
"Jung",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0632 | Alexandros Dimakis | Alexandros G. Dimakis, P. Brighten Godfrey, Yunnan Wu, Martin J.
Wainwright, Kannan Ramchandran | Network Coding for Distributed Storage Systems | null | null | null | EECS 14546 | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed storage systems provide reliable access to data through
redundancy spread over individually unreliable nodes. Application scenarios
include data centers, peer-to-peer storage systems, and storage in wireless
networks. Storing data using an erasure code, in fragments spread across nodes,
requires less redundancy than simple replication for the same level of
reliability. However, since fragments must be periodically replaced as nodes
fail, a key question is how to generate encoded fragments in a distributed way
while transferring as little data as possible across the network.
For an erasure coded system, a common practice to repair from a node failure
is for a new node to download subsets of data stored at a number of surviving
nodes, reconstruct a lost coded block using the downloaded data, and store it
at the new node. We show that this procedure is sub-optimal. We introduce the
notion of regenerating codes, which allow a new node to download
\emph{functions} of the stored data from the surviving nodes. We show that
regenerating codes can significantly reduce the repair bandwidth. Further, we
show that there is a fundamental tradeoff between storage and repair bandwidth
which we theoretically characterize using flow arguments on an appropriately
constructed graph. By invoking constructive results in network coding, we
introduce regenerating codes that can achieve any point in this optimal
tradeoff.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 11:05:08 GMT"
}
] | 2008-03-06T00:00:00 | [
[
"Dimakis",
"Alexandros G.",
""
],
[
"Godfrey",
"P. Brighten",
""
],
[
"Wu",
"Yunnan",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Ramchandran",
"Kannan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0653 | Joaquin Garcia-Alfaro | Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia | Aggregating and Deploying Network Access Control Policies | 9 pages | Proc. 2007 International Symposium on Frontiers in Availability,
Reliability and Security (FARES), Vienna (Austria), 10-13 April 2007
(10/04/2007), 532-539 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The existence of errors or inconsistencies in the configuration of security
components, such as filtering routers and/or firewalls, may lead to weak access
control policies -- potentially easy to be evaded by unauthorized parties. We
present in this paper a proposal to create, manage, and deploy consistent
policies in those components in an efficient way. To do so, we combine two main
approaches. The first approach is the use of an aggregation mechanism that
yields consistent configurations or signals inconsistencies. Through this
mechanism we can fold existing policies of a given system and create a
consistent and global set of access control rules -- easy to maintain and
manage by using a single syntax. The second approach is the use of a refinement
mechanism that guarantees the proper deployment of such a global set of rules
into the system, yet free of inconsistencies.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 13:07:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Garcia-Alfaro",
"Joaquin",
""
],
[
"Cuppens",
"Frederic",
""
],
[
"Cuppens-Boulahia",
"Nora",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.0661 | Jakob Nordstr\"om | Jakob Nordstr\"om, Johan H{\aa}stad | Towards an Optimal Separation of Space and Length in Resolution | null | null | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most state-of-the-art satisfiability algorithms today are variants of the
DPLL procedure augmented with clause learning. The main bottleneck for such
algorithms, other than the obvious one of time, is the amount of memory used.
In the field of proof complexity, the resources of time and memory correspond
to the length and space of resolution proofs. There has been a long line of
research trying to understand these proof complexity measures, but while strong
results have been proven on length our understanding of space is still quite
poor. For instance, it remains open whether the fact that a formula is provable
in short length implies that it is also provable in small space or whether on
the contrary these measures are unrelated in the sense that short proofs can be
arbitrarily complex with respect to space.
In this paper, we present some evidence that the true answer should be that
the latter case holds. We do this by proving a tight bound of Theta(sqrt(n)) on
the space needed for so-called pebbling contradictions over pyramid graphs of
size n. This yields the first polynomial lower bound on space that is not a
consequence of a corresponding lower bound on width, another well-studied
measure in resolution, as well as an improvement of the weak separation in
(Nordstrom 2006) of space and width from logarithmic to polynomial.
Also, continuing the line of research initiated by (Ben-Sasson 2002) into
trade-offs between different proof complexity measures, we present a simplified
proof of the recent length-space trade-off result in (Hertel and Pitassi 2007),
and show how our ideas can be used to prove a couple of other exponential
trade-offs in resolution.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 12:52:13 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Nordström",
"Jakob",
""
],
[
"Håstad",
"Johan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.0666 | Soumaya El Kadiri | Soumaya El Kadiri (LIESP), Philippe Pernelle (LIESP), Miguel Delattre
(LIESP), Abdelaziz Bouras (LIESP) | An approach to control collaborative processes in PLM systems | null | Dans Workshop on Extended Product and Process Analysis aNd Design
- Extended Product and Process Analysis aNd Design, Bordeaux : France (2008) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Companies that collaborate within the product development processes need to
implement an effective management of their collaborative activities. Despite
the implementation of a PLM system, the collaborative activities are not
efficient as it might be expected. This paper presents an analysis of the
problems related to the collaborative work using a PLM system. From this
analysis, we propose an approach for improving collaborative processes within a
PLM system, based on monitoring indicators. This approach leads to identify and
therefore to mitigate the brakes of the collaborative work.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 14:04:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kadiri",
"Soumaya El",
"",
"LIESP"
],
[
"Pernelle",
"Philippe",
"",
"LIESP"
],
[
"Delattre",
"Miguel",
"",
"LIESP"
],
[
"Bouras",
"Abdelaziz",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.0701 | Gregory Gutin | N Alon, F.V. Fomin, G. Gutin, M. Krivelevich and S. Saurabh | Spanning directed trees with many leaves | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The {\sc Directed Maximum Leaf Out-Branching} problem is to find an
out-branching (i.e. a rooted oriented spanning tree) in a given digraph with
the maximum number of leaves. In this paper, we obtain two combinatorial
results on the number of leaves in out-branchings. We show that
- every strongly connected $n$-vertex digraph $D$ with minimum in-degree at
least 3 has an out-branching with at least $(n/4)^{1/3}-1$ leaves;
- if a strongly connected digraph $D$ does not contain an out-branching with
$k$ leaves, then the pathwidth of its underlying graph UG($D$) is $O(k\log k)$.
