id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0803.2856
Christoph Schommer
T. Rothenberger, S. Oez, E. Tahirovic, C. Schommer
Figuring out Actors in Text Streams: Using Collocations to establish Incremental Mind-maps
10 pages, 3 Figures
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recognition, involvement, and description of main actors influences the story line of the whole text. This is of higher importance as the text per se represents a flow of words and expressions that once it is read it is lost. In this respect, the understanding of a text and moreover on how the actor exactly behaves is not only a major concern: as human beings try to store a given input on short-term memory while associating diverse aspects and actors with incidents, the following approach represents a virtual architecture, where collocations are concerned and taken as the associative completion of the actors' acting. Once that collocations are discovered, they become managed in separated memory blocks broken down by the actors. As for human beings, the memory blocks refer to associative mind-maps. We then present several priority functions to represent the actual temporal situation inside a mind-map to enable the user to reconstruct the recent events from the discovered temporal results.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 18:00:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Rothenberger", "T.", "" ], [ "Oez", "S.", "" ], [ "Tahirovic", "E.", "" ], [ "Schommer", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0803.2874
Wolfgang Steiner
Christiane Frougny (LIAFA), Wolfgang Steiner (LIAFA)
Minimal weight expansions in Pisot bases
null
null
null
null
cs.DM cs.CR math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For applications to cryptography, it is important to represent numbers with a small number of non-zero digits (Hamming weight) or with small absolute sum of digits. The problem of finding representations with minimal weight has been solved for integer bases, e.g. by the non-adjacent form in base~2. In this paper, we consider numeration systems with respect to real bases $\beta$ which are Pisot numbers and prove that the expansions with minimal absolute sum of digits are recognizable by finite automata. When $\beta$ is the Golden Ratio, the Tribonacci number or the smallest Pisot number, we determine expansions with minimal number of digits $\pm1$ and give explicitely the finite automata recognizing all these expansions. The average weight is lower than for the non-adjacent form.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 19:55:38 GMT" }, { "version": "v2", "created": "Thu, 27 Mar 2008 16:30:49 GMT" }, { "version": "v3", "created": "Fri, 9 Jan 2009 20:16:31 GMT" } ]
2009-01-09T00:00:00
[ [ "Frougny", "Christiane", "", "LIAFA" ], [ "Steiner", "Wolfgang", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0803.2904
Gabriel Cardona
Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente
A Distance Metric for Tree-Sibling Time Consistent Phylogenetic Networks
16 pages, 16 figures
null
null
null
q-bio.PE cs.CE cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The presence of reticulate evolutionary events in phylogenies turn phylogenetic trees into phylogenetic networks. These events imply in particular that there may exist multiple evolutionary paths from a non-extant species to an extant one, and this multiplicity makes the comparison of phylogenetic networks much more difficult than the comparison of phylogenetic trees. In fact, all attempts to define a sound distance measure on the class of all phylogenetic networks have failed so far. Thus, the only practical solutions have been either the use of rough estimates of similarity (based on comparison of the trees embedded in the networks), or narrowing the class of phylogenetic networks to a certain class where such a distance is known and can be efficiently computed. The first approach has the problem that one may identify two networks as equivalent, when they are not; the second one has the drawback that there may not exist algorithms to reconstruct such networks from biological sequences. We present in this paper a distance measure on the class of tree-sibling time consistent phylogenetic networks, which generalize tree-child time consistent phylogenetic networks, and thus also galled-trees. The practical interest of this distance measure is twofold: it can be computed in polynomial time by means of simple algorithms, and there also exist polynomial-time algorithms for reconstructing networks of this class from DNA sequence data. The Perl package Bio::PhyloNetwork, included in the BioPerl bundle, implements many algorithms on phylogenetic networks, including the computation of the distance presented in this paper.
[ { "version": "v1", "created": "Wed, 19 Mar 2008 22:24:11 GMT" } ]
2008-03-21T00:00:00
[ [ "Cardona", "Gabriel", "" ], [ "Llabres", "Merce", "" ], [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.2919
Travis Beals
Travis R. Beals, Barry C. Sanders
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
12 pages, 2 figures; added proof of verification sub-protocol, minor corrections
ICITS 2008, LNCS 5155, pp. 29-39, 2008
10.1007/978-3-540-85093-9_4
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution's major limitations: the short maximum transmission distance (~200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed compromised nodes. The protocol provides arbitrarily high confidence in the security of the protocol, with modest scaling of resource costs with improvement of the security parameter. Although some types of failure are undetectable, users can take preemptive measures to make the probability of such failures arbitrarily small.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 02:51:30 GMT" }, { "version": "v2", "created": "Sat, 23 Aug 2008 07:19:25 GMT" } ]
2008-08-23T00:00:00
[ [ "Beals", "Travis R.", "" ], [ "Sanders", "Barry C.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2925
Marcus Hutter
Kassel Hingee and Marcus Hutter
Equivalence of Probabilistic Tournament and Polynomial Ranking Selection
9 double-column pages, 5 figures
Proc. 2008 Congress on Evolutionary Computation (CEC 2008) pages 564-571
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crucial to an Evolutionary Algorithm's performance is its selection scheme. We mathematically investigate the relation between polynomial rank and probabilistic tournament methods which are (respectively) generalisations of the popular linear ranking and tournament selection schemes. We show that every probabilistic tournament is equivalent to a unique polynomial rank scheme. In fact, we derived explicit operators for translating between these two types of selection. Of particular importance is that most linear and most practical quadratic rank schemes are probabilistic tournaments.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 03:50:53 GMT" } ]
2008-06-26T00:00:00
[ [ "Hingee", "Kassel", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.2955
Lenka Zdeborova
Lenka Zdeborov\'a, Marc M\'ezard
Locked constraint satisfaction problems
4 pages, 2 figures
Phys. Rev. Lett. 101, 078702 (2008)
10.1103/PhysRevLett.101.078702
null
cond-mat.stat-mech cond-mat.dis-nn cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce and study the random "locked" constraint satisfaction problems. When increasing the density of constraints, they display a broad "clustered" phase in which the space of solutions is divided into many isolated points. While the phase diagram can be found easily, these problems, in their clustered phase, are extremely hard from the algorithmic point of view: the best known algorithms all fail to find solutions. We thus propose new benchmarks of really hard optimization problems and provide insight into the origin of their typical hardness.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 10:11:00 GMT" }, { "version": "v2", "created": "Fri, 5 Sep 2008 16:54:42 GMT" } ]
2008-09-05T00:00:00
[ [ "Zdeborová", "Lenka", "" ], [ "Mézard", "Marc", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.2957
Uwe Aickelin
Uwe Aickelin and Kathryn Dowsland
Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall Layout and Tenant Selection Problem
null
Journal of Heuristics, 8(5), pp 503-514, 2002
10.1023/A:1016536623961,
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During our earlier research, it was recognised that in order to be successful with an indirect genetic algorithm approach using a decoder, the decoder has to strike a balance between being an optimiser in its own right and finding feasible solutions. Previously this balance was achieved manually. Here we extend this by presenting an automated approach where the genetic algorithm itself, simultaneously to solving the problem, sets weights to balance the components out. Subsequently we were able to solve a complex and non-linear scheduling problem better than with a standard direct genetic algorithm implementation.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 10:19:01 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Dowsland", "Kathryn", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.2965
Uwe Aickelin
Uwe Aickelin
An Indirect Genetic Algorithm for Set Covering Problems
null
Journal of the Operational Research Society, 53(10), pp 1118-1126 2002
10.1057/palgrave.jors.2601317
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new type of genetic algorithm for the set covering problem. It differs from previous evolutionary approaches first because it is an indirect algorithm, i.e. the actual solutions are found by an external decoder function. The genetic algorithm itself provides this decoder with permutations of the solution variables and other parameters. Second, it will be shown that results can be further improved by adding another indirect optimisation layer. The decoder will not directly seek out low cost solutions but instead aims for good exploitable solutions. These are then post optimised by another hill-climbing algorithm. Although seemingly more complicated, we will show that this three-stage approach has advantages in terms of solution quality, speed and adaptability to new types of problems over more direct approaches. Extensive computational results are presented and compared to the latest evolutionary and other heuristic approaches to the same data instances.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 10:58:32 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.2966
Uwe Aickelin
Uwe Aickelin and Larry Bull
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
null
Journal of Applied System Studies, 4(2), pp 2-17, 2003
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the use of a hierarchical coevolutionary genetic algorithm under different partnering strategies. Cascading clusters of sub-populations are built from the bottom up, with higher-level sub-populations optimising larger parts of the problem. Hence higher-level sub-populations potentially search a larger search space with a lower resolution whilst lower-level sub-populations search a smaller search space with a higher resolution. The effects of different partner selection schemes amongst the sub-populations on solution quality are examined for two constrained optimisation problems. We examine a number of recombination partnering strategies in the construction of higher-level individuals and a number of related schemes for evaluating sub-solutions. It is shown that partnering strategies that exploit problem-specific knowledge are superior and can counter inappropriate (sub)fitness measurements.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 11:09:39 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Bull", "Larry", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.2967
