id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0803.1220 | Somitra Sanadhya | Somitra Kumar Sanadhya and Palash Sarkar | 22-Step Collisions for SHA-2 | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, we provide the first 22-step collisions for SHA-256 and
SHA-512. Detailed technique of generating these collisions will be provided in
the next revision of this note.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 06:44:38 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Sanadhya",
"Somitra Kumar",
""
],
[
"Sarkar",
"Palash",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.1221 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Non-Singular Assembly-mode Changing Motions for 3-RPR Parallel
Manipulators | null | Mechanism and Machine Theory 23, 4 (2008) 480-490 | null | null | cs.RO physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When moving from one arbitrary location at another, a parallel manipulator
may change its assembly-mode without crossing a singularity. Because the
non-singular change of assembly-mode cannot be simply detected, the actual
assembly-mode during motion is difficult to track. This paper proposes a global
explanatory approach to help better understand non-singular assembly-mode
changing motions for 3-RPR planar parallel manipulators. The approach consists
in fixing one of the actuated joints and analyzing the configuration-space as a
surface in a 3-dimensional space. Such a global description makes it possible
to display all possible non-singular assembly-mode changing trajectories.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 06:54:47 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0803.1227 | Jean Creignou | Jean Creignou (IMB), Herv\'e Diet (IMB) | Linear programming bounds for unitary space time codes | Submitted to ISIT 2008 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The linear programming method is applied to the space $\U_n(\C)$ of unitary
matrices in order to obtain bounds for codes relative to the diversity sum and
the diversity product. Theoretical and numerical results improving previously
known bounds are derived.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 09:11:18 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Creignou",
"Jean",
"",
"IMB"
],
[
"Diet",
"Hervé",
"",
"IMB"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1245 | George Bell | George I. Bell | The shortest game of Chinese Checkers and related problems | 22 pages, 10 figures; published version | INTEGERS: Electronic Journal of Combinatorial Number Theory 9
(2009) #G01 | null | null | math.CO cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 1979, David Fabian found a complete game of two-person Chinese Checkers in
30 moves (15 by each player) [Martin Gardner, Penrose Tiles to Trapdoor
Ciphers, MAA, 1997]. This solution requires that the two players cooperate to
generate a win as quickly as possible for one of them. We show, using
computational search techniques, that no shorter game is possible. We also
consider a solitaire version of Chinese Checkers where one player attempts to
move her pieces across the board in as few moves as possible. In 1971, Octave
Levenspiel found a solution in 27 moves [Ibid.]; we demonstrate that no shorter
solution exists. To show optimality, we employ a variant of A* search, as well
as bidirectional search.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2008 14:38:31 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 18:41:21 GMT"
}
] | 2009-01-13T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.1296 | Steve Oudot | Steve Y. Oudot | On the Topology of the Restricted Delaunay Triangulation and Witness
Complex in Higher Dimensions | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is a well-known fact that, under mild sampling conditions, the restricted
Delaunay triangulation provides good topological approximations of 1- and
2-manifolds. We show that this is not the case for higher-dimensional
manifolds, even under stronger sampling conditions. Specifically, it is not
true that, for any compact closed submanifold M of R^n, and any sufficiently
dense uniform sampling L of M, the Delaunay triangulation of L restricted to M
is homeomorphic to M, or even homotopy equivalent to it. Besides, it is not
true either that, for any sufficiently dense set W of witnesses, the witness
complex of L relative to M contains or is contained in the restricted Delaunay
triangulation of L.
| [
{
"version": "v1",
"created": "Sun, 9 Mar 2008 13:47:43 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Oudot",
"Steve Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0803.1321 | Yngve Villanger | Fedor V. Fomin and Yngve Villanger | Treewidth computation and extremal combinatorics | Corrected typos | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a given graph G and integers b,f >= 0, let S be a subset of vertices of G
of size b+1 such that the subgraph of G induced by S is connected and S can be
separated from other vertices of G by removing f vertices. We prove that every
graph on n vertices contains at most n\binom{b+f}{b} such vertex subsets. This
result from extremal combinatorics appears to be very useful in the design of
several enumeration and exact algorithms. In particular, we use it to provide
algorithms that for a given n-vertex graph G - compute the treewidth of G in
time O(1.7549^n) by making use of exponential space and in time O(2.6151^n) and
polynomial space; - decide in time O(({\frac{2n+k+1}{3})^{k+1}\cdot kn^6}) if
the treewidth of G is at most k; - list all minimal separators of G in time
O(1.6181^n) and all potential maximal cliques of G in time O(1.7549^n). This
significantly improves previous algorithms for these problems.
| [
{
"version": "v1",
"created": "Sun, 9 Mar 2008 20:54:58 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2008 09:34:16 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Fomin",
"Fedor V.",
""
],
[
"Villanger",
"Yngve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.1323 | Samir Medina Perlaza | Samir Medina Perlaza, Laura Cottatellucci, Merouane Debbah | A Game Theoretic Framework for Decentralized Power Allocation in IDMA
Systems | To appear in IEEE International Symposium on Personal, Indoor and
Mobile Radio Communications (PIMRC 2008) | null | 10.1109/PIMRC.2008.4699708 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this contribution we present a decentralized power allocation algorithm
for the uplink interleave division multiple access (IDMA) channel. Within the
proposed optimal strategy for power allocation, each user aims at selfishly
maximizing its own utility function. An iterative chip by chip (CBC) decoder at
the receiver and a rational selfish behavior of all the users according to a
classical game-theoretical framework are the underlying assumptions of this
work. This approach leads to a power allocation based on a channel inversion
policy where the optimal power level is set locally at each terminal based on
the knowledge of its own channel realization, the noise level at the receiver
and the number of active users in the network.
| [
{
"version": "v1",
"created": "Sun, 9 Mar 2008 21:22:19 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jun 2008 11:25:16 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Perlaza",
"Samir Medina",
""
],
[
"Cottatellucci",
"Laura",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1360 | Nadja Kutz | Nadja Kutz | On the need for a global academic internet platform | 22 pages, no figures | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The article collects arguments for the necessity of a global academic
internet platform, which is organized as a kind of ``global scientific
parliament''. With such a constitution educational and research institutions
will have direct means for communicating scientific results, as well as a
platform for representing academia and scientific life in the public.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 08:42:43 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Kutz",
"Nadja",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.1393 | Ewa Krot-Sieniawska | A. Krzysztof Kwa\'sniewski, Ewa Krot-Sieniawska | On inversion formulas and Fibonomial coefficients | 4 pages, presented at the Gian-Carlo Rota Polish Seminar,
http://ii.uwb.edu.pl/akk/sem/sem_rota.htm, submitted to FECS'08: The 2008
International Conference on Frontiers in Education: WORLDCOMP'08 | Proc. Jangjeon Math. Soc. volume 11 (1), 2008 (June),65-68 | null | null | math.CO cs.DM math.GM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A research problem for undergraduates and graduates is being posed as a cap
for the prior antecedent regular discrete mathematics exercises. [Here cap is
not necessarily CAP=Competitive Access Provider, though nevertheless ...] The
object of the cap problem of final interest i.e. array of fibonomial
coefficients and the issue of its combinatorial meaning is to be found in
A.K.Kwa\'sniewski's source papers. The cap problem number seven - still opened
for students has been placed on Mathemagics page of the first author
[http://ii.uwb.edu.pl/akk/dydaktyka/dyskr/dyskretna.htm]. The indicatory
references are to point at a part of the vast domain of the foundations of
computer science in ArXiv affiliation noted as CO.cs.DM. The presentation has
been verified in a tutor system of communication with a couple of intelligent
students. The result is top secret.Temporarily. [Contact: Wikipedia; Theory of
cognitive development].
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 12:11:14 GMT"
}
] | 2010-11-23T00:00:00 | [
[
"Kwaśniewski",
"A. Krzysztof",
""
],
[
"Krot-Sieniawska",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0803.1416 | Andrzej Kwasniewski | A. K. Kwasniewski | New formulas for Stirling-like numbers and Dobinski-like formulas | 9 pages, presented at the Gian-Carlo Rota Polish Seminar,
http://ii.uwb.edu.pl/akk/sem/sem_rota.htm | Proc. Jangjeon Math. Soc. Vol. 11 No 2, (2008),137-144 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extensions of the $Stirling$ numbers of the second kind and $Dobinski$ -like
formulas are proposed in a series of exercises for graduates. Some of these new
formulas recently discovered by me are to be found in the source paper $ [1]$.
These extensions naturally encompass the well known $q$- extensions. The
indicatory references are to point at a part of the vast domain of the
foundations of computer science in arxiv affiliation.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 13:49:39 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jan 2009 21:05:59 GMT"
}
] | 2009-01-19T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.1443 | Robert Shour | Robert Shour | Lexical growth, entropy and the benefits of networking | About 27 pages, double spaced; v3 changes remarks on zeroth
generation in proposition 8, and makes some minor changes to wording and
spelling; v4 is intended to correct remarks relating to glottochronology | null | null | null | cs.IT math.IT q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If each node of an idealized network has an equal capacity to efficiently
exchange benefits, then the network's capacity to use energy is scaled by the
average amount of energy required to connect any two of its nodes. The scaling
factor equals \textit{e}, and the network's entropy is $\ln(n)$. Networking
emerges in consequence of nodes minimizing the ratio of their energy use to the
benefits obtained for such use, and their connectability. Networking leads to
nested hierarchical clustering, which multiplies a network's capacity to use
its energy to benefit its nodes. Network entropy multiplies a node's capacity.
For a real network in which the nodes have the capacity to exchange benefits,
network entropy may be estimated as $C \log_L(n)$, where the base of the log is
the path length $L$, and $C$ is the clustering coefficient. Since $n$, $L$ and
$C$ can be calculated for real networks, network entropy for real networks can
be calculated and can reveal aspects of emergence and also of economic,
biological, conceptual and other networks, such as the relationship between
rates of lexical growth and divergence, and the economic benefit of adding
customers to a commercial communications network. \textit{Entropy dating} can
help estimate the age of network processes, such as the growth of hierarchical
society and of language.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 15:46:20 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Mar 2008 18:50:27 GMT"
},
{
"version": "v3",
"created": "Mon, 12 May 2008 14:33:46 GMT"
},
{
"version": "v4",
"created": "Thu, 31 Dec 2009 19:49:52 GMT"
}
] | 2009-12-31T00:00:00 | [
[
"Shour",
"Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0803.1445 | Rajesh Ramachandran | R. Rajesh and Vinod Sharma | Distributed Joint Source-Channel Coding on a Multiple Access Channel
with Side Information | 49 pages, Technical Report, DRDO-IISc programme on Advanced Research
in Mathematical Engineering, Dept of ECE, Indian Institute of Science,
Bangalore, India | null | null | TR-PME-2008-01 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of transmission of several distributed sources over a
multiple access channel (MAC) with side information at the sources and the
decoder. Source-channel separation does not hold for this channel. Sufficient
conditions are provided for transmission of sources with a given distortion.
The source and/or the channel could have continuous alphabets (thus Gaussian
sources and Gaussian MACs are special cases). Various previous results are
obtained as special cases. We also provide several good joint source-channel
coding schemes for a discrete/continuous source and discrete/continuous
alphabet channel. Channels with feedback and fading are also considered.
Keywords: Multiple access channel, side information, lossy joint
source-channel coding, channels with feedback, fading channels.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 17:39:19 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Rajesh",
"R.",
""
],
[
"Sharma",
"Vinod",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1454 | Satish Babu Korada | Satish Babu Korada, Nicolas Macris | Tight Bounds on the Capacity of Binary Input random CDMA Systems | 34 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider multiple access communication on a binary input additive white
Gaussian noise channel using randomly spread code division. For a general class
of symmetric distributions for spreading coefficients, in the limit of a large
number of users, we prove an upper bound on the capacity, which matches a
formula that Tanaka obtained by using the replica method. We also show
concentration of various relevant quantities including mutual information,
capacity and free energy. The mathematical methods are quite general and allow
us to discuss extensions to other multiuser scenarios.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 17:04:37 GMT"
}
] | 2008-03-11T00:00:00 | [
[
"Korada",
"Satish Babu",
""
],
[
"Macris",
"Nicolas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1457 | Catherine Recanati | Catherine Recanati (LIPN) | Hybrid Reasoning and the Future of Iconic Representations | pp. 299-310 | Dans Artificial General Intelligence 2008 - The First AGI
Conference, Memphis, Tennessee : \'Etats-Unis d'Am\'erique (2008) | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a brief overview of the main characteristics of diagrammatic
reasoning, analyze a case of human reasoning in a mastermind game, and explain
why hybrid representation systems (HRS) are particularly attractive and
promising for Artificial General Intelligence and Computer Science in general.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 16:44:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.1500 | Dean Krafft | Dean B. Krafft, Aaron Birkland, Ellen J. Cramer | NCore: Architecture and Implementation of a Flexible, Collaborative
Digital Library | 11 pages, to appear in JCDL 2008 | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | NCore is an open source architecture and software platform for creating
flexible, collaborative digital libraries. NCore was developed by the National
Science Digital Library (NSDL) project, and it serves as the central technical
infrastructure for NSDL. NCore consists of a central Fedora-based digital
repository, a specific data model, an API, and a set of backend services and
frontend tools that create a new model for collaborative, contributory digital
libraries. This paper describes NCore, presents and analyzes its architecture,
tools and services; and reports on the experience of NSDL in building and
operating a major digital library on it over the past year and the experience
of the Digital Library for Earth Systems Education in porting their existing
digital library and tools to the NCore platform.
| [
{
"version": "v1",
"created": "Mon, 10 Mar 2008 21:06:31 GMT"
}
] | 2008-03-12T00:00:00 | [
[
"Krafft",
"Dean B.",
""
],
[
"Birkland",
"Aaron",
""
],
[
"Cramer",
"Ellen J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0803.1511 | Ron Dabora | Ron Dabora and Andrea Goldsmith | The Capacity Region of the Degraded Finite-State Broadcast Channel | 5 pages. Accepted to the Information Theory Workshop 2008, Porto,
Portugal | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the discrete, time-varying broadcast channel with memory under
the assumption that the channel states belong to a set of finite cardinality.