Moreover, if the digraph is acyclic, the pathwidth is at most $4k$.
The last result implies that it can be decided in time $2^{O(k\log^2 k)}\cdot
n^{O(1)}$ whether a strongly connected digraph on $n$ vertices has an
out-branching with at least $k$ leaves. On acyclic digraphs the running time of
our algorithm is $2^{O(k\log k)}\cdot n^{O(1)}$.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 16:38:34 GMT"
}
] | 2008-03-06T00:00:00 | [
[
"Alon",
"N",
""
],
[
"Fomin",
"F. V.",
""
],
[
"Gutin",
"G.",
""
],
[
"Krivelevich",
"M.",
""
],
[
"Saurabh",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0726 | Marie-Pierre B\'eal | Marie-Pierre B\'eal, Dominique Perrin | A quadratic algorithm for road coloring | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Road Coloring Theorem states that every aperiodic directed graph with
constant out-degree has a synchronized coloring. This theorem had been
conjectured during many years as the Road Coloring Problem before being settled
by A. Trahtman. Trahtman's proof leads to an algorithm that finds a
synchronized labeling with a cubic worst-case time complexity. We show a
variant of his construction with a worst-case complexity which is quadratic in
time and linear in space. We also extend the Road Coloring Theorem to the
periodic case.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 20:35:54 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Mar 2008 21:33:23 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Apr 2008 15:12:00 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Apr 2008 16:32:12 GMT"
},
{
"version": "v5",
"created": "Wed, 14 May 2008 14:54:09 GMT"
},
{
"version": "v6",
"created": "Fri, 11 Jul 2008 14:21:07 GMT"
},
{
"version": "v7",
"created": "Wed, 7 Oct 2009 16:00:57 GMT"
},
{
"version": "v8",
"created": "Mon, 23 Apr 2012 16:17:48 GMT"
},
{
"version": "v9",
"created": "Thu, 30 May 2013 16:16:40 GMT"
}
] | 2013-05-31T00:00:00 | [
[
"Béal",
"Marie-Pierre",
""
],
[
"Perrin",
"Dominique",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0731 | Ning Chen | Ning Chen and Zhiyuan Yan | Complexity Analysis of Reed-Solomon Decoding over GF(2^m) Without Using
Syndromes | 11 pages, submitted to EURASIP Journal on Wireless Communications and
Networking | null | null | null | cs.IT cs.CC cs.DS math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the majority of the applications of Reed-Solomon (RS) codes, hard
decision decoding is based on syndromes. Recently, there has been renewed
interest in decoding RS codes without using syndromes. In this paper, we
investigate the complexity of syndromeless decoding for RS codes, and compare
it to that of syndrome-based decoding. Aiming to provide guidelines to
practical applications, our complexity analysis differs in several aspects from
existing asymptotic complexity analysis, which is typically based on
multiplicative fast Fourier transform (FFT) techniques and is usually in big O
notation. First, we focus on RS codes over characteristic-2 fields, over which
some multiplicative FFT techniques are not applicable. Secondly, due to
moderate block lengths of RS codes in practice, our analysis is complete since
all terms in the complexities are accounted for. Finally, in addition to fast
implementation using additive FFT techniques, we also consider direct
implementation, which is still relevant for RS codes with moderate lengths.
Comparing the complexities of both syndromeless and syndrome-based decoding
algorithms based on direct and fast implementations, we show that syndromeless
decoding algorithms have higher complexities than syndrome-based ones for high
rate RS codes regardless of the implementation. Both errors-only and
errors-and-erasures decoding are considered in this paper. We also derive
tighter bounds on the complexities of fast polynomial multiplications based on
Cantor's approach and the fast extended Euclidean algorithm.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 18:54:35 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2008 21:05:41 GMT"
}
] | 2008-05-08T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0755 | Yi Ming Zou | Florian Sebert, Leslie Ying, and Yi Ming Zou | Toeplitz Block Matrices in Compressed Sensing | Preprint 16 pages, 1 figure | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work in compressed sensing theory shows that $n\times N$ independent
and identically distributed (IID) sensing matrices whose entries are drawn
independently from certain probability distributions guarantee exact recovery
of a sparse signal with high probability even if $n\ll N$. Motivated by signal
processing applications, random filtering with Toeplitz sensing matrices whose
elements are drawn from the same distributions were considered and shown to
also be sufficient to recover a sparse signal from reduced samples exactly with
high probability. This paper considers Toeplitz block matrices as sensing
matrices. They naturally arise in multichannel and multidimensional filtering
applications and include Toeplitz matrices as special cases. It is shown that
the probability of exact reconstruction is also high. Their performance is
validated using simulations.
| [
{
"version": "v1",
"created": "Wed, 5 Mar 2008 22:39:23 GMT"
}
] | 2008-03-07T00:00:00 | [
[
"Sebert",
"Florian",
""
],
[
"Ying",
"Leslie",
""
],
[
"Zou",
"Yi Ming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0803.0764 | Salah A. Aly | Salah A. Aly | Asymmetric and Symmetric Subsystem BCH Codes and Beyond | 10 pages, 2 figures, and 2 tables of independent work. Private
comments and corrections are welcome | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the theory of quantum error control codes has been extended to
subsystem codes over symmetric and asymmetric quantum channels -- qubit-flip
and phase-shift errors may have equal or different probabilities. Previous work
in constructing quantum error control codes has focused on code constructions
for symmetric quantum channels. In this paper, we develop a theory and
establish the connection between asymmetric quantum codes and subsystem codes.
We present families of subsystem and asymmetric quantum codes derived, once
again, from classical BCH and RS codes over finite fields. Particularly, we
derive an interesting asymmetric and symmetric subsystem codes based on
classical BCH codes with parameters $[[n,k,r,d]]_q$, $[[n,k,r,d_z/d_x]]_q$ and
$[[n,k',0,d_z/d_x]]_q$ for arbitrary values of code lengths and dimensions. We
establish asymmetric Singleton and Hamming bounds on asymmetric quantum and
subsystem code parameters; and derive optimal asymmetric MDS subsystem codes.