Uwe Aickelin
Uwe Aickelin and Paul White
Building Better Nurse Scheduling Algorithms
null
Annals of Operations Research, 128, pp 159-177, 2004
10.1023/B:ANOR.0000019103.31340.a6
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this research is twofold: Firstly, to model and solve a complex nurse scheduling problem with an integer programming formulation and evolutionary algorithms. Secondly, to detail a novel statistical method of comparing and hence building better scheduling algorithms by identifying successful algorithm modifications. The comparison method captures the results of algorithms in a single figure that can then be compared using traditional statistical techniques. Thus, the proposed method of comparing algorithms is an objective procedure designed to assist in the process of improving an algorithm. This is achieved even when some results are non-numeric or missing due to infeasibility. The final algorithm outperforms all previous evolutionary algorithms, which relied on human expertise for modification.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 11:15:37 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "White", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.2969
Uwe Aickelin
Uwe Aickelin and Kathryn Dowsland
An Indirect Genetic Algorithm for a Nurse Scheduling Problem
null
Computers & Operations Research, 31(5), pp 761-778, 2004
10.1016/S0305-0548(03)00034-0
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a Genetic Algorithms approach to a manpower-scheduling problem arising at a major UK hospital. Although Genetic Algorithms have been successfully used for similar problems in the past, they always had to overcome the limitations of the classical Genetic Algorithms paradigm in handling the conflict between objectives and constraints. The approach taken here is to use an indirect coding based on permutations of the nurses, and a heuristic decoder that builds schedules from these permutations. Computational experiments based on 52 weeks of live data are used to evaluate three different decoders with varying levels of intelligence, and four well-known crossover operators. Results are further enhanced by introducing a hybrid crossover operator and by making use of simple bounds to reduce the size of the solution space. The results reveal that the proposed algorithm is able to find high quality solutions and is both faster and more flexible than a recently published Tabu Search approach.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 11:21:19 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Dowsland", "Kathryn", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.2970
Uwe Aickelin
Steve Cayzer and Uwe Aickelin
A Recommender System based on Idiotypic Artificial Immune Networks
null
Journal of Mathematical Modelling and Algorithms, 4(2), pp 181-198, 2005
10.1007/s10852-004-5336-7
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an Artificial Immune System (AIS) that exploits some of these characteristics and is applied to the task of film recommendation by Collaborative Filtering (CF). Natural evolution and in particular the immune system have not been designed for classical optimisation. However, for this problem, we are not interested in finding a single optimum. Rather we intend to identify a sub-set of good matches on which recommendations can be based. It is our hypothesis that an AIS built on two central aspects of the biological immune system will be an ideal candidate to achieve this: Antigen-antibody interaction for matching and idiotypic antibody-antibody interaction for diversity. Computational results are presented in support of this conjecture and compared to those found by other CF techniques.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 11:27:56 GMT" }, { "version": "v2", "created": "Fri, 16 May 2008 10:45:28 GMT" } ]
2010-07-05T00:00:00
[ [ "Cayzer", "Steve", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.2973
Uwe Aickelin
Uwe Aickelin, Jamie Twycross and Thomas Hesketh-Roberts
Rule Generalisation in Intrusion Detection Systems using Snort
null
International Journal of Electronic Security and Digital Forensics, 1 (1), pp 101-116, 2007
10.1504/IJESDF.2007.013596,
null
cs.NE cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intrusion Detection Systems (ids)provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An ids responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of ids use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source ids that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undeleted variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based ids rule processing.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 11:59:27 GMT" }, { "version": "v2", "created": "Fri, 16 May 2008 10:42:09 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Twycross", "Jamie", "" ], [ "Hesketh-Roberts", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.2975
Uwe Aickelin
Uwe Aickelin and Jingpeng Li
An Estimation of Distribution Algorithm for Nurse Scheduling
null
Annals of Operations Research, 155 (1), pp 289-309, 2007
10.1007/s10479-007-0214-0
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Schedules can be built in a similar way to a human scheduler by using a set of rules that involve domain knowledge. This paper presents an Estimation of Distribution Algorithm (eda) for the nurse scheduling problem, which involves choosing a suitable scheduling rule from a set for the assignment of each nurse. Unlike previous work that used Genetic Algorithms (ga) to implement implicit learning, the learning in the proposed algorithm is explicit, i.e. we identify and mix building blocks directly. The eda is applied to implement such explicit learning by building a Bayesian network of the joint distribution of solutions. The conditional probability of each variable in the network is computed according to an initial set of promising solutions. Subsequently, each new instance for each variable is generated by using the corresponding conditional probabilities, until all variables have been generated, i.e. in our case, a new rule string has been obtained. Another set of rule strings will be generated in this way, some of which will replace previous strings based on fitness selection. If stopping conditions are not met, the conditional probabilities for all nodes in the Bayesian network are updated again using the current set of promising rule strings. Computational results from 52 real data instances demonstrate the success of this approach. It is also suggested that the learning mechanism in the proposed approach might be suitable for other scheduling problems.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 12:07:26 GMT" }, { "version": "v2", "created": "Fri, 16 May 2008 10:46:10 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Li", "Jingpeng", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.2981
Uwe Aickelin
Amanda Whitbrook, Uwe Aickelin and Jonathan Garibaldi
Idiotypic Immune Networks in Mobile Robot Control
null
IEEE Transactions on Systems, Man and Cybernetics, Part B, 37(6), 1581- 1598, 2007
10.1109/TSMCB.2007.907334
null
cs.NE cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (ais) model for incorporation into behavior-based robotics but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with non-idiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic ais network with a Reinforcement Learning based control system (rl) is described and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic rl, a simplified hybrid ais-rl that implements idiotypic selection independently of derived concentration levels and a full hybrid ais-rl scheme are examined. The test bed takes the form of a simulated Pioneer robot that is required to navigate through maze worlds detecting and tracking door markers.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 12:24:43 GMT" } ]
2010-07-05T00:00:00
[ [ "Whitbrook", "Amanda", "" ], [ "Aickelin", "Uwe", "" ], [ "Garibaldi", "Jonathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0803.2995
Uwe Aickelin
Peer-Olaf Siebers, Uwe Aickelin, Giuliana Battisti, Helen Celia, Christopher Clegg, Xiaolan Fu, Raphael De Hoyos, Alfonsiana Iona, Alina Petrescu and Peixoto Adriano
The Role of Management Practices in Closing the Productivity Gap
null
AIM Working Paper Series Number 065, 2008
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is no doubt that management practices are linked to the productivity and performance of a company. However, research findings are mixed. This paper provides a multi-disciplinary review of the current evidence of such a relationship and offers suggestions for further exploration. We provide an extensive review of the literature in terms of research findings from studies that have been trying to measure and understand the impact that individual management practices and clusters of management practices have on productivity at different levels of analysis. We focus our review on Operations Management (om) and Human Resource Management (hrm) practices as well as joint applications of these practices. In conclusion, we can say that taken as a whole, the research findings are equivocal. Some studies have found a positive relationship between the adoption of management practices and productivity, some negative and some no association whatsoever. We believe that the lack of universal consensus on the effect of the adoption of complementary management practices might be driven either by measurement issues or by the level of analysis. Consequently, there is a need for further research. In particular, for a multi-level approach from the lowest possible level of aggregation up to the firm-level of analysis in order to assess the impact of management practices upon the productivity of firms.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 13:15:11 GMT" }, { "version": "v2", "created": "Sat, 22 Mar 2008 12:46:10 GMT" } ]
2013-05-30T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ], [ "Battisti", "Giuliana", "" ], [ "Celia", "Helen", "" ], [ "Clegg", "Christopher", "" ], [ "Fu", "Xiaolan", "" ], [ "De Hoyos", "Raphael", "" ], [ "Iona", "Alfonsiana", "" ], [ "Petrescu", "Alina", "" ], [ "Adriano", "Peixoto", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0803.3027
Adrien Poteaux
Adrien Poteaux, Marc Rybowicz
Towards a Symbolic-Numeric Method to Compute Puiseux Series: The Modular Part
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have designed a new symbolic-numeric strategy to compute efficiently and accurately floating point Puiseux series defined by a bivariate polynomial over an algebraic number field. In essence, computations modulo a well chosen prime $p$ are used to obtain the exact information required to guide floating point computations. In this paper, we detail the symbolic part of our algorithm: First of all, we study modular reduction of Puiseux series and give a good reduction criterion to ensure that the information required by the numerical part is preserved. To establish our results, we introduce a simple modification of classical Newton polygons, that we call "generic Newton polygons", which happen to be very convenient. Then, we estimate the arithmetic complexity of computing Puiseux series over finite fields and improve known bounds. Finally, we give bit-complexity bounds for deterministic and randomized versions of the symbolic part. The details of the numerical part will be described in a forthcoming paper.