We first define the physically degraded finite-state broadcast channel for
which we derive the capacity region. We then define the stochastically degraded
finite-state broadcast channel and derive the capacity region for this scenario
as well. In both scenarios we consider the non-indecomposable finite-state
channel as well as the indecomposable one.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 00:14:00 GMT"
}
] | 2008-03-12T00:00:00 | [
[
"Dabora",
"Ron",
""
],
[
"Goldsmith",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1520 | Wenbing Zhao | Wenbing Zhao | Integrity-Enhancing Replica Coordination for Byzantine Fault Tolerant
Systems | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Strong replica consistency is often achieved by writing deterministic
applications, or by using a variety of mechanisms to render replicas
deterministic. There exists a large body of work on how to render replicas
deterministic under the benign fault model. However, when replicas can be
subject to malicious faults, most of the previous work is no longer effective.
Furthermore, the determinism of the replicas is often considered harmful from
the security perspective and for many applications, their integrity strongly
depends on the randomness of some of their internal operations. This calls for
new approaches towards achieving replica consistency while preserving the
replica randomness. In this paper, we present two such approaches. One is based
on Byzantine agreement and the other on threshold coin-tossing. Each approach
has its strength and weaknesses. We compare the performance of the two
approaches and outline their respective best use scenarios.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 04:20:06 GMT"
}
] | 2008-03-12T00:00:00 | [
[
"Zhao",
"Wenbing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.1521 | Wenbing Zhao | Wenbing Zhao | Proactive Service Migration for Long-Running Byzantine Fault Tolerant
Systems | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe a novel proactive recovery scheme based on service
migration for long-running Byzantine fault tolerant systems. Proactive recovery
is an essential method for ensuring long term reliability of fault tolerant
systems that are under continuous threats from malicious adversaries. The
primary benefit of our proactive recovery scheme is a reduced vulnerability
window. This is achieved by removing the time-consuming reboot step from the
critical path of proactive recovery. Our migration-based proactive recovery is
coordinated among the replicas, therefore, it can automatically adjust to
different system loads and avoid the problem of excessive concurrent proactive
recoveries that may occur in previous work with fixed watchdog timeouts.
Moreover, the fast proactive recovery also significantly improves the system
availability in the presence of faults.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 04:34:04 GMT"
}
] | 2008-03-12T00:00:00 | [
[
"Zhao",
"Wenbing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.1555 | Bart Moelans | Bart Kuijpers, Vanessa Lemmens, Bart Moelans and Karl Tuyls | Privacy Preserving ID3 over Horizontally, Vertically and Grid
Partitioned Data | 25 pages | null | null | null | cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider privacy preserving decision tree induction via ID3 in the case
where the training data is horizontally or vertically distributed. Furthermore,
we consider the same problem in the case where the data is both horizontally
and vertically distributed, a situation we refer to as grid partitioned data.
We give an algorithm for privacy preserving ID3 over horizontally partitioned
data involving more than two parties. For grid partitioned data, we discuss two
different evaluation methods for preserving privacy ID3, namely, first merging
horizontally and developing vertically or first merging vertically and next
developing horizontally. Next to introducing privacy preserving data mining
over grid-partitioned data, the main contribution of this paper is that we
show, by means of a complexity analysis that the former evaluation method is
the more efficient.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 11:18:52 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kuijpers",
"Bart",
""
],
[
"Lemmens",
"Vanessa",
""
],
[
"Moelans",
"Bart",
""
],
[
"Tuyls",
"Karl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0803.1568 | Uwe Aickelin | Qi Chen and Uwe Aickelin | Dempster-Shafer for Anomaly Detection | null | Proceedings of the International Conference on Data Mining (DMIN
2006), pp 232-238, Las Vegas, USA 2006 | null | null | cs.NE cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we implement an anomaly detection system using the
Dempster-Shafer method. Using two standard benchmark problems we show that by
combining multiple signals it is possible to achieve better results than by
using a single signal. We further show that by applying this approach to a
real-world email dataset the algorithm works for email worm detection.
Dempster-Shafer can be a promising method for anomaly detection problems with
multiple features (data sources), and two or more classes.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 12:39:01 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Chen",
"Qi",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.1575 | David Monniaux | David Monniaux (VERIMAG - Imag) | A Quantifier Elimination Algorithm for Linear Real Arithmetic | accepted at LPAR '08 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new quantifier elimination algorithm for the theory of linear
real arithmetic. This algorithm uses as subroutine satisfiability modulo this
theory, a problem for which there are several implementations available. The
quantifier elimination algorithm presented in the paper is compared, on
examples arising from program analysis problems, to several other
implementations, all of which cannot solve some of the examples that our
algorithm solves easily.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 12:55:25 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Sep 2008 17:58:58 GMT"
}
] | 2008-09-04T00:00:00 | [
[
"Monniaux",
"David",
"",
"VERIMAG - Imag"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.1576 | Uwe Aickelin | Uwe Aickelin and Adrian Adewunmi | Simulation Optimization of the Crossdock Door Assignment Problem | null | UK Operational Research Society Simulation Workshop 2006 (SW
2006), Leamington Spa, UK 2006 | null | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this report is to present the Crossdock Door Assignment
Problem, which involves assigning destinations to outbound dock doors of
Crossdock centres such that travel distance by material handling equipment is
minimized. We propose a two fold solution; simulation and optimization of the
simulation model simulation optimization. The novel aspect of our solution
approach is that we intend to use simulation to derive a more realistic
objective function and use Memetic algorithms to find an optimal solution. The
main advantage of using Memetic algorithms is that it combines a local search
with Genetic Algorithms. The Crossdock Door Assignment Problem is a new domain
application to Memetic Algorithms and it is yet unknown how it will perform.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 12:56:51 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Adewunmi",
"Adrian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.1586 | Jeroen Vendrig | Jarrad Springett, Jeroen Vendrig | Spatio-activity based object detection | To be submitted to: AVSS 2008 conference | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the SAMMI lightweight object detection method which has a high
level of accuracy and robustness, and which is able to operate in an
environment with a large number of cameras. Background modeling is based on DCT
coefficients provided by cameras. Foreground detection uses similarity in
temporal characteristics of adjacent blocks of pixels, which is a
computationally inexpensive way to make use of object coherence. Scene model
updating uses the approximated median method for improved performance.
Evaluation at pixel level and application level shows that SAMMI object
detection performs better and faster than the conventional Mixture of Gaussians
method.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 13:40:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Springett",
"Jarrad",
""
],
[
"Vendrig",
"Jeroen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0803.1596 | Uwe Aickelin | Helen Celia, Christopher Clegg, Mark Robinson, Peer-Olaf Siebers, Uwe
Aickelin and Christine Sprigg | Using Intelligent Agents to understand organisational behaviour | null | Proceedings of the British Psychology Society Annual Conference,
Occupational Psychology Division (BPS 2007), Bristol, UK 2007 | null | null | cs.NE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces two ongoing research projects which seek to apply
computer modelling techniques in order to simulate human behaviour within
organisations. Previous research in other disciplines has suggested that
complex social behaviours are governed by relatively simple rules which, when
identified, can be used to accurately model such processes using computer
technology. The broad objective of our research is to develop a similar
capability within organisational psychology.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 14:19:33 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
],
[
"Robinson",
"Mark",
""
],
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Sprigg",
"Christine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.1598 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg | A Multi-Agent Simulation of Retail Management Practices | null | Proceedings of the Summer Computer Simulation Conference (SCSC
2007), pp 959-966, San Diego, USA 2007 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We apply Agent-Based Modeling and Simulation (ABMS) to investigate a set of
problems in a retail context. Specifically, we are working to understand the
relationship between human resource management practices and retail
productivity. Despite the fact we are working within a relatively novel and
complex domain, it is clear that intelligent agents do offer potential for
developing organizational capabilities in the future. Our multi-disciplinary
research team has worked with a UK department store to collect data and capture
perceptions about operations from actors within departments. Based on this case
study work, we have built a simulator that we present in this paper. We then
use the simulator to gather empirical evidence regarding two specific
management practices: empowerment and employee development.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 14:37:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.1600 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg | Understanding Retail Productivity by Simulating Management Practise | null | Proceedings of the EUROSIM Congress on Modelling and Simulation
(EUROSIM 2007), pp 1-12, Ljubljana, Slovenia 2007 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intelligent agents offer a new and exciting way of understanding the world of
work. In this paper we apply agent-based modeling and simulation to investigate
a set of problems in a retail context. Specifically, we are working to
understand the relationship between human resource management practices and
retail productivity. Despite the fact we are working within a relatively novel
and complex domain, it is clear that intelligent agents could offer potential
for fostering sustainable organizational capabilities in the future. Our
research so far has led us to conduct case study work with a top ten UK
retailer, collecting data in four departments in two stores. Based on our case
study data we have built and tested a first version of a department store
simulator. In this paper we will report on the current development of our
simulator which includes new features concerning more realistic data on the
pattern of footfall during the day and the week, a more differentiated view of
customers, and the evolution of customers over time. This allows us to
investigate more complex scenarios and to analyze the impact of various
management practices.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 14:46:10 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.1604 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg | Using Intelligent Agents to Understand Management Practices and Retail
Productivity | null | Proceedings of the Winter Simulation Conference (WSC 2007), pp
2212-2220, Washington, USA 2007 | null | null | cs.NE cs.CE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intelligent agents offer a new and exciting way of understanding the world of
work. In this paper we apply agent-based modeling and simulation to investigate
a set of problems in a retail context. Specifically, we are working to
understand the relationship between human resource management practices and
retail productivity. Despite the fact we are working within a relatively novel
and complex domain, it is clear that intelligent agents could offer potential
for fostering sustainable organizational capabilities in the future. The
project is still at an early stage. So far we have conducted a case study in a
UK department store to collect data and capture impressions about operations
and actors within departments. Furthermore, based on our case study we have
built and tested our first version of a retail branch simulator which we will
present in this paper.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 14:55:58 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.1610 | Philippe Robert | Florian Simatos, Philippe Robert, Fabrice Guillemin (FT R&D) | A Queueing System for Modeling a File Sharing Principle | null | Dans ACM Sigmetrics (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate in this paper the performance of a simple file sharing
principle. For this purpose, we consider a system composed of N peers becoming
active at exponential random times; the system is initiated with only one
server offering the desired file and the other peers after becoming active try
to download it. Once the file has been downloaded by a peer, this one
immediately becomes a server. To investigate the transient behavior of this
file sharing system, we study the instant when the system shifts from a
congested state where all servers available are saturated by incoming demands
to a state where a growing number of servers are idle. In spite of its apparent
simplicity, this queueing model (with a random number of servers) turns out to
be quite difficult to analyze. A formulation in terms of an urn and ball model
is proposed and corresponding scaling results are derived. These asymptotic
results are then compared against simulations.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 15:21:14 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Simatos",
"Florian",
"",
"FT R&D"
],
[
"Robert",
"Philippe",
"",
"FT R&D"
],
[
"Guillemin",
"Fabrice",
"",
"FT R&D"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.1621 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg | An Agent-Based Simulation of In-Store Customer Experiences | null | Operational Research Society 4th Simulation Workshop (SW08), in
print, pp, Worcestershire, UK 2008 | null | null | cs.NE cs.CE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Agent-based modelling and simulation offers a new and exciting way of
understanding the world of work. In this paper we describe the development of
an agent-based simulation model, designed to help to understand the
relationship between human resource management practices and retail
productivity. We report on the current development of our simulation model
which includes new features concerning the evolution of customers over time. To
test some of these features we have conducted a series of experiments dealing
with customer pool sizes, standard and noise reduction modes, and the spread of
the word of mouth. Our multi-disciplinary research team draws upon expertise
from work psychologists and computer scientists. Despite the fact we are
working within a relatively novel and complex domain, it is clear that
intelligent agents offer potential for fostering sustainable organisational
capabilities in the future.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 16:11:34 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.1626 | Uwe Aickelin | Amanda Whitbrook, Uwe Aickelin and Jonathan Garibaldi | Genetic-Algorithm Seeding Of Idiotypic Networks For Mobile-Robot
Navigation | null | Proceedings of the International Conference on Informatics in
Control, Automation and Robotics (ICINCO 2008), in print, pp, Funchal,
Portugal, 2008 | null | null | cs.NE cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Robot-control designers have begun to exploit the properties of the human
immune system in order to produce dynamic systems that can adapt to complex,
varying, real-world tasks. Jernes idiotypic-network theory has proved the most
popular artificial-immune-system (AIS) method for incorporation into
behaviour-based robotics, since idiotypic selection produces highly adaptive
responses. However, previous efforts have mostly focused on evolving the
network connections and have often worked with a single, pre-engineered set of
behaviours, limiting variability. This paper describes a method for encoding
behaviours as a variable set of attributes, and shows that when the encoding is
used with a genetic algorithm (GA), multiple sets of diverse behaviours can
develop naturally and rapidly, providing much greater scope for flexible
behaviour-selection. The algorithm is tested extensively with a simulated
e-puck robot that navigates around a maze by tracking colour. Results show that
highly successful behaviour sets can be generated within about 25 minutes, and
that much greater diversity can be obtained when multiple autonomous
populations are used, rather than a single one.
| [
{
"version": "v1",
"created": "Tue, 11 Mar 2008 16:26:47 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Whitbrook",
"Amanda",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Garibaldi",
"Jonathan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0803.1672 | Scott Summers | Matthew J. Patitz, and Scott M. Summers | Self-Assembly of Discrete Self-Similar Fractals | null | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we search for {\it absolute} limitations of the Tile Assembly
Model (TAM), along with techniques to work around such limitations.