Finally, our constructions are well explained by an illustrative example.
This paper is written on the occasion of the 50th anniversary of the
discovery of classical BCH codes and their quantum counterparts were derived
nearly 10 years ago.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 20:55:41 GMT"
}
] | 2008-11-11T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0778 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Constant-Rank Codes | 5 pages, to appear in Proc. IEEE ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constant-dimension codes have recently received attention due to their
significance to error control in noncoherent random network coding. In this
paper, we show that constant-rank codes are closely related to
constant-dimension codes and we study the properties of constant-rank codes. We
first introduce a relation between vectors in $\mathrm{GF}(q^m)^n$ and
subspaces of $\mathrm{GF}(q)^m$ or $\mathrm{GF}(q)^n$, and use it to establish
a relation between constant-rank codes and constant-dimension codes. We then
derive bounds on the maximum cardinality of constant-rank codes with given rank
weight and minimum rank distance. Finally, we investigate the asymptotic
behavior of the maximal cardinality of constant-rank codes with given rank
weight and minimum rank distance.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 02:17:36 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2008 20:35:10 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0792 | Siddhartha Sen | Bernhard Haeupler, Siddhartha Sen, and Robert E. Tarjan | Incremental Topological Ordering and Strong Component Maintenance | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an on-line algorithm for maintaining a topological order of a
directed acyclic graph as arcs are added, and detecting a cycle when one is
created. Our algorithm takes O(m^{1/2}) amortized time per arc, where m is the
total number of arcs. For sparse graphs, this bound improves the best previous
bound by a logarithmic factor and is tight to within a constant factor for a
natural class of algorithms that includes all the existing ones. Our main
insight is that the bidirectional search method of previous algorithms does not
require an ordered search, but can be more general. This allows us to avoid the
use of heaps (priority queues) entirely. Instead, the deterministic version of
our algorithm uses (approximate) median-finding. The randomized version of our
algorithm avoids this complication, making it very simple. We extend our
topological ordering algorithm to give the first detailed algorithm for
maintaining the strong components of a directed graph, and a topological order
of these components, as arcs are added. This extension also has an amortized
time bound of O(m^{1/2}) per arc.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 05:11:18 GMT"
}
] | 2008-03-07T00:00:00 | [
[
"Haeupler",
"Bernhard",
""
],
[
"Sen",
"Siddhartha",
""
],
[
"Tarjan",
"Robert E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0803 | Husnain Mansoor Ali | Husnain Mansoor Ali (IEF), Anthony Busson (IEF), Amina Meraihi Naimi
(IEF), Veronique Veque (IEF) | Un Algorithme de Gestion des Adjacences bas\'e sur la Puissance du
Signal | null | Colloque Francophone sur l'Ing\'enierie des Protocoles (CFIP), Les
Arcs : France (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this proposition, we present a link management technique for pro-active
routing protocols for ad-hoc networks. This new mechanism is based on signal
strength hence cross layer approach is used. The hysteresis mechanism provided
by OLSR is improved upon by using signal strength in combination with the hello
loss based hysteresis. The signal power is used to determine if the
link-quality is improving or deteriorating while packet losses are handled
through the hysteresis mechanism specified in OLSR RFC. This not only makes the
link management more robust but also helps in anticipating link breakages
thereby greatly improving the performance.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 07:39:13 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ali",
"Husnain Mansoor",
"",
"IEF"
],
[
"Busson",
"Anthony",
"",
"IEF"
],
[
"Naimi",
"Amina Meraihi",
"",
"IEF"
],
[
"Veque",
"Veronique",
"",
"IEF"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.0811 | Wei Dai | Wei Dai and Olgica Milenkovic | Subspace Pursuit for Compressive Sensing Signal Reconstruction | The first version was submitted on Mar. 6th, 2008. The 2nd version
was updated on Mar. 10th, 2008. The 3rd version was submitted on Jan 8th,
2009 | null | null | null | cs.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new method for reconstruction of sparse signals with and without
noisy perturbations, termed the subspace pursuit algorithm. The algorithm has
two important characteristics: low computational complexity, comparable to that
of orthogonal matching pursuit techniques when applied to very sparse signals,
and reconstruction accuracy of the same order as that of LP optimization
methods. The presented analysis shows that in the noiseless setting, the
proposed algorithm can exactly reconstruct arbitrary sparse signals provided
that the sensing matrix satisfies the restricted isometry property with a
constant parameter. In the noisy setting and in the case that the signal is not
exactly sparse, it can be shown that the mean squared error of the
reconstruction is upper bounded by constant multiples of the measurement and
signal perturbation energies.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 08:04:13 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Mar 2008 20:45:09 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Jan 2009 05:58:56 GMT"
}
] | 2009-01-08T00:00:00 | [
[
"Dai",
"Wei",
""
],
[
"Milenkovic",
"Olgica",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0822 | Biswajit Biswal | Biswajit Biswal | Website Optimization through Mining User Navigational Pattern | 10 pages, 6 figures | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the World Wide Web's ubiquity increase and the rapid development of
various online businesses, the complexity of web sites grow. The analysis of
web user's navigational pattern within a web site can provide useful
information for server performance enhancements, restructuring a website and
direct marketing in e-commerce etc. In this paper, an algorithm is proposed for
mining such navigation patterns. The key insight is that users access
information of interest and follow a certain path while navigating a web site.
If they don't find it, they would backtrack and choose among the alternate
paths till they reach the destination. The point they backtrack is the
Intermediate Reference Location. Identifying such Intermediate locations and
destinations out of the pattern will be the main endeavor in the rest of this
report.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 10:01:08 GMT"
}
] | 2008-03-07T00:00:00 | [
[
"Biswal",
"Biswajit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.0845 | Evain Laurent | Laurent Evain | Knapsack cryptosystems built on NP-hard instance | 20 pages | null | null | null | cs.CR cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct three public key knapsack cryptosystems. Standard knapsack
cryptosystems hide easy instances of the knapsack problem and have been broken.