[ { "version": "v1", "created": "Thu, 20 Mar 2008 16:23:40 GMT" } ]
2008-03-21T00:00:00
[ [ "Poteaux", "Adrien", "" ], [ "Rybowicz", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0803.3099
Mark Burgin
Mark Burgin a and Marc L. Smith
Concurrent Composition and Algebras of Events, Actions, and Processes
null
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many different models of concurrent processes. The goal of this work is to introduce a common formalized framework for current research in this area and to eliminate shortcomings of existing models of concurrency. Following up the previous research of the authors and other researchers on concurrency, here we build a high-level metamodel EAP (event-action-process) for concurrent processes. This metamodel comprises a variety of other models of concurrent processes. We shape mathematical models for, and study events, actions, and processes in relation to important practical problems, such as communication in networks, concurrent programming, and distributed computations. In the third section of the work, a three-level algebra of events, actions and processes is constructed and studied as a new stage of algebra for concurrent processes. Relations between EAP process algebra and other models of concurrency are considered in the fourth section of this work.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 00:27:38 GMT" } ]
2008-03-24T00:00:00
[ [ "a", "Mark Burgin", "" ], [ "Smith", "Marc L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0803.3117
Shahab Oveis Gharan
Shahab Oveis Gharan, Alireza Bayesteh, and Amir K. Khandani
On the Diversity-Multiplexing Tradeoff in Multiple-Relay Network
Submitted to IEEE Trans. on Information Theory, April 28 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the setup of a multiple-relay network in which $K$ half-duplex multiple-antenna relays assist in the transmission between a/several multiple-antenna transmitter(s) and a multiple-antenna receiver. Each two nodes are assumed to be either connected through a quasi-static Rayleigh fading channel, or disconnected. We propose a new scheme, which we call \textit{random sequential} (RS), based on the amplify-and-forward relaying. We prove that for general multiple-antenna multiple-relay networks, the proposed scheme achieves the maximum diversity gain. Furthermore, we derive diversity-multiplexing tradeoff (DMT) of the proposed RS scheme for general single-antenna multiple-relay networks. It is shown that for single-antenna two-hop multiple-access multiple-relay ($K>1$) networks (without direct link between the transmitter(s) and the receiver), the proposed RS scheme achieves the optimum DMT. However, for the case of multiple access single relay setup, we show that the RS scheme reduces to the naive amplify-and-forward relaying and is not optimum in terms of DMT, while the dynamic decode-and-forward scheme is shown to be optimum for this scenario.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 06:49:42 GMT" }, { "version": "v2", "created": "Sun, 1 Jun 2008 22:33:24 GMT" }, { "version": "v3", "created": "Sun, 8 Jun 2008 01:01:44 GMT" } ]
2008-06-08T00:00:00
[ [ "Gharan", "Shahab Oveis", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3186
Denis Pallez
Denis Pallez (I3S), Laurent Brisson (I3S), Thierry Baccino (LPEQ)
Towards a human eye behavior model by applying Data Mining Techniques on Gaze Information from IEC
null
Dans Proceedings of the Third International Conference on Human Centered Processes - Human Centered Processes, Delft : Pays-Bas (2008)
null
null
cs.HC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we firstly present what is Interactive Evolutionary Computation (IEC) and rapidly how we have combined this artificial intelligence technique with an eye-tracker for visual optimization. Next, in order to correctly parameterize our application, we present results from applying data mining techniques on gaze information coming from experiments conducted on about 80 human individuals.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 15:38:25 GMT" } ]
2008-12-18T00:00:00
[ [ "Pallez", "Denis", "", "I3S" ], [ "Brisson", "Laurent", "", "I3S" ], [ "Baccino", "Thierry", "", "LPEQ" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.3187
Luca Vigan\`o
Luca Vigan\`o and Marco Volpe
Labeled Natural Deduction Systems for a Family of Tense Logics
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give labeled natural deduction systems for a family of tense logics extending the basic linear tense logic Kl. We prove that our systems are sound and complete with respect to the usual Kripke semantics, and that they possess a number of useful normalization properties (in particular, derivations reduce to a normal form that enjoys a subformula property). We also discuss how to extend our systems to capture richer logics like (fragments of) LTL.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 15:53:56 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2008 14:34:59 GMT" } ]
2008-03-25T00:00:00
[ [ "Viganò", "Luca", "" ], [ "Volpe", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0803.3192
Denis Pallez
Denis Pallez (LIRIS), Philippe Collard (I3S), Thierry Baccino (LPEQ), Laurent Dumercy (LPEQ)
Eye-Tracking Evolutionary Algorithm to minimize user's fatigue in IEC applied to Interactive One-Max problem
null
Dans Proceedings of the 2007 GECCO conference companion on Genetic and evolutionary computation - GECCO '07: the 2007 GECCO conference companion on Genetic and evolutionary computation, London : Royaume-Uni (2007)
10.1145/1274000.1274098
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a new algorithm that consists in combining an eye-tracker for minimizing the fatigue of a user during the evaluation process of Interactive Evolutionary Computation. The approach is then applied to the Interactive One-Max optimization problem.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 16:11:38 GMT" } ]
2008-12-18T00:00:00
[ [ "Pallez", "Denis", "", "LIRIS" ], [ "Collard", "Philippe", "", "I3S" ], [ "Baccino", "Thierry", "", "LPEQ" ], [ "Dumercy", "Laurent", "", "LPEQ" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.3224
Michael Hahsler
Michael Hahsler
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
null
Michael Hahsler. A model-based frequency constraint for mining associations from transaction data. Data Mining and Knowledge Discovery, 13(2):137-166, September 2006
10.1007/s10618-005-0026-2
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an association, is used as the primary indicator of the associations's significance. A single user-specified support threshold is used to decided if associations should be further investigated. Support has some known problems with rare items, favors shorter itemsets and sometimes produces misleading associations. In this paper we develop a novel model-based frequency constraint as an alternative to a single, user-specified minimum support. The constraint utilizes knowledge of the process generating transaction data by applying a simple stochastic mixture model (the NB model) which allows for transaction data's typically highly skewed item frequency distribution. A user-specified precision threshold is used together with the model to find local frequency thresholds for groups of itemsets. Based on the constraint we develop the notion of NB-frequent itemsets and adapt a mining algorithm to find all NB-frequent itemsets in a database. In experiments with publicly available transaction databases we show that the new constraint provides improvements over a single minimum support threshold and that the precision threshold is more robust and easier to set and interpret by the user.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 20:39:53 GMT" } ]
2008-12-18T00:00:00
[ [ "Hahsler", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0803.3230
Avik Chaudhuri
Avik Chaudhuri, Prasad Naldurg, and Sriram Rajamani
A Type System for Data-Flow Integrity on Windows Vista
null
null
null
null
cs.CR cs.OS cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code can be blamed for any information-flow attack; thus, it is possible to eliminate such attacks by static analysis of trusted code. We formalize this model by designing a type system that can efficiently enforce data-flow integrity on Windows Vista. Typechecking guarantees that objects whose contents are statically trusted never contain untrusted values, regardless of what untrusted code runs in the environment. Some of Windows Vista's runtime access checks are necessary for soundness; others are redundant and can be optimized away.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 21:28:16 GMT" }, { "version": "v2", "created": "Thu, 8 May 2008 02:55:57 GMT" } ]
2008-12-18T00:00:00
[ [ "Chaudhuri", "Avik", "" ], [ "Naldurg", "Prasad", "" ], [ "Rajamani", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0803.3231
Grenville Croll
Victoria Lemieux
Archiving: The Overlooked Spreadsheet Risk
16 Pages. Recovered by OCR from paper conference proceedings
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 213-226 ISBN:1-902724-16-X
null
null
cs.SE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper maintains that archiving has been overlooked as a key spreadsheet internal control. The case of failed Jamaican commercial banks demonstrates how poor archiving can lead to weaknesses in spreadsheet control that contribute to operational risk. In addition, the Sarbanes-0xley Act contains a number of provisions that require tighter control over the archiving of spreadsheets. To mitigate operational risks and achieve compliance with the records-related provisions of Sarbanes-Oxley, the author argues that organisations should introduce records management programmes that provide control over the archiving of spreadsheets. At a minimum, spreadsheet archiving controls should identify and ensure compliance with retention requirements, support document production in the event of regulatory inquiries or litigation, and prevent unauthorised destruction of records.