Specifically, we investigate the self-assembly of fractal shapes in the TAM. We
prove that no self-similar fractal fully weakly self-assembles at temperature
1, and that certain kinds of self-similar fractals do not strictly
self-assemble at any temperature. Additionally, we extend the fiber
construction from Lathrop et. al. (2007) to show that any self-similar fractal
belonging to a particular class of "nice" self-similar fractals has a fibered
version that strictly self-assembles in the TAM.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 16:43:24 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Apr 2008 17:15:02 GMT"
}
] | 2008-04-26T00:00:00 | [
[
"Patitz",
"Matthew J.",
""
],
[
"Summers",
"Scott M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.1695 | Sergei Viznyuk | S.Viznyuk | Use of self-correlation metrics for evaluation of information properties
of binary strings | 5 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is demonstrated that appropriately chosen computable metrics based on
self-correlation properties provide a degree of determinism sufficient to
segregate binary strings by level of information content.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 02:33:07 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Viznyuk",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1716 | Lokman Meho | Lokman I. Meho and Yvonne Rogers | Citation Counting, Citation Ranking, and h-Index of Human-Computer
Interaction Researchers: A Comparison between Scopus and Web of Science | 35 pages, 9 tables, 3 figures, accepted for publication in the
Journal of the American Society for Information Science and Technology | null | null | null | cs.HC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study examines the differences between Scopus and Web of Science in the
citation counting, citation ranking, and h-index of 22 top human-computer
interaction (HCI) researchers from EQUATOR--a large British Interdisciplinary
Research Collaboration project. Results indicate that Scopus provides
significantly more coverage of HCI literature than Web of Science, primarily
due to coverage of relevant ACM and IEEE peer-reviewed conference proceedings.
No significant differences exist between the two databases if citations in
journals only are compared. Although broader coverage of the literature does
not significantly alter the relative citation ranking of individual
researchers, Scopus helps distinguish between the researchers in a more nuanced
fashion than Web of Science in both citation counting and h-index. Scopus also
generates significantly different maps of citation networks of individual
scholars than those generated by Web of Science. The study also presents a
comparison of h-index scores based on Google Scholar with those based on the
union of Scopus and Web of Science. The study concludes that Scopus can be used
as a sole data source for citation-based research and evaluation in HCI,
especially if citations in conference proceedings are sought and that h scores
should be manually calculated instead of relying on system calculations.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 08:09:19 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Meho",
"Lokman I.",
""
],
[
"Rogers",
"Yvonne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.1723 | Andrei Sukhov M | A. P. Platonov, D. I. Sidelnikov, M. V. Strizhov, A. M. Sukhov | Estimation of available bandwidth and measurement infrastructure for
Russian segment of Internet | 8 pages, 4 figures, submitted to Telecommunication (www.nait.ru, in
Russian) | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In paper the method for estimation of available bandwidth is supposed which
does not demand the advanced utilities. Our method is based on the measurement
of network delay $D$ for packets of different sizes $W$. The simple expression
for available bandwidth $B_{av} =(W_2-W_1)/(D_2-D_1)$ is substantiated. For the
experimental testing the measurement infrastructure for Russian segment of
Internet was installed in framework of RFBR grant 06-07-89074.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 08:57:50 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jul 2008 08:39:05 GMT"
}
] | 2008-07-02T00:00:00 | [
[
"Platonov",
"A. P.",
""
],
[
"Sidelnikov",
"D. I.",
""
],
[
"Strizhov",
"M. V.",
""
],
[
"Sukhov",
"A. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0803.1728 | Uwe Aickelin | Salwani Abdullah, Uwe Aickelin, Edmund Burke, Aniza Din and Rong Qu | Investigating a Hybrid Metaheuristic For Job Shop Rescheduling | null | Proceedings of the 3rd Australian Conference on Artificial Life
(ACAL07), Lecture Notes in Computer Science 4828, pp 357-368, Gold Coast,
Australia 2007 | 10.1007/978-3-540-76931-6_31 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous research has shown that artificial immune systems can be used to
produce robust schedules in a manufacturing environment. The main goal is to
develop building blocks (antibodies) of partial schedules that can be used to
construct backup solutions (antigens) when disturbances occur during
production. The building blocks are created based upon underpinning ideas from
artificial immune systems and evolved using a genetic algorithm (Phase I). Each
partial schedule (antibody) is assigned a fitness value and the best partial
schedules are selected to be converted into complete schedules (antigens). We
further investigate whether simulated annealing and the great deluge algorithm
can improve the results when hybridised with our artificial immune system
(Phase II). We use ten fixed solutions as our target and measure how well we
cover these specific scenarios.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 09:26:47 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Abdullah",
"Salwani",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Burke",
"Edmund",
""
],
[
"Din",
"Aniza",
""
],
[
"Qu",
"Rong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.1733 | Chiachi Huang | Chiachi Huang and Syed A. Jafar | Degrees of Freedom of the MIMO Interference Channel with Cooperation and
Cognition | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore the benefits, in the sense of total (sum rate)
degrees of freedom (DOF), of cooperation and cognitive message sharing for a
two-user multiple-input-multiple-output (MIMO) Gaussian interference channel
with $M_1$, $M_2$ antennas at transmitters and $N_1$, $N_2$ antennas at
receivers. For the case of cooperation (including cooperation at transmitters
only, at receivers only, and at transmitters as well as receivers), the DOF is
$\min \{M_1+M_2, N_1+N_2, \max(M_1, N_2)), \max(M_2, N_1)\}$, which is the same
as the DOF of the channel without cooperation. For the case of cognitive
message sharing, the DOF is $\min \{M_1+M_2, N_1+N_2, (1-1_{T2})((1-1_{R2})
\max(M_1, N_2) + 1_{R2} (M_1+N_2)), (1-1_{T1})((1-1_{R1}) \max(M_2, N_1) +
1_{R1} (M_2+N_1)) \}$ where $1_{Ti} = 1$ $(0)$ when transmitter $i$ is (is not)
a cognitive transmitter and $1_{Ri}$ is defined in the same fashion. Our
results show that while both techniques may increase the sum rate capacity of
the MIMO interference channel, only cognitive message sharing can increase the
DOF. We also find that it may be more beneficial for a user to have a cognitive
transmitter than to have a cognitive receiver.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 09:46:22 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Huang",
"Chiachi",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1748 | Grenville Croll | Yusuf Jafry, Fredrika Sidoroff, Roger Chi | A Computational Framework for the Near Elimination of Spreadsheet Risk | 9 pages, 3 colour figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 85-93
ISBN:1-905617-08-9 | null | null | cs.SE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a
technical approach to the near-elimination of spreadsheet risk in the
enterprise computing environment, whilst maintaining the full flexibility of
spreadsheets for modelling complex financial structures and processes. In its
Basic Mode of use, the system comprises a secure and robust centralised
spreadsheet management framework. In Advanced Mode, the system can be viewed as
a robust computational framework whereby users can "submit jobs" to the
spreadsheet, and retrieve the results from the computations, but with no direct
access to the underlying spreadsheet. An example application, Monte Carlo
simulation, is presented to highlight the benefits of this approach with regard
to mitigating spreadsheet risk in complex, mission-critical, financial
calculations.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 11:22:12 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Jafry",
"Yusuf",
""
],
[
"Sidoroff",
"Fredrika",
""
],
[
"Chi",
"Roger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.1751 | Grenville Croll | John Nash, Andy Adler, Neil Smith | TellTable Spreadsheet Audit: from Technical Possibility to Operating
Prototype | 11 pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004
45-55ISBN 1 902724 94 1 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At the 2003 EuSpRIG meeting, we presented a framework and software
infrastructure to generate and analyse an audit trail for a spreadsheet file.
This report describes the results of a pilot implementation of this software
(now called TellTable; see www.telltable.com), along with developments in the
server infrastructure and availability, extensions to other "Office Suite"
files, integration of the audit tool into the server interface, and related
developments, licensing and reports. We continue to seek collaborators and
partners in what is primarily an open-source project with some shared-source
components.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 11:36:41 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Nash",
"John",
""
],
[
"Adler",
"Andy",
""
],
[
"Smith",
"Neil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.1754 | Grenville Croll | Simon Thorne, David Ball, Zoe Lawson | A Novel Approach to Formulae Production and Overconfidence Measurement
to Reduce Risk in Spreadsheet Modelling | 12 pages, 7 figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 71-83
ISBN 1 902724 94 1 | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research on formulae production in spreadsheets has established the practice
as high risk yet unrecognised as such by industry. There are numerous software
applications that are designed to audit formulae and find errors. However these
are all post creation, designed to catch errors before the spreadsheet is
deployed. As a general conclusion from EuSpRIG 2003 conference it was decided
that the time has come to attempt novel solutions based on an understanding of
human factors. Hence in this paper we examine one such possibility namely a
novel example driven modelling approach. We discuss a control experiment that
compares example driven modelling against traditional approaches over several
progressively more difficult tests. The results are very interesting and
certainly point to the value of further investigation of the example driven
potential. Lastly we propose a method for statistically analysing the problem
of overconfidence in spreadsheet modellers.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 11:47:41 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Thorne",
"Simon",
""
],
[
"Ball",
"David",
""
],
[
"Lawson",
"Zoe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.1764 | Thomas Watteyne | Thomas Watteyne (INRIA Rh\^one-Alpes, FT R&D), Dominique Barthel (FT
R&D), Mischa Dohler (CTTC), Isabelle Aug\'e-Blum (INRIA Rh\^one-Alpes) | WiFly: experimenting with Wireless Sensor Networks and Virtual
coordinates | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Experimentation is important when designing communication protocols for
Wireless Sensor Networks. Lower-layers have a major impact on upper-layer
performance, and the complexity of the phenomena can not be entirely captured
by analysis or simulation. In this report, we go through the complete process,
from designing an energy-efficient self-organizing communication architecture
(MAC, routing and application layers) to real-life experimentation roll-outs.
The presented communication architecture includes a MAC protocol which avoids
building and maintaining neighborhood tables, and a geographically-inspired
routing protocol over virtual coordinates. The application consists of a mobile
sink interrogating a wireless sensor network based on the requests issued by a
disconnected base station. After the design process of this architecture, we
verify it functions correctly by simulation, and we perform a temporal
verification. This study is needed to calculate the maximum speed the mobile
sink can take. We detail the implementation, and the results of the off-site
experimentation (energy consumption at PHY layer, collision probability at MAC
layer, and routing). Finally, we report on the real-world deployment where we
have mounted the mobile sink node on a radio-controlled airplane.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 13:02:15 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2008 09:11:57 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Watteyne",
"Thomas",
"",
"INRIA Rhône-Alpes, FT R&D"
],
[
"Barthel",
"Dominique",
"",
"FT\n R&D"
],
[
"Dohler",
"Mischa",
"",
"CTTC"
],
[
"Augé-Blum",
"Isabelle",
"",
"INRIA Rhône-Alpes"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.1807 | Valentin Savin | Ghassan M. Kraidy and Valentin Savin | Minimum-Delay Decoding of Turbo-Codes for Upper-Layer FEC | 5 pages, submitted SPAWC08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate the decoding of parallel turbo codes over the
binary erasure channel suited for upper-layer error correction. The proposed
algorithm performs on-the-fly decoding, i.e. it starts decoding as soon as the
first symbols are received. This algorithm compares with the iterative decoding
of codes defined on graphs, in that it propagates in the trellises of the turbo
code by removing transitions in the same way edges are removed in a bipartite
graph under message-passing decoding. Performance comparison with LDPC codes
for different coding rates is shown.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 16:22:28 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Kraidy",
"Ghassan M.",
""
],
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1830 | Olivier Finkel | Olivier Finkel (ELM) | On Winning Conditions of High Borel Complexity in Pushdown Games | null | Fundamenta Informaticae 66 (3) (2005) 277-298 | null | null | cs.LO cs.GT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some decidable winning conditions of arbitrarily high finite Borel complexity
for games on finite graphs or on pushdown graphs have been recently presented
by O. Serre in [ Games with Winning Conditions of High Borel Complexity, in the
Proceedings of the International Conference ICALP 2004, LNCS, Volume 3142, p.