The systems considered in the article face this problem: They hide a random
(possibly hard) instance of the knapsack problem. We provide both complexity
results (size of the key, time needed to encypher/decypher...) and experimental
results. Security results are given for the second cryptosystem (the fastest
one and the one with the shortest key). Probabilistic polynomial reductions
show that finding the private key is as difficult as factorizing a product of
two primes. We also consider heuristic attacks. First, the density of the
cryptosystem can be chosen arbitrarily close to one, discarding low density
attacks. Finally, we consider explicit heuristic attacks based on the LLL
algorithm and we prove that with respect to these attacks, the public key is as
secure as a random key.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 12:20:35 GMT"
}
] | 2008-03-17T00:00:00 | [
[
"Evain",
"Laurent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0858 | Oleg Verbitsky | Mihyun Kang, Oleg Pikhurko, Alexander Ravsky, Mathias Schacht, Oleg
Verbitsky | Untangling planar graphs from a specified vertex position - Hard cases | 18 pages, 4 figures. Lemma 3.3 is corrected, several amendments are
made throughout the paper | Discrete Applied Mathematics 159:8 (2011) 789-799 | 10.1016/j.dam.2011.01.011 | null | cs.DM cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a planar graph $G$, we consider drawings of $G$ in the plane where
edges are represented by straight line segments (which possibly intersect).
Such a drawing is specified by an injective embedding $\pi$ of the vertex set
of $G$ into the plane. We prove that a wheel graph $W_n$ admits a drawing $\pi$
such that, if one wants to eliminate edge crossings by shifting vertices to new
positions in the plane, then at most $(2+o(1))\sqrt n$ of all $n$ vertices can
stay fixed. Moreover, such a drawing $\pi$ exists even if it is presupposed
that the vertices occupy any prescribed set of points in the plane. Similar
questions are discussed for other families of planar graphs.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 13:08:41 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2008 17:15:12 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Dec 2008 22:44:03 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Jun 2009 13:26:44 GMT"
},
{
"version": "v5",
"created": "Tue, 23 Nov 2010 09:59:13 GMT"
}
] | 2011-05-20T00:00:00 | [
[
"Kang",
"Mihyun",
""
],
[
"Pikhurko",
"Oleg",
""
],
[
"Ravsky",
"Alexander",
""
],
[
"Schacht",
"Mathias",
""
],
[
"Verbitsky",
"Oleg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0803.0862 | Jose M. Martin-Garcia | Jose M. Martin-Garcia | xPerm: fast index canonicalization for tensor computer algebra | 16 pages, 3 figures. Package can be downloaded from
http://metric.iem.csic.es/Martin-Garcia/xAct/ | Comp. Phys. Commun. 179 (2008) 597-603 | 10.1016/j.cpc.2008.05.009 | null | cs.SC gr-qc hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a very fast implementation of the Butler-Portugal algorithm for
index canonicalization with respect to permutation symmetries. It is called
xPerm, and has been written as a combination of a Mathematica package and a C
subroutine. The latter performs the most demanding parts of the computations
and can be linked from any other program or computer algebra system. We
demonstrate with tests and timings the effectively polynomial performance of
the Butler-Portugal algorithm with respect to the number of indices, though we
also show a case in which it is exponential. Our implementation handles generic
tensorial expressions with several dozen indices in hundredths of a second, or
one hundred indices in a few seconds, clearly outperforming all other current
canonicalizers. The code has been already under intensive testing for several
years and has been essential in recent investigations in large-scale tensor
computer algebra.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 13:26:32 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Martin-Garcia",
"Jose M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
}
] |
0803.0874 | Milan Batista | Milan Batista | A Method for Solving Cyclic Block Penta-diagonal Systems of Linear
Equations | null | null | null | null | cs.MS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method for solving cyclic block three-diagonal systems of equations is
generalized for solving a block cyclic penta-diagonal system of equations.
Introducing a special form of two new variables the original system is split
into three block pentagonal systems, which can be solved by the known methods.
As such method belongs to class of direct methods without pivoting.
Implementation of the algorithm is discussed in some details and the numerical
examples are present.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 18:45:39 GMT"
},
{
"version": "v2",
"created": "Sat, 8 Mar 2008 11:03:56 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Mar 2008 07:35:16 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Batista",
"Milan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0803.0875 | Leonardo Cardoso | L. S. Cardoso, M. Kobayashi, M. Debbah, O. Ryan | Vandermonde Frequency Division Multiplexing for Cognitive Radio | Submitted to Signal Processing Advances in Wireless Communications,
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a cognitive radio scenario where a primary and a secondary user
wish to communicate with their corresponding receivers simultaneously over
frequency selective channels. Under realistic assumptions that the secondary
transmitter has no side information about the primary's message and each
transmitter knows only its local channels, we propose a Vandermonde precoder
that cancels the interference from the secondary user by exploiting the
redundancy of a cyclic prefix. Our numerical examples show that VFDM, with an
appropriate design of the input covariance, enables the secondary user to
achieve a considerable rate while generating zero interference to the primary
user.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 14:27:45 GMT"
}
] | 2008-03-07T00:00:00 | [
[
"Cardoso",
"L. S.",
""
],
[
"Kobayashi",
"M.",
""
],
[
"Debbah",
"M.",
""
],
[
"Ryan",
"O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.0924 | Shiva Kasiviswanathan | Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya
Raskhodnikova, and Adam Smith | What Can We Learn Privately? | 35 pages, 2 figures | SIAM Journal of Computing 40(3) (2011) 793-826 | null | null | cs.LG cs.CC cs.CR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning problems form an important category of computational tasks that
generalizes many of the computations researchers apply to large real-life data
sets. We ask: what concept classes can be learned privately, namely, by an
algorithm whose output does not depend too heavily on any one input or specific
training example? More precisely, we investigate learning algorithms that
satisfy differential privacy, a notion that provides strong confidentiality
guarantees in contexts where aggregate information is released about a database
containing sensitive information about individuals. We demonstrate that,
ignoring computational constraints, it is possible to privately agnostically
learn any concept class using a sample size approximately logarithmic in the
cardinality of the concept class. Therefore, almost anything learnable is
learnable privately: specifically, if a concept class is learnable by a
(non-private) algorithm with polynomial sample complexity and output size, then
it can be learned privately using a polynomial number of samples. We also
present a computationally efficient private PAC learner for the class of parity
functions. Local (or randomized response) algorithms are a practical class of