[ { "version": "v1", "created": "Fri, 21 Mar 2008 21:35:40 GMT" } ]
2008-03-25T00:00:00
[ [ "Lemieux", "Victoria", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0803.3314
Igor V. Lerner
I. V. Lerner, I. V. Yurkevich A. S. Stepanenko and C. C. Constantinou
Loss Fluctuations and Temporal Correlations in Network Queues
6 pages, 2 figures; an invited talk at the 1st Workshop on Physics-Inspired Paradigms in Wireless Communications and Networks, April 4th, 2008, Berlin, Germany
null
null
null
cs.NI cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider data losses in a single node of a packet-switched Internet-like network. We employ two distinct models, one with discrete and the other with continuous one-dimensional random walks, representing the state of a queue in a router. Both models {have} a built-in critical behavior with {a sharp} transition from exponentially small to finite losses. It turns out that the finite capacity of a buffer and the packet-dropping procedure give rise to specific boundary conditions which lead to strong loss rate fluctuations at the critical point even in the absence of such fluctuations in the data arrival process.
[ { "version": "v1", "created": "Sun, 23 Mar 2008 11:05:23 GMT" } ]
2008-03-26T00:00:00
[ [ "Lerner", "I. V.", "" ], [ "Stepanenko", "I. V. Yurkevich A. S.", "" ], [ "Constantinou", "C. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0803.3338
Ganesh M. Narayan
Bhargava Kumar K, Ganesh M. Narayan, K. Gopinath
Performance Evaluation of Multiple TCP connections in iSCSI
10pt, 11 pages, two column, 15 figures
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies, 2007 - MSST '07
null
null
cs.NI cs.DC cs.OS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scaling data storage is a significant concern in enterprise systems and Storage Area Networks (SANs) are deployed as a means to scale enterprise storage. SANs based on Fibre Channel have been used extensively in the last decade while iSCSI is fast becoming a serious contender due to its reduced costs and unified infrastructure. This work examines the performance of iSCSI with multiple TCP connections. Multiple TCP connections are often used to realize higher bandwidth but there may be no fairness in how bandwidth is distributed. We propose a mechanism to share congestion information across multiple flows in ``Fair-TCP'' for improved performance. Our results show that Fair-TCP significantly improves the performance for I/O intensive workloads.
[ { "version": "v1", "created": "Sun, 23 Mar 2008 19:10:00 GMT" } ]
2008-12-18T00:00:00
[ [ "K", "Bhargava Kumar", "" ], [ "Narayan", "Ganesh M.", "" ], [ "Gopinath", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0803.3360
Guangyue Han
Guangyue Han, Brian Marcus
Asymptotics of input-constrained binary symmetric channel capacity
Published in at http://dx.doi.org/10.1214/08-AAP570 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2009, Vol. 19, No. 3, 1063-1091
10.1214/08-AAP570
IMS-AAP-AAP570
math.PR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the classical problem of noisy constrained capacity in the case of the binary symmetric channel (BSC), namely, the capacity of a BSC whose inputs are sequences chosen from a constrained set. Motivated by a result of Ordentlich and Weissman [In Proceedings of IEEE Information Theory Workshop (2004) 117--122], we derive an asymptotic formula (when the noise parameter is small) for the entropy rate of a hidden Markov chain, observed when a Markov chain passes through a BSC. Using this result, we establish an asymptotic formula for the capacity of a BSC with input process supported on an irreducible finite type constraint, as the noise parameter tends to zero.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 04:39:32 GMT" }, { "version": "v2", "created": "Mon, 29 Sep 2008 04:19:33 GMT" }, { "version": "v3", "created": "Mon, 10 Aug 2009 06:59:54 GMT" } ]
2009-08-10T00:00:00
[ [ "Han", "Guangyue", "" ], [ "Marcus", "Brian", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3363
Yoshiharu Maeno
Yoshiharu Maeno
Node discovery in a networked organization
null
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, October 2009
10.1109/ICSMC.2009.5346826
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, I present a method to solve a node discovery problem in a networked organization. Covert nodes refer to the nodes which are not observable directly. They affect social interactions, but do not appear in the surveillance logs which record the participants of the social interactions. Discovering the covert nodes is defined as identifying the suspicious logs where the covert nodes would appear if the covert nodes became overt. A mathematical model is developed for the maximal likelihood estimation of the network behind the social interactions and for the identification of the suspicious logs. Precision, recall, and F measure characteristics are demonstrated with the dataset generated from a real organization and the computationally synthesized datasets. The performance is close to the theoretical limit for any covert nodes in the networks of any topologies and sizes if the ratio of the number of observation to the number of possible communication patterns is large.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 05:53:39 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 05:13:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Maeno", "Yoshiharu", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.3394
Grenville Croll
Patrick O'Beirne
Facing the Facts
7 pages, 1 table, 1 figure
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 209-214 ISBN 978-905617-58-6
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human error research on overconfidence supports the benefits of early visibility of defects and disciplined development. If risk to the enterprise is to be reduced, individuals need to become aware of the reality of the quality of their work. Several cycles of inspection and defect removal are inevitable. Software Quality Management measurements of defect density and removal efficiency are applicable. Research of actual spreadsheet error rates shows data consistent with other software depending on the extent to which the work product was reviewed before inspection. The paper argues that the payback for an investment in early review time is justified by the saving in project delay and expensive errors in use. 'If debugging is the process of removing bugs, then programming must be the process of putting them in' - Anon.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 12:01:16 GMT" } ]
2008-03-25T00:00:00
[ [ "O'Beirne", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0803.3404
Wesley Calvert
Wesley Calvert and John E. Porter
Some results on $\mathbb{R}$-computable structures
null
null
null
null
cs.DB cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This survey paper examines the effective model theory obtained with the BSS model of real number computation. It treats the following topics: computable ordinals, satisfaction of computable infinitary formulas, forcing as a construction technique, effective categoricity, effective topology, and relations with other models for the effective theory of uncountable structures.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 13:59:53 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 17:03:07 GMT" } ]
2009-06-09T00:00:00
[ [ "Calvert", "Wesley", "" ], [ "Porter", "John E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0803.3419
David Sevilla
John McKay, David Sevilla
Decomposing replicable functions
25 pages, 2 data tables; to be published in LMS Journal of Computation and Mathematics. v2: page format adjustment
LMS Journal of Computation and Mathematics 11 (June 2008), p. 146-171. ISSN 1461-1570.