1150-1162 ]. We answer in this paper several questions which were raised by
Serre in the above cited paper. We first show that, for every positive integer
n, the class C_n(A), which arises in the definition of decidable winning
conditions, is included in the class of non-ambiguous context free omega
languages, and that it is neither closed under union nor under intersection. We
prove also that there exists pushdown games, equipped with such decidable
winning conditions, where the winning sets are not deterministic context free
languages, giving examples of winning sets which are non-deterministic
non-ambiguous context free languages, inherently ambiguous context free
languages, or even non context free languages.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 19:50:26 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0803.1841 | Olivier Finkel | Olivier Finkel (ELM) | On the Topological Complexity of Infinitary Rational Relations | null | RAIRO-Theoretical Informatics and Applications 37 (2) (2003)
105-113 | null | null | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove in this paper that there exists some infinitary rational relations
which are analytic but non Borel sets, giving an answer to a question of
Simonnet [Automates et Th\'eorie Descriptive, Ph. D. Thesis, Universit\'e Paris
7, March 1992].
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 20:14:47 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0803.1842 | Olivier Finkel | Olivier Finkel (ELM) | Closure Properties of Locally Finite Omega Languages | null | Theoretical Computer Science 322 (1) (2004) 69-84 | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Locally finite omega languages were introduced by Ressayre in [Journal of
Symbolic Logic, Volume 53, No. 4, p.1009-1026]. They generalize omega languages
accepted by finite automata or defined by monadic second order sentences. We
study here closure properties of the family LOC_omega of locally finite omega
languages. In particular we show that the class LOC_omega is neither closed
under intersection nor under complementation, giving an answer to a question of
Ressayre.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 20:16:34 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0803.1862 | Grenville Croll | Simon Thorne, David Ball | Exploring Human Factors in Spreadsheet Development | 11 pages, 3 figures, 2 tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 161-172
ISBN:1-902724-16-X | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider human factors and their impact on spreadsheet
development in strategic decision-making. This paper brings forward research
from many disciplines both directly related to spreadsheets and a broader
spectrum from psychology to industrial processing. We investigate how human
factors affect a simplified development cycle and what the potential
consequences are.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 22:09:59 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Thorne",
"Simon",
""
],
[
"Ball",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.1866 | Grenville Croll | Deborah Cernauskas, Andrew Kumiega, Ben VanVliet | Risk Management for Complex Calculations: EuSpRIG Best Practices in
Hybrid Applications | 11 pages, 8 figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 25-36
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the need for advanced, interactive mathematical models has increased,
user/programmers are increasingly choosing the MatLab scripting language over
spreadsheets. However, applications developed in these tools have high error
risk, and no best practices exist. We recommend that advanced, highly
mathematical applications incorporate these tools with spreadsheets into hybrid
applications, where developers can apply EuSpRIG best practices. Development of
hybrid applications can reduce the potential for errors, shorten development
time, and enable higher level operations. We believe that hybrid applications
are the future and over the course of this paper, we apply and extend
spreadsheet best practices to reduce or prevent risks in hybrid Excel/MatLab
applications.
| [
{
"version": "v1",
"created": "Wed, 12 Mar 2008 22:30:10 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Cernauskas",
"Deborah",
""
],
[
"Kumiega",
"Andrew",
""
],
[
"VanVliet",
"Ben",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.1875 | Grenville Croll | Ziv Hellman | Breaking Out of the Cell: On The Benefits of a New Spreadsheet
User-Interaction Paradigm | 12 Pages, 2 Diagrams | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 113-124
ISBN:1-902724-16-X | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contemporary spreadsheets are plagued by a profusion of errors, auditing
difficulties, lack of uniform development methodologies, and barriers to easy
comprehension of the underlying business models they represent. This paper
presents a case that most of these difficulties stem from the fact that the
standard spreadsheet user-interaction paradigm - the 'cell-matrix' approach -
is appropriate for spreadsheet data presentation but has significant drawbacks
with respect to spreadsheet creation, maintenance and comprehension when
workbooks pass a minimal threshold of complexity. An alternative paradigm for
the automated generation of spreadsheets directly from plain-language business
model descriptions is presented along with its potential benefits. Sunsight
Modeller (TM), a working software system implementing the suggested paradigm,
is briefly described.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 00:15:40 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Hellman",
"Ziv",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.1908 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, M. Laddomada, F. Mesiti, M. Mondin | On the Throughput Allocation for Proportional Fairness in Multirate IEEE
802.11 DCF under General Load Conditions | 5 pages, 2 figures, submitted to IEEE Globecom 2008, March 2008 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a modified proportional fairness (PF) criterion suitable
for mitigating the \textit{rate anomaly} problem of multirate IEEE 802.11
Wireless LANs employing the mandatory Distributed Coordination Function (DCF)
option. Compared to the widely adopted assumption of saturated network, the
proposed criterion can be applied to general networks whereby the contending
stations are characterized by specific packet arrival rates, $\lambda_s$, and
transmission rates $R_d^{s}$.
The throughput allocation resulting from the proposed algorithm is able to
greatly increase the aggregate throughput of the DCF while ensuring fairness
levels among the stations of the same order of the ones available with the
classical PF criterion. Put simply, each station is allocated a throughput that
depends on a suitable normalization of its packet rate, which, to some extent,
measures the frequency by which the station tries to gain access to the
channel. Simulation results are presented for some sample scenarios, confirming
the effectiveness of the proposed criterion.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 06:48:50 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"M.",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.1926 | Juan J. Merelo Pr. | Pablo Garcia-Sanchez, J. L. J. Laredo, J. P. Sevilla, Pedro Castillo,
J. J. Merelo | Improved evolutionary generation of XSLT stylesheets | Accepted as poster at the GECCO-2008 conference | null | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper introduces a procedure based on genetic programming to evolve XSLT
programs (usually called stylesheets or logicsheets). XSLT is a general
purpose, document-oriented functional language, generally used to transform XML
documents (or, in general, solve any problem that can be coded as an XML
document). The proposed solution uses a tree representation for the stylesheets
as well as diverse specific operators in order to obtain, in the studied cases
and a reasonable time, a XSLT stylesheet that performs the transformation.
Several types of representation have been compared, resulting in different
performance and degree of success.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 11:43:25 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Garcia-Sanchez",
"Pablo",
""
],
[
"Laredo",
"J. L. J.",
""
],
[
"Sevilla",
"J. P.",
""
],
[
"Castillo",
"Pedro",
""
],
[
"Merelo",
"J. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.1944 | Diego Perino | Luca Muscariello (FT R&D), Diego Perino (FT R&D, INRIA Rocquencourt) | Early Experiences in Traffic Engineering Exploiting Path Diversity: A
Practical Approach | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent literature has proved that stable dynamic routing algorithms have
solid theoretical foundation that makes them suitable to be implemented in a
real protocol, and used in practice in many different operational network
contexts. Such algorithms inherit much of the properties of congestion
controllers implementing one of the possible combination of AQM/ECN schemes at
nodes and flow control at sources. In this paper we propose a linear program
formulation of the multi-commodity flow problem with congestion control, under
max-min fairness, comprising demands with or without exogenous peak rates. Our
evaluations of the gain, using path diversity, in scenarios as intra-domain
traffic engineering and wireless mesh networks encourages real implementations,
especially in presence of hot spots demands and non uniform traffic matrices.
We propose a flow aware perspective of the subject by using a natural
multi-path extension to current congestion controllers and show its performance
with respect to current proposals. Since flow aware architectures exploiting
path diversity are feasible, scalable, robust and nearly optimal in presence of
flows with exogenous peak rates, we claim that our solution rethinked in the
context of realistic traffic assumptions performs as better as an optimal
approach with all the additional benefits of the flow aware paradigm.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 10:49:32 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2008 09:22:59 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Muscariello",
"Luca",
"",
"FT R&D"
],
[
"Perino",
"Diego",
"",
"FT R&D, INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.1945 | Riccardo Borghi | Marco Lanucara and Riccardo Borghi | Resampling and requantization of band-limited Gaussian stochastic
signals with flat power spectrum | Submitted to Digital Signal Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A theoretical analysis, aimed at characterizing the degradation induced by
the resampling and requantization processes applied to band-limited Gaussian
signals with flat power spectrum, available through their digitized samples, is
presented. The analysis provides an efficient algorithm for computing the
complete {joint} bivariate discrete probability distribution associated to the
true quantized version of the Gaussian signal and to the quantity estimated
after resampling and requantization of the input digitized sequence. The use of
Fourier transform techniques allows deriving {approximate} analytical
expressions for the quantities of interest, as well as implementing their
efficient computation. Numerical experiments are found to be in good agreement
with the theoretical results, and confirm the validity of the whole approach.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 10:57:08 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jul 2008 12:13:18 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Aug 2009 13:20:07 GMT"
}
] | 2009-08-19T00:00:00 | [
[
"Lanucara",
"Marco",
""
],
[
"Borghi",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1975 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK), Laurent Fousse (LJK), Bruno Salvy (INRIA
Rocquencourt) | Compressed Modular Matrix Multiplication | Published in: MICA'2008 : Milestones in Computer Algebra, Tobago :
Trinit\'e-et-Tobago (2008) | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose to store several integers modulo a small prime into a single
machine word. Modular addition is performed by addition and possibly
subtraction of a word containing several times the modulo. Modular
Multiplication is not directly accessible but modular dot product can be
performed by an integer multiplication by the reverse integer. Modular
multiplication by a word containing a single residue is a also possible.
Therefore matrix multiplication can be performed on such a compressed storage.
We here give bounds on the sizes of primes and matrices for which such a
compression is possible. We also explicit the details of the required
compressed arithmetic routines.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 19:15:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Fousse",
"Laurent",
"",
"LJK"
],
[
"Salvy",
"Bruno",
"",
"INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0803.1985 | Uwe Aickelin | Adrian Adewunmi, Uwe Aickelin and Mike Byrne | An Investigation of the Sequential Sampling Method for Crossdocking
Simulation Output Variance Reduction | null | Operational Research Society 4th Simulation Workshop (SW08) in
print, pp, Worcestershire, UK 2008 | null | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the reduction of variance associated with a
simulation output performance measure, using the Sequential Sampling method
while applying minimum simulation replications, for a class of JIT (Just in
Time) warehousing system called crossdocking. We initially used the Sequential
Sampling method to attain a desired 95% confidence interval half width of
plus/minus 0.5 for our chosen performance measure (Total usage cost, given the
mean maximum level of 157,000 pounds and a mean minimum level of 149,000
pounds). From our results, we achieved a 95% confidence interval half width of
plus/minus 2.8 for our chosen performance measure (Total usage cost, with an
average mean value of 115,000 pounds). However, the Sequential Sampling method
requires a huge number of simulation replications to reduce variance for our
simulation output value to the target level. Arena (version 11) simulation
software was used to conduct this study.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 15:02:48 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Adewunmi",
"Adrian",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Byrne",
"Mike",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.1992 | Mustafa Cenk Gursoy | Junwei Zhang, Mustafa Cenk Gursoy | Achievable Rates and Optimal Resource Allocation for Imperfectly-Known
Fading Relay Channels | null | null | null | UNL-123 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, achievable rates and optimal resource allocation strategies
for imperfectly-known fading relay channels are studied. It is assumed that
communication starts with the network training phase in which the receivers
estimate the fading coefficients of their respective channels. In the data
transmission phase, amplify-and-forward and decode-and-forward relaying schemes
with different degrees of cooperation are considered, and the corresponding
achievable rate expressions are obtained. Three resource allocation problems
are addressed: 1) power allocation between data and training symbols; 2)
time/bandwidth allocation to the relay; 3) power allocation between the source
and relay in the presence of total power constraints. The achievable rate
expressions are employed to identify the optimal resource allocation
strategies. Finally, energy efficiency is investigated by studying the bit
energy requirements in the low-SNR regime.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 15:25:54 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Zhang",
"Junwei",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.1993 | Uwe Aickelin | Uwe Aickelin, Edmund Burke and Jingpeng Li | Improved Squeaky Wheel Optimisation for Driver Scheduling | null | Proceedings of the 9th International Conference on Parallel
Problem Solving from Nature (PPSN IX), Lecture Notes in Computer Science
4193, pp 182-191, Reykjavik, Iceland, 2006 | 10.1007/11844297_19 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a technique called Improved Squeaky Wheel Optimisation
for driver scheduling problems. It improves the original Squeaky Wheel
Optimisations effectiveness and execution speed by incorporating two additional
steps of Selection and Mutation which implement evolution within a single
solution. In the ISWO, a cycle of
Analysis-Selection-Mutation-Prioritization-Construction continues until
stopping conditions are reached. The Analysis step first computes the fitness
of a current solution to identify troublesome components. The Selection step
then discards these troublesome components probabilistically by using the
fitness measure, and the Mutation step follows to further discard a small
number of components at random. After the above steps, an input solution
becomes partial and thus the resulting partial solution needs to be repaired.