private algorithms that have received extensive investigation. We provide a
precise characterization of local private learning algorithms. We show that a
concept class is learnable by a local algorithm if and only if it is learnable
in the statistical query (SQ) model. Finally, we present a separation between
the power of interactive and noninteractive local learning algorithms.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 17:50:07 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 16:18:44 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Feb 2010 01:47:02 GMT"
}
] | 2012-10-10T00:00:00 | [
[
"Kasiviswanathan",
"Shiva Prasad",
""
],
[
"Lee",
"Homin K.",
""
],
[
"Nissim",
"Kobbi",
""
],
[
"Raskhodnikova",
"Sofya",
""
],
[
"Smith",
"Adam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0803.0929 | Daniel A. Spielman | Daniel A. Spielman, Nikhil Srivastava | Graph Sparsification by Effective Resistances | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/3.0/ | We present a nearly-linear time algorithm that produces high-quality
sparsifiers of weighted graphs. Given as input a weighted graph $G=(V,E,w)$ and
a parameter $\epsilon>0$, we produce a weighted subgraph
$H=(V,\tilde{E},\tilde{w})$ of $G$ such that $|\tilde{E}|=O(n\log
n/\epsilon^2)$ and for all vectors $x\in\R^V$ $(1-\epsilon)\sum_{uv\in
E}(x(u)-x(v))^2w_{uv}\le \sum_{uv\in\tilde{E}}(x(u)-x(v))^2\tilde{w}_{uv} \le
(1+\epsilon)\sum_{uv\in E}(x(u)-x(v))^2w_{uv}. (*)$
This improves upon the sparsifiers constructed by Spielman and Teng, which
had $O(n\log^c n)$ edges for some large constant $c$, and upon those of
Bencz\'ur and Karger, which only satisfied (*) for $x\in\{0,1\}^V$.
A key ingredient in our algorithm is a subroutine of independent interest: a
nearly-linear time algorithm that builds a data structure from which we can
query the approximate effective resistance between any two vertices in a graph
in $O(\log n)$ time.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 18:03:06 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Mar 2008 23:10:59 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Mar 2008 19:49:32 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Nov 2009 07:22:03 GMT"
}
] | 2009-11-18T00:00:00 | [
[
"Spielman",
"Daniel A.",
""
],
[
"Srivastava",
"Nikhil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0952 | Vikram Chandrasekhar | Vikram Chandrasekhar, Jeffrey Andrews and Alan Gatherer | Femtocell Networks: A Survey | IEEE Communications Magazine, vol. 46, no.9, pp. 59-67, Sept. 2008 | null | 10.1109/MCOM.2008.4623708 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The surest way to increase the system capacity of a wireless link is by
getting the transmitter and receiver closer to each other, which creates the
dual benefits of higher quality links and more spatial reuse. In a network with
nomadic users, this inevitably involves deploying more infrastructure,
typically in the form of microcells, hotspots, distributed antennas, or relays.
A less expensive alternative is the recent concept of femtocells, also called
home base-stations, which are data access points installed by home users get
better indoor voice and data coverage. In this article, we overview the
technical and business arguments for femtocells, and describe the
state-of-the-art on each front. We also describe the technical challenges
facing femtocell networks, and give some preliminary ideas for how to overcome
them.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 19:41:50 GMT"
},
{
"version": "v2",
"created": "Sat, 8 Mar 2008 00:29:26 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Mar 2008 20:46:54 GMT"
},
{
"version": "v4",
"created": "Tue, 25 Mar 2008 20:32:36 GMT"
},
{
"version": "v5",
"created": "Tue, 24 Jun 2008 21:56:17 GMT"
},
{
"version": "v6",
"created": "Sat, 20 Sep 2008 18:56:02 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Chandrasekhar",
"Vikram",
""
],
[
"Andrews",
"Jeffrey",
""
],
[
"Gatherer",
"Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.0954 | Michael Hahsler | Michael Hahsler, Christian Buchta, and Kurt Hornik | Selective association rule generation | null | Computational Statistics, 2007. Online First, Published: 25 July
2007 | 10.1007/s00180-007-0062-z | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining association rules is a popular and well researched method for
discovering interesting relations between variables in large databases. A
practical problem is that at medium to low support values often a large number
of frequent itemsets and an even larger number of association rules are found
in a database. A widely used approach is to gradually increase minimum support
and minimum confidence or to filter the found rules using increasingly strict
constraints on additional measures of interestingness until the set of rules
found is reduced to a manageable size. In this paper we describe a different
approach which is based on the idea to first define a set of ``interesting''
itemsets (e.g., by a mixture of mining and expert knowledge) and then, in a
second step to selectively generate rules for only these itemsets. The main
advantage of this approach over increasing thresholds or filtering rules is
that the number of rules found is significantly reduced while at the same time
it is not necessary to increase the support and confidence thresholds which
might lead to missing important information in the database.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 19:43:35 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hahsler",
"Michael",
""
],
[
"Buchta",
"Christian",
""
],
[
"Hornik",
"Kurt",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.0956 | Benjamin Leveque | Benjamin L\'ev\^eque (LGS), Fr\'ed\'eric Maffray (LGS), Myriam
Preissmann (LGS) | Characterizing path graphs by forbidden induced subgraphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph is a path graph if it is the intersection graph of a family of
subpaths of a tree. In 1970, Renz asked for a characterizaton of path graphs by
forbidden induced subgraphs. Here we answer this question by listing all graphs
that are not path graphs and are minimal with this property.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 19:56:20 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Mar 2008 19:47:05 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Apr 2008 19:03:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lévêque",
"Benjamin",
"",
"LGS"
],
[
"Maffray",
"Frédéric",
"",
"LGS"
],
[
"Preissmann",
"Myriam",
"",
"LGS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.0966 | Michael Hahsler | Michael Hahsler and Kurt Hornik | New probabilistic interest measures for association rules | null | Intelligent Data Analysis, 11(5):437-455, 2007 | 10.3233/IDA-2007-11502 | null | cs.DB stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining association rules is an important technique for discovering meaningful
patterns in transaction databases. Many different measures of interestingness
have been proposed for association rules. However, these measures fail to take
the probabilistic properties of the mined data into account. In this paper, we
start with presenting a simple probabilistic framework for transaction data
which can be used to simulate transaction data when no associations are
present. We use such data and a real-world database from a grocery outlet to
explore the behavior of confidence and lift, two popular interest measures used
for rule mining. The results show that confidence is systematically influenced
by the frequency of the items in the left hand side of rules and that lift
performs poorly to filter random noise in transaction data. Based on the
probabilistic framework we develop two new interest measures, hyper-lift and
hyper-confidence, which can be used to filter or order mined association rules.