null
null
math.NT cs.SC math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm to decompose rational functions from which we determine the poset of groups fixing these functions.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 16:02:26 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2008 07:18:19 GMT" } ]
2008-08-21T00:00:00
[ [ "McKay", "John", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0803.3422
Sergey Dorogovtsev
S. N. Dorogovtsev, J. F. F. Mendes, A. N. Samukhin, A. Y. Zyuzin
Organization of modular networks
9 pages, 3 figures
Phys. Rev. E 78, 056106 (2008)
10.1103/PhysRevE.78.056106
null
cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the global organization of heterogeneous equilibrium networks consisting of a number of well distinguished interconnected parts--``communities'' or modules. We develop an analytical approach allowing us to obtain the statistics of connected components and an intervertex distance distribution in these modular networks, and to describe their global organization and structure. In particular, we study the evolution of the intervertex distance distribution with an increasing number of interlinks connecting two infinitely large uncorrelated networks. We demonstrate that even a relatively small number of shortcuts unite the networks into one. In more precise terms, if the number of the interlinks is any finite fraction of the total number of connections, then the intervertex distance distribution approaches a delta-function peaked form, and so the network is united.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 16:20:12 GMT" }, { "version": "v2", "created": "Mon, 24 Mar 2008 20:42:46 GMT" } ]
2009-11-13T00:00:00
[ [ "Dorogovtsev", "S. N.", "" ], [ "Mendes", "J. F. F.", "" ], [ "Samukhin", "A. N.", "" ], [ "Zyuzin", "A. Y.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0803.3435
Tomas Rokicki
Tomas Rokicki
Twenty-Five Moves Suffice for Rubik's Cube
null
null
null
null
cs.SC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How many moves does it take to solve Rubik's Cube? Positions are known that require 20 moves, and it has already been shown that there are no positions that require 27 or more moves; this is a surprisingly large gap. This paper describes a program that is able to find solutions of length 20 or less at a rate of more than 16 million positions a second. We use this program, along with some new ideas and incremental improvements in other techniques, to show that there is no position that requires 26 moves.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 19:37:09 GMT" } ]
2008-03-25T00:00:00
[ [ "Rokicki", "Tomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.3448
Salah A. Aly
Esam Mlaih, Salah A. Aly
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
null
Proc. 2nd IEEE MCN'08 workshop in conj. with Infocom'08, Phoenix, AZ, 2008
10.1109/INFOCOM.2008.4544601
null
cs.CR cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-to-end, each of which has its own encryption schemes considering different security primitives. End-to-end encrypted data aggregation protocols introduce maximum data secrecy with in-efficient data aggregation and more vulnerability to active attacks, while hop-by-hop data aggregation protocols introduce maximum data integrity with efficient data aggregation and more vulnerability to passive attacks. In this paper, we propose a secure aggregation protocol for aggregated WSNs deployed in hostile environments in which dual attack modes are present. Our proposed protocol is a blend of flexible data aggregation as in hop-by-hop protocols and optimal data confidentiality as in end-to-end protocols. Our protocol introduces an efficient O(1) heuristic for checking data integrity along with cost-effective heuristic-based divide and conquer attestation process which is $O(\ln{n})$ in average -O(n) in the worst scenario- for further verification of aggregated results.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 18:08:03 GMT" } ]
2016-11-18T00:00:00
[ [ "Mlaih", "Esam", "" ], [ "Aly", "Salah A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3455
Marc Lelarge
Marc Lelarge and Jean Bolot
A Local Mean Field Analysis of Security Investments in Networks
Proofs added
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network externalities. Our goal in this paper is to carefully model and quantify the impact of such externalities on the investment in, and deployment of, security features and protocols in a network. Specifically, we study a network of interconnected agents, which are subject to epidemic risks such as those caused by propagating viruses and worms, and which can decide whether or not to invest some amount to self-protect and deploy security solutions. We make three contributions in the paper. First, we introduce a general model which combines an epidemic propagation model with an economic model for agents which captures network effects and externalities. Second, borrowing ideas and techniques used in statistical physics, we introduce a Local Mean Field (LMF) model, which extends the standard mean-field approximation to take into account the correlation structure on local neighborhoods. Third, we solve the LMF model in a network with externalities, and we derive analytic solutions for sparse random graphs, for which we obtain asymptotic results. We explicitly identify the impact of network externalities on the decision to invest in and deploy security features. In other words, we identify both the economic and network properties that determine the adoption of security technologies.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 18:29:17 GMT" }, { "version": "v2", "created": "Thu, 19 Jun 2008 09:59:52 GMT" } ]
2008-06-19T00:00:00
[ [ "Lelarge", "Marc", "" ], [ "Bolot", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.3459
Franklin Marquezino
F.L. Marquezino, R. Portugal
The QWalk Simulator of Quantum Walks
21 pages, 11 figures. Accepted in Computer Physics Communications. Simulator can be downloaded from http://qubit.lncc.br/qwalk
Computer Physics Communications, Volume 179, Issue 5, Pages 359-369. (2008)
10.1016/j.cpc.2008.02.019
null
quant-ph cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several research groups are giving special attention to quantum walks recently, because this research area have been used with success in the development of new efficient quantum algorithms. A general simulator of quantum walks is very important for the development of this area, since it allows the researchers to focus on the mathematical and physical aspects of the research instead of deviating the efforts to the implementation of specific numerical simulations. In this paper we present QWalk, a quantum walk simulator for one- and two-dimensional lattices. Finite two-dimensional lattices with generic topologies can be used. Decoherence can be simulated by performing measurements or by breaking links of the lattice. We use examples to explain the usage of the software and to show some recent results of the literature that are easily reproduced by the simulator.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 20:25:49 GMT" } ]
2012-05-18T00:00:00
[ [ "Marquezino", "F. L.", "" ], [ "Portugal", "R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0803.3482
Tad Hogg
Tad Hogg and Gabor Szabo
Diversity of Online Community Activities
14 pages
null
10.1209/0295-5075/86/38003
null
cs.CY cs.HC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web sites where users create and rate content as well as form networks with other users display long-tailed distributions in many aspects of behavior. Using behavior on one such community site, Essembly, we propose and evaluate plausible mechanisms to explain these behaviors. Unlike purely descriptive models, these mechanisms rely on user behaviors based on information available locally to each user. For Essembly, we find the long-tails arise from large differences among user activity rates and qualities of the rated content, as well as the extensive variability in the time users devote to the site. We show that the models not only explain overall behavior but also allow estimating the quality of content from their early behaviors.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 00:23:05 GMT" } ]
2015-05-13T00:00:00
[ [ "Hogg", "Tad", "" ], [ "Szabo", "Gabor", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0803.3490
Huan Xu Mr.
Huan Xu, Constantine Caramanis and Shie Mannor
Robustness and Regularization of Support Vector Machines
null
Journal of Machine Learning Research, vol 10, 1485-1510, year 2009
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider regularized support vector machines (SVMs) and show that they are precisely equivalent to a new robust optimization formulation. We show that this equivalence of robust optimization and regularization has implications for both algorithms, and analysis. In terms of algorithms, the equivalence suggests more general SVM-like algorithms for classification that explicitly build in protection to noise, and at the same time control overfitting. On the analysis front, the equivalence of robustness and regularization, provides a robust optimization interpretation for the success of regularized SVMs. We use the this new robustness interpretation of SVMs to give a new proof of consistency of (kernelized) SVMs, thus establishing robustness as the reason regularized SVMs generalize well.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 03:51:59 GMT" }, { "version": "v2", "created": "Tue, 11 Nov 2008 22:36:47 GMT" } ]
2010-02-25T00:00:00
[ [ "Xu", "Huan", "" ], [ "Caramanis", "Constantine", "" ], [ "Mannor", "Shie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.3501
Fahem Kebair
Fahem Kebair (LITIS), Fr\'ed\'eric Serin (LITIS)
Multiagent Approach for the Representation of Information in a Decision Support System
null
Multiagent Approach for the Representation of Information in a Decision Support System, Springer Berlin / Heidelberg (Ed.) (2006) 98-107
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an emergency situation, the actors need an assistance allowing them to react swiftly and efficiently. In this prospect, we present in this paper a decision support system that aims to prepare actors in a crisis situation thanks to a decision-making support. The global architecture of this system is presented in the first part. Then we focus on a part of this system which is designed to represent the information of the current situation. This part is composed of a multiagent system that is made of factual agents. Each agent carries a semantic feature and aims to represent a partial part of a situation. The agents develop thanks to their interactions by comparing their semantic features using proximity measures and according to specific ontologies.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 07:43:36 GMT" } ]
2008-12-18T00:00:00
[ [ "Kebair", "Fahem", "", "LITIS" ], [ "Serin", "Frédéric", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.3515
Mahesh Pal Dr.