The repair is carried out by using the Prioritization step to first produce
priorities that determine an order by which the following Construction step
then schedules the remaining components. Therefore, the optimisation in the
ISWO is achieved by solution disruption, iterative improvement and an iterative
constructive repair process performed. Encouraging experimental results are
reported.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 15:28:06 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Burke",
"Edmund",
""
],
[
"Li",
"Jingpeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.1994 | Uwe Aickelin | Jingpeng Li and Uwe Aickelin | The Application of Bayesian Optimization and Classifier Systems in Nurse
Scheduling | null | Proceedings of the 8th International Conference on Parallel
Problem Solving from Nature (PPSN VIII), Lecture Notes in Computer Science
3242, pp 581-590, Birmingham, UK 2004 | 10.1007/b100601 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two ideas taken from Bayesian optimization and classifier systems are
presented for personnel scheduling based on choosing a suitable scheduling rule
from a set for each persons assignment. Unlike our previous work of using
genetic algorithms whose learning is implicit, the learning in both approaches
is explicit, i.e. we are able to identify building blocks directly. To achieve
this target, the Bayesian optimization algorithm builds a Bayesian network of
the joint probability distribution of the rules used to construct solutions,
while the adapted classifier system assigns each rule a strength value that is
constantly updated according to its usefulness in the current situation.
Computational results from 52 real data instances of nurse scheduling
demonstrate the success of both approaches. It is also suggested that the
learning mechanism in the proposed approaches might be suitable for other
scheduling problems.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 15:43:34 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.1997 | Uwe Aickelin | Uwe Aickelin, Peter Bentley, Steve Cayzer, Kim Jungwon and Julie
McLeod | Danger Theory: The Link between AIS and IDS? | null | Proceedings of the 2nd International Conference on Artificial
Immune Systems (ICARIS 2003), Lecture Notes in Computer Science 2787, pp
147-155, doi: 10.1007/b12020, Edinburgh, UK 2003 | 10.1007/b12020 | null | cs.NE cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present ideas about creating a next generation Intrusion Detection System
based on the latest immunological theories. The central challenge with computer
security is determining the difference between normal and potentially harmful
activity. For half a century, developers have protected their systems by coding
rules that identify and block specific events. However, the nature of current
and future threats in conjunction with ever larger IT systems urgently requires
the development of automated and adaptive defensive tools. A promising solution
is emerging in the form of Artificial Immune Systems. The Human Immune System
can detect and defend against harmful and previously unseen invaders, so can we
not build a similar Intrusion Detection System for our computers.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 16:01:10 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 09:41:27 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Bentley",
"Peter",
""
],
[
"Cayzer",
"Steve",
""
],
[
"Jungwon",
"Kim",
""
],
[
"McLeod",
"Julie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2027 | Grenville Croll | Jocelyn Paine | Excelsior: Bringing the Benefits of Modularisation to Excel | 13 Pages, Code Fragments | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 173-184
ISBN:1-902724-16-X | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Excel lacks features for modular design. Had it such features, as do most
programming languages, they would save time, avoid unneeded programming, make
mistakes less likely, make code-control easier, help organisations adopt a
uniform house style, and open business opportunities in buying and selling
spreadsheet modules. I present Excelsior, a system for bringing these benefits
to Excel.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2008 18:41:21 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Paine",
"Jocelyn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.2092 | Yoann Pigne | Fr\'ed\'eric Guinand (LITIS), Yoann Pign\'e (LITIS) | An Ant-Based Model for Multiple Sequence Alignment | null | Dans Large-Scale Scientific Computing - Large-Scale Scientific
Computing, 6th International Conference, LSSC 2007, Sozopol : Bulgarie (2007) | null | null | q-bio.QM cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple sequence alignment is a key process in today's biology, and finding
a relevant alignment of several sequences is much more challenging than just
optimizing some improbable evaluation functions. Our approach for addressing
multiple sequence alignment focuses on the building of structures in a new
graph model: the factor graph model. This model relies on block-based
formulation of the original problem, formulation that seems to be one of the
most suitable ways for capturing evolutionary aspects of alignment. The
structures are implicitly built by a colony of ants laying down pheromones in
the factor graphs, according to relations between blocks belonging to the
different sequences.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 06:58:56 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Guinand",
"Frédéric",
"",
"LITIS"
],
[
"Pigné",
"Yoann",
"",
"LITIS"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.2093 | Yoann Pigne | Yoann Pign\'e (LITIS), Antoine Dutot (LITIS), Fr\'ed\'eric Guinand
(LITIS), Damien Olivier (LITIS) | GraphStream: A Tool for bridging the gap between Complex Systems and
Dynamic Graphs | null | Emergent Properties in Natural and Artificial Complex Systems.
Satellite Conference within the 4th European Conference on Complex Systems
(ECCS'2007), Dresden : Allemagne (2007) | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notion of complex systems is common to many domains, from Biology to
Economy, Computer Science, Physics, etc. Often, these systems are made of sets
of entities moving in an evolving environment. One of their major
characteristics is the emergence of some global properties stemmed from local
interactions between the entities themselves and between the entities and the
environment. The structure of these systems as sets of interacting entities
leads researchers to model them as graphs. However, their understanding
requires most often to consider the dynamics of their evolution. It is indeed
not relevant to study some properties out of any temporal consideration. Thus,
dynamic graphs seem to be a very suitable model for investigating the emergence
and the conservation of some properties. GraphStream is a Java-based library
whose main purpose is to help researchers and developers in their daily tasks
of dynamic problem modeling and of classical graph management tasks: creation,
processing, display, etc. It may also be used, and is indeed already used, for
teaching purpose. GraphStream relies on an event-based engine allowing several
event sources. Events may be included in the core of the application, read from
a file or received from an event handler.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 07:09:13 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pigné",
"Yoann",
"",
"LITIS"
],
[
"Dutot",
"Antoine",
"",
"LITIS"
],
[
"Guinand",
"Frédéric",
"",
"LITIS"
],
[
"Olivier",
"Damien",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0803.2123 | Felix Fontein | Felix Fontein (University of Zurich) | Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain
Infrastructures | 14 pages | Advances in Mathematics of Communications, 2 (3), 2008 | 10.3934/amc.2008.2.293 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In discrete logarithm based cryptography, a method by Pohlig and Hellman
allows solving the discrete logarithm problem efficiently if the group order is
known and has no large prime factors. The consequence is that such groups are
avoided. In the past, there have been proposals for cryptography based on
cyclic infrastructures. We will show that the Pohlig-Hellman method can be
adapted to certain cyclic infrastructures, which similarly implies that certain
infrastructures should not be used for cryptography. This generalizes a result
by M\"uller, Vanstone and Zuccherato for infrastructures obtained from
hyperelliptic function fields.
We recall the Pohlig-Hellman method, define the concept of a cyclic
infrastructure and briefly describe how to obtain such infrastructures from
certain function fields of unit rank one. Then, we describe how to obtain
cyclic groups from discrete cyclic infrastructures and how to apply the
Pohlig-Hellman method to compute absolute distances, which is in general a
computationally hard problem for cyclic infrastructures. Moreover, we give an
algorithm which allows to test whether an infrastructure satisfies certain
requirements needed for applying the Pohlig-Hellman method, and discuss whether
the Pohlig-Hellman method is applicable in infrastructures obtained from number
fields. Finally, we discuss how this influences cryptography based on cyclic
infrastructures.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 14:15:04 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 21:11:15 GMT"
}
] | 2012-04-02T00:00:00 | [
[
"Fontein",
"Felix",
"",
"University of Zurich"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2129 | Natalia Osipova | Natalia Osipova (INRIA Sophia Antipolis) | Comparison of the Discriminatory Processor Sharing Policies | null | null | null | RR-6475 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discriminatory Processor Sharing policy introduced by Kleinrock is of a great
interest in many application areas, including telecommunications, web
applications and TCP flow modelling. Under the DPS policy the job priority is
controlled by the vector of weights. Verifying the vector of weights it is
possible to modify the service rates of the jobs and optimize system
characteristics. In the present paper we present the results concerning the
comparison of two DPS policies with different weight vectors. We show the
monotonicity of the expected sojourn time of the system depending on the weight
vector under certain condition on the system. Namely, the system has to consist
of classes with means which are quite different from each other. The classes
with similar means can be organized together and considered as one class, so
the given restriction can be overcame.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 10:58:46 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Mar 2008 08:49:39 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Apr 2008 13:04:38 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Apr 2008 15:19:34 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Osipova",
"Natalia",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.2135 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | On $(P_5,\bar{P_5})$-sparse graphs and other families | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the notion of $P_4$-sparse graphs previously introduced by
{\scshape Ho\`ang} by considering $\mathcal{F}$-sparse graphs were
$\mathcal{F}$ denotes a finite set of graphs on $p$ vertices. Thus we obtain
some results on $(P_5,\bar{P_5})$-sparse graphs already known on
$(P_5,\bar{P_5})$-free graphs. Finally we completely describe the structure of
$(P_5,\bar{P_5}, bull$)-sparse graphs, it follows that those graphs have
bounded clique-width.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 11:36:49 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.2174 | Mirela Damian | Mirela Damian, Saurav Pandit and Sriram Pemmaraju | Local Approximation Schemes for Topology Control | 11 pages, 6 figures | Proceedings of the 25th ACM Symposium on Principles of Distributed
Computing, pages 208-218, July 2006 | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a distributed algorithm on wireless ad-hoc networks that
runs in polylogarithmic number of rounds in the size of the network and
constructs a linear size, lightweight, (1+\epsilon)-spanner for any given
\epsilon > 0. A wireless network is modeled by a d-dimensional \alpha-quasi
unit ball graph (\alpha-UBG), which is a higher dimensional generalization of
the standard unit disk graph (UDG) model. The d-dimensional \alpha-UBG model
goes beyond the unrealistic ``flat world'' assumption of UDGs and also takes
into account transmission errors, fading signal strength, and physical
obstructions. The main result in the paper is this: for any fixed \epsilon > 0,
0 < \alpha \le 1, and d \ge 2, there is a distributed algorithm running in
O(\log n \log^* n) communication rounds on an n-node, d-dimensional \alpha-UBG
G that computes a (1+\epsilon)-spanner G' of G with maximum degree \Delta(G') =
O(1) and total weight w(G') = O(w(MST(G)). This result is motivated by the
topology control problem in wireless ad-hoc networks and improves on existing
topology control algorithms along several dimensions. The technical
contributions of the paper include a new, sequential, greedy algorithm with
relaxed edge ordering and lazy updating, and clustering techniques for
filtering out unnecessary edges.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 14:37:12 GMT"
}
] | 2008-03-17T00:00:00 | [
[
"Damian",
"Mirela",
""
],
[
"Pandit",
"Saurav",
""
],
[
"Pemmaraju",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.2212 | Dan Olteanu | Christoph Koch and Dan Olteanu | Conditioning Probabilistic Databases | 13 pages, 13 figures | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Past research on probabilistic databases has studied the problem of answering
queries on a static database. Application scenarios of probabilistic databases
however often involve the conditioning of a database using additional
information in the form of new evidence. The conditioning problem is thus to
transform a probabilistic database of priors into a posterior probabilistic
database which is materialized for subsequent query processing or further
refinement. It turns out that the conditioning problem is closely related to
the problem of computing exact tuple confidence values.
It is known that exact confidence computation is an NP-hard problem. This has
led researchers to consider approximation techniques for confidence
computation. However, neither conditioning nor exact confidence computation can
be solved using such techniques.
In this paper we present efficient techniques for both problems. We study
several problem decomposition methods and heuristics that are based on the most
successful search techniques from constraint satisfaction, such as the
Davis-Putnam algorithm. We complement this with a thorough experimental
evaluation of the algorithms proposed. Our experiments show that our exact
algorithms scale well to realistic database sizes and can in some scenarios
compete with the most efficient previous approximation algorithms.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 17:23:34 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jun 2008 16:20:06 GMT"
}
] | 2008-06-16T00:00:00 | [
[
"Koch",
"Christoph",
""
],
[
"Olteanu",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.2219 | Olivier Powell | Andrei Marculescu and Sotiris Nikoletseas and Olivier Powell and Jose
Rolim | Lighweight Target Tracking Using Passive Traces in Sensor Networks | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the important problem of tracking moving targets in wireless sensor
networks. We try to overcome the limitations of standard state of the art
tracking methods based on continuous location tracking, i.e. the high energy
dissipation and communication overhead imposed by the active participation of
sensors in the tracking process and the low scalability, especially in sparse
networks. Instead, our approach uses sensors in a passive way: they just record
and judiciously spread information about observed target presence in their
vicinity; this information is then used by the (powerful) tracking agent to
locate the target by just following the traces left at sensors. Our protocol is
greedy, local, distributed, energy efficient and very successful, in the sense
that (as shown by extensive simulations) the tracking agent manages to quickly
locate and follow the target; also, we achieve good trade-offs between the
energy dissipation and latency.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 18:01:17 GMT"
}
] | 2008-03-17T00:00:00 | [
[
"Marculescu",
"Andrei",
""
],
[
"Nikoletseas",
"Sotiris",
""
],
[
"Powell",
"Olivier",
""
],
[
"Rolim",
"Jose",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.2220 | Panagiotis Papadakos | Panagiotis Papadakos, Giorgos Vasiliadis, Yannis Theoharis, Nikos
Armenatzoglou, Stella Kopidaki, Yannis Marketakis, Manos Daskalakis, Kostas
Karamaroudis, Giorgos Linardakis, Giannis Makrydakis, Vangelis Papathanasiou,
Lefteris Sardis, Petros Tsialiamanis, Georgia Troullinou, Kostas Vandikas,
Dimitris Velegrakis and Yannis Tzitzikas | The Anatomy of Mitos Web Search Engine | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Engineering a Web search engine offering effective and efficient information
retrieval is a challenging task. This document presents our experiences from
designing and developing a Web search engine offering a wide spectrum of
functionalities and we report some interesting experimental results. A rather
peculiar design choice of the engine is that its index is based on a DBMS,
while some of the distinctive functionalities that are offered include advanced
Greek language stemming, real time result clustering, and advanced link
analysis techniques (also for spam page detection).
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 19:18:15 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Mar 2008 17:25:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Papadakos",
"Panagiotis",
""
],
[
"Vasiliadis",
"Giorgos",
""
],
[
"Theoharis",
"Yannis",
""
],
[
"Armenatzoglou",
"Nikos",
""
],
[
"Kopidaki",
"Stella",
""
],
[
"Marketakis",
"Yannis",
""
],
[
"Daskalakis",
"Manos",
""
],
[
"Karamaroudis",
"Kostas",
""
],
[
"Linardakis",
"Giorgos",
""
],
[
"Makrydakis",
"Giannis",
""
],
[
"Papathanasiou",
"Vangelis",
""
],
[
"Sardis",
"Lefteris",
""
],
[
"Tsialiamanis",
"Petros",
""
],
[
"Troullinou",
"Georgia",
""
],
[
"Vandikas",
"Kostas",
""
],
[
"Velegrakis",
"Dimitris",
""
],
[
"Tzitzikas",
"Yannis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.2257 | Matthew Herman | Matthew A. Herman and Thomas Strohmer | High-Resolution Radar via Compressed Sensing | New: Extended theory to include case of noisy signals; Re-ran
numerical simulations with complex-valued data; Clarified definition of
"random signal"; Minor language and typo fixes; 14 pages, 13 figures.
Accepted to IEEE Transactions on Signal Processing, December 2008 | null | 10.1109/TSP.2009.2014277 | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A stylized compressed sensing radar is proposed in which the time-frequency
plane is discretized into an N by N grid. Assuming the number of targets K is
small (i.e., K much less than N^2), then we can transmit a sufficiently
"incoherent" pulse and employ the techniques of compressed sensing to
reconstruct the target scene. A theoretical upper bound on the sparsity K is
presented. Numerical simulations verify that even better performance can be
achieved in practice. This novel compressed sensing approach offers great
potential for better resolution over classical radar.
| [
{
"version": "v1",
"created": "Fri, 14 Mar 2008 22:20:51 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Dec 2008 08:31:32 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Herman",
"Matthew A.",
""
],
[
"Strohmer",
"Thomas",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2262 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Constant-Rank Codes and Their Connection to Constant-Dimension Codes | 10 pages, 3 figures, accepted to appear in IEEE Transactions on
Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constant-dimension codes have recently received attention due to their
significance to error control in noncoherent random linear network coding. What
the maximal cardinality of any constant-dimension code with finite dimension
and minimum distance is and how to construct the optimal constant-dimension
code (or codes) that achieves the maximal cardinality both remain open research
problems. In this paper, we introduce a new approach to solving these two
problems. We first establish a connection between constant-rank codes and
constant-dimension codes. Via this connection, we show that optimal
constant-dimension codes correspond to optimal constant-rank codes over
matrices with sufficiently many rows. As such, the two aforementioned problems
are equivalent to determining the maximum cardinality of constant-rank codes
and to constructing optimal constant-rank codes, respectively. To this end, we
then derive bounds on the maximum cardinality of a constant-rank code with a
given minimum rank distance, propose explicit constructions of optimal or
asymptotically optimal constant-rank codes, and establish asymptotic bounds on
the maximum rate of a constant-rank code.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 00:02:43 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2008 17:07:10 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Apr 2008 22:29:31 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Jul 2008 23:04:05 GMT"
},
{
"version": "v5",
"created": "Mon, 28 Jul 2008 23:05:24 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Jun 2009 13:23:16 GMT"
},
{
"version": "v7",
"created": "Tue, 30 Mar 2010 09:49:46 GMT"
}
] | 2010-03-31T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2285 | Gerhard de Koning Gans | Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia | A Practical Attack on the MIFARE Classic | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The MIFARE Classic is the most widely used contactless smart card in the
market. Its design and implementation details are kept secret by its
manufacturer. This paper studies the architecture of the card and the
communication protocol between card and reader. Then it gives a practical,
low-cost, attack that recovers secret information from the memory of the card.
Due to a weakness in the pseudo-random generator, we are able to recover the
keystream generated by the CRYPTO1 stream cipher. We exploit the malleability
of the stream cipher to read all memory blocks of the first sector of the card.
Moreover, we are able to read any sector of the memory of the card, provided
that we know one memory block within this sector. Finally, and perhaps more
damaging, the same holds for modifying memory blocks.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 11:28:40 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Jun 2008 11:56:11 GMT"
}
] | 2008-06-26T00:00:00 | [
[
"Gans",
"Gerhard de Koning",
""
],
[
"Hoepman",
"Jaap-Henk",
""
],
[
"Garcia",
"Flavio D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2305 | Andrew Gacek | Andrew Gacek | The Abella Interactive Theorem Prover (System Description) | 7 pages, to appear in IJCAR'08 | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Abella is an interactive system for reasoning about aspects of object
languages that have been formally presented through recursive rules based on
syntactic structure. Abella utilizes a two-level logic approach to
specification and reasoning. One level is defined by a specification logic
which supports a transparent encoding of structural semantics rules and also
enables their execution. The second level, called the reasoning logic, embeds
the specification logic and allows the development of proofs of properties
about specifications. An important characteristic of both logics is that they
exploit the lambda tree syntax approach to treating binding in object
languages. Amongst other things, Abella has been used to prove normalizability
properties of the lambda calculus, cut admissibility for a sequent calculus and
type uniqueness and subject reduction properties. This paper discusses the
logical foundations of Abella, outlines the style of theorem proving that it
supports and finally describes some of its recent applications.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 16:15:10 GMT"
},
{
"version": "v2",
"created": "Fri, 23 May 2008 15:28:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gacek",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0803.2306 | Valentin Goranko | Valentin Goranko and Dmitry Shkatov | Tableau-based decision procedures for logics of strategic ability in
multi-agent systems | To appear in ACM Transactions on Computational Logic. 48 pages | null | null | null | cs.LO cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop an incremental tableau-based decision procedures for the
Alternating-time temporal logic ATL and some of its variants.
While running within the theoretically established complexity upper bound, we
claim that our tableau is practically more efficient in the average case than
other decision procedures for ATL known so far. Besides, the ease of its
adaptation to variants of ATL demonstrates the flexibility of the proposed
procedure.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 16:22:53 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 10:53:22 GMT"
}
] | 2008-09-09T00:00:00 | [
[
"Goranko",
"Valentin",
""
],
[
"Shkatov",
"Dmitry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.2314 | Yoann Pigne | Fr\'ed\'eric Guinand (LITIS), Yoann Pign\'e (LITIS) | Problem Solving and Complex Systems | null | Emergent Properties in Natural and Artificial Dynamical Systems,
Springer Verlag (Ed.) (2006) 53-86 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The observation and modeling of natural Complex Systems (CSs) like the human
nervous system, the evolution or the weather, allows the definition of special
abilities and models reusable to solve other problems. For instance, Genetic
Algorithms or Ant Colony Optimizations are inspired from natural CSs to solve
optimization problems. This paper proposes the use of ant-based systems to
solve various problems with a non assessing approach. This means that solutions
to some problem are not evaluated. They appear as resultant structures from the
activity of the system. Problems are modeled with graphs and such structures
are observed directly on these graphs. Problems of Multiple Sequences Alignment
and Natural Language Processing are addressed with this approach.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 18:07:49 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Guinand",
"Frédéric",
"",
"LITIS"
],
[
"Pigné",
"Yoann",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.2315 | Jean-Philippe Cointet | Jean-Philippe Cointet (CREA, TSV), David Chavalarias (CREA) | Science mapping with asymmetrical paradigmatic proximity | null | Networks and Heterogeneous Media 3, 2 (2008) 267 - 276 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a series of methods to represent the evolution of a field of
science at different levels: namely micro, meso and macro levels. We use a
previously introduced asymmetric measure of paradigmatic proximity between
terms that enables us to extract structure from a large publications database.
We apply our set of methods on a case study from the complex systems community
through the mapping of more than 400 complex systems science concepts indexed
from a database as large as several millions of journal papers. We will first
summarize the main properties of our asymmetric proximity measure. Then we show
how salient paradigmatic fields can be embedded into a 2-dimensional
visualization into which the terms are plotted according to their relative
specificity and generality index. This meso-level helps us producing
macroscopic maps of the field of science studied featuring the former
paradigmatic fields.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 18:10:25 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Cointet",
"Jean-Philippe",
"",
"CREA, TSV"
],
[
"Chavalarias",
"David",
"",
"CREA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.2316 | Vivek V. Shende | Vivek V. Shende and Igor L. Markov | On the CNOT-cost of TOFFOLI gates | 28 pages | Quant.Inf.Comp. 9(5-6):461-486 (2009) | null | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The three-input TOFFOLI gate is the workhorse of circuit synthesis for
classical logic operations on quantum data, e.g., reversible arithmetic
circuits. In physical implementations, however, TOFFOLI gates are decomposed
into six CNOT gates and several one-qubit gates. Though this decomposition has
been known for at least 10 years, we provide here the first demonstration of
its CNOT-optimality.
We study three-qubit circuits which contain less than six CNOT gates and
implement a block-diagonal operator, then show that they implicitly describe
the cosine-sine decomposition of a related operator. Leveraging the canonicity
of such decompositions to limit one-qubit gates appearing in respective
circuits, we prove that the n-qubit analogue of the TOFFOLI requires at least
2n CNOT gates. Additionally, our results offer a complete classification of
three-qubit diagonal operators by their CNOT-cost, which holds even if ancilla
qubits are available.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 19:36:48 GMT"
}
] | 2011-11-03T00:00:00 | [
[
"Shende",
"Vivek V.",
""
],
[
"Markov",
"Igor L.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.ET",
"description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.",
"span": "(Emerging Technologies)"
}
] |
0803.2317 | Jorge Sousa Pinto | Joao Gomes and Daniel Martins and Simao Melo de Sousa and Jorge Sousa
Pinto | Lissom, a Source Level Proof Carrying Code Platform | Poster presented at the International Workshop on Proof-Carrying Code
(PCC 06), 2006 | null | null | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a proposal for a Proof Carrying Code (PCC) architecture
called Lissom. Started as a challenge for final year Computing students, Lissom
was thought as a mean to prove to a sceptic community, and in particular to
students, that formal verification tools can be put to practice in a realistic
environment, and be used to solve complex and concrete problems. The
attractiveness of the problems that PCC addresses has already brought students
to show interest in this project.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 18:53:06 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gomes",
"Joao",
""
],
[
"Martins",
"Daniel",
""
],
[
"de Sousa",
"Simao Melo",
""
],
[
"Pinto",
"Jorge Sousa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0803.2319 | AbdelRahman Karawia Dr. | A. A. Karawia | Two Algorithms for Solving A General Backward Pentadiagonal Linear
Systems | 7 pages | null | null | null | cs.SC cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an efficient computational and symbolic algorithms
for solving a backward pentadiagonal linear systems. The implementation of the
algorithms using Computer Algebra Systems (CAS) such as MAPLE, MACSYMA,
MATHEMATICA, and MATLAB are straightforward. An examples are given in order to
illustrate the algorithms. The symbolic algorithm is competitive the other
methods for solving a backward pentadiagonal linear systems.
| [
{
"version": "v1",
"created": "Sat, 15 Mar 2008 20:04:18 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Karawia",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0803.2337 | Wee Peng Tay | Wee Peng Tay, John Tsitsiklis, and Moe Win | Data Fusion Trees for Detection: Does Architecture Matter? | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of decentralized detection in a network consisting of
a large number of nodes arranged as a tree of bounded height, under the
assumption of conditionally independent, identically distributed observations.
We characterize the optimal error exponent under a Neyman-Pearson formulation.