The new measures show significantly better performance than lift for
applications where spurious rules are problematic.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 20:17:19 GMT"
}
] | 2024-01-01T00:00:00 | [
[
"Hahsler",
"Michael",
""
],
[
"Hornik",
"Kurt",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0803.0988 | Samuel Daitch | Samuel I. Daitch, Daniel A. Spielman | Faster Approximate Lossy Generalized Flow via Interior Point Algorithms | v2: bug fixes and some expanded proofs | null | null | null | cs.DS cs.NA | http://creativecommons.org/licenses/by/3.0/ | We present faster approximation algorithms for generalized network flow
problems. A generalized flow is one in which the flow out of an edge differs
from the flow into the edge by a constant factor. We limit ourselves to the
lossy case, when these factors are at most 1.
Our algorithm uses a standard interior-point algorithm to solve a linear
program formulation of the network flow problem. The system of linear equations
that arises at each step of the interior-point algorithm takes the form of a
symmetric M-matrix. We present an algorithm for solving such systems in nearly
linear time. The algorithm relies on the Spielman-Teng nearly linear time
algorithm for solving linear systems in diagonally-dominant matrices.
For a graph with m edges, our algorithm obtains an additive epsilon
approximation of the maximum generalized flow and minimum cost generalized flow
in time tildeO(m^(3/2) * log(1/epsilon)). In many parameter ranges, this
improves over previous algorithms by a factor of approximately m^(1/2). We also
obtain a similar improvement for exactly solving the standard min-cost flow
problem.
| [
{
"version": "v1",
"created": "Thu, 6 Mar 2008 21:57:53 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2008 19:02:38 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Daitch",
"Samuel I.",
""
],
[
"Spielman",
"Daniel A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0803.1025 | Tadashi Wadyama | Tadashi Wadayama | Asymptotic Concentration Behaviors of Linear Combinations of Weight
Distributions on Random Linear Code Ensemble | 6 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Asymptotic concentration behaviors of linear combinations of weight
distributions on the random linear code ensemble are presented. Many important
properties of a binary linear code can be expressed as the form of a linear
combination of weight distributions such as number of codewords, undetected
error probability and upper bound on the maximum likelihood error probability.
The key in this analysis is the covariance formula of weight distributions of
the random linear code ensemble, which reveals the second-order statistics of a
linear function of the weight distributions. Based on the covariance formula,
several expressions of the asymptotic concentration rate, which indicate the
speed of convergence to the average, are derived.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 05:25:49 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Wadayama",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1030 | David Soloveichik | David Soloveichik | Robust Stochastic Chemical Reaction Networks and Bounded Tau-Leaping | Tightened up section 5 | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The behavior of some stochastic chemical reaction networks is largely
unaffected by slight inaccuracies in reaction rates. We formalize the
robustness of state probabilities to reaction rate deviations, and describe a
formal connection between robustness and efficiency of simulation. Without
robustness guarantees, stochastic simulation seems to require computational
time proportional to the total number of reaction events. Even if the
concentration (molecular count per volume) stays bounded, the number of
reaction events can be linear in the duration of simulated time and total
molecular count. We show that the behavior of robust systems can be predicted
such that the computational work scales linearly with the duration of simulated
time and concentration, and only polylogarithmically in the total molecular
count. Thus our asymptotic analysis captures the dramatic speedup when
molecular counts are large, and shows that for bounded concentrations the
computation time is essentially invariant with molecular count. Finally, by
noticing that even robust stochastic chemical reaction networks are capable of
embedding complex computational problems, we argue that the linear dependence
on simulated time and concentration is likely optimal.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 17:36:54 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Nov 2008 02:10:39 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Jan 2009 09:58:41 GMT"
}
] | 2009-01-28T00:00:00 | [
[
"Soloveichik",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.1087 | Cl\'ement Vidal | Clement Vidal | The Future of Scientific Simulations: from Artificial Life to Artificial
Cosmogenesis | The text was improved in many respects, and a new figure was added.
