id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0803.1220
Somitra Sanadhya
Somitra Kumar Sanadhya and Palash Sarkar
22-Step Collisions for SHA-2
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we provide the first 22-step collisions for SHA-256 and SHA-512. Detailed technique of generating these collisions will be provided in the next revision of this note.
[ { "version": "v1", "created": "Sat, 8 Mar 2008 06:44:38 GMT" } ]
2008-03-11T00:00:00
[ [ "Sanadhya", "Somitra Kumar", "" ], [ "Sarkar", "Palash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.1221
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Non-Singular Assembly-mode Changing Motions for 3-RPR Parallel Manipulators
null
Mechanism and Machine Theory 23, 4 (2008) 480-490
null
null
cs.RO physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When moving from one arbitrary location at another, a parallel manipulator may change its assembly-mode without crossing a singularity. Because the non-singular change of assembly-mode cannot be simply detected, the actual assembly-mode during motion is difficult to track. This paper proposes a global explanatory approach to help better understand non-singular assembly-mode changing motions for 3-RPR planar parallel manipulators. The approach consists in fixing one of the actuated joints and analyzing the configuration-space as a surface in a 3-dimensional space. Such a global description makes it possible to display all possible non-singular assembly-mode changing trajectories.
[ { "version": "v1", "created": "Sat, 8 Mar 2008 06:54:47 GMT" } ]
2008-12-18T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0803.1227
Jean Creignou
Jean Creignou (IMB), Herv\'e Diet (IMB)
Linear programming bounds for unitary space time codes
Submitted to ISIT 2008 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The linear programming method is applied to the space $\U_n(\C)$ of unitary matrices in order to obtain bounds for codes relative to the diversity sum and the diversity product. Theoretical and numerical results improving previously known bounds are derived.
[ { "version": "v1", "created": "Sat, 8 Mar 2008 09:11:18 GMT" } ]
2008-12-18T00:00:00
[ [ "Creignou", "Jean", "", "IMB" ], [ "Diet", "Hervé", "", "IMB" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1245
George Bell
George I. Bell
The shortest game of Chinese Checkers and related problems
22 pages, 10 figures; published version
INTEGERS: Electronic Journal of Combinatorial Number Theory 9 (2009) #G01
null
null
math.CO cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1979, David Fabian found a complete game of two-person Chinese Checkers in 30 moves (15 by each player) [Martin Gardner, Penrose Tiles to Trapdoor Ciphers, MAA, 1997]. This solution requires that the two players cooperate to generate a win as quickly as possible for one of them. We show, using computational search techniques, that no shorter game is possible. We also consider a solitaire version of Chinese Checkers where one player attempts to move her pieces across the board in as few moves as possible. In 1971, Octave Levenspiel found a solution in 27 moves [Ibid.]; we demonstrate that no shorter solution exists. To show optimality, we employ a variant of A* search, as well as bidirectional search.
[ { "version": "v1", "created": "Sat, 8 Mar 2008 14:38:31 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2009 18:41:21 GMT" } ]
2009-01-13T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.1296
Steve Oudot
Steve Y. Oudot
On the Topology of the Restricted Delaunay Triangulation and Witness Complex in Higher Dimensions
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is a well-known fact that, under mild sampling conditions, the restricted Delaunay triangulation provides good topological approximations of 1- and 2-manifolds. We show that this is not the case for higher-dimensional manifolds, even under stronger sampling conditions. Specifically, it is not true that, for any compact closed submanifold M of R^n, and any sufficiently dense uniform sampling L of M, the Delaunay triangulation of L restricted to M is homeomorphic to M, or even homotopy equivalent to it. Besides, it is not true either that, for any sufficiently dense set W of witnesses, the witness complex of L relative to M contains or is contained in the restricted Delaunay triangulation of L.
[ { "version": "v1", "created": "Sun, 9 Mar 2008 13:47:43 GMT" } ]
2008-12-18T00:00:00
[ [ "Oudot", "Steve Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0803.1321
Yngve Villanger
Fedor V. Fomin and Yngve Villanger
Treewidth computation and extremal combinatorics
Corrected typos
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a given graph G and integers b,f >= 0, let S be a subset of vertices of G of size b+1 such that the subgraph of G induced by S is connected and S can be separated from other vertices of G by removing f vertices. We prove that every graph on n vertices contains at most n\binom{b+f}{b} such vertex subsets. This result from extremal combinatorics appears to be very useful in the design of several enumeration and exact algorithms. In particular, we use it to provide algorithms that for a given n-vertex graph G - compute the treewidth of G in time O(1.7549^n) by making use of exponential space and in time O(2.6151^n) and polynomial space; - decide in time O(({\frac{2n+k+1}{3})^{k+1}\cdot kn^6}) if the treewidth of G is at most k; - list all minimal separators of G in time O(1.6181^n) and all potential maximal cliques of G in time O(1.7549^n). This significantly improves previous algorithms for these problems.
[ { "version": "v1", "created": "Sun, 9 Mar 2008 20:54:58 GMT" }, { "version": "v2", "created": "Mon, 5 May 2008 09:34:16 GMT" } ]
2008-05-05T00:00:00
[ [ "Fomin", "Fedor V.", "" ], [ "Villanger", "Yngve", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.1323
Samir Medina Perlaza
Samir Medina Perlaza, Laura Cottatellucci, Merouane Debbah
A Game Theoretic Framework for Decentralized Power Allocation in IDMA Systems
To appear in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008)
null
10.1109/PIMRC.2008.4699708
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal strategy for power allocation, each user aims at selfishly maximizing its own utility function. An iterative chip by chip (CBC) decoder at the receiver and a rational selfish behavior of all the users according to a classical game-theoretical framework are the underlying assumptions of this work. This approach leads to a power allocation based on a channel inversion policy where the optimal power level is set locally at each terminal based on the knowledge of its own channel realization, the noise level at the receiver and the number of active users in the network.
[ { "version": "v1", "created": "Sun, 9 Mar 2008 21:22:19 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2008 11:25:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Perlaza", "Samir Medina", "" ], [ "Cottatellucci", "Laura", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1360
Nadja Kutz
Nadja Kutz
On the need for a global academic internet platform
22 pages, no figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article collects arguments for the necessity of a global academic internet platform, which is organized as a kind of ``global scientific parliament''. With such a constitution educational and research institutions will have direct means for communicating scientific results, as well as a platform for representing academia and scientific life in the public.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 08:42:43 GMT" } ]
2008-03-11T00:00:00
[ [ "Kutz", "Nadja", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0803.1393
Ewa Krot-Sieniawska
A. Krzysztof Kwa\'sniewski, Ewa Krot-Sieniawska
On inversion formulas and Fibonomial coefficients
4 pages, presented at the Gian-Carlo Rota Polish Seminar, http://ii.uwb.edu.pl/akk/sem/sem_rota.htm, submitted to FECS'08: The 2008 International Conference on Frontiers in Education: WORLDCOMP'08
Proc. Jangjeon Math. Soc. volume 11 (1), 2008 (June),65-68
null
null
math.CO cs.DM math.GM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A research problem for undergraduates and graduates is being posed as a cap for the prior antecedent regular discrete mathematics exercises. [Here cap is not necessarily CAP=Competitive Access Provider, though nevertheless ...] The object of the cap problem of final interest i.e. array of fibonomial coefficients and the issue of its combinatorial meaning is to be found in A.K.Kwa\'sniewski's source papers. The cap problem number seven - still opened for students has been placed on Mathemagics page of the first author [http://ii.uwb.edu.pl/akk/dydaktyka/dyskr/dyskretna.htm]. The indicatory references are to point at a part of the vast domain of the foundations of computer science in ArXiv affiliation noted as CO.cs.DM. The presentation has been verified in a tutor system of communication with a couple of intelligent students. The result is top secret.Temporarily. [Contact: Wikipedia; Theory of cognitive development].
[ { "version": "v1", "created": "Mon, 10 Mar 2008 12:11:14 GMT" } ]
2010-11-23T00:00:00
[ [ "Kwaśniewski", "A. Krzysztof", "" ], [ "Krot-Sieniawska", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
0803.1416
Andrzej Kwasniewski
A. K. Kwasniewski
New formulas for Stirling-like numbers and Dobinski-like formulas
9 pages, presented at the Gian-Carlo Rota Polish Seminar, http://ii.uwb.edu.pl/akk/sem/sem_rota.htm
Proc. Jangjeon Math. Soc. Vol. 11 No 2, (2008),137-144
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extensions of the $Stirling$ numbers of the second kind and $Dobinski$ -like formulas are proposed in a series of exercises for graduates. Some of these new formulas recently discovered by me are to be found in the source paper $ [1]$. These extensions naturally encompass the well known $q$- extensions. The indicatory references are to point at a part of the vast domain of the foundations of computer science in arxiv affiliation.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 13:49:39 GMT" }, { "version": "v2", "created": "Mon, 19 Jan 2009 21:05:59 GMT" } ]
2009-01-19T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.1443
Robert Shour
Robert Shour
Lexical growth, entropy and the benefits of networking
About 27 pages, double spaced; v3 changes remarks on zeroth generation in proposition 8, and makes some minor changes to wording and spelling; v4 is intended to correct remarks relating to glottochronology
null
null
null
cs.IT math.IT q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If each node of an idealized network has an equal capacity to efficiently exchange benefits, then the network's capacity to use energy is scaled by the average amount of energy required to connect any two of its nodes. The scaling factor equals \textit{e}, and the network's entropy is $\ln(n)$. Networking emerges in consequence of nodes minimizing the ratio of their energy use to the benefits obtained for such use, and their connectability. Networking leads to nested hierarchical clustering, which multiplies a network's capacity to use its energy to benefit its nodes. Network entropy multiplies a node's capacity. For a real network in which the nodes have the capacity to exchange benefits, network entropy may be estimated as $C \log_L(n)$, where the base of the log is the path length $L$, and $C$ is the clustering coefficient. Since $n$, $L$ and $C$ can be calculated for real networks, network entropy for real networks can be calculated and can reveal aspects of emergence and also of economic, biological, conceptual and other networks, such as the relationship between rates of lexical growth and divergence, and the economic benefit of adding customers to a commercial communications network. \textit{Entropy dating} can help estimate the age of network processes, such as the growth of hierarchical society and of language.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 15:46:20 GMT" }, { "version": "v2", "created": "Sun, 30 Mar 2008 18:50:27 GMT" }, { "version": "v3", "created": "Mon, 12 May 2008 14:33:46 GMT" }, { "version": "v4", "created": "Thu, 31 Dec 2009 19:49:52 GMT" } ]
2009-12-31T00:00:00
[ [ "Shour", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0803.1445
Rajesh Ramachandran
R. Rajesh and Vinod Sharma
Distributed Joint Source-Channel Coding on a Multiple Access Channel with Side Information
49 pages, Technical Report, DRDO-IISc programme on Advanced Research in Mathematical Engineering, Dept of ECE, Indian Institute of Science, Bangalore, India
null
null
TR-PME-2008-01
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of transmission of several distributed sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separation does not hold for this channel. Sufficient conditions are provided for transmission of sources with a given distortion. The source and/or the channel could have continuous alphabets (thus Gaussian sources and Gaussian MACs are special cases). Various previous results are obtained as special cases. We also provide several good joint source-channel coding schemes for a discrete/continuous source and discrete/continuous alphabet channel. Channels with feedback and fading are also considered. Keywords: Multiple access channel, side information, lossy joint source-channel coding, channels with feedback, fading channels.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 17:39:19 GMT" } ]
2008-03-11T00:00:00
[ [ "Rajesh", "R.", "" ], [ "Sharma", "Vinod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1454
Satish Babu Korada
Satish Babu Korada, Nicolas Macris
Tight Bounds on the Capacity of Binary Input random CDMA Systems
34 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider multiple access communication on a binary input additive white Gaussian noise channel using randomly spread code division. For a general class of symmetric distributions for spreading coefficients, in the limit of a large number of users, we prove an upper bound on the capacity, which matches a formula that Tanaka obtained by using the replica method. We also show concentration of various relevant quantities including mutual information, capacity and free energy. The mathematical methods are quite general and allow us to discuss extensions to other multiuser scenarios.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 17:04:37 GMT" } ]
2008-03-11T00:00:00
[ [ "Korada", "Satish Babu", "" ], [ "Macris", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1457
Catherine Recanati
Catherine Recanati (LIPN)
Hybrid Reasoning and the Future of Iconic Representations
pp. 299-310
Dans Artificial General Intelligence 2008 - The First AGI Conference, Memphis, Tennessee : \'Etats-Unis d'Am\'erique (2008)
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a brief overview of the main characteristics of diagrammatic reasoning, analyze a case of human reasoning in a mastermind game, and explain why hybrid representation systems (HRS) are particularly attractive and promising for Artificial General Intelligence and Computer Science in general.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 16:44:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Recanati", "Catherine", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0803.1500
Dean Krafft
Dean B. Krafft, Aaron Birkland, Ellen J. Cramer
NCore: Architecture and Implementation of a Flexible, Collaborative Digital Library
11 pages, to appear in JCDL 2008
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
NCore is an open source architecture and software platform for creating flexible, collaborative digital libraries. NCore was developed by the National Science Digital Library (NSDL) project, and it serves as the central technical infrastructure for NSDL. NCore consists of a central Fedora-based digital repository, a specific data model, an API, and a set of backend services and frontend tools that create a new model for collaborative, contributory digital libraries. This paper describes NCore, presents and analyzes its architecture, tools and services; and reports on the experience of NSDL in building and operating a major digital library on it over the past year and the experience of the Digital Library for Earth Systems Education in porting their existing digital library and tools to the NCore platform.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 21:06:31 GMT" } ]
2008-03-12T00:00:00