We show that the Type II error probability decays exponentially fast with the
number of nodes, and the optimal error exponent is often the same as that
corresponding to a parallel configuration. We provide sufficient, as well as
necessary, conditions for this to happen. For those networks satisfying the
sufficient conditions, we propose a simple strategy that nearly achieves the
optimal error exponent, and in which all non-leaf nodes need only send 1-bit
messages.
| [
{
"version": "v1",
"created": "Sun, 16 Mar 2008 07:40:41 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Tay",
"Wee Peng",
""
],
[
"Tsitsiklis",
"John",
""
],
[
"Win",
"Moe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2363 | Li Chen | Li Chen | lambda-Connectedness Determination for Image Segmentation | 9 pages, 36th Applied Image Pattern Recognition Workshop (AIPR 2007),
October 2007, Washington, DC, USA | null | null | null | cs.CV cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image segmentation is to separate an image into distinct homogeneous regions
belonging to different objects. It is an essential step in image analysis and
computer vision. This paper compares some segmentation technologies and
attempts to find an automated way to better determine the parameters for image
segmentation, especially the connectivity value of $\lambda$ in
$\lambda$-connected segmentation.
Based on the theories on the maximum entropy method and Otsu's minimum
variance method, we propose:(1)maximum entropy connectedness determination: a
method that uses maximum entropy to determine the best $\lambda$ value in
$\lambda$-connected segmentation, and (2) minimum variance connectedness
determination: a method that uses the principle of minimum variance to
determine $\lambda$ value. Applying these optimization techniques in real
images, the experimental results have shown great promise in the development of
the new methods. In the end, we extend the above method to more general case in
order to compare it with the famous Mumford-Shah method that uses variational
principle and geometric measure.
| [
{
"version": "v1",
"created": "Sun, 16 Mar 2008 17:18:19 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Chen",
"Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.2365 | Ganesh Narayan | V Sriram, Ganesh Narayan, K Gopinath | SAFIUS - A secure and accountable filesystem over untrusted storage | 11pt, 12 pages, 16 figures | Fourth International IEEE Security in Storage Workshop, 2007 -
SISW '07. Publication Date: 27-27 Sept. 2007 On page(s): 34-45 | 10.1109/SISW.2007.7 | null | cs.OS cs.CR cs.DC cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe SAFIUS, a secure accountable file system that resides over an
untrusted storage. SAFIUS provides strong security guarantees like
confidentiality, integrity, prevention from rollback attacks, and
accountability. SAFIUS also enables read/write sharing of data and provides the
standard UNIX-like interface for applications. To achieve accountability with
good performance, it uses asynchronous signatures; to reduce the space required
for storing these signatures, a novel signature pruning mechanism is used.
SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS.
Preliminary performance studies show that SAFIUS has a tolerable overhead for
providing secure storage: while it has an overhead of about 50% of OpenGFS in
data intensive workloads (due to the overhead of performing
encryption/decryption in software), it is comparable (or better in some cases)
to OpenGFS in metadata intensive workloads.
| [
{
"version": "v1",
"created": "Sun, 16 Mar 2008 18:24:13 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Sriram",
"V",
""
],
[
"Narayan",
"Ganesh",
""
],
[
"Gopinath",
"K",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0803.2386 | James Raynolds | Lenore R. Mullin and James E. Raynolds | Conformal Computing: Algebraically connecting the hardware/software
boundary using a uniform approach to high-performance computation for
software and hardware applications | null | null | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a systematic, algebraically based, design methodology for
efficient implementation of computer programs optimized over multiple levels of
the processor/memory and network hierarchy. Using a common formalism to
describe the problem and the partitioning of data over processors and memory
levels allows one to mathematically prove the efficiency and correctness of a
given algorithm as measured in terms of a set of metrics (such as
processor/network speeds, etc.). The approach allows the average programmer to
achieve high-level optimizations similar to those used by compiler writers
(e.g. the notion of "tiling").
The approach presented in this monograph makes use of A Mathematics of Arrays
(MoA, Mullin 1988) and an indexing calculus (i.e. the psi-calculus) to enable
the programmer to develop algorithms using high-level compiler-like
optimizations through the ability to algebraically compose and reduce sequences
of array operations. Extensive discussion and benchmark results are presented
for the Fast Fourier Transform and other important algorithms.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 02:38:49 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Mullin",
"Lenore R.",
""
],
[
"Raynolds",
"James E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0803.2392 | Joel Tropp | D. Needell and J. A. Tropp | CoSaMP: Iterative signal recovery from incomplete and inaccurate samples | 30 pages. Revised. Presented at Information Theory and Applications,
31 January 2008, San Diego | Appl. Comput. Harmon. Anal., Vol. 26, pp. 301-321, 2008 | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive sampling offers a new paradigm for acquiring signals that are
compressible with respect to an orthonormal basis. The major algorithmic
challenge in compressive sampling is to approximate a compressible signal from
noisy samples. This paper describes a new iterative recovery algorithm called
CoSaMP that delivers the same guarantees as the best optimization-based
approaches. Moreover, this algorithm offers rigorous bounds on computational
cost and storage. It is likely to be extremely efficient for practical problems
because it requires only matrix-vector multiplies with the sampling matrix. For
many cases of interest, the running time is just O(N*log^2(N)), where N is the
length of the signal.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 05:59:48 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2008 23:24:21 GMT"
}
] | 2014-04-29T00:00:00 | [
[
"Needell",
"D.",
""
],
[
"Tropp",
"J. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2427 | Raphael Hunger | Raphael Hunger, Michael Joham | A General Rate Duality of the MIMO Multiple Access Channel and the MIMO
Broadcast Channel | Submitted to IEEE Globecom 2008; Fixed dimensions of channel matrix
H_k and covariance matrix Z_k, slightly modified conclusion | null | 10.1109/GLOCOM.2008.ECP.178 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general rate duality between the multiple access channel (MAC)
and the broadcast channel (BC) which is applicable to systems with and without
nonlinear interference cancellation. Different to the state-of-the-art rate
duality with interference subtraction from Vishwanath et al., the proposed
duality is filter-based instead of covariance-based and exploits the arising
unitary degree of freedom to decorrelate every point-to-point link. Therefore,
it allows for noncooperative stream-wise decoding which reduces complexity and
latency. Moreover, the conversion from one domain to the other does not exhibit
any dependencies during its computation making it accessible to a parallel
implementation instead of a serial one. We additionally derive a rate duality
for systems with multi-antenna terminals when linear filtering without
interference (pre-)subtraction is applied and the different streams of a single
user are not treated as self-interference. Both dualities are based on a
framework already applied to a mean-square-error duality between the MAC and
the BC. Thanks to this novel rate duality, any rate-based optimization with
linear filtering in the BC can now be handled in the dual MAC where the arising
expressions lead to more efficient algorithmic solutions than in the BC due to
the alignment of the channel and precoder indices.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 11:48:35 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2008 12:33:19 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Hunger",
"Raphael",
""
],
[
"Joham",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2443 | Jens Christian Claussen | Jens Christian Claussen | Discrete stochastic processes, replicator and Fokker-Planck equations of
coevolutionary dynamics in finite and infinite populations | Banach Center publications, in press | Banach Center Publications 80, 17-31 (2008) | 10.4064/bc80-0-1 | null | q-bio.PE cond-mat.stat-mech cs.SI math.PR math.ST physics.bio-ph physics.soc-ph stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finite-size fluctuations in coevolutionary dynamics arise in models of
biological as well as of social and economic systems. This brief tutorial
review surveys a systematic approach starting from a stochastic process
discrete both in time and state. The limit $N\to \infty$ of an infinite
population can be considered explicitly, generally leading to a replicator-type
equation in zero order, and to a Fokker-Planck-type equation in first order in
$1/\sqrt{N}$. Consequences and relations to some previous approaches are
outlined.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 13:33:00 GMT"
}
] | 2019-07-15T00:00:00 | [
[
"Claussen",
"Jens Christian",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0803.2447 | Luciano da Fontoura Costa | Luciano da Fontoura Costa | Trajectory Networks and Their Topological Changes Induced by
Geographical Infiltration | 10 pages, 8 figures. A working manuscript: suggestions and
collaborations welcomed | null | null | null | cs.DM cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we investigate the topological changes undergone by
trajectory networks as a consequence of progressive geographical infiltration.
Trajectory networks, a type of knitted network, are obtained by establishing
paths between geographically distributed nodes while following an associated
vector field. For instance, the nodes could correspond to neurons along the
cortical surface and the vector field could correspond to the gradient of
neurotrophic factors, or the nodes could represent towns while the vector
fields would be given by economical and/or geographical gradients. Therefore
trajectory networks are natural models of a large number of geographical
structures. The geographical infiltrations correspond to the addition of new
local connections between nearby existing nodes. As such, these infiltrations
could be related to several real-world processes such as contaminations,
diseases, attacks, parasites, etc. The way in which progressive geographical
infiltrations affect trajectory networks is investigated in terms of the
degree, clustering coefficient, size of the largest component and the lengths
of the existing chains measured along the infiltrations. It is shown that the
maximum infiltration distance plays a critical role in the intensity of the
induced topological changes. For large enough values of this parameter, the
chains intrinsic to the trajectory networks undergo a collapse which is shown
not to be related to the percolation of the network also implied by the
infiltrations.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 13:52:39 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2008 19:24:31 GMT"
}
] | 2008-04-21T00:00:00 | [
[
"Costa",
"Luciano da Fontoura",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0803.2460 | Idan Goldenberg | Idan Goldenberg and David Burshtein | Upper Bound on Error Exponent of Regular LDPC Codes Transmitted over the
BEC | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The error performance of the ensemble of typical LDPC codes transmitted over
the binary erasure channel (BEC) is analyzed. In the past, lower bounds on the
error exponents were derived. In this paper a probabilistic upper bound on this
error exponent is derived. This bound holds with some confidence level.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 14:53:09 GMT"
}
] | 2008-03-18T00:00:00 | [
[
"Goldenberg",
"Idan",
""
],
[
"Burshtein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2495 | Gabriel Istrate | Gabriel Istrate, Madhav V. Marathe and S.S.Ravi | Adversarial Scheduling Analysis of Game Theoretic Models of Norm
Diffusion | null | null | null | null | cs.GT cs.DM math.CO math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In (Istrate, Marathe, Ravi SODA 2001) we advocated the investigation of
robustness of results in the theory of learning in games under adversarial
scheduling models. We provide evidence that such an analysis is feasible and
can lead to nontrivial results by investigating, in an adversarial scheduling
setting, Peyton Young's model of diffusion of norms. In particular, our main
result incorporates into Peyton Young's model.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 17:42:28 GMT"
}
] | 2008-11-04T00:00:00 | [
[
"Istrate",
"Gabriel",
""
],
[
"Marathe",
"Madhav V.",
""
],
[
"Ravi",
"S. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0803.2527 | Grenville Croll | Vipin Samar, Sangeeta Patni | Controlling the Information Flow in Spreadsheets | 9 pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 125-134
ISBN:1-902724-16-X | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is no denying that spreadsheets have become critical for all
operational processes including financial reporting, budgeting, forecasting,
and analysis. Microsoft Excel has essentially become a scratch pad and a data
browser that can quickly be put to use for information gathering and
decision-making. However, there is little control in how data comes into Excel,
and how it gets updated. The information supply chain feeding into Excel
remains ad hoc and without any centralized IT control. This paper discusses
some of the pitfalls of the data collection and maintenance process in Excel.
It then suggests service-oriented architecture (SOA) based information
gathering and control techniques to ameliorate the pitfalls of this scratch pad
while improving the integrity of data, boosting the productivity of the
business users, and building controls to satisfy the requirements of Section
404 of the Sarbanes-Oxley Act.
| [
{
"version": "v1",
"created": "Mon, 17 Mar 2008 20:46:12 GMT"
}
] | 2008-03-19T00:00:00 | [
[
"Samar",
"Vipin",
""
],
[
"Patni",
"Sangeeta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.2559 | James Bailey | James Bailey and Guozhu Dong and Anthony Widjaja To | Logical Queries over Views: Decidability and Expressiveness | null | null | null | null | cs.LO cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of deciding satisfiability of first order logic queries
over views, our aim being to delimit the boundary between the decidable and the
undecidable fragments of this language. Views currently occupy a central place
in database research, due to their role in applications such as information
integration and data warehousing. Our main result is the identification of a
decidable class of first order queries over unary conjunctive views that
generalises the decidability of the classical class of first order sentences
over unary relations, known as the Lowenheim class. We then demonstrate how
various extensions of this class lead to undecidability and also provide some
expressivity results. Besides its theoretical interest, our new decidable class
is potentially interesting for use in applications such as deciding implication
of complex dependencies, analysis of a restricted class of active database
rules, and ontology reasoning.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 02:07:12 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bailey",
"James",
""
],
[
"Dong",
"Guozhu",
""
],
[
"To",
"Anthony Widjaja",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0803.2570 | Bari\c{s} Nakibo\u{g}lu | Shashi Borade, Baris Nakiboglu, Lizhong Zheng | Unequal Error Protection: An Information Theoretic Perspective | 45 pages, 6 figures, Submitted to IEEE Transaction on Information
Theory. Corrected typos | IEEE Transactions on Information Theory, 55(12):5511-5539, Dec
2009 | 10.1109/TIT.2009.2032819 10.1109/ISIT.2008.4595385 | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An information theoretic framework for unequal error protection is developed
in terms of the exponential error bounds. The fundamental difference between
the bit-wise and message-wise unequal error protection (UEP) is demonstrated,
for fixed length block codes on DMCs without feedback. Effect of feedback is
investigated via variable length block codes. It is shown that, feedback
results in a significant improvement in both bit-wise and message-wise UEP
(except the single message case for missed detection). The distinction between
false-alarm and missed-detection formalizations for message-wise UEP is also
considered. All results presented are at rates close to capacity.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 06:03:44 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jun 2009 16:12:00 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Aug 2009 18:51:31 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Oct 2009 23:06:45 GMT"
}
] | 2020-01-03T00:00:00 | [
[
"Borade",
"Shashi",
""
],
[
"Nakiboglu",
"Baris",
""
],
[
"Zheng",
"Lizhong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2615 | Olivier Laval | Olivier Laval (LIPN), Sophie Toulouse (LIPN), Anass Nagih (LITA) | Rapport de recherche sur le probl\`eme du plus court chemin contraint | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article provides an overview of the performance and the theoretical
complexity of approximate and exact methods for various versions of the
shortest path problem. The proposed study aims to improve the resolution of a
more general covering problem within a column generation scheme in which the
shortest path problem is the sub-problem.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 12:37:36 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Laval",
"Olivier",
"",
"LIPN"
],
[
"Toulouse",
"Sophie",
"",
"LIPN"
],
[
"Nagih",
"Anass",
"",
"LITA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.2616 | Etienne Gallais | Etienne Gallais (LMAM, LMJL) | Combinatorial realization of the Thom-Smale complex via discrete Morse
theory | 20 pages | null | null | null | math.GT cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the case of smooth manifolds, we use Forman's discrete Morse theory to
realize combinatorially any Thom-Smale complex coming from a smooth Morse
function by a couple triangulation-discrete Morse function. As an application,
we prove that any Euler structure on a smooth oriented closed 3-manifold has a
particular realization by a complete matching on the Hasse diagram of a
triangulation of the manifold.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 12:38:16 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gallais",
"Etienne",
"",
"LMAM, LMJL"
]
] | [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0803.2639 | Camilla Hollanti | Camilla Hollanti, Jyrki Lahtonen, Hsiao-feng Francis Lu | Maximal Orders in the Design of Dense Space-Time Lattice Codes | 24 pages, 17 figures, revised version submitted to IEEE Trans. on
Inform. Theory Dec. 2007, first version submitted Sep. 2006 | IEEE Trans. Inf. Theory, vol. 54(10), Oct. 2008, pp. 4493-4510 | 10.1109/TIT.2008.928998 | null | cs.IT cs.DM math.IT math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct explicit rate-one, full-diversity, geometrically dense matrix
lattices with large, non-vanishing determinants (NVD) for four transmit antenna
multiple-input single-output (MISO) space-time (ST) applications. The
constructions are based on the theory of rings of algebraic integers and
related subrings of the Hamiltonian quaternions and can be extended to a larger
number of Tx antennas. The usage of ideals guarantees a non-vanishing
determinant larger than one and an easy way to present the exact proofs for the
minimum determinants. The idea of finding denser sublattices within a given
division algebra is then generalized to a multiple-input multiple-output (MIMO)
case with an arbitrary number of Tx antennas by using the theory of cyclic
division algebras (CDA) and maximal orders. It is also shown that the explicit
constructions in this paper all have a simple decoding method based on sphere
decoding. Related to the decoding complexity, the notion of sensitivity is
introduced, and experimental evidence indicating a connection between
sensitivity, decoding complexity and performance is provided. Simulations in a
quasi-static Rayleigh fading channel show that our dense quaternionic
constructions outperform both the earlier rectangular lattices and the rotated
ABBA lattice as well as the DAST lattice. We also show that our quaternionic
lattice is better than the DAST lattice in terms of the diversity-multiplexing
gain tradeoff.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 14:20:44 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Hollanti",
"Camilla",
""
],
[
"Lahtonen",
"Jyrki",
""
],
[
"Lu",
"Hsiao-feng Francis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0803.2675 | Gerard Briscoe Mr | Gerard Briscoe and Philippe De Wilde | Digital Ecosystems: Self-Organisation of Evolving Agent Populations | 5 pages, 5 figures, ACM Management of Emergent Digital EcoSystems
(MEDES) 2009 | null | null | null | cs.NE cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A primary motivation for our research in Digital Ecosystems is the desire to
exploit the self-organising properties of biological ecosystems. Ecosystems are
thought to be robust, scalable architectures that can automatically solve
complex, dynamic problems. Self-organisation is perhaps one of the most
desirable features in the systems that we engineer, and it is important for us
to be able to measure self-organising behaviour. We investigate the
self-organising aspects of Digital Ecosystems, created through the application
of evolutionary computing to Multi-Agent Systems (MASs), aiming to determine a
macroscopic variable to characterise the self-organisation of the evolving
agent populations within. We study a measure for the self-organisation called
Physical Complexity; based on statistical physics, automata theory, and
information theory, providing a measure of information relative to the
randomness in an organism's genome, by calculating the entropy in a population.
We investigate an extension to include populations of variable length, and then
built upon this to construct an efficiency measure to investigate clustering
within evolving agent populations. Overall an insight has been achieved into
where and how self-organisation occurs in our Digital Ecosystem, and how it can
be quantified.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 16:59:12 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2008 09:53:30 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Feb 2009 04:14:47 GMT"
},
{
"version": "v4",
"created": "Mon, 5 Oct 2009 00:32:17 GMT"
}
] | 2009-10-05T00:00:00 | [
[
"Briscoe",
"Gerard",
""
],
[
"De Wilde",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.2695 | Juan J. Merelo Pr. | C. Fernandes, A.M. Mora, J.J. Merelo, V. Ramos, J.L.J. Laredo | KohonAnts: A Self-Organizing Ant Algorithm for Clustering and Pattern
Classification | Submitted to ALIFE XI | null | null | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a new ant-based method that takes advantage of the
cooperative self-organization of Ant Colony Systems to create a naturally
inspired clustering and pattern recognition method. The approach considers each
data item as an ant, which moves inside a grid changing the cells it goes
through, in a fashion similar to Kohonen's Self-Organizing Maps. The resulting
algorithm is conceptually more simple, takes less free parameters than other
ant-based clustering algorithms, and, after some parameter tuning, yields very
good results on some benchmark problems.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 18:27:14 GMT"
}
] | 2008-03-19T00:00:00 | [
[
"Fernandes",
"C.",
""
],
[
"Mora",
"A. M.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Ramos",
"V.",
""
],
[
"Laredo",
"J. L. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0803.2717 | Travis Beals | Travis R. Beals, Kevin P. Hynes, Barry C. Sanders | Distributed authentication for randomly compromised networks | 15 pages, 5 figures; final version | New Journal of Physics 11 (2009) 085005 | 10.1088/1367-2630/11/8/085005 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple, practical approach with probabilistic
information-theoretic security to solve one of quantum key distribution's major
security weaknesses: the requirement of an authenticated classical channel to
prevent man-in-the-middle attacks. Our scheme employs classical secret sharing
and partially trusted intermediaries to provide arbitrarily high confidence in
the security of the protocol. Although certain failures elude detection, we
discuss preemptive strategies to reduce the probability of failure to an
arbitrarily small level: probability of such failures is exponentially
suppressed with increases in connectivity (i.e., connections per node).
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2008 21:02:48 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Dec 2008 07:29:25 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Aug 2009 06:45:19 GMT"
}
] | 2009-08-27T00:00:00 | [
[
"Beals",
"Travis R.",
""
],
[
"Hynes",
"Kevin P.",
""
],
[
"Sanders",
"Barry C.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2812 | Mikhail Konnik | Mikhail V. Konnik | Using Spatially Varying Pixels Exposures and Bayer-covered Photosensors
for High Dynamic Range Imaging | Typos corrected | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The method of a linear high dynamic range imaging using solid-state
photosensors with Bayer colour filters array is provided in this paper. Using
information from neighbour pixels, it is possible to reconstruct linear images
with wide dynamic range from the oversaturated images. Bayer colour filters
array is considered as an array of neutral filters in a quasimonochromatic
light. If the camera's response function to the desirable light source is known
then one can calculate correction coefficients to reconstruct oversaturated
images. Reconstructed images are linearized in order to provide a linear high
dynamic range images for optical-digital imaging systems. The calibration
procedure for obtaining the camera's response function to the desired light
source is described. Experimental results of the reconstruction of the images
from the oversaturated images are presented for red, green, and blue
quasimonochromatic light sources. Quantitative analysis of the accuracy of the
reconstructed images is provided.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 14:55:15 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Mar 2008 07:04:39 GMT"
}
] | 2008-03-24T00:00:00 | [
[
"Konnik",
"Mikhail V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0803.2824 | Simon Balon | Simon Balon and Guy Leduc | Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato
Aware Link Weights Optimization | 12 pages, Short version to be published in ACM SIGMETRICS 2008,
International Conference on Measurement and Modeling of Computer Systems,
June 2-6, 2008, Annapolis, Maryland, USA | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A well-known approach to intradomain traffic engineering consists in finding
the set of link weights that minimizes a network-wide objective function for a
given intradomain traffic matrix. This approach is inadequate because it
ignores a potential impact on interdomain routing. Indeed, the resulting set of
link weights may trigger BGP to change the BGP next hop for some destination
prefixes, to enforce hot-potato routing policies. In turn, this results in
changes in the intradomain traffic matrix that have not been anticipated by the
link weights optimizer, possibly leading to degraded network performance.
We propose a BGP-aware link weights optimization method that takes these
effects into account, and even turns them into an advantage. This method uses
the interdomain traffic matrix and other available BGP data, to extend the
intradomain topology with external virtual nodes and links, on which all the
well-tuned heuristics of a classical link weights optimizer can be applied. A
key innovative asset of our method is its ability to also optimize the traffic
on the interdomain peering links. We show, using an operational network as a
case study, that our approach does so efficiently at almost no extra
computational cost.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 15:50:08 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 15:09:43 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Balon",
"Simon",
""
],
[
"Leduc",
"Guy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.2827 | Mari Kobayashi | Mari Kobayashi and Xavier Mestre | Impact of CSI on Distributed Space-Time Coding in Wireless Relay
Networks | submitted to IEEE Trans. on Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a two-hop wireless network where a transmitter communicates with
a receiver via $M$ relays with an amplify-and-forward (AF) protocol. Recent
works have shown that sophisticated linear processing such as beamforming and
distributed space-time coding (DSTC) at relays enables to improve the AF
performance. However, the relative utility of these strategies depend on the
available channel state information at transmitter (CSIT), which in turn
depends on system parameters such as the speed of the underlying fading channel
and that of training and feedback procedures. Moreover, it is of practical
interest to have a single transmit scheme that handles different CSIT
scenarios. This motivates us to consider a unified approach based on DSTC that
potentially provides diversity gain with statistical CSIT and exploits some
additional side information if available. Under individual power constraints at
the relays, we optimize the amplifier power allocation such that pairwise error
probability conditioned on the available CSIT is minimized. Under perfect CSIT
we propose an on-off gradient algorithm that efficiently finds a set of relays
to switch on. Under partial and statistical CSIT, we propose a simple
waterfilling algorithm that yields a non-trivial solution between maximum power
allocation and a generalized STC that equalizes the averaged amplified noise
for all relays. Moreover, we derive closed-form solutions for M=2 and in
certain asymptotic regimes that enable an easy interpretation of the proposed
algorithms. It is found that an appropriate amplifier power allocation is
mandatory for DSTC to offer sufficient diversity and power gain in a general
network topology.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 18:55:14 GMT"
}
] | 2008-03-20T00:00:00 | [
[
"Kobayashi",
"Mari",
""
],
[
"Mestre",
"Xavier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.2842 | Shai Gutner | Noga Alon, Yossi Azar, Shai Gutner | Admission Control to Minimize Rejections and Online Set Cover with
Repetitions | null | Proc. of 17th SPAA (2005), 238-244 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the admission control problem in general networks. Communication
requests arrive over time, and the online algorithm accepts or rejects each
request while maintaining the capacity limitations of the network. The
admission control problem has been usually analyzed as a benefit problem, where
the goal is to devise an online algorithm that accepts the maximum number of
requests possible. The problem with this objective function is that even
algorithms with optimal competitive ratios may reject almost all of the
requests, when it would have been possible to reject only a few. This could be
inappropriate for settings in which rejections are intended to be rare events.
In this paper, we consider preemptive online algorithms whose goal is to
minimize the number of rejected requests. Each request arrives together with
the path it should be routed on. We show an $O(\log^2 (mc))$-competitive
randomized algorithm for the weighted case, where $m$ is the number of edges in
the graph and $c$ is the maximum edge capacity. For the unweighted case, we
give an $O(\log m \log c)$-competitive randomized algorithm. This settles an
open question of Blum, Kalai and Kleinberg raised in \cite{BlKaKl01}. We note
that allowing preemption and handling requests with given paths are essential
for avoiding trivial lower bounds.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 16:53:42 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Azar",
"Yossi",
""
],
[
"Gutner",
"Shai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.