Cite as: Vidal, C. 2008. The Future of Scientific Simulations: from
Artificial Life to Artificial Cosmogenesis. In Death And Anti-Death, Volume
6: Thirty Years After Kurt Godel (1906-1978), Ed. Charles Tandy, in press | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This philosophical paper explores the relation between modern scientific
simulations and the future of the universe. We argue that a simulation of an
entire universe will result from future scientific activity. This requires us
to tackle the challenge of simulating open-ended evolution at all levels in a
single simulation. The simulation should encompass not only biological
evolution, but also physical evolution (a level below) and cultural evolution
(a level above). The simulation would allow us to probe what would happen if we
would "replay the tape of the universe" with the same or different laws and
initial conditions. We also distinguish between real-world and artificial-world
modelling. Assuming that intelligent life could indeed simulate an entire
universe, this leads to two tentative hypotheses. Some authors have argued that
we may already be in a simulation run by an intelligent entity. Or, if such a
simulation could be made real, this would lead to the production of a new
universe. This last direction is argued with a careful speculative
philosophical approach, emphasizing the imperative to find a solution to the
heat death problem in cosmology. The reader is invited to consult Annex 1 for
an overview of the logical structure of this paper. -- Keywords: far future,
future of science, ALife, simulation, realization, cosmology, heat death,
fine-tuning, physical eschatology, cosmological natural selection, cosmological
artificial selection, artificial cosmogenesis, selfish biocosm hypothesis,
meduso-anthropic principle, developmental singularity hypothesis, role of
intelligent life.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 14:42:02 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Oct 2008 17:14:11 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Dec 2008 10:47:50 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Vidal",
"Clement",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.1090 | Valentin Savin | Valentin Savin | Self-Corrected Min-Sum decoding of LDPC codes | 5 pages, ISIT08 second version: acknowledgement footnote added (no
content modification) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a very simple but powerful self-correction method
for the Min-Sum decoding of LPDC codes. Unlike other correction methods known
in the literature, our method does not try to correct the check node processing
approximation, but it modifies the variable node processing by erasing
unreliable messages. However, this positively affects check node messages,
which become symmetric Gaussian distributed, and we show that this is
sufficient to ensure a quasi-optimal decoding performance. Monte-Carlo
simulations show that the proposed Self-Corrected Min-Sum decoding performs
very close to the Sum-Product decoding, while preserving the main features of
the Min-Sum decoding, that is low complexity and independence with respect to
noise variance estimation errors.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 13:46:28 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 17:13:48 GMT"
}
] | 2009-01-13T00:00:00 | [
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1094 | Valentin Savin | Valentin Savin | Min-Max decoding for non binary LDPC codes | 5 pages, ISIT08 version v2: acknowledgement footnote, and appendix
containing proofs of some statements in the paper | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Iterative decoding of non-binary LDPC codes is currently performed using
either the Sum-Product or the Min-Sum algorithms or slightly different versions
of them. In this paper, several low-complexity quasi-optimal iterative
algorithms are proposed for decoding non-binary codes. The Min-Max algorithm is
one of them and it has the benefit of two possible LLR domain implementations:
a standard implementation, whose complexity scales as the square of the Galois
field's cardinality and a reduced complexity implementation called selective
implementation, which makes the Min-Max decoding very attractive for practical
purposes.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 14:09:42 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 17:34:24 GMT"
}
] | 2009-01-13T00:00:00 | [
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1096 | Valentin Savin | Valentin Savin | Algebraic-geometric codes from vector bundles and their decoding | 5 pages, submitted to ISIT08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algebraic-geometric codes can be constructed by evaluating a certain set of
functions on a set of distinct rational points of an algebraic curve. The set
of functions that are evaluated is the linear space of a given divisor or,
equivalently, the set of section of a given line bundle. Using arbitrary rank
vector bundles on algebraic curves, we propose a natural generalization of the
above construction. Our codes can also be seen as interleaved versions of
classical algebraic-geometric codes. We show that the algorithm of Brown,
Minder and Shokrollahi can be extended to this new class of codes and it
corrects any number of errors up to $t^{*} - g/2$, where $t^{*}$ is the
designed correction capacity of the code and $g$ is the curve genus.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 14:14:10 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1104 | Michael Hahsler | Michael Hahsler | Optimizing Web Sites for Customer Retention | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With customer relationship management (CRM) companies move away from a mainly
product-centered view to a customer-centered view. Resulting from this change,
the effective management of how to keep contact with customers throughout
different channels is one of the key success factors in today's business world.
Company Web sites have evolved in many industries into an extremely important
channel through which customers can be attracted and retained. To analyze and
optimize this channel, accurate models of how customers browse through the Web
site and what information within the site they repeatedly view are crucial.
Typically, data mining techniques are used for this purpose. However, there
already exist numerous models developed in marketing research for traditional
channels which could also prove valuable to understanding this new channel. In
this paper we propose the application of an extension of the Logarithmic Series
Distribution (LSD) model repeat-usage of Web-based information and thus to
analyze and optimize a Web Site's capability to support one goal of CRM, to
retain customers. As an example, we use the university's blended learning web
portal with over a thousand learning resources to demonstrate how the model can
be used to evaluate and improve the Web site's effectiveness.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 14:50:21 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hahsler",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.1110 | Olivier Ruatta | Daouda Niang Diatta (XLIM), Bernard Mourrain (INRIA Sophia Antipolis),
Olivier Ruatta (XLIM) | On the Computation of the Topology of a Non-Reduced Implicit Space Curve | null | null | null | null | math.AC cs.CG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algorithm is presented for the computation of the topology of a
non-reduced space curve defined as the intersection of two implicit algebraic
surfaces. It computes a Piecewise Linear Structure (PLS) isotopic to the
original space curve. The algorithm is designed to provide the exact result for
all inputs. It's a symbolic-numeric algorithm based on subresultant
computation. Simple algebraic criteria are given to certify the output of the
algorithm. The algorithm uses only one projection of the non-reduced space
curve augmented with adjacency information around some "particular points" of
the space curve. The algorithm is implemented with the Mathemagix Computer
Algebra System (CAS) using the SYNAPS library as a backend.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 15:28:52 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Diatta",
"Daouda Niang",
"",
"XLIM"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Ruatta",
"Olivier",
"",
"XLIM"
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0803.1111 | Abedelaziz Mohaisen | Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee | Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor
Networks | 13 pages, 9 figures, 2 tables, to appear in the International Journal
of Networks and Security | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The security of wireless sensor networks is an active topic of research where
both symmetric and asymmetric key cryptography issues have been studied. Due to
their computational feasibility on typical sensor nodes, symmetric key
algorithms that use the same key to encrypt and decrypt messages have been
intensively studied and perfectly deployed in such environment. Because of the
wireless sensor's limited infrastructure, the bottleneck challenge for
deploying these algorithms is the key distribution. For the same reason of
resources restriction, key distribution mechanisms which are used in
traditional wireless networks are not efficient for sensor networks.