V. K. Bansal and Mahesh Pal
Geographic Information Systems in Evaluation and Visualization of Construction Schedule
Presented in Second ESRI Asia-Pacific User Conference New Delhi, 2007
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Commercially available scheduling tools such as Primavera and Microsoft Project fail to provide information pertaining to the spatial aspects of construction project. A methodology using geographical information systems (GIS) is developed to represent spatial aspects of the construction progress graphically by synchronizing it with construction schedule. The spatial aspects are depicted by 3D model developed in AutoCAD and construction schedule is generated using Microsoft Excel. Spatial and scheduling information are linked together into the GIS environment (ArcGIS). The GIS-based system developed in this study may help in better understanding the schedule along with its spatial aspects.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 09:27:44 GMT" } ]
2008-03-26T00:00:00
[ [ "Bansal", "V. K.", "" ], [ "Pal", "Mahesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0803.3531
Daniel Raible
Daniel Raible and Henning Fernau
A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach
null
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In {\sc MaxSat}, we ask for an assignment which satisfies the maximum number of clauses for a boolean formula in CNF. We present an algorithm yielding a run time upper bound of $O^*(2^{\frac{1}{6.2158}})$ for {\sc Max-2-Sat} (each clause contains at most 2 literals), where $K$ is the number of clauses. The run time has been achieved by using heuristic priorities on the choice of the variable on which we branch. The implementation of these heuristic priorities is rather simple, though they have a significant effect on the run time. The analysis is done using a tailored non-standard measure.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 11:32:22 GMT" }, { "version": "v2", "created": "Mon, 7 Apr 2008 08:36:18 GMT" } ]
2008-12-18T00:00:00
[ [ "Raible", "Daniel", "" ], [ "Fernau", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.3539
Michael Fairbank Mr
Michael Fairbank
Reinforcement Learning by Value Gradients
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of the value-gradient is introduced and developed in the context of reinforcement learning. It is shown that by learning the value-gradients exploration or stochastic behaviour is no longer needed to find locally optimal trajectories. This is the main motivation for using value-gradients, and it is argued that learning value-gradients is the actual objective of any value-function learning algorithm for control problems. It is also argued that learning value-gradients is significantly more efficient than learning just the values, and this argument is supported in experiments by efficiency gains of several orders of magnitude, in several problem domains. Once value-gradients are introduced into learning, several analyses become possible. For example, a surprising equivalence between a value-gradient learning algorithm and a policy-gradient learning algorithm is proven, and this provides a robust convergence proof for control problems using a value function with a general function approximator.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 11:57:15 GMT" } ]
2008-03-26T00:00:00
[ [ "Fairbank", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.3553
Carl Bracken
Carl Bracken
New Families of Triple Error Correcting Codes with BCH Parameters
11 pages. Submitted to IEEE Transactions on information Theory
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discovered by Bose, Chaudhuri and Hocquenghem, the BCH family of error correcting codes are one of the most studied families in coding theory. They are also among the best performing codes, particularly when the number of errors being corrected is small relative to the code length. In this article we consider binary codes with minimum distance of 7. We construct new families of codes with these BCH parameters via a generalisation of the Kasami-Welch Theorem.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 13:08:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Bracken", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3608
Benjamin Allen
Benjamin Allen
The Category-Theoretic Arithmetic of Information
v3: Changed presentation and incorporated reviewers' suggestions
null
null
null
math.CT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We highlight the underlying category-theoretic structure of measures of information flow. We present an axiomatic framework in which communication systems are represented as morphisms, and information flow is characterized by its behavior when communication systems are combined. Our framework includes a variety of discrete, continuous, and, conjecturally, quantum information measures. It also includes some familiar mathematical constructs not normally associated with information, such as vector space dimension. We discuss these examples and prove basic results from the axioms.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 18:57:14 GMT" }, { "version": "v2", "created": "Wed, 26 Mar 2008 15:16:17 GMT" }, { "version": "v3", "created": "Mon, 21 Jul 2008 18:05:21 GMT" } ]
2008-07-21T00:00:00
[ [ "Allen", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3632
Mikhail Nesterenko
Mikhail Nesterenko, Adnan Vora
Void Traversal for Guaranteed Delivery in Geometric Routing
null
The 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), Washington, DC, November, 2005
10.1109/MAHSS.2005.1542862
null
cs.OS cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorithms run on planar graphs only. To efficiently construct a planar graph, they require a unit-disk graph. To make the topology unit-disk, the maximum link length in the network has to be selected conservatively. In practical setting this leads to the designs where the node density is rather high. Moreover, the network diameter of a planar subgraph is greater than the original graph, which leads to longer routes. To remedy this problem, we propose a void traversal algorithm that works on arbitrary geometric graphs. We describe how to use this algorithm for geometric routing with guaranteed delivery and compare its performance with GFG.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 20:52:17 GMT" } ]
2016-11-15T00:00:00
[ [ "Nesterenko", "Mikhail", "" ], [ "Vora", "Adnan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.3642
Hariharan Narayanan
Hariharan Narayanan
Distributed Averaging in the presence of a Sparse Cut
8 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the question of averaging on a graph that has one sparse cut separating two subgraphs that are internally well connected. While there has been a large body of work devoted to algorithms for distributed averaging, nearly all algorithms involve only {\it convex} updates. In this paper, we suggest that {\it non-convex} updates can lead to significant improvements. We do so by exhibiting a decentralized algorithm for graphs with one sparse cut that uses non-convex averages and has an averaging time that can be significantly smaller than the averaging time of known distributed algorithms, such as those of \cite{tsitsiklis, Boyd}. We use stochastic dominance to prove this result in a way that may be of independent interest.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 22:04:50 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2008 01:47:20 GMT" }, { "version": "v3", "created": "Wed, 30 Apr 2008 23:33:40 GMT" } ]
2008-05-01T00:00:00
[ [ "Narayanan", "Hariharan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0803.3645
Ali Nazari
Ali Nazari, Sandeep Pradhan, Achilleas Anastasopoulos
A New Sphere-Packing Bound for Maximal Error Exponent for Multiple-Access Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a new lower bound for the maximal error probability of a two-user discrete memoryless (DM) multiple-access channel (MAC) is derived. This is the first bound of this type that explicitly imposes independence of the users' input distributions (conditioned on the time-sharing auxiliary variable) and thus results in a tighter sphere-packing exponent when compared to the tightest known exponent derived by Haroutunian.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 23:05:39 GMT" } ]
2008-03-27T00:00:00
[ [ "Nazari", "Ali", "" ], [ "Pradhan", "Sandeep", "" ], [ "Anastasopoulos", "Achilleas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3657
Yeow Meng Chee
Yeow Meng Chee and San Ling
Improved Lower Bounds for Constant GC-Content DNA Codes
4 pages
IEEE Transactions on Information Theory, vol. 54, no. 1, pp. 391-394, 2008
10.1109/TIT.2007.911167
null
cs.IT cs.DS math.CO math.IT q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of large libraries of oligonucleotides having constant GC-content and satisfying Hamming distance constraints between oligonucleotides and their Watson-Crick complements is important in reducing hybridization errors in DNA computing, DNA microarray technologies, and molecular bar coding. Various techniques have been studied for the construction of such oligonucleotide libraries, ranging from algorithmic constructions via stochastic local search to theoretical constructions via coding theory. We introduce a new stochastic local search method which yields improvements up to more than one third of the benchmark lower bounds of Gaborit and King (2005) for n-mer oligonucleotide libraries when n <= 14. We also found several optimal libraries by computing maximum cliques on certain graphs.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 02:26:36 GMT" } ]
2008-03-27T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ling", "San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0803.3658
Yeow Meng Chee
Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, and San Ling
The Sizes of Optimal q-Ary Codes of Weight Three and Distance Four: A Complete Solution
5 pages
IEEE Transactions on Information Theory, vol. 54, no. 3, pp. 1291-1295, 2008
10.1109/TIT.2007.915885
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This correspondence introduces two new constructive techniques to complete the determination of the sizes of optimal q-ary codes of constant weight three and distance four.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 02:33:51 GMT" } ]
2008-03-27T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Dau", "Son Hoang", "" ], [ "Ling", "Alan C. H.", "" ], [ "Ling", "San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3670
Mathew Francis
L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan
On the cubicity of AT-free graphs and circular-arc graphs
9 pages, 0 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A unit cube in $k$ dimensions ($k$-cube) is defined as the the Cartesian product $R_1\times R_2\times...\times R_k$ where $R_i$(for $1\leq i\leq k$) is a closed interval of the form $[a_i,a_i+1]$ on the real line. A graph $G$ on $n$ nodes is said to be representable as the intersection of $k$-cubes (cube representation in $k$ dimensions) if each vertex of $G$ can be mapped to a $k$-cube such that two vertices are adjacent in $G$ if and only if their corresponding $k$-cubes have a non-empty intersection. The \emph{cubicity} of $G$ denoted as $\cubi(G)$ is the minimum $k$ for which $G$ can be represented as the intersection of $k$-cubes. We give an $O(bw\cdot n)$ algorithm to compute the cube representation of a general graph $G$ in $bw+1$ dimensions given a bandwidth ordering of the vertices of $G$, where $bw$ is the \emph{bandwidth} of $G$. As a consequence, we get $O(\Delta)$ upper bounds on the cubicity of many well-known graph classes such as AT-free graphs, circular-arc graphs and co-comparability graphs which have $O(\Delta)$ bandwidth. Thus we have: 1) $\cubi(G)\leq 3\Delta-1$, if $G$ is an AT-free graph. 2) $\cubi(G)\leq 2\Delta+1$, if $G$ is a circular-arc graph. 3) $\cubi(G)\leq 2\Delta$, if $G$ is a co-comparability graph. Also for these graph classes, there are constant factor approximation algorithms for bandwidth computation that generate orderings of vertices with $O(\Delta)$ width. We can thus generate the cube representation of such graphs in $O(\Delta)$ dimensions in polynomial time.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 07:11:20 GMT" } ]
2008-03-27T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Francis", "Mathew C.", "" ], [ "Sivadasan", "Naveen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.3693
Rasmus Pagh
Martin Dietzfelbinger and Rasmus Pagh
Succinct Data Structures for Retrieval and Approximate Membership
null
null
null
null
cs.DS cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The retrieval problem is the problem of associating data with keys in a set. Formally, the data structure must store a function f: U ->{0,1}^r that has specified values on the elements of a given set S, a subset of U, |S|=n, but may have any value on elements outside S. Minimal perfect hashing makes it possible to avoid storing the set S, but this induces a space overhead of Theta(n) bits in addition to the nr bits needed for function values. In this paper we show how to eliminate this overhead. Moreover, we show that for any k query time O(k) can be achieved using space that is within a factor 1+e^{-k} of optimal, asymptotically for large n. If we allow logarithmic evaluation time, the additive overhead can be reduced to O(log log n) bits whp. The time to construct the data structure is O(n), expected. A main technical ingredient is to utilize existing tight bounds on the probability of almost square random matrices with rows of low weight to have full row rank. In addition to direct constructions, we point out a close connection between retrieval structures and hash tables where keys are stored in an array and some kind of probing scheme is used. Further, we propose a general reduction that transfers the results on retrieval into analogous results on approximate membership, a problem traditionally addressed using Bloom filters. Again, we show how to eliminate the space overhead present in previously known methods, and get arbitrarily close to the lower bound. The evaluation procedures of our data structures are extremely simple (similar to a Bloom filter). For the results stated above we assume free access to fully random hash functions. However, we show how to justify this assumption using extra space o(n) to simulate full randomness on a RAM.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 10:53:49 GMT" } ]
2008-03-27T00:00:00
[ [ "Dietzfelbinger", "Martin", "" ], [ "Pagh", "Rasmus", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0803.3742
Costas Constantinou
C. C. Constantinou and A. S. Stepanenko
Network protocol scalability via a topological Kadanoff transformation
4 pages, 5 figures, PhysComNet 2008 workshop submission
null
null
null
cs.NI cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A natural hierarchical framework for network topology abstraction is presented based on an analogy with the Kadanoff transformation and renormalisation group in theoretical physics. Some properties of the renormalisation group bear similarities to the scalability properties of network routing protocols (interactions). Central to our abstraction are two intimately connected and complementary path diversity units: simple cycles, and cycle adjacencies. A recursive network abstraction procedure is presented, together with an associated generic recursive routing protocol family that offers many desirable features.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 14:59:38 GMT" } ]
2008-03-27T00:00:00
[ [ "Constantinou", "C. C.", "" ], [ "Stepanenko", "A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0803.3746
Leonid Litinskii
Leonid B. Litinskii
Cluster Approach to the Domains Formation
11 pages, 5 figures, PDF-file
Optical Memory & Neural Networks (Information Optics), 2007, v.16(3) pp.144-153
null
null
cs.NE cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a rule, a quadratic functional depending on a great number of binary variables has a lot of local minima. One of approaches allowing one to find in averaged deeper local minima is aggregation of binary variables into larger blocks/domains. To minimize the functional one has to change the states of aggregated variables (domains). In the present publication we discuss methods of domains formation. It is shown that the best results are obtained when domains are formed by variables that are strongly connected with each other.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 15:14:33 GMT" } ]
2008-03-27T00:00:00
[ [ "Litinskii", "Leonid B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.3773
Rafael Wyrembelski
Rafael F. Wyrembelski, Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr, Holger Boche
Capacity of Gaussian MIMO Bidirectional Broadcast Channels
Proc. IEEE International Symposium on Information Theory (ISIT 2008), Toronto, Canada, July 2008
null
10.1109/ISIT.2008.4595053
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the broadcast phase of a three-node network, where a relay node establishes a bidirectional communication between two nodes using a spectrally efficient two-phase decode-and-forward protocol. In the first phase the two nodes transmit their messages to the relay node. Then the relay node decodes the messages and broadcasts a re-encoded composition of them in the second phase. We consider Gaussian MIMO channels and determine the capacity region for the second phase which we call the Gaussian MIMO bidirectional broadcast channel.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 17:22:34 GMT" }, { "version": "v2", "created": "Wed, 30 Apr 2008 14:01:00 GMT" } ]
2011-04-19T00:00:00
[ [ "Wyrembelski", "Rafael F.", "" ], [ "Oechtering", "Tobias J.", "" ], [ "Bjelakovic", "Igor", "" ], [ "Schnurr", "Clemens", "" ], [ "Boche", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3777
Vitaly Skachek
Vitaly Skachek and Mark F. Flanagan
Lower Bounds on the Minimum Pseudodistance for Linear Codes with $q$-ary PSK Modulation over AWGN
6 pages, Proceedings 5-th International Symposium on Turbo Codes & related topics
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present lower bounds on the minimum pseudocodeword effective Euclidean distance (or minimum "pseudodistance") for coded modulation systems using linear codes with $q$-ary phase-shift keying (PSK) modulation over the additive white Gaussian noise (AWGN) channel. These bounds apply to both binary and nonbinary coded modulation systems which use direct modulation mapping of coded symbols. The minimum pseudodistance may serve as a first-order measure of error-correcting performance for both linear-programming and message-passing based receivers. In the case of a linear-programming based receiver, the minimum pseudodistance may be used to form an exact bound on the codeword error rate of the system.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 17:28:46 GMT" }, { "version": "v2", "created": "Thu, 12 Jun 2008 18:01:07 GMT" } ]
2008-06-12T00:00:00
[ [ "Skachek", "Vitaly", "" ], [ "Flanagan", "Mark F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3781
Carl Bracken
Carl Bracken, Eimear Byrne, Nadya Markin and Gary McGuire
Fourier Spectra of Binomial APN Functions
20 pages. Submitted to the SIAM Journal on Discrete Mathematics
null
null
null
cs.DM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we compute the Fourier spectra of some recently discovered binomial APN functions. One consequence of this is the determination of the nonlinearity of the functions, which measures their resistance to linear cryptanalysis. Another consequence is that certain error-correcting codes related to these functions have the same weight distribution as the 2-error-correcting BCH code. Furthermore, for fields of odd degree, our results provide an alternative proof of the APN property of the functions.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 17:51:20 GMT" } ]
2008-12-18T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Byrne", "Eimear", "" ], [ "Markin", "Nadya", "" ], [ "McGuire", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3796
Franck van Breugel
Franck van Breugel, Babita Sharma, James Worrell
Approximating a Behavioural Pseudometric without Discount for<br> Probabilistic Systems
null
Logical Methods in Computer Science, Volume 4, Issue 2 (April 9, 2008) lmcs:822
10.2168/LMCS-4(2:2)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Desharnais, Gupta, Jagadeesan and Panangaden introduced a family of behavioural pseudometrics for probabilistic transition systems. These pseudometrics are a quantitative analogue of probabilistic bisimilarity. Distance zero captures probabilistic bisimilarity. Each pseudometric has a discount factor, a real number in the interval (0, 1]. The smaller the discount factor, the more the future is discounted. If the discount factor is one, then the future is not discounted at all. Desharnais et al. showed that the behavioural distances can be calculated up to any desired degree of accuracy if the discount factor is smaller than one. In this paper, we show that the distances can also be approximated if the future is not discounted. A key ingredient of our algorithm is Tarski's decision procedure for the first order theory over real closed fields. By exploiting the Kantorovich-Rubinstein duality theorem we can restrict to the existential fragment for which more efficient decision procedures exist.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 19:08:40 GMT" }, { "version": "v2", "created": "Wed, 26 Mar 2008 20:02:18 GMT" }, { "version": "v3", "created": "Wed, 9 Apr 2008 14:23:31 GMT" } ]
2015-07-01T00:00:00
[ [ "van Breugel", "Franck", "" ], [ "Sharma", "Babita", "" ], [ "Worrell", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0803.3812
Juan Carlos Nieves
Juan Carlos Nieves, Mauricio Osorio, Ulises Cort\'es
Preferred extensions as stable models
17 pages, 2 Figures; to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an argumentation framework AF, we introduce a mapping function that constructs a disjunctive logic program P, such that the preferred extensions of AF correspond to the stable models of P, after intersecting each stable model with the relevant atoms. The given mapping function is of polynomial size w.r.t. AF. In particular, we identify that there is a direct relationship between the minimal models of a propositional formula and the preferred extensions of an argumentation framework by working on representing the defeated arguments. Then we show how to infer the preferred extensions of an argumentation framework by using UNSAT algorithms and disjunctive stable model solvers. The relevance of this result is that we define a direct relationship between one of the most satisfactory argumentation semantics and one of the most successful approach of non-monotonic reasoning i.e., logic programming with the stable model semantics.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 20:08:31 GMT" } ]
2008-12-18T00:00:00
[ [ "Nieves", "Juan Carlos", "" ], [ "Osorio", "Mauricio", "" ], [ "Cortés", "Ulises", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0803.3816
Syed Jafar
Krishna Gomadam, Viveck R. Cadambe, Syed A. Jafar
Approaching the Capacity of Wireless Networks through Distributed Interference Alignment
10 pages 2 columns
IEEE Transactions on Information Theory, Vol. 57, No. 6, June, 2011, Pages: 3309-3322
10.1109/GLOCOM.2008.ECP.817
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to which interference can be aligned over a finite number of signalling dimensions remains unknown. Another important concern for interference alignment schemes is the requirement of global channel knowledge. In this work we provide examples of iterative algorithms that utilize the reciprocity of wireless networks to achieve interference alignment with only local channel knowledge at each node. These algorithms also provide numerical insights into the feasibility of interference alignment that are not yet available in theory.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 20:32:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Gomadam", "Krishna", "" ], [ "Cadambe", "Viveck R.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3838
Ted Dunning
Ted Dunning
Recorded Step Directional Mutation for Faster Convergence
15 pages, 4 figures, presented at EP-98
null
null
null
cs.NE cs.LG
http://creativecommons.org/licenses/by/3.0/
Two meta-evolutionary optimization strategies described in this paper accelerate the convergence of evolutionary programming algorithms while still retaining much of their ability to deal with multi-modal problems. The strategies, called directional mutation and recorded step in this paper, can operate independently but together they greatly enhance the ability of evolutionary programming algorithms to deal with fitness landscapes characterized by long narrow valleys. The directional mutation aspect of this combined method uses correlated meta-mutation but does not introduce a full covariance matrix. These new methods are thus much more economical in terms of storage for problems with high dimensionality. Additionally, directional mutation is rotationally invariant which is a substantial advantage over self-adaptive methods which use a single variance per coordinate for problems where the natural orientation of the problem is not oriented along the axes.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 22:49:40 GMT" }, { "version": "v2", "created": "Thu, 26 Mar 2009 20:37:59 GMT" } ]
2009-03-26T00:00:00
[ [ "Dunning", "Ted", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0803.3850
Alex Leong
Alex S. Leong, Subhrakanti Dey, and Jamie S. Evans
State Estimation Over Wireless Channels Using Multiple Sensors: Asymptotic Behaviour and Optimal Power Allocation
25 pages, 6 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers state estimation of linear systems using analog amplify and forwarding with multiple sensors, for both multiple access and orthogonal access schemes. Optimal state estimation can be achieved at the fusion center using a time varying Kalman filter. We show that in many situations, the estimation error covariance decays at a rate of $1/M$ when the number of sensors $M$ is large. We consider optimal allocation of transmission powers that 1) minimizes the sum power usage subject to an error covariance constraint and 2) minimizes the error covariance subject to a sum power constraint. In the case of fading channels with channel state information the optimization problems are solved using a greedy approach, while for fading channels without channel state information but with channel statistics available a sub-optimal linear estimator is derived.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 01:41:06 GMT" }, { "version": "v2", "created": "Thu, 11 Jun 2009 06:59:21 GMT" } ]
2009-06-11T00:00:00
[ [ "Leong", "Alex S.", "" ], [ "Dey", "Subhrakanti", "" ], [ "Evans", "Jamie S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3880
Pedro Comesa\~na
P. Comesa\~na, N. Merhav and M. Barni
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
20 pages, 7 Postscript figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false-negative error exponent subject to a guaranteed false-positive error exponent. In particular, Merhav and Sabbag derived universal asymptotically optimum embedding and detection rules under the assumption that the detector relies solely on second order joint empirical statistics of the received signal and the watermark. In the case of a Gaussian host signal and a Gaussian attack, however, closed-form expressions for the optimum embedding strategy and the false-negative error exponent were not obtained in that work. In this paper, we derive such expressions, again, under the universality assumption that neither the host variance nor the attack power are known to either the embedder or the detector. The optimum embedding rule turns out to be very simple and with an intuitively-appealing geometrical interpretation. The improvement with respect to existing sub-optimum schemes is demonstrated by displaying the optimum false-negative error exponent as a function of the guaranteed false-positive error exponent.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 10:17:49 GMT" } ]
2008-03-28T00:00:00
[ [ "Comesaña", "P.", "" ], [ "Merhav", "N.", "" ], [ "Barni", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.3900
Uwe Aickelin
Jingpeng Li, Uwe Aickelin and Edmund Burke
A Component Based Heuristic Search method with Adaptive Perturbations for Hospital Personnel Scheduling
null
Technical Report NOTTCS-TR-2007-4, University of Nottingham, UK,, 2006
null
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with adaptive perturbations, for a nurse scheduling problem arising at a major UK hospital. The main idea behind this technique is to decompose a schedule into its components (i.e. the allocated shift pattern of each nurse), and then mimic a natural evolutionary process on these components to iteratively deliver better schedules. The worthiness of all components in the schedule has to be continuously demonstrated in order for them to remain there. This demonstration employs a dynamic evaluation function which evaluates how well each component contributes towards the final objective. Two perturbation steps are then applied: the first perturbation eliminates a number of components that are deemed not worthy to stay in the current schedule; the second perturbation may also throw out, with a low level of probability, some worthy components. The eliminated components are replenished with new ones using a set of constructive heuristics using local optimality criteria. Computational results using 52 data instances demonstrate the applicability of the proposed approach in solving real-world problems.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 12:15:43 GMT" } ]
2010-07-05T00:00:00
[ [ "Li", "Jingpeng", "" ], [ "Aickelin", "Uwe", "" ], [ "Burke", "Edmund", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0803.3905
Uwe Aickelin
Peer-Olaf Siebers and Uwe Aickelin
Introduction to Multi-Agent Simulation
null
Encyclopaedia of Decision Making and Decision Support Technologies, 554-564, 2008
null
null
cs.NE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When designing systems that are complex, dynamic and stochastic in nature, simulation is generally recognised as one of the best design support technologies, and a valuable aid in the strategic and tactical decision making process. A simulation model consists of a set of rules that define how a system changes over time, given its current state. Unlike analytical models, a simulation model is not solved but is run and the changes of system states can be observed at any point in time. This provides an insight into system dynamics rather than just predicting the output