[ [ "Krafft", "Dean B.", "" ], [ "Birkland", "Aaron", "" ], [ "Cramer", "Ellen J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0803.1511
Ron Dabora
Ron Dabora and Andrea Goldsmith
The Capacity Region of the Degraded Finite-State Broadcast Channel
5 pages. Accepted to the Information Theory Workshop 2008, Porto, Portugal
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the discrete, time-varying broadcast channel with memory under the assumption that the channel states belong to a set of finite cardinality. We first define the physically degraded finite-state broadcast channel for which we derive the capacity region. We then define the stochastically degraded finite-state broadcast channel and derive the capacity region for this scenario as well. In both scenarios we consider the non-indecomposable finite-state channel as well as the indecomposable one.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 00:14:00 GMT" } ]
2008-03-12T00:00:00
[ [ "Dabora", "Ron", "" ], [ "Goldsmith", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1520
Wenbing Zhao
Wenbing Zhao
Integrity-Enhancing Replica Coordination for Byzantine Fault Tolerant Systems
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Strong replica consistency is often achieved by writing deterministic applications, or by using a variety of mechanisms to render replicas deterministic. There exists a large body of work on how to render replicas deterministic under the benign fault model. However, when replicas can be subject to malicious faults, most of the previous work is no longer effective. Furthermore, the determinism of the replicas is often considered harmful from the security perspective and for many applications, their integrity strongly depends on the randomness of some of their internal operations. This calls for new approaches towards achieving replica consistency while preserving the replica randomness. In this paper, we present two such approaches. One is based on Byzantine agreement and the other on threshold coin-tossing. Each approach has its strength and weaknesses. We compare the performance of the two approaches and outline their respective best use scenarios.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 04:20:06 GMT" } ]
2008-03-12T00:00:00
[ [ "Zhao", "Wenbing", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0803.1521
Wenbing Zhao
Wenbing Zhao
Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a novel proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ensuring long term reliability of fault tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window. This is achieved by removing the time-consuming reboot step from the critical path of proactive recovery. Our migration-based proactive recovery is coordinated among the replicas, therefore, it can automatically adjust to different system loads and avoid the problem of excessive concurrent proactive recoveries that may occur in previous work with fixed watchdog timeouts. Moreover, the fast proactive recovery also significantly improves the system availability in the presence of faults.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 04:34:04 GMT" } ]
2008-03-12T00:00:00
[ [ "Zhao", "Wenbing", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0803.1555
Bart Moelans
Bart Kuijpers, Vanessa Lemmens, Bart Moelans and Karl Tuyls
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
25 pages
null
null
null
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same problem in the case where the data is both horizontally and vertically distributed, a situation we refer to as grid partitioned data. We give an algorithm for privacy preserving ID3 over horizontally partitioned data involving more than two parties. For grid partitioned data, we discuss two different evaluation methods for preserving privacy ID3, namely, first merging horizontally and developing vertically or first merging vertically and next developing horizontally. Next to introducing privacy preserving data mining over grid-partitioned data, the main contribution of this paper is that we show, by means of a complexity analysis that the former evaluation method is the more efficient.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 11:18:52 GMT" } ]
2008-12-18T00:00:00
[ [ "Kuijpers", "Bart", "" ], [ "Lemmens", "Vanessa", "" ], [ "Moelans", "Bart", "" ], [ "Tuyls", "Karl", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0803.1568
Uwe Aickelin
Qi Chen and Uwe Aickelin
Dempster-Shafer for Anomaly Detection
null
Proceedings of the International Conference on Data Mining (DMIN 2006), pp 232-238, Las Vegas, USA 2006
null
null
cs.NE cs.AI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is possible to achieve better results than by using a single signal. We further show that by applying this approach to a real-world email dataset the algorithm works for email worm detection. Dempster-Shafer can be a promising method for anomaly detection problems with multiple features (data sources), and two or more classes.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 12:39:01 GMT" } ]
2010-07-05T00:00:00
[ [ "Chen", "Qi", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.1575
David Monniaux
David Monniaux (VERIMAG - Imag)
A Quantifier Elimination Algorithm for Linear Real Arithmetic
accepted at LPAR '08
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new quantifier elimination algorithm for the theory of linear real arithmetic. This algorithm uses as subroutine satisfiability modulo this theory, a problem for which there are several implementations available. The quantifier elimination algorithm presented in the paper is compared, on examples arising from program analysis problems, to several other implementations, all of which cannot solve some of the examples that our algorithm solves easily.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 12:55:25 GMT" }, { "version": "v2", "created": "Thu, 4 Sep 2008 17:58:58 GMT" } ]
2008-09-04T00:00:00
[ [ "Monniaux", "David", "", "VERIMAG - Imag" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0803.1576
Uwe Aickelin
Uwe Aickelin and Adrian Adewunmi
Simulation Optimization of the Crossdock Door Assignment Problem
null
UK Operational Research Society Simulation Workshop 2006 (SW 2006), Leamington Spa, UK 2006
null
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel distance by material handling equipment is minimized. We propose a two fold solution; simulation and optimization of the simulation model simulation optimization. The novel aspect of our solution approach is that we intend to use simulation to derive a more realistic objective function and use Memetic algorithms to find an optimal solution. The main advantage of using Memetic algorithms is that it combines a local search with Genetic Algorithms. The Crossdock Door Assignment Problem is a new domain application to Memetic Algorithms and it is yet unknown how it will perform.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 12:56:51 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Adewunmi", "Adrian", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.1586
Jeroen Vendrig
Jarrad Springett, Jeroen Vendrig
Spatio-activity based object detection
To be submitted to: AVSS 2008 conference
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the SAMMI lightweight object detection method which has a high level of accuracy and robustness, and which is able to operate in an environment with a large number of cameras. Background modeling is based on DCT coefficients provided by cameras. Foreground detection uses similarity in temporal characteristics of adjacent blocks of pixels, which is a computationally inexpensive way to make use of object coherence. Scene model updating uses the approximated median method for improved performance. Evaluation at pixel level and application level shows that SAMMI object detection performs better and faster than the conventional Mixture of Gaussians method.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 13:40:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Springett", "Jarrad", "" ], [ "Vendrig", "Jeroen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0803.1596
Uwe Aickelin
Helen Celia, Christopher Clegg, Mark Robinson, Peer-Olaf Siebers, Uwe Aickelin and Christine Sprigg
Using Intelligent Agents to understand organisational behaviour
null
Proceedings of the British Psychology Society Annual Conference, Occupational Psychology Division (BPS 2007), Bristol, UK 2007
null
null
cs.NE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces two ongoing research projects which seek to apply computer modelling techniques in order to simulate human behaviour within organisations. Previous research in other disciplines has suggested that complex social behaviours are governed by relatively simple rules which, when identified, can be used to accurately model such processes using computer technology. The broad objective of our research is to develop a similar capability within organisational psychology.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 14:19:33 GMT" } ]
2010-07-05T00:00:00
[ [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ], [ "Robinson", "Mark", "" ], [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Sprigg", "Christine", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.1598
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg
A Multi-Agent Simulation of Retail Management Practices
null
Proceedings of the Summer Computer Simulation Conference (SCSC 2007), pp 959-966, San Diego, USA 2007
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply Agent-Based Modeling and Simulation (ABMS) to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents do offer potential for developing organizational capabilities in the future. Our multi-disciplinary research team has worked with a UK department store to collect data and capture perceptions about operations from actors within departments. Based on this case study work, we have built a simulator that we present in this paper. We then use the simulator to gather empirical evidence regarding two specific management practices: empowerment and employee development.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 14:37:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.1600
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg
Understanding Retail Productivity by Simulating Management Practise
null
Proceedings of the EUROSIM Congress on Modelling and Simulation (EUROSIM 2007), pp 1-12, Ljubljana, Slovenia 2007
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents could offer potential for fostering sustainable organizational capabilities in the future. Our research so far has led us to conduct case study work with a top ten UK retailer, collecting data in four departments in two stores. Based on our case study data we have built and tested a first version of a department store simulator. In this paper we will report on the current development of our simulator which includes new features concerning more realistic data on the pattern of footfall during the day and the week, a more differentiated view of customers, and the evolution of customers over time. This allows us to investigate more complex scenarios and to analyze the impact of various management practices.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 14:46:10 GMT" } ]
2008-12-18T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.1604
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg
Using Intelligent Agents to Understand Management Practices and Retail Productivity
null
Proceedings of the Winter Simulation Conference (WSC 2007), pp 2212-2220, Washington, USA 2007
null
null
cs.NE cs.CE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents could offer potential for fostering sustainable organizational capabilities in the future. The project is still at an early stage. So far we have conducted a case study in a UK department store to collect data and capture impressions about operations and actors within departments. Furthermore, based on our case study we have built and tested our first version of a retail branch simulator which we will present in this paper.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 14:55:58 GMT" } ]
2010-07-05T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.1610
Philippe Robert
Florian Simatos, Philippe Robert, Fabrice Guillemin (FT R&D)
A Queueing System for Modeling a File Sharing Principle
null
Dans ACM Sigmetrics (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate in this paper the performance of a simple file sharing principle. For this purpose, we consider a system composed of N peers becoming active at exponential random times; the system is initiated with only one server offering the desired file and the other peers after becoming active try to download it. Once the file has been downloaded by a peer, this one immediately becomes a server. To investigate the transient behavior of this file sharing system, we study the instant when the system shifts from a congested state where all servers available are saturated by incoming demands to a state where a growing number of servers are idle. In spite of its apparent simplicity, this queueing model (with a random number of servers) turns out to be quite difficult to analyze. A formulation in terms of an urn and ball model is proposed and corresponding scaling results are derived. These asymptotic results are then compared against simulations.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 15:21:14 GMT" } ]
2008-12-18T00:00:00
[ [ "Simatos", "Florian", "", "FT R&D" ], [ "Robert", "Philippe", "", "FT R&D" ], [ "Guillemin", "Fabrice", "", "FT R&D" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.1621
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia and Christopher Clegg
An Agent-Based Simulation of In-Store Customer Experiences
null
Operational Research Society 4th Simulation Workshop (SW08), in print, pp, Worcestershire, UK 2008
null
null
cs.NE cs.CE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Agent-based modelling and simulation offers a new and exciting way of understanding the world of work. In this paper we describe the development of an agent-based simulation model, designed to help to understand the relationship between human resource management practices and retail productivity. We report on the current development of our simulation model which includes new features concerning the evolution of customers over time. To test some of these features we have conducted a series of experiments dealing with customer pool sizes, standard and noise reduction modes, and the spread of the word of mouth. Our multi-disciplinary research team draws upon expertise from work psychologists and computer scientists. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents offer potential for fostering sustainable organisational capabilities in the future.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 16:11:34 GMT" } ]
2010-07-05T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.1626
Uwe Aickelin
Amanda Whitbrook, Uwe Aickelin and Jonathan Garibaldi
Genetic-Algorithm Seeding Of Idiotypic Networks For Mobile-Robot Navigation
null
Proceedings of the International Conference on Informatics in Control, Automation and Robotics (ICINCO 2008), in print, pp, Funchal, Portugal, 2008
null
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robot-control designers have begun to exploit the properties of the human immune system in order to produce dynamic systems that can adapt to complex, varying, real-world tasks. Jernes idiotypic-network theory has proved the most popular artificial-immune-system (AIS) method for incorporation into behaviour-based robotics, since idiotypic selection produces highly adaptive responses. However, previous efforts have mostly focused on evolving the network connections and have often worked with a single, pre-engineered set of behaviours, limiting variability. This paper describes a method for encoding behaviours as a variable set of attributes, and shows that when the encoding is used with a genetic algorithm (GA), multiple sets of diverse behaviours can develop naturally and rapidly, providing much greater scope for flexible behaviour-selection. The algorithm is tested extensively with a simulated e-puck robot that navigates around a maze by tracking colour. Results show that highly successful behaviour sets can be generated within about 25 minutes, and that much greater diversity can be obtained when multiple autonomous populations are used, rather than a single one.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 16:26:47 GMT" } ]
2010-07-05T00:00:00
[ [ "Whitbrook", "Amanda", "" ], [ "Aickelin", "Uwe", "" ], [ "Garibaldi", "Jonathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0803.1672
Scott Summers
Matthew J. Patitz, and Scott M. Summers
Self-Assembly of Discrete Self-Similar Fractals
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we search for {\it absolute} limitations of the Tile Assembly Model (TAM), along with techniques to work around such limitations. Specifically, we investigate the self-assembly of fractal shapes in the TAM. We prove that no self-similar fractal fully weakly self-assembles at temperature 1, and that certain kinds of self-similar fractals do not strictly self-assemble at any temperature. Additionally, we extend the fiber construction from Lathrop et. al. (2007) to show that any self-similar fractal belonging to a particular class of "nice" self-similar fractals has a fibered version that strictly self-assembles in the TAM.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 16:43:24 GMT" }, { "version": "v2", "created": "Sat, 26 Apr 2008 17:15:02 GMT" } ]
2008-04-26T00:00:00
[ [ "Patitz", "Matthew J.", "" ], [ "Summers", "Scott M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.1695
Sergei Viznyuk
S.Viznyuk
Use of self-correlation metrics for evaluation of information properties of binary strings
5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is demonstrated that appropriately chosen computable metrics based on self-correlation properties provide a degree of determinism sufficient to segregate binary strings by level of information content.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 02:33:07 GMT" } ]
2008-03-13T00:00:00
[ [ "Viznyuk", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1716
Lokman Meho
Lokman I. Meho and Yvonne Rogers
Citation Counting, Citation Ranking, and h-Index of Human-Computer Interaction Researchers: A Comparison between Scopus and Web of Science
35 pages, 9 tables, 3 figures, accepted for publication in the Journal of the American Society for Information Science and Technology
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study examines the differences between Scopus and Web of Science in the citation counting, citation ranking, and h-index of 22 top human-computer interaction (HCI) researchers from EQUATOR--a large British Interdisciplinary Research Collaboration project. Results indicate that Scopus provides significantly more coverage of HCI literature than Web of Science, primarily due to coverage of relevant ACM and IEEE peer-reviewed conference proceedings. No significant differences exist between the two databases if citations in journals only are compared. Although broader coverage of the literature does not significantly alter the relative citation ranking of individual researchers, Scopus helps distinguish between the researchers in a more nuanced fashion than Web of Science in both citation counting and h-index. Scopus also generates significantly different maps of citation networks of individual scholars than those generated by Web of Science. The study also presents a comparison of h-index scores based on Google Scholar with those based on the union of Scopus and Web of Science. The study concludes that Scopus can be used as a sole data source for citation-based research and evaluation in HCI, especially if citations in conference proceedings are sought and that h scores should be manually calculated instead of relying on system calculations.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 08:09:19 GMT" } ]
2008-03-13T00:00:00
[ [ "Meho", "Lokman I.", "" ], [ "Rogers", "Yvonne", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0803.1723
Andrei Sukhov M
A. P. Platonov, D. I. Sidelnikov, M. V. Strizhov, A. M. Sukhov
Estimation of available bandwidth and measurement infrastructure for Russian segment of Internet
8 pages, 4 figures, submitted to Telecommunication (www.nait.ru, in Russian)
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In paper the method for estimation of available bandwidth is supposed which does not demand the advanced utilities. Our method is based on the measurement of network delay $D$ for packets of different sizes $W$. The simple expression for available bandwidth $B_{av} =(W_2-W_1)/(D_2-D_1)$ is substantiated. For the experimental testing the measurement infrastructure for Russian segment of Internet was installed in framework of RFBR grant 06-07-89074.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 08:57:50 GMT" }, { "version": "v2", "created": "Wed, 2 Jul 2008 08:39:05 GMT" } ]
2008-07-02T00:00:00
[ [ "Platonov", "A. P.", "" ], [ "Sidelnikov", "D. I.", "" ], [ "Strizhov", "M. V.", "" ], [ "Sukhov", "A. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0803.1728
Uwe Aickelin
Salwani Abdullah, Uwe Aickelin, Edmund Burke, Aniza Din and Rong Qu
Investigating a Hybrid Metaheuristic For Job Shop Rescheduling
null
Proceedings of the 3rd Australian Conference on Artificial Life (ACAL07), Lecture Notes in Computer Science 4828, pp 357-368, Gold Coast, Australia 2007
10.1007/978-3-540-76931-6_31
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous research has shown that artificial immune systems can be used to produce robust schedules in a manufacturing environment. The main goal is to develop building blocks (antibodies) of partial schedules that can be used to construct backup solutions (antigens) when disturbances occur during production. The building blocks are created based upon underpinning ideas from artificial immune systems and evolved using a genetic algorithm (Phase I). Each partial schedule (antibody) is assigned a fitness value and the best partial schedules are selected to be converted into complete schedules (antigens). We further investigate whether simulated annealing and the great deluge algorithm can improve the results when hybridised with our artificial immune system (Phase II). We use ten fixed solutions as our target and measure how well we cover these specific scenarios.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 09:26:47 GMT" } ]
2010-07-05T00:00:00
[ [ "Abdullah", "Salwani", "" ], [ "Aickelin", "Uwe", "" ], [ "Burke", "Edmund", "" ], [ "Din", "Aniza", "" ], [ "Qu", "Rong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.1733
Chiachi Huang
Chiachi Huang and Syed A. Jafar
Degrees of Freedom of the MIMO Interference Channel with Cooperation and Cognition
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore the benefits, in the sense of total (sum rate) degrees of freedom (DOF), of cooperation and cognitive message sharing for a two-user multiple-input-multiple-output (MIMO) Gaussian interference channel with $M_1$, $M_2$ antennas at transmitters and $N_1$, $N_2$ antennas at receivers. For the case of cooperation (including cooperation at transmitters only, at receivers only, and at transmitters as well as receivers), the DOF is $\min \{M_1+M_2, N_1+N_2, \max(M_1, N_2)), \max(M_2, N_1)\}$, which is the same as the DOF of the channel without cooperation. For the case of cognitive message sharing, the DOF is $\min \{M_1+M_2, N_1+N_2, (1-1_{T2})((1-1_{R2}) \max(M_1, N_2) + 1_{R2} (M_1+N_2)), (1-1_{T1})((1-1_{R1}) \max(M_2, N_1) + 1_{R1} (M_2+N_1)) \}$ where $1_{Ti} = 1$ $(0)$ when transmitter $i$ is (is not) a cognitive transmitter and $1_{Ri}$ is defined in the same fashion. Our results show that while both techniques may increase the sum rate capacity of the MIMO interference channel, only cognitive message sharing can increase the DOF. We also find that it may be more beneficial for a user to have a cognitive transmitter than to have a cognitive receiver.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 09:46:22 GMT" } ]
2008-03-13T00:00:00
[ [ "Huang", "Chiachi", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1748
Grenville Croll
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
A Computational Framework for the Near Elimination of Spreadsheet Risk
9 pages, 3 colour figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 85-93 ISBN:1-905617-08-9
null
null
cs.SE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, whilst maintaining the full flexibility of spreadsheets for modelling complex financial structures and processes. In its Basic Mode of use, the system comprises a secure and robust centralised spreadsheet management framework. In Advanced Mode, the system can be viewed as a robust computational framework whereby users can "submit jobs" to the spreadsheet, and retrieve the results from the computations, but with no direct access to the underlying spreadsheet. An example application, Monte Carlo simulation, is presented to highlight the benefits of this approach with regard to mitigating spreadsheet risk in complex, mission-critical, financial calculations.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 11:22:12 GMT" } ]
2008-03-13T00:00:00
[ [ "Jafry", "Yusuf", "" ], [ "Sidoroff", "Fredrika", "" ], [ "Chi", "Roger", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0803.1751
Grenville Croll
John Nash, Andy Adler, Neil Smith
TellTable Spreadsheet Audit: from Technical Possibility to Operating Prototype
11 pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 45-55ISBN 1 902724 94 1
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At the 2003 EuSpRIG meeting, we presented a framework and software infrastructure to generate and analyse an audit trail for a spreadsheet file. This report describes the results of a pilot implementation of this software (now called TellTable; see www.telltable.com), along with developments in the server infrastructure and availability, extensions to other "Office Suite" files, integration of the audit tool into the server interface, and related developments, licensing and reports. We continue to seek collaborators and partners in what is primarily an open-source project with some shared-source components.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 11:36:41 GMT" } ]
2008-03-13T00:00:00
[ [ "Nash", "John", "" ], [ "Adler", "Andy", "" ], [ "Smith", "Neil", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0803.1754
Grenville Croll
Simon Thorne, David Ball, Zoe Lawson
A Novel Approach to Formulae Production and Overconfidence Measurement to Reduce Risk in Spreadsheet Modelling
12 pages, 7 figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 71-83 ISBN 1 902724 94 1
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on formulae production in spreadsheets has established the practice as high risk yet unrecognised as such by industry. There are numerous software applications that are designed to audit formulae and find errors. However these are all post creation, designed to catch errors before the spreadsheet is deployed. As a general conclusion from EuSpRIG 2003 conference it was decided that the time has come to attempt novel solutions based on an understanding of human factors. Hence in this paper we examine one such possibility namely a novel example driven modelling approach. We discuss a control experiment that compares example driven modelling against traditional approaches over several progressively more difficult tests. The results are very interesting and certainly point to the value of further investigation of the example driven potential. Lastly we propose a method for statistically analysing the problem of overconfidence in spreadsheet modellers.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 11:47:41 GMT" } ]
2008-03-13T00:00:00
[ [ "Thorne", "Simon", "" ], [ "Ball", "David", "" ], [ "Lawson", "Zoe", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0803.1764
Thomas Watteyne
Thomas Watteyne (INRIA Rh\^one-Alpes, FT R&D), Dominique Barthel (FT R&D), Mischa Dohler (CTTC), Isabelle Aug\'e-Blum (INRIA Rh\^one-Alpes)
WiFly: experimenting with Wireless Sensor Networks and Virtual coordinates
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Experimentation is important when designing communication protocols for Wireless Sensor Networks. Lower-layers have a major impact on upper-layer performance, and the complexity of the phenomena can not be entirely captured by analysis or simulation. In this report, we go through the complete process, from designing an energy-efficient self-organizing communication architecture (MAC, routing and application layers) to real-life experimentation roll-outs. The presented communication architecture includes a MAC protocol which avoids building and maintaining neighborhood tables, and a geographically-inspired routing protocol over virtual coordinates. The application consists of a mobile sink interrogating a wireless sensor network based on the requests issued by a disconnected base station. After the design process of this architecture, we verify it functions correctly by simulation, and we perform a temporal verification. This study is needed to calculate the maximum speed the mobile sink can take. We detail the implementation, and the results of the off-site experimentation (energy consumption at PHY layer, collision probability at MAC layer, and routing). Finally, we report on the real-world deployment where we have mounted the mobile sink node on a radio-controlled airplane.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 13:02:15 GMT" }, { "version": "v2", "created": "Fri, 14 Mar 2008 09:11:57 GMT" } ]
2008-12-18T00:00:00
[ [ "Watteyne", "Thomas", "", "INRIA Rhône-Alpes, FT R&D" ], [ "Barthel", "Dominique", "", "FT\n R&D" ], [ "Dohler", "Mischa", "", "CTTC" ], [ "Augé-Blum", "Isabelle", "", "INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.1807
Valentin Savin
Ghassan M. Kraidy and Valentin Savin
Minimum-Delay Decoding of Turbo-Codes for Upper-Layer FEC
5 pages, submitted SPAWC08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the decoding of parallel turbo codes over the binary erasure channel suited for upper-layer error correction. The proposed algorithm performs on-the-fly decoding, i.e. it starts decoding as soon as the first symbols are received. This algorithm compares with the iterative decoding of codes defined on graphs, in that it propagates in the trellises of the turbo code by removing transitions in the same way edges are removed in a bipartite graph under message-passing decoding. Performance comparison with LDPC codes for different coding rates is shown.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 16:22:28 GMT" } ]
2008-03-13T00:00:00
[ [ "Kraidy", "Ghassan M.", "" ], [ "Savin", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1830
Olivier Finkel
Olivier Finkel (ELM)
On Winning Conditions of High Borel Complexity in Pushdown Games
null
Fundamenta Informaticae 66 (3) (2005) 277-298
null
null
cs.LO cs.GT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some decidable winning conditions of arbitrarily high finite Borel complexity for games on finite graphs or on pushdown graphs have been recently presented by O. Serre in [ Games with Winning Conditions of High Borel Complexity, in the Proceedings of the International Conference ICALP 2004, LNCS, Volume 3142, p. 1150-1162 ]. We answer in this paper several questions which were raised by Serre in the above cited paper. We first show that, for every positive integer n, the class C_n(A), which arises in the definition of decidable winning conditions, is included in the class of non-ambiguous context free omega languages, and that it is neither closed under union nor under intersection. We prove also that there exists pushdown games, equipped with such decidable winning conditions, where the winning sets are not deterministic context free languages, giving examples of winning sets which are non-deterministic non-ambiguous context free languages, inherently ambiguous context free languages, or even non context free languages.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 19:50:26 GMT" } ]
2008-12-18T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0803.1841
Olivier Finkel
Olivier Finkel (ELM)
On the Topological Complexity of Infinitary Rational Relations
null
RAIRO-Theoretical Informatics and Applications 37 (2) (2003) 105-113
null
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove in this paper that there exists some infinitary rational relations which are analytic but non Borel sets, giving an answer to a question of Simonnet [Automates et Th\'eorie Descriptive, Ph. D. Thesis, Universit\'e Paris 7, March 1992].
[ { "version": "v1", "created": "Wed, 12 Mar 2008 20:14:47 GMT" } ]
2008-12-18T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0803.1842
Olivier Finkel
Olivier Finkel (ELM)
Closure Properties of Locally Finite Omega Languages
null
Theoretical Computer Science 322 (1) (2004) 69-84
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Locally finite omega languages were introduced by Ressayre in [Journal of Symbolic Logic, Volume 53, No. 4, p.1009-1026]. They generalize omega languages accepted by finite automata or defined by monadic second order sentences. We study here closure properties of the family LOC_omega of locally finite omega languages. In particular we show that the class LOC_omega is neither closed under intersection nor under complementation, giving an answer to a question of Ressayre.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 20:16:34 GMT" } ]
2008-12-18T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0803.1862
Grenville Croll
Simon Thorne, David Ball
Exploring Human Factors in Spreadsheet Development
11 pages, 3 figures, 2 tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 161-172 ISBN:1-902724-16-X
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider human factors and their impact on spreadsheet development in strategic decision-making. This paper brings forward research from many disciplines both directly related to spreadsheets and a broader spectrum from psychology to industrial processing. We investigate how human factors affect a simplified development cycle and what the potential consequences are.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 22:09:59 GMT" } ]
2008-03-14T00:00:00
[ [ "Thorne", "Simon", "" ], [ "Ball", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0803.1866
Grenville Croll
Deborah Cernauskas, Andrew Kumiega, Ben VanVliet
Risk Management for Complex Calculations: EuSpRIG Best Practices in Hybrid Applications
11 pages, 8 figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 25-36 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the need for advanced, interactive mathematical models has increased, user/programmers are increasingly choosing the MatLab scripting language over spreadsheets. However, applications developed in these tools have high error risk, and no best practices exist. We recommend that advanced, highly mathematical applications incorporate these tools with spreadsheets into hybrid applications, where developers can apply EuSpRIG best practices. Development of hybrid applications can reduce the potential for errors, shorten development time, and enable higher level operations. We believe that hybrid applications are the future and over the course of this paper, we apply and extend spreadsheet best practices to reduce or prevent risks in hybrid Excel/MatLab applications.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 22:30:10 GMT" } ]
2008-03-14T00:00:00
[ [ "Cernauskas", "Deborah", "" ], [ "Kumiega", "Andrew", "" ], [ "VanVliet", "Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0803.1875
Grenville Croll
Ziv Hellman
Breaking Out of the Cell: On The Benefits of a New Spreadsheet User-Interaction Paradigm
12 Pages, 2 Diagrams
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 113-124 ISBN:1-902724-16-X
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contemporary spreadsheets are plagued by a profusion of errors, auditing difficulties, lack of uniform development methodologies, and barriers to easy comprehension of the underlying business models they represent. This paper presents a case that most of these difficulties stem from the fact that the standard spreadsheet user-interaction paradigm - the 'cell-matrix' approach - is appropriate for spreadsheet data presentation but has significant drawbacks with respect to spreadsheet creation, maintenance and comprehension when workbooks pass a minimal threshold of complexity. An alternative paradigm for the automated generation of spreadsheets directly from plain-language business model descriptions is presented along with its potential benefits. Sunsight Modeller (TM), a working software system implementing the suggested paradigm, is briefly described.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 00:15:40 GMT" } ]
2008-03-14T00:00:00
[ [ "Hellman", "Ziv", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0803.1908
Massimiliano Laddomada Ph.D.
F. Daneshgaran, M. Laddomada, F. Mesiti, M. Mondin
On the Throughput Allocation for Proportional Fairness in Multirate IEEE 802.11 DCF under General Load Conditions
5 pages, 2 figures, submitted to IEEE Globecom 2008, March 2008
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a modified proportional fairness (PF) criterion suitable for mitigating the \textit{rate anomaly} problem of multirate IEEE 802.11 Wireless LANs employing the mandatory Distributed Coordination Function (DCF) option. Compared to the widely adopted assumption of saturated network, the proposed criterion can be applied to general networks whereby the contending stations are characterized by specific packet arrival rates, $\lambda_s$, and transmission rates $R_d^{s}$. The throughput allocation resulting from the proposed algorithm is able to greatly increase the aggregate throughput of the DCF while ensuring fairness levels among the stations of the same order of the ones available with the classical PF criterion. Put simply, each station is allocated a throughput that depends on a suitable normalization of its packet rate, which, to some extent, measures the frequency by which the station tries to gain access to the channel. Simulation results are presented for some sample scenarios, confirming the effectiveness of the proposed criterion.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 06:48:50 GMT" } ]
2008-12-18T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "M.", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.1926
Juan J. Merelo Pr.
Pablo Garcia-Sanchez, J. L. J. Laredo, J. P. Sevilla, Pedro Castillo, J. J. Merelo
Improved evolutionary generation of XSLT stylesheets
Accepted as poster at the GECCO-2008 conference
null
null
null
cs.NE cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper introduces a procedure based on genetic programming to evolve XSLT programs (usually called stylesheets or logicsheets). XSLT is a general purpose, document-oriented functional language, generally used to transform XML documents (or, in general, solve any problem that can be coded as an XML document). The proposed solution uses a tree representation for the stylesheets as well as diverse specific operators in order to obtain, in the studied cases and a reasonable time, a XSLT stylesheet that performs the transformation. Several types of representation have been compared, resulting in different performance and degree of success.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 11:43:25 GMT" } ]
2008-03-14T00:00:00
[ [ "Garcia-Sanchez", "Pablo", "" ], [ "Laredo", "J. L. J.", "" ], [ "Sevilla", "J. P.", "" ], [ "Castillo", "Pedro", "" ], [ "Merelo", "J. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.1944
Diego Perino
Luca Muscariello (FT R&D), Diego Perino (FT R&D, INRIA Rocquencourt)
Early Experiences in Traffic Engineering Exploiting Path Diversity: A Practical Approach
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent literature has proved that stable dynamic routing algorithms have solid theoretical foundation that makes them suitable to be implemented in a real protocol, and used in practice in many different operational network contexts. Such algorithms inherit much of the properties of congestion controllers implementing one of the possible combination of AQM/ECN schemes at nodes and flow control at sources. In this paper we propose a linear program formulation of the multi-commodity flow problem with congestion control, under max-min fairness, comprising demands with or without exogenous peak rates. Our evaluations of the gain, using path diversity, in scenarios as intra-domain traffic engineering and wireless mesh networks encourages real implementations, especially in presence of hot spots demands and non uniform traffic matrices. We propose a flow aware perspective of the subject by using a natural multi-path extension to current congestion controllers and show its performance with respect to current proposals. Since flow aware architectures exploiting path diversity are feasible, scalable, robust and nearly optimal in presence of flows with exogenous peak rates, we claim that our solution rethinked in the context of realistic traffic assumptions performs as better as an optimal approach with all the additional benefits of the flow aware paradigm.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 10:49:32 GMT" }, { "version": "v2", "created": "Fri, 14 Mar 2008 09:22:59 GMT" } ]
2008-12-18T00:00:00
[ [ "Muscariello", "Luca", "", "FT R&D" ], [ "Perino", "Diego", "", "FT R&D, INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.1945
Riccardo Borghi
Marco Lanucara and Riccardo Borghi
Resampling and requantization of band-limited Gaussian stochastic signals with flat power spectrum
Submitted to Digital Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A theoretical analysis, aimed at characterizing the degradation induced by the resampling and requantization processes applied to band-limited Gaussian signals with flat power spectrum, available through their digitized samples, is presented. The analysis provides an efficient algorithm for computing the complete {joint} bivariate discrete probability distribution associated to the true quantized version of the Gaussian signal and to the quantity estimated after resampling and requantization of the input digitized sequence. The use of Fourier transform techniques allows deriving {approximate} analytical expressions for the quantities of interest, as well as implementing their efficient computation. Numerical experiments are found to be in good agreement with the theoretical results, and confirm the validity of the whole approach.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 10:57:08 GMT" }, { "version": "v2", "created": "Fri, 4 Jul 2008 12:13:18 GMT" }, { "version": "v3", "created": "Wed, 19 Aug 2009 13:20:07 GMT" } ]
2009-08-19T00:00:00
[ [ "Lanucara", "Marco", "" ], [ "Borghi", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1975
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Laurent Fousse (LJK), Bruno Salvy (INRIA Rocquencourt)
Compressed Modular Matrix Multiplication
Published in: MICA'2008 : Milestones in Computer Algebra, Tobago : Trinit\'e-et-Tobago (2008)
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to store several integers modulo a small prime into a single machine word. Modular addition is performed by addition and possibly subtraction of a word containing several times the modulo. Modular Multiplication is not directly accessible but modular dot product can be performed by an integer multiplication by the reverse integer. Modular multiplication by a word containing a single residue is a also possible. Therefore matrix multiplication can be performed on such a compressed storage. We here give bounds on the sizes of primes and matrices for which such a compression is possible. We also explicit the details of the required compressed arithmetic routines.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 19:15:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Fousse", "Laurent", "", "LJK" ], [ "Salvy", "Bruno", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0803.1985
Uwe Aickelin
Adrian Adewunmi, Uwe Aickelin and Mike Byrne
An Investigation of the Sequential Sampling Method for Crossdocking Simulation Output Variance Reduction
null
Operational Research Society 4th Simulation Workshop (SW08) in print, pp, Worcestershire, UK 2008
null
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the reduction of variance associated with a simulation output performance measure, using the Sequential Sampling method while applying minimum simulation replications, for a class of JIT (Just in Time) warehousing system called crossdocking. We initially used the Sequential Sampling method to attain a desired 95% confidence interval half width of plus/minus 0.5 for our chosen performance measure (Total usage cost, given the mean maximum level of 157,000 pounds and a mean minimum level of 149,000 pounds). From our results, we achieved a 95% confidence interval half width of plus/minus 2.8 for our chosen performance measure (Total usage cost, with an average mean value of 115,000 pounds). However, the Sequential Sampling method requires a huge number of simulation replications to reduce variance for our simulation output value to the target level. Arena (version 11) simulation software was used to conduct this study.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 15:02:48 GMT" } ]
2010-07-05T00:00:00
[ [ "Adewunmi", "Adrian", "" ], [ "Aickelin", "Uwe", "" ], [ "Byrne", "Mike", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.1992
Mustafa Cenk Gursoy
Junwei Zhang, Mustafa Cenk Gursoy
Achievable Rates and Optimal Resource Allocation for Imperfectly-Known Fading Relay Channels
null
null
null
UNL-123
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, achievable rates and optimal resource allocation strategies for imperfectly-known fading relay channels are studied. It is assumed that communication starts with the network training phase in which the receivers estimate the fading coefficients of their respective channels. In the data transmission phase, amplify-and-forward and decode-and-forward relaying schemes with different degrees of cooperation are considered, and the corresponding achievable rate expressions are obtained. Three resource allocation problems are addressed: 1) power allocation between data and training symbols; 2) time/bandwidth allocation to the relay; 3) power allocation between the source and relay in the presence of total power constraints. The achievable rate expressions are employed to identify the optimal resource allocation strategies. Finally, energy efficiency is investigated by studying the bit energy requirements in the low-SNR regime.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 15:25:54 GMT" } ]
2008-03-14T00:00:00
[ [ "Zhang", "Junwei", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.1993
Uwe Aickelin
Uwe Aickelin, Edmund Burke and Jingpeng Li
Improved Squeaky Wheel Optimisation for Driver Scheduling
null
Proceedings of the 9th International Conference on Parallel Problem Solving from Nature (PPSN IX), Lecture Notes in Computer Science 4193, pp 182-191, Reykjavik, Iceland, 2006
10.1007/11844297_19
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a technique called Improved Squeaky Wheel Optimisation for driver scheduling problems. It improves the original Squeaky Wheel Optimisations effectiveness and execution speed by incorporating two additional steps of Selection and Mutation which implement evolution within a single solution. In the ISWO, a cycle of Analysis-Selection-Mutation-Prioritization-Construction continues until stopping conditions are reached. The Analysis step first computes the fitness of a current solution to identify troublesome components. The Selection step then discards these troublesome components probabilistically by using the fitness measure, and the Mutation step follows to further discard a small number of components at random. After the above steps, an input solution becomes partial and thus the resulting partial solution needs to be repaired. The repair is carried out by using the Prioritization step to first produce priorities that determine an order by which the following Construction step then schedules the remaining components. Therefore, the optimisation in the ISWO is achieved by solution disruption, iterative improvement and an iterative constructive repair process performed. Encouraging experimental results are reported.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 15:28:06 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Burke", "Edmund", "" ], [ "Li", "Jingpeng", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.1994
Uwe Aickelin
Jingpeng Li and Uwe Aickelin
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
null
Proceedings of the 8th International Conference on Parallel Problem Solving from Nature (PPSN VIII), Lecture Notes in Computer Science 3242, pp 581-590, Birmingham, UK 2004
10.1007/b100601
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each persons assignment. Unlike our previous work of using genetic algorithms whose learning is implicit, the learning in both approaches is explicit, i.e. we are able to identify building blocks directly. To achieve this target, the Bayesian optimization algorithm builds a Bayesian network of the joint probability distribution of the rules used to construct solutions, while the adapted classifier system assigns each rule a strength value that is constantly updated according to its usefulness in the current situation. Computational results from 52 real data instances of nurse scheduling demonstrate the success of both approaches. It is also suggested that the learning mechanism in the proposed approaches might be suitable for other scheduling problems.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 15:43:34 GMT" } ]
2010-07-05T00:00:00
[ [ "Li", "Jingpeng", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.1997
Uwe Aickelin
Uwe Aickelin, Peter Bentley, Steve Cayzer, Kim Jungwon and Julie McLeod
Danger Theory: The Link between AIS and IDS?
null
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS 2003), Lecture Notes in Computer Science 2787, pp 147-155, doi: 10.1007/b12020, Edinburgh, UK 2003
10.1007/b12020
null
cs.NE cs.AI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present ideas about creating a next generation Intrusion Detection System based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems. The Human Immune System can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System for our computers.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 16:01:10 GMT" }, { "version": "v2", "created": "Fri, 16 May 2008 09:41:27 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Bentley", "Peter", "" ], [ "Cayzer", "Steve", "" ], [ "Jungwon", "Kim", "" ], [ "McLeod", "Julie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2027
Grenville Croll
Jocelyn Paine
Excelsior: Bringing the Benefits of Modularisation to Excel
13 Pages, Code Fragments
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 173-184 ISBN:1-902724-16-X
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Excel lacks features for modular design. Had it such features, as do most programming languages, they would save time, avoid unneeded programming, make mistakes less likely, make code-control easier, help organisations adopt a uniform house style, and open business opportunities in buying and selling spreadsheet modules. I present Excelsior, a system for bringing these benefits to Excel.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 18:41:21 GMT" } ]
2008-03-14T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0803.2092
Yoann Pigne
Fr\'ed\'eric Guinand (LITIS), Yoann Pign\'e (LITIS)
An Ant-Based Model for Multiple Sequence Alignment
null
Dans Large-Scale Scientific Computing - Large-Scale Scientific Computing, 6th International Conference, LSSC 2007, Sozopol : Bulgarie (2007)
null
null
q-bio.QM cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple sequence alignment is a key process in today's biology, and finding a relevant alignment of several sequences is much more challenging than just optimizing some improbable evaluation functions. Our approach for addressing multiple sequence alignment focuses on the building of structures in a new graph model: the factor graph model. This model relies on block-based formulation of the original problem, formulation that seems to be one of the most suitable ways for capturing evolutionary aspects of alignment. The structures are implicitly built by a colony of ants laying down pheromones in the factor graphs, according to relations between blocks belonging to the different sequences.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 06:58:56 GMT" } ]
2008-12-18T00:00:00
[ [ "Guinand", "Frédéric", "", "LITIS" ], [ "Pigné", "Yoann", "", "LITIS" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.2093
Yoann Pigne
Yoann Pign\'e (LITIS), Antoine Dutot (LITIS), Fr\'ed\'eric Guinand (LITIS), Damien Olivier (LITIS)
GraphStream: A Tool for bridging the gap between Complex Systems and Dynamic Graphs
null
Emergent Properties in Natural and Artificial Complex Systems. Satellite Conference within the 4th European Conference on Complex Systems (ECCS'2007), Dresden : Allemagne (2007)
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of complex systems is common to many domains, from Biology to Economy, Computer Science, Physics, etc. Often, these systems are made of sets of entities moving in an evolving environment. One of their major characteristics is the emergence of some global properties stemmed from local interactions between the entities themselves and between the entities and the environment. The structure of these systems as sets of interacting entities leads researchers to model them as graphs. However, their understanding requires most often to consider the dynamics of their evolution. It is indeed not relevant to study some properties out of any temporal consideration. Thus, dynamic graphs seem to be a very suitable model for investigating the emergence and the conservation of some properties. GraphStream is a Java-based library whose main purpose is to help researchers and developers in their daily tasks of dynamic problem modeling and of classical graph management tasks: creation, processing, display, etc. It may also be used, and is indeed already used, for teaching purpose. GraphStream relies on an event-based engine allowing several event sources. Events may be included in the core of the application, read from a file or received from an event handler.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 07:09:13 GMT" } ]
2008-12-18T00:00:00
[ [ "Pigné", "Yoann", "", "LITIS" ], [ "Dutot", "Antoine", "", "LITIS" ], [ "Guinand", "Frédéric", "", "LITIS" ], [ "Olivier", "Damien", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0803.2123
Felix Fontein
Felix Fontein (University of Zurich)
Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain Infrastructures
14 pages
Advances in Mathematics of Communications, 2 (3), 2008
10.3934/amc.2008.2.293
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In discrete logarithm based cryptography, a method by Pohlig and Hellman allows solving the discrete logarithm problem efficiently if the group order is known and has no large prime factors. The consequence is that such groups are avoided. In the past, there have been proposals for cryptography based on cyclic infrastructures. We will show that the Pohlig-Hellman method can be adapted to certain cyclic infrastructures, which similarly implies that certain infrastructures should not be used for cryptography. This generalizes a result by M\"uller, Vanstone and Zuccherato for infrastructures obtained from hyperelliptic function fields. We recall the Pohlig-Hellman method, define the concept of a cyclic infrastructure and briefly describe how to obtain such infrastructures from certain function fields of unit rank one. Then, we describe how to obtain cyclic groups from discrete cyclic infrastructures and how to apply the Pohlig-Hellman method to compute absolute distances, which is in general a computationally hard problem for cyclic infrastructures. Moreover, we give an algorithm which allows to test whether an infrastructure satisfies certain requirements needed for applying the Pohlig-Hellman method, and discuss whether the Pohlig-Hellman method is applicable in infrastructures obtained from number fields. Finally, we discuss how this influences cryptography based on cyclic infrastructures.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 14:15:04 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 21:11:15 GMT" } ]
2012-04-02T00:00:00
[ [ "Fontein", "Felix", "", "University of Zurich" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2129
Natalia Osipova
Natalia Osipova (INRIA Sophia Antipolis)
Comparison of the Discriminatory Processor Sharing Policies
null
null
null
RR-6475
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discriminatory Processor Sharing policy introduced by Kleinrock is of a great interest in many application areas, including telecommunications, web applications and TCP flow modelling. Under the DPS policy the job priority is controlled by the vector of weights. Verifying the vector of weights it is possible to modify the service rates of the jobs and optimize system characteristics. In the present paper we present the results concerning the comparison of two DPS policies with different weight vectors. We show the monotonicity of the expected sojourn time of the system depending on the weight vector under certain condition on the system. Namely, the system has to consist of classes with means which are quite different from each other. The classes with similar means can be organized together and considered as one class, so the given restriction can be overcame.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 10:58:46 GMT" }, { "version": "v2", "created": "Mon, 17 Mar 2008 08:49:39 GMT" }, { "version": "v3", "created": "Mon, 7 Apr 2008 13:04:38 GMT" }, { "version": "v4", "created": "Fri, 25 Apr 2008 15:19:34 GMT" } ]
2008-12-18T00:00:00
[ [ "Osipova", "Natalia", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.2135
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On $(P_5,\bar{P_5})$-sparse graphs and other families
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the notion of $P_4$-sparse graphs previously introduced by {\scshape Ho\`ang} by considering $\mathcal{F}$-sparse graphs were $\mathcal{F}$ denotes a finite set of graphs on $p$ vertices. Thus we obtain some results on $(P_5,\bar{P_5})$-sparse graphs already known on $(P_5,\bar{P_5})$-free graphs. Finally we completely describe the structure of $(P_5,\bar{P_5}, bull$)-sparse graphs, it follows that those graphs have bounded clique-width.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 11:36:49 GMT" } ]
2008-12-18T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.2174
Mirela Damian
Mirela Damian, Saurav Pandit and Sriram Pemmaraju
Local Approximation Schemes for Topology Control
11 pages, 6 figures
Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, pages 208-218, July 2006
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a distributed algorithm on wireless ad-hoc networks that runs in polylogarithmic number of rounds in the size of the network and constructs a linear size, lightweight, (1+\epsilon)-spanner for any given \epsilon > 0. A wireless network is modeled by a d-dimensional \alpha-quasi unit ball graph (\alpha-UBG), which is a higher dimensional generalization of the standard unit disk graph (UDG) model. The d-dimensional \alpha-UBG model goes beyond the unrealistic ``flat world'' assumption of UDGs and also takes into account transmission errors, fading signal strength, and physical obstructions. The main result in the paper is this: for any fixed \epsilon > 0, 0 < \alpha \le 1, and d \ge 2, there is a distributed algorithm running in O(\log n \log^* n) communication rounds on an n-node, d-dimensional \alpha-UBG G that computes a (1+\epsilon)-spanner G' of G with maximum degree \Delta(G') = O(1) and total weight w(G') = O(w(MST(G)). This result is motivated by the topology control problem in wireless ad-hoc networks and improves on existing topology control algorithms along several dimensions. The technical contributions of the paper include a new, sequential, greedy algorithm with relaxed edge ordering and lazy updating, and clustering techniques for filtering out unnecessary edges.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 14:37:12 GMT" } ]
2008-03-17T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Pandit", "Saurav", "" ], [ "Pemmaraju", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.2212
Dan Olteanu
Christoph Koch and Dan Olteanu
Conditioning Probabilistic Databases
13 pages, 13 figures
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Past research on probabilistic databases has studied the problem of answering queries on a static database. Application scenarios of probabilistic databases however often involve the conditioning of a database using additional information in the form of new evidence. The conditioning problem is thus to transform a probabilistic database of priors into a posterior probabilistic database which is materialized for subsequent query processing or further refinement. It turns out that the conditioning problem is closely related to the problem of computing exact tuple confidence values. It is known that exact confidence computation is an NP-hard problem. This has led researchers to consider approximation techniques for confidence computation. However, neither conditioning nor exact confidence computation can be solved using such techniques. In this paper we present efficient techniques for both problems. We study several problem decomposition methods and heuristics that are based on the most successful search techniques from constraint satisfaction, such as the Davis-Putnam algorithm. We complement this with a thorough experimental evaluation of the algorithms proposed. Our experiments show that our exact algorithms scale well to realistic database sizes and can in some scenarios compete with the most efficient previous approximation algorithms.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 17:23:34 GMT" }, { "version": "v2", "created": "Mon, 16 Jun 2008 16:20:06 GMT" } ]
2008-06-16T00:00:00
[ [ "Koch", "Christoph", "" ], [ "Olteanu", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.2219
Olivier Powell
Andrei Marculescu and Sotiris Nikoletseas and Olivier Powell and Jose Rolim
Lighweight Target Tracking Using Passive Traces in Sensor Networks
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the important problem of tracking moving targets in wireless sensor networks. We try to overcome the limitations of standard state of the art tracking methods based on continuous location tracking, i.e. the high energy dissipation and communication overhead imposed by the active participation of sensors in the tracking process and the low scalability, especially in sparse networks. Instead, our approach uses sensors in a passive way: they just record and judiciously spread information about observed target presence in their vicinity; this information is then used by the (powerful) tracking agent to locate the target by just following the traces left at sensors. Our protocol is greedy, local, distributed, energy efficient and very successful, in the sense that (as shown by extensive simulations) the tracking agent manages to quickly locate and follow the target; also, we achieve good trade-offs between the energy dissipation and latency.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 18:01:17 GMT" } ]
2008-03-17T00:00:00
[ [ "Marculescu", "Andrei", "" ], [ "Nikoletseas", "Sotiris", "" ], [ "Powell", "Olivier", "" ], [ "Rolim", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0803.2220
Panagiotis Papadakos
Panagiotis Papadakos, Giorgos Vasiliadis, Yannis Theoharis, Nikos Armenatzoglou, Stella Kopidaki, Yannis Marketakis, Manos Daskalakis, Kostas Karamaroudis, Giorgos Linardakis, Giannis Makrydakis, Vangelis Papathanasiou, Lefteris Sardis, Petros Tsialiamanis, Georgia Troullinou, Kostas Vandikas, Dimitris Velegrakis and Yannis Tzitzikas
The Anatomy of Mitos Web Search Engine
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Engineering a Web search engine offering effective and efficient information retrieval is a challenging task. This document presents our experiences from designing and developing a Web search engine offering a wide spectrum of functionalities and we report some interesting experimental results. A rather peculiar design choice of the engine is that its index is based on a DBMS, while some of the distinctive functionalities that are offered include advanced Greek language stemming, real time result clustering, and advanced link analysis techniques (also for spam page detection).
[ { "version": "v1", "created": "Fri, 14 Mar 2008 19:18:15 GMT" }, { "version": "v2", "created": "Sun, 16 Mar 2008 17:25:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Papadakos", "Panagiotis", "" ], [ "Vasiliadis", "Giorgos", "" ], [ "Theoharis", "Yannis", "" ], [ "Armenatzoglou", "Nikos", "" ], [ "Kopidaki", "Stella", "" ], [ "Marketakis", "Yannis", "" ], [ "Daskalakis", "Manos", "" ], [ "Karamaroudis", "Kostas", "" ], [ "Linardakis", "Giorgos", "" ], [ "Makrydakis", "Giannis", "" ], [ "Papathanasiou", "Vangelis", "" ], [ "Sardis", "Lefteris", "" ], [ "Tsialiamanis", "Petros", "" ], [ "Troullinou", "Georgia", "" ], [ "Vandikas", "Kostas", "" ], [ "Velegrakis", "Dimitris", "" ], [ "Tzitzikas", "Yannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0803.2257
Matthew Herman
Matthew A. Herman and Thomas Strohmer
High-Resolution Radar via Compressed Sensing
New: Extended theory to include case of noisy signals; Re-ran numerical simulations with complex-valued data; Clarified definition of "random signal"; Minor language and typo fixes; 14 pages, 13 figures. Accepted to IEEE Transactions on Signal Processing, December 2008
null
10.1109/TSP.2009.2014277
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A stylized compressed sensing radar is proposed in which the time-frequency plane is discretized into an N by N grid. Assuming the number of targets K is small (i.e., K much less than N^2), then we can transmit a sufficiently "incoherent" pulse and employ the techniques of compressed sensing to reconstruct the target scene. A theoretical upper bound on the sparsity K is presented. Numerical simulations verify that even better performance can be achieved in practice. This novel compressed sensing approach offers great potential for better resolution over classical radar.
[ { "version": "v1", "created": "Fri, 14 Mar 2008 22:20:51 GMT" }, { "version": "v2", "created": "Mon, 22 Dec 2008 08:31:32 GMT" } ]
2015-05-13T00:00:00
[ [ "Herman", "Matthew A.", "" ], [ "Strohmer", "Thomas", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2262
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Constant-Rank Codes and Their Connection to Constant-Dimension Codes
10 pages, 3 figures, accepted to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constant-dimension codes have recently received attention due to their significance to error control in noncoherent random linear network coding. What the maximal cardinality of any constant-dimension code with finite dimension and minimum distance is and how to construct the optimal constant-dimension code (or codes) that achieves the maximal cardinality both remain open research problems. In this paper, we introduce a new approach to solving these two problems. We first establish a connection between constant-rank codes and constant-dimension codes. Via this connection, we show that optimal constant-dimension codes correspond to optimal constant-rank codes over matrices with sufficiently many rows. As such, the two aforementioned problems are equivalent to determining the maximum cardinality of constant-rank codes and to constructing optimal constant-rank codes, respectively. To this end, we then derive bounds on the maximum cardinality of a constant-rank code with a given minimum rank distance, propose explicit constructions of optimal or asymptotically optimal constant-rank codes, and establish asymptotic bounds on the maximum rate of a constant-rank code.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 00:02:43 GMT" }, { "version": "v2", "created": "Tue, 1 Apr 2008 17:07:10 GMT" }, { "version": "v3", "created": "Tue, 29 Apr 2008 22:29:31 GMT" }, { "version": "v4", "created": "Sun, 6 Jul 2008 23:04:05 GMT" }, { "version": "v5", "created": "Mon, 28 Jul 2008 23:05:24 GMT" }, { "version": "v6", "created": "Tue, 23 Jun 2009 13:23:16 GMT" }, { "version": "v7", "created": "Tue, 30 Mar 2010 09:49:46 GMT" } ]
2010-03-31T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2285
Gerhard de Koning Gans
Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia
A Practical Attack on the MIFARE Classic
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-random generator, we are able to recover the keystream generated by the CRYPTO1 stream cipher. We exploit the malleability of the stream cipher to read all memory blocks of the first sector of the card. Moreover, we are able to read any sector of the memory of the card, provided that we know one memory block within this sector. Finally, and perhaps more damaging, the same holds for modifying memory blocks.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 11:28:40 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2008 11:56:11 GMT" } ]
2008-06-26T00:00:00
[ [ "Gans", "Gerhard de Koning", "" ], [ "Hoepman", "Jaap-Henk", "" ], [ "Garcia", "Flavio D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2305
Andrew Gacek
Andrew Gacek
The Abella Interactive Theorem Prover (System Description)
7 pages, to appear in IJCAR'08
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abella is an interactive system for reasoning about aspects of object languages that have been formally presented through recursive rules based on syntactic structure. Abella utilizes a two-level logic approach to specification and reasoning. One level is defined by a specification logic which supports a transparent encoding of structural semantics rules and also enables their execution. The second level, called the reasoning logic, embeds the specification logic and allows the development of proofs of properties about specifications. An important characteristic of both logics is that they exploit the lambda tree syntax approach to treating binding in object languages. Amongst other things, Abella has been used to prove normalizability properties of the lambda calculus, cut admissibility for a sequent calculus and type uniqueness and subject reduction properties. This paper discusses the logical foundations of Abella, outlines the style of theorem proving that it supports and finally describes some of its recent applications.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 16:15:10 GMT" }, { "version": "v2", "created": "Fri, 23 May 2008 15:28:08 GMT" } ]
2008-12-18T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0803.2306
Valentin Goranko
Valentin Goranko and Dmitry Shkatov
Tableau-based decision procedures for logics of strategic ability in multi-agent systems
To appear in ACM Transactions on Computational Logic. 48 pages
null
null
null
cs.LO cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop an incremental tableau-based decision procedures for the Alternating-time temporal logic ATL and some of its variants. While running within the theoretically established complexity upper bound, we claim that our tableau is practically more efficient in the average case than other decision procedures for ATL known so far. Besides, the ease of its adaptation to variants of ATL demonstrates the flexibility of the proposed procedure.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 16:22:53 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 10:53:22 GMT" } ]
2008-09-09T00:00:00
[ [ "Goranko", "Valentin", "" ], [ "Shkatov", "Dmitry", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.2314
Yoann Pigne
Fr\'ed\'eric Guinand (LITIS), Yoann Pign\'e (LITIS)
Problem Solving and Complex Systems
null
Emergent Properties in Natural and Artificial Dynamical Systems, Springer Verlag (Ed.) (2006) 53-86
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The observation and modeling of natural Complex Systems (CSs) like the human nervous system, the evolution or the weather, allows the definition of special abilities and models reusable to solve other problems. For instance, Genetic Algorithms or Ant Colony Optimizations are inspired from natural CSs to solve optimization problems. This paper proposes the use of ant-based systems to solve various problems with a non assessing approach. This means that solutions to some problem are not evaluated. They appear as resultant structures from the activity of the system. Problems are modeled with graphs and such structures are observed directly on these graphs. Problems of Multiple Sequences Alignment and Natural Language Processing are addressed with this approach.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 18:07:49 GMT" } ]
2008-12-18T00:00:00
[ [ "Guinand", "Frédéric", "", "LITIS" ], [ "Pigné", "Yoann", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.2315
Jean-Philippe Cointet
Jean-Philippe Cointet (CREA, TSV), David Chavalarias (CREA)
Science mapping with asymmetrical paradigmatic proximity
null
Networks and Heterogeneous Media 3, 2 (2008) 267 - 276
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a series of methods to represent the evolution of a field of science at different levels: namely micro, meso and macro levels. We use a previously introduced asymmetric measure of paradigmatic proximity between terms that enables us to extract structure from a large publications database. We apply our set of methods on a case study from the complex systems community through the mapping of more than 400 complex systems science concepts indexed from a database as large as several millions of journal papers. We will first summarize the main properties of our asymmetric proximity measure. Then we show how salient paradigmatic fields can be embedded into a 2-dimensional visualization into which the terms are plotted according to their relative specificity and generality index. This meso-level helps us producing macroscopic maps of the field of science studied featuring the former paradigmatic fields.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 18:10:25 GMT" } ]
2008-12-18T00:00:00
[ [ "Cointet", "Jean-Philippe", "", "CREA, TSV" ], [ "Chavalarias", "David", "", "CREA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0803.2316
Vivek V. Shende
Vivek V. Shende and Igor L. Markov
On the CNOT-cost of TOFFOLI gates
28 pages
Quant.Inf.Comp. 9(5-6):461-486 (2009)
null
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The three-input TOFFOLI gate is the workhorse of circuit synthesis for classical logic operations on quantum data, e.g., reversible arithmetic circuits. In physical implementations, however, TOFFOLI gates are decomposed into six CNOT gates and several one-qubit gates. Though this decomposition has been known for at least 10 years, we provide here the first demonstration of its CNOT-optimality. We study three-qubit circuits which contain less than six CNOT gates and implement a block-diagonal operator, then show that they implicitly describe the cosine-sine decomposition of a related operator. Leveraging the canonicity of such decompositions to limit one-qubit gates appearing in respective circuits, we prove that the n-qubit analogue of the TOFFOLI requires at least 2n CNOT gates. Additionally, our results offer a complete classification of three-qubit diagonal operators by their CNOT-cost, which holds even if ancilla qubits are available.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 19:36:48 GMT" } ]
2011-11-03T00:00:00
[ [ "Shende", "Vivek V.", "" ], [ "Markov", "Igor L.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
0803.2317
Jorge Sousa Pinto
Joao Gomes and Daniel Martins and Simao Melo de Sousa and Jorge Sousa Pinto
Lissom, a Source Level Proof Carrying Code Platform
Poster presented at the International Workshop on Proof-Carrying Code (PCC 06), 2006
null
null
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a proposal for a Proof Carrying Code (PCC) architecture called Lissom. Started as a challenge for final year Computing students, Lissom was thought as a mean to prove to a sceptic community, and in particular to students, that formal verification tools can be put to practice in a realistic environment, and be used to solve complex and concrete problems. The attractiveness of the problems that PCC addresses has already brought students to show interest in this project.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 18:53:06 GMT" } ]
2008-12-18T00:00:00
[ [ "Gomes", "Joao", "" ], [ "Martins", "Daniel", "" ], [ "de Sousa", "Simao Melo", "" ], [ "Pinto", "Jorge Sousa", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0803.2319
AbdelRahman Karawia Dr.
A. A. Karawia
Two Algorithms for Solving A General Backward Pentadiagonal Linear Systems
7 pages
null
null
null
cs.SC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an efficient computational and symbolic algorithms for solving a backward pentadiagonal linear systems. The implementation of the algorithms using Computer Algebra Systems (CAS) such as MAPLE, MACSYMA, MATHEMATICA, and MATLAB are straightforward. An examples are given in order to illustrate the algorithms. The symbolic algorithm is competitive the other methods for solving a backward pentadiagonal linear systems.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 20:04:18 GMT" } ]
2008-03-18T00:00:00
[ [ "Karawia", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0803.2337
Wee Peng Tay
Wee Peng Tay, John Tsitsiklis, and Moe Win
Data Fusion Trees for Detection: Does Architecture Matter?
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of decentralized detection in a network consisting of a large number of nodes arranged as a tree of bounded height, under the assumption of conditionally independent, identically distributed observations. We characterize the optimal error exponent under a Neyman-Pearson formulation. We show that the Type II error probability decays exponentially fast with the number of nodes, and the optimal error exponent is often the same as that corresponding to a parallel configuration. We provide sufficient, as well as necessary, conditions for this to happen. For those networks satisfying the sufficient conditions, we propose a simple strategy that nearly achieves the optimal error exponent, and in which all non-leaf nodes need only send 1-bit messages.
[ { "version": "v1", "created": "Sun, 16 Mar 2008 07:40:41 GMT" } ]
2008-03-18T00:00:00
[ [ "Tay", "Wee Peng", "" ], [ "Tsitsiklis", "John", "" ], [ "Win", "Moe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2363
Li Chen
Li Chen
lambda-Connectedness Determination for Image Segmentation
9 pages, 36th Applied Image Pattern Recognition Workshop (AIPR 2007), October 2007, Washington, DC, USA
null
null
null
cs.CV cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image segmentation is to separate an image into distinct homogeneous regions belonging to different objects. It is an essential step in image analysis and computer vision. This paper compares some segmentation technologies and attempts to find an automated way to better determine the parameters for image segmentation, especially the connectivity value of $\lambda$ in $\lambda$-connected segmentation. Based on the theories on the maximum entropy method and Otsu's minimum variance method, we propose:(1)maximum entropy connectedness determination: a method that uses maximum entropy to determine the best $\lambda$ value in $\lambda$-connected segmentation, and (2) minimum variance connectedness determination: a method that uses the principle of minimum variance to determine $\lambda$ value. Applying these optimization techniques in real images, the experimental results have shown great promise in the development of the new methods. In the end, we extend the above method to more general case in order to compare it with the famous Mumford-Shah method that uses variational principle and geometric measure.
[ { "version": "v1", "created": "Sun, 16 Mar 2008 17:18:19 GMT" } ]
2008-03-18T00:00:00
[ [ "Chen", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.2365
Ganesh Narayan
V Sriram, Ganesh Narayan, K Gopinath
SAFIUS - A secure and accountable filesystem over untrusted storage
11pt, 12 pages, 16 figures
Fourth International IEEE Security in Storage Workshop, 2007 - SISW '07. Publication Date: 27-27 Sept. 2007 On page(s): 34-45
10.1109/SISW.2007.7
null
cs.OS cs.CR cs.DC cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability. SAFIUS also enables read/write sharing of data and provides the standard UNIX-like interface for applications. To achieve accountability with good performance, it uses asynchronous signatures; to reduce the space required for storing these signatures, a novel signature pruning mechanism is used. SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS. Preliminary performance studies show that SAFIUS has a tolerable overhead for providing secure storage: while it has an overhead of about 50% of OpenGFS in data intensive workloads (due to the overhead of performing encryption/decryption in software), it is comparable (or better in some cases) to OpenGFS in metadata intensive workloads.
[ { "version": "v1", "created": "Sun, 16 Mar 2008 18:24:13 GMT" } ]
2016-11-18T00:00:00
[ [ "Sriram", "V", "" ], [ "Narayan", "Ganesh", "" ], [ "Gopinath", "K", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0803.2386
James Raynolds
Lenore R. Mullin and James E. Raynolds
Conformal Computing: Algebraically connecting the hardware/software boundary using a uniform approach to high-performance computation for software and hardware applications
null
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a systematic, algebraically based, design methodology for efficient implementation of computer programs optimized over multiple levels of the processor/memory and network hierarchy. Using a common formalism to describe the problem and the partitioning of data over processors and memory levels allows one to mathematically prove the efficiency and correctness of a given algorithm as measured in terms of a set of metrics (such as processor/network speeds, etc.). The approach allows the average programmer to achieve high-level optimizations similar to those used by compiler writers (e.g. the notion of "tiling"). The approach presented in this monograph makes use of A Mathematics of Arrays (MoA, Mullin 1988) and an indexing calculus (i.e. the psi-calculus) to enable the programmer to develop algorithms using high-level compiler-like optimizations through the ability to algebraically compose and reduce sequences of array operations. Extensive discussion and benchmark results are presented for the Fast Fourier Transform and other important algorithms.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 02:38:49 GMT" } ]
2008-03-18T00:00:00
[ [ "Mullin", "Lenore R.", "" ], [ "Raynolds", "James E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0803.2392
Joel Tropp
D. Needell and J. A. Tropp
CoSaMP: Iterative signal recovery from incomplete and inaccurate samples
30 pages. Revised. Presented at Information Theory and Applications, 31 January 2008, San Diego
Appl. Comput. Harmon. Anal., Vol. 26, pp. 301-321, 2008
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive sampling offers a new paradigm for acquiring signals that are compressible with respect to an orthonormal basis. The major algorithmic challenge in compressive sampling is to approximate a compressible signal from noisy samples. This paper describes a new iterative recovery algorithm called CoSaMP that delivers the same guarantees as the best optimization-based approaches. Moreover, this algorithm offers rigorous bounds on computational cost and storage. It is likely to be extremely efficient for practical problems because it requires only matrix-vector multiplies with the sampling matrix. For many cases of interest, the running time is just O(N*log^2(N)), where N is the length of the signal.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 05:59:48 GMT" }, { "version": "v2", "created": "Thu, 17 Apr 2008 23:24:21 GMT" } ]
2014-04-29T00:00:00
[ [ "Needell", "D.", "" ], [ "Tropp", "J. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2427
Raphael Hunger
Raphael Hunger, Michael Joham
A General Rate Duality of the MIMO Multiple Access Channel and the MIMO Broadcast Channel
Submitted to IEEE Globecom 2008; Fixed dimensions of channel matrix H_k and covariance matrix Z_k, slightly modified conclusion
null
10.1109/GLOCOM.2008.ECP.178
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general rate duality between the multiple access channel (MAC) and the broadcast channel (BC) which is applicable to systems with and without nonlinear interference cancellation. Different to the state-of-the-art rate duality with interference subtraction from Vishwanath et al., the proposed duality is filter-based instead of covariance-based and exploits the arising unitary degree of freedom to decorrelate every point-to-point link. Therefore, it allows for noncooperative stream-wise decoding which reduces complexity and latency. Moreover, the conversion from one domain to the other does not exhibit any dependencies during its computation making it accessible to a parallel implementation instead of a serial one. We additionally derive a rate duality for systems with multi-antenna terminals when linear filtering without interference (pre-)subtraction is applied and the different streams of a single user are not treated as self-interference. Both dualities are based on a framework already applied to a mean-square-error duality between the MAC and the BC. Thanks to this novel rate duality, any rate-based optimization with linear filtering in the BC can now be handled in the dual MAC where the arising expressions lead to more efficient algorithmic solutions than in the BC due to the alignment of the channel and precoder indices.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 11:48:35 GMT" }, { "version": "v2", "created": "Mon, 28 Jul 2008 12:33:19 GMT" } ]
2016-11-15T00:00:00
[ [ "Hunger", "Raphael", "" ], [ "Joham", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2443
Jens Christian Claussen
Jens Christian Claussen
Discrete stochastic processes, replicator and Fokker-Planck equations of coevolutionary dynamics in finite and infinite populations
Banach Center publications, in press
Banach Center Publications 80, 17-31 (2008)
10.4064/bc80-0-1
null
q-bio.PE cond-mat.stat-mech cs.SI math.PR math.ST physics.bio-ph physics.soc-ph stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finite-size fluctuations in coevolutionary dynamics arise in models of biological as well as of social and economic systems. This brief tutorial review surveys a systematic approach starting from a stochastic process discrete both in time and state. The limit $N\to \infty$ of an infinite population can be considered explicitly, generally leading to a replicator-type equation in zero order, and to a Fokker-Planck-type equation in first order in $1/\sqrt{N}$. Consequences and relations to some previous approaches are outlined.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 13:33:00 GMT" } ]
2019-07-15T00:00:00
[ [ "Claussen", "Jens Christian", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0803.2447
Luciano da Fontoura Costa
Luciano da Fontoura Costa
Trajectory Networks and Their Topological Changes Induced by Geographical Infiltration
10 pages, 8 figures. A working manuscript: suggestions and collaborations welcomed
null
null
null
cs.DM cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we investigate the topological changes undergone by trajectory networks as a consequence of progressive geographical infiltration. Trajectory networks, a type of knitted network, are obtained by establishing paths between geographically distributed nodes while following an associated vector field. For instance, the nodes could correspond to neurons along the cortical surface and the vector field could correspond to the gradient of neurotrophic factors, or the nodes could represent towns while the vector fields would be given by economical and/or geographical gradients. Therefore trajectory networks are natural models of a large number of geographical structures. The geographical infiltrations correspond to the addition of new local connections between nearby existing nodes. As such, these infiltrations could be related to several real-world processes such as contaminations, diseases, attacks, parasites, etc. The way in which progressive geographical infiltrations affect trajectory networks is investigated in terms of the degree, clustering coefficient, size of the largest component and the lengths of the existing chains measured along the infiltrations. It is shown that the maximum infiltration distance plays a critical role in the intensity of the induced topological changes. For large enough values of this parameter, the chains intrinsic to the trajectory networks undergo a collapse which is shown not to be related to the percolation of the network also implied by the infiltrations.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 13:52:39 GMT" }, { "version": "v2", "created": "Mon, 21 Apr 2008 19:24:31 GMT" } ]
2008-04-21T00:00:00
[ [ "Costa", "Luciano da Fontoura", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0803.2460
Idan Goldenberg
Idan Goldenberg and David Burshtein
Upper Bound on Error Exponent of Regular LDPC Codes Transmitted over the BEC
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The error performance of the ensemble of typical LDPC codes transmitted over the binary erasure channel (BEC) is analyzed. In the past, lower bounds on the error exponents were derived. In this paper a probabilistic upper bound on this error exponent is derived. This bound holds with some confidence level.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 14:53:09 GMT" } ]
2008-03-18T00:00:00
[ [ "Goldenberg", "Idan", "" ], [ "Burshtein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2495
Gabriel Istrate
Gabriel Istrate, Madhav V. Marathe and S.S.Ravi
Adversarial Scheduling Analysis of Game Theoretic Models of Norm Diffusion
null
null
null
null
cs.GT cs.DM math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In (Istrate, Marathe, Ravi SODA 2001) we advocated the investigation of robustness of results in the theory of learning in games under adversarial scheduling models. We provide evidence that such an analysis is feasible and can lead to nontrivial results by investigating, in an adversarial scheduling setting, Peyton Young's model of diffusion of norms. In particular, our main result incorporates into Peyton Young's model.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 17:42:28 GMT" } ]
2008-11-04T00:00:00
[ [ "Istrate", "Gabriel", "" ], [ "Marathe", "Madhav V.", "" ], [ "Ravi", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0803.2527
Grenville Croll
Vipin Samar, Sangeeta Patni
Controlling the Information Flow in Spreadsheets
9 pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 125-134 ISBN:1-902724-16-X
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is no denying that spreadsheets have become critical for all operational processes including financial reporting, budgeting, forecasting, and analysis. Microsoft Excel has essentially become a scratch pad and a data browser that can quickly be put to use for information gathering and decision-making. However, there is little control in how data comes into Excel, and how it gets updated. The information supply chain feeding into Excel remains ad hoc and without any centralized IT control. This paper discusses some of the pitfalls of the data collection and maintenance process in Excel. It then suggests service-oriented architecture (SOA) based information gathering and control techniques to ameliorate the pitfalls of this scratch pad while improving the integrity of data, boosting the productivity of the business users, and building controls to satisfy the requirements of Section 404 of the Sarbanes-Oxley Act.
[ { "version": "v1", "created": "Mon, 17 Mar 2008 20:46:12 GMT" } ]
2008-03-19T00:00:00
[ [ "Samar", "Vipin", "" ], [ "Patni", "Sangeeta", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0803.2559
James Bailey
James Bailey and Guozhu Dong and Anthony Widjaja To
Logical Queries over Views: Decidability and Expressiveness
null
null
null
null
cs.LO cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of deciding satisfiability of first order logic queries over views, our aim being to delimit the boundary between the decidable and the undecidable fragments of this language. Views currently occupy a central place in database research, due to their role in applications such as information integration and data warehousing. Our main result is the identification of a decidable class of first order queries over unary conjunctive views that generalises the decidability of the classical class of first order sentences over unary relations, known as the Lowenheim class. We then demonstrate how various extensions of this class lead to undecidability and also provide some expressivity results. Besides its theoretical interest, our new decidable class is potentially interesting for use in applications such as deciding implication of complex dependencies, analysis of a restricted class of active database rules, and ontology reasoning.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 02:07:12 GMT" } ]
2008-12-18T00:00:00
[ [ "Bailey", "James", "" ], [ "Dong", "Guozhu", "" ], [ "To", "Anthony Widjaja", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0803.2570
Bari\c{s} Nakibo\u{g}lu
Shashi Borade, Baris Nakiboglu, Lizhong Zheng
Unequal Error Protection: An Information Theoretic Perspective
45 pages, 6 figures, Submitted to IEEE Transaction on Information Theory. Corrected typos
IEEE Transactions on Information Theory, 55(12):5511-5539, Dec 2009
10.1109/TIT.2009.2032819 10.1109/ISIT.2008.4595385
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An information theoretic framework for unequal error protection is developed in terms of the exponential error bounds. The fundamental difference between the bit-wise and message-wise unequal error protection (UEP) is demonstrated, for fixed length block codes on DMCs without feedback. Effect of feedback is investigated via variable length block codes. It is shown that, feedback results in a significant improvement in both bit-wise and message-wise UEP (except the single message case for missed detection). The distinction between false-alarm and missed-detection formalizations for message-wise UEP is also considered. All results presented are at rates close to capacity.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 06:03:44 GMT" }, { "version": "v2", "created": "Thu, 11 Jun 2009 16:12:00 GMT" }, { "version": "v3", "created": "Tue, 25 Aug 2009 18:51:31 GMT" }, { "version": "v4", "created": "Sun, 25 Oct 2009 23:06:45 GMT" } ]
2020-01-03T00:00:00
[ [ "Borade", "Shashi", "" ], [ "Nakiboglu", "Baris", "" ], [ "Zheng", "Lizhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2615
Olivier Laval
Olivier Laval (LIPN), Sophie Toulouse (LIPN), Anass Nagih (LITA)
Rapport de recherche sur le probl\`eme du plus court chemin contraint
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article provides an overview of the performance and the theoretical complexity of approximate and exact methods for various versions of the shortest path problem. The proposed study aims to improve the resolution of a more general covering problem within a column generation scheme in which the shortest path problem is the sub-problem.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 12:37:36 GMT" } ]
2008-12-18T00:00:00
[ [ "Laval", "Olivier", "", "LIPN" ], [ "Toulouse", "Sophie", "", "LIPN" ], [ "Nagih", "Anass", "", "LITA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.2616
Etienne Gallais
Etienne Gallais (LMAM, LMJL)
Combinatorial realization of the Thom-Smale complex via discrete Morse theory
20 pages
null
null
null
math.GT cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the case of smooth manifolds, we use Forman's discrete Morse theory to realize combinatorially any Thom-Smale complex coming from a smooth Morse function by a couple triangulation-discrete Morse function. As an application, we prove that any Euler structure on a smooth oriented closed 3-manifold has a particular realization by a complete matching on the Hasse diagram of a triangulation of the manifold.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 12:38:16 GMT" } ]
2008-12-18T00:00:00
[ [ "Gallais", "Etienne", "", "LMAM, LMJL" ] ]
[ { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0803.2639
Camilla Hollanti
Camilla Hollanti, Jyrki Lahtonen, Hsiao-feng Francis Lu
Maximal Orders in the Design of Dense Space-Time Lattice Codes
24 pages, 17 figures, revised version submitted to IEEE Trans. on Inform. Theory Dec. 2007, first version submitted Sep. 2006
IEEE Trans. Inf. Theory, vol. 54(10), Oct. 2008, pp. 4493-4510
10.1109/TIT.2008.928998
null
cs.IT cs.DM math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct explicit rate-one, full-diversity, geometrically dense matrix lattices with large, non-vanishing determinants (NVD) for four transmit antenna multiple-input single-output (MISO) space-time (ST) applications. The constructions are based on the theory of rings of algebraic integers and related subrings of the Hamiltonian quaternions and can be extended to a larger number of Tx antennas. The usage of ideals guarantees a non-vanishing determinant larger than one and an easy way to present the exact proofs for the minimum determinants. The idea of finding denser sublattices within a given division algebra is then generalized to a multiple-input multiple-output (MIMO) case with an arbitrary number of Tx antennas by using the theory of cyclic division algebras (CDA) and maximal orders. It is also shown that the explicit constructions in this paper all have a simple decoding method based on sphere decoding. Related to the decoding complexity, the notion of sensitivity is introduced, and experimental evidence indicating a connection between sensitivity, decoding complexity and performance is provided. Simulations in a quasi-static Rayleigh fading channel show that our dense quaternionic constructions outperform both the earlier rectangular lattices and the rotated ABBA lattice as well as the DAST lattice. We also show that our quaternionic lattice is better than the DAST lattice in terms of the diversity-multiplexing gain tradeoff.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 14:20:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Hollanti", "Camilla", "" ], [ "Lahtonen", "Jyrki", "" ], [ "Lu", "Hsiao-feng Francis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0803.2675
Gerard Briscoe Mr
Gerard Briscoe and Philippe De Wilde
Digital Ecosystems: Self-Organisation of Evolving Agent Populations
5 pages, 5 figures, ACM Management of Emergent Digital EcoSystems (MEDES) 2009
null
null
null
cs.NE cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A primary motivation for our research in Digital Ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. Self-organisation is perhaps one of the most desirable features in the systems that we engineer, and it is important for us to be able to measure self-organising behaviour. We investigate the self-organising aspects of Digital Ecosystems, created through the application of evolutionary computing to Multi-Agent Systems (MASs), aiming to determine a macroscopic variable to characterise the self-organisation of the evolving agent populations within. We study a measure for the self-organisation called Physical Complexity; based on statistical physics, automata theory, and information theory, providing a measure of information relative to the randomness in an organism's genome, by calculating the entropy in a population. We investigate an extension to include populations of variable length, and then built upon this to construct an efficiency measure to investigate clustering within evolving agent populations. Overall an insight has been achieved into where and how self-organisation occurs in our Digital Ecosystem, and how it can be quantified.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 16:59:12 GMT" }, { "version": "v2", "created": "Tue, 28 Oct 2008 09:53:30 GMT" }, { "version": "v3", "created": "Fri, 20 Feb 2009 04:14:47 GMT" }, { "version": "v4", "created": "Mon, 5 Oct 2009 00:32:17 GMT" } ]
2009-10-05T00:00:00
[ [ "Briscoe", "Gerard", "" ], [ "De Wilde", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.2695
Juan J. Merelo Pr.
C. Fernandes, A.M. Mora, J.J. Merelo, V. Ramos, J.L.J. Laredo
KohonAnts: A Self-Organizing Ant Algorithm for Clustering and Pattern Classification
Submitted to ALIFE XI
null
null
null
cs.NE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new ant-based method that takes advantage of the cooperative self-organization of Ant Colony Systems to create a naturally inspired clustering and pattern recognition method. The approach considers each data item as an ant, which moves inside a grid changing the cells it goes through, in a fashion similar to Kohonen's Self-Organizing Maps. The resulting algorithm is conceptually more simple, takes less free parameters than other ant-based clustering algorithms, and, after some parameter tuning, yields very good results on some benchmark problems.
[ { "version": "v1", "created": "Tue, 18 Mar 2008 18:27:14 GMT" } ]
2008-03-19T00:00:00
[ [ "Fernandes", "C.", "" ], [ "Mora", "A. M.", "" ], [ "Merelo", "J. J.", "" ], [ "Ramos", "V.", "" ], [ "Laredo", "J. L. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0803.2717
Travis Beals
Travis R. Beals, Kevin P. Hynes, Barry C. Sanders
Distributed authentication for randomly compromised networks
15 pages, 5 figures; final version
New Journal of Physics 11 (2009) 085005
10.1088/1367-2630/11/8/085005
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major security weaknesses: the requirement of an authenticated classical channel to prevent man-in-the-middle attacks. Our scheme employs classical secret sharing and partially trusted intermediaries to provide arbitrarily high confidence in the security of the protocol. Although certain failures elude detection, we discuss preemptive strategies to reduce the probability of failure to an arbitrarily small level: probability of such failures is exponentially suppressed with increases in connectivity (i.e., connections per node).
[ { "version": "v1", "created": "Tue, 18 Mar 2008 21:02:48 GMT" }, { "version": "v2", "created": "Mon, 8 Dec 2008 07:29:25 GMT" }, { "version": "v3", "created": "Thu, 27 Aug 2009 06:45:19 GMT" } ]
2009-08-27T00:00:00
[ [ "Beals", "Travis R.", "" ], [ "Hynes", "Kevin P.", "" ], [ "Sanders", "Barry C.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2812
Mikhail Konnik
Mikhail V. Konnik
Using Spatially Varying Pixels Exposures and Bayer-covered Photosensors for High Dynamic Range Imaging
Typos corrected
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The method of a linear high dynamic range imaging using solid-state photosensors with Bayer colour filters array is provided in this paper. Using information from neighbour pixels, it is possible to reconstruct linear images with wide dynamic range from the oversaturated images. Bayer colour filters array is considered as an array of neutral filters in a quasimonochromatic light. If the camera's response function to the desirable light source is known then one can calculate correction coefficients to reconstruct oversaturated images. Reconstructed images are linearized in order to provide a linear high dynamic range images for optical-digital imaging systems. The calibration procedure for obtaining the camera's response function to the desired light source is described. Experimental results of the reconstruction of the images from the oversaturated images are presented for red, green, and blue quasimonochromatic light sources. Quantitative analysis of the accuracy of the reconstructed images is provided.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 14:55:15 GMT" }, { "version": "v2", "created": "Mon, 24 Mar 2008 07:04:39 GMT" } ]
2008-03-24T00:00:00
[ [ "Konnik", "Mikhail V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0803.2824
Simon Balon
Simon Balon and Guy Leduc
Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato Aware Link Weights Optimization
12 pages, Short version to be published in ACM SIGMETRICS 2008, International Conference on Measurement and Modeling of Computer Systems, June 2-6, 2008, Annapolis, Maryland, USA
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A well-known approach to intradomain traffic engineering consists in finding the set of link weights that minimizes a network-wide objective function for a given intradomain traffic matrix. This approach is inadequate because it ignores a potential impact on interdomain routing. Indeed, the resulting set of link weights may trigger BGP to change the BGP next hop for some destination prefixes, to enforce hot-potato routing policies. In turn, this results in changes in the intradomain traffic matrix that have not been anticipated by the link weights optimizer, possibly leading to degraded network performance. We propose a BGP-aware link weights optimization method that takes these effects into account, and even turns them into an advantage. This method uses the interdomain traffic matrix and other available BGP data, to extend the intradomain topology with external virtual nodes and links, on which all the well-tuned heuristics of a classical link weights optimizer can be applied. A key innovative asset of our method is its ability to also optimize the traffic on the interdomain peering links. We show, using an operational network as a case study, that our approach does so efficiently at almost no extra computational cost.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 15:50:08 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 15:09:43 GMT" } ]
2008-04-14T00:00:00
[ [ "Balon", "Simon", "" ], [ "Leduc", "Guy", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.2827
Mari Kobayashi
Mari Kobayashi and Xavier Mestre
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
submitted to IEEE Trans. on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a two-hop wireless network where a transmitter communicates with a receiver via $M$ relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophisticated linear processing such as beamforming and distributed space-time coding (DSTC) at relays enables to improve the AF performance. However, the relative utility of these strategies depend on the available channel state information at transmitter (CSIT), which in turn depends on system parameters such as the speed of the underlying fading channel and that of training and feedback procedures. Moreover, it is of practical interest to have a single transmit scheme that handles different CSIT scenarios. This motivates us to consider a unified approach based on DSTC that potentially provides diversity gain with statistical CSIT and exploits some additional side information if available. Under individual power constraints at the relays, we optimize the amplifier power allocation such that pairwise error probability conditioned on the available CSIT is minimized. Under perfect CSIT we propose an on-off gradient algorithm that efficiently finds a set of relays to switch on. Under partial and statistical CSIT, we propose a simple waterfilling algorithm that yields a non-trivial solution between maximum power allocation and a generalized STC that equalizes the averaged amplified noise for all relays. Moreover, we derive closed-form solutions for M=2 and in certain asymptotic regimes that enable an easy interpretation of the proposed algorithms. It is found that an appropriate amplifier power allocation is mandatory for DSTC to offer sufficient diversity and power gain in a general network topology.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 18:55:14 GMT" } ]
2008-03-20T00:00:00
[ [ "Kobayashi", "Mari", "" ], [ "Mestre", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.2842
Shai Gutner
Noga Alon, Yossi Azar, Shai Gutner
Admission Control to Minimize Rejections and Online Set Cover with Repetitions
null
Proc. of 17th SPAA (2005), 238-244
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the admission control problem in general networks. Communication requests arrive over time, and the online algorithm accepts or rejects each request while maintaining the capacity limitations of the network. The admission control problem has been usually analyzed as a benefit problem, where the goal is to devise an online algorithm that accepts the maximum number of requests possible. The problem with this objective function is that even algorithms with optimal competitive ratios may reject almost all of the requests, when it would have been possible to reject only a few. This could be inappropriate for settings in which rejections are intended to be rare events. In this paper, we consider preemptive online algorithms whose goal is to minimize the number of rejected requests. Each request arrives together with the path it should be routed on. We show an $O(\log^2 (mc))$-competitive randomized algorithm for the weighted case, where $m$ is the number of edges in the graph and $c$ is the maximum edge capacity. For the unweighted case, we give an $O(\log m \log c)$-competitive randomized algorithm. This settles an open question of Blum, Kalai and Kleinberg raised in \cite{BlKaKl01}. We note that allowing preemption and handling requests with given paths are essential for avoiding trivial lower bounds.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 16:53:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Alon", "Noga", "" ], [ "Azar", "Yossi", "" ], [ "Gutner", "Shai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]