To overcome the key distribution problem, several key pre-distribution
algorithms and techniques that assign keys or keying material for the networks
nodes in an offline phase have been introduced recently. In this paper, we
introduce a supplemental distribution technique based on the communication
pattern and deployment knowledge modeling. Our technique is based on the
hierarchical grid deployment. For granting a proportional security level with
number of dependent sensors, we use different polynomials in different orders
with different weights. In seek of our proposed work's value, we provide a
detailed analysis on the used resources, resulting security, resiliency, and
connectivity compared with other related works.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 15:30:18 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Nyang",
"DaeHun",
""
],
[
"Lee",
"KyungHee",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.1120 | Tal Philosof | Tal Philosof and Ram Zamir | The Rate Loss of Single-Letter Characterization: The "Dirty" Multiple
Access Channel | 23 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For general memoryless systems, the typical information theoretic solution -
when exists - has a "single-letter" form. This reflects the fact that optimum
performance can be approached by a random code (or a random binning scheme),
generated using independent and identically distributed copies of some
single-letter distribution. Is that the form of the solution of any
(information theoretic) problem? In fact, some counter examples are known. The
most famous is the "two help one" problem: Korner and Marton showed that if we
want to decode the modulo-two sum of two binary sources from their independent
encodings, then linear coding is better than random coding. In this paper we
provide another counter example, the "doubly-dirty" multiple access channel
(MAC). Like the Korner-Marton problem, this is a multi-terminal scenario where
side information is distributed among several terminals; each transmitter knows
part of the channel interference but the receiver is not aware of any part of
it. We give an explicit solution for the capacity region of a binary version of
the doubly-dirty MAC, demonstrate how the capacity region can be approached
using a linear coding scheme, and prove that the "best known single-letter
region" is strictly contained in it. We also state a conjecture regarding a
similar rate loss of single letter characterization in the Gaussian case.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 16:44:31 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2008 14:15:23 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Mar 2008 19:26:50 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Philosof",
"Tal",
""
],
[
"Zamir",
"Ram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1144 | Nadia Fawaz | Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert | Asymptotic Capacity and Optimal Precoding Strategy of Multi-Level
Precode & Forward in Correlated Channels | 5 pages, 3 figures, to be published in proceedings of IEEE
Information Theory Workshop 2008 | null | 10.1109/ITW.2008.4578651 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze a multi-level MIMO relaying system where a multiple-antenna
transmitter sends data to a multipleantenna receiver through several relay
levels, also equipped with multiple antennas. Assuming correlated fading in
each hop, each relay receives a faded version of the signal transmitted by the
previous level, performs precoding on the received signal and retransmits it to
the next level. Using free probability theory and assuming that the noise power
at the relay levels - but not at the receiver - is negligible, a closed-form
expression of the end-to-end asymptotic instantaneous mutual information is
derived as the number of antennas in all levels grow large with the same rate.
This asymptotic expression is shown to be independent from the channel
realizations, to only depend on the channel statistics and to also serve as the
asymptotic value of the end-to-end average mutual information. We also provide
the optimal singular vectors of the precoding matrices that maximize the
asymptotic mutual information : the optimal transmit directions represented by
the singular vectors of the precoding matrices are aligned on the eigenvectors
of the channel correlation matrices, therefore they can be determined only
using the known statistics of the channel matrices and do not depend on a
particular channel realization.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 17:56:36 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Fawaz",
"Nadia",
""
],
[
"Zarifi",
"Keyvan",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Gesbert",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1189 | Narad Rampersad | James D. Currie, Narad Rampersad | Infinite words containing squares at every position | 12 pages; minor revisions and clarifications | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Richomme asked the following question: what is the infimum of the real
numbers $\alpha$ > 2 such that there exists an infinite word that avoids
$\alpha$-powers but contains arbitrarily large squares beginning at every
position? We resolve this question in the case of a binary alphabet by showing
that the answer is $\alpha$ = 7/3.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2008 22:39:40 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2008 15:36:24 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Currie",
"James D.",
""
],
[
"Rampersad",
"Narad",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0803.1195 | Deniz Gunduz | Deniz Gunduz, Elza Erkip, H. Vincent Poor | Secure Lossless Compression with Side Information | To appear in the Proceedings of the 2008 IEEE Information Theory
Workshop, Porto, Portugal, May 5-9, 2008 | null | 10.1109/ITW.2008.4578644 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secure data compression in the presence of side information at both a
legitimate receiver and an eavesdropper is explored. A noise-free, limited rate
link between the source and the receiver, whose output can be perfectly
observed by the eavesdropper, is assumed. As opposed to the wiretap channel
model, in which secure communication can be established by exploiting the noise
in the channel, here the existence of side information at the receiver is used.
Both coded and uncoded side information are considered. In the coded side
information scenario, inner and outer bounds on the compression-equivocation
rate region are given. In the uncoded side information scenario, the
availability of the legitimate receiver's and the eavesdropper's side
information at the encoder is considered, and the compression-equivocation rate
region is characterized for these cases. It is shown that the side information
at the encoder can increase the equivocation rate at the eavesdropper. Hence,
the side information at the encoder is shown to be useful in terms of security;
this is in contrast with the pure lossless data compression case where side
information at the encoder would not help.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 00:05:44 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Erkip",
"Elza",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1207 | Hang Dinh | Hang Dinh | Serious Flaws in Korf et al.'s Analysis on Time Complexity of A* | This paper has been withdrawn | null | null | null | cs.AI | http://creativecommons.org/licenses/by/3.0/ | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 02:47:27 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 15:36:28 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Sep 2010 21:20:08 GMT"
}
] | 2010-09-30T00:00:00 | [
[
"Dinh",
"Hang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.1217 | Li Chen | Li Chen | Hsiao-Code Check Matrices and Recursively Balanced Matrices | 8 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The key step of generating the well-known Hsiao code is to construct a
{0,1}-check-matrix in which each column contains the same odd-number of 1's and
each row contains the same number of 1's or differs at most by one for the
number of 1's. We also require that no two columns are identical in the matrix.
The author solved this problem in 1986 by introducing a type of recursively
balanced matrices. However, since the paper was published in Chinese, the
solution for such an important problem was not known by international
researchers in coding theory. In this note, we focus on how to practically
generate the check matrix of Hsiao codes. We have modified the original
algorithm to be more efficient and effective. We have also corrected an error
in algorithm analysis presented in the earlier paper. The result shows that the
algorithm attained optimum in average cases if a divide-and-conquer technique
must be involved in the algorithm.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 06:00:03 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Chen",
"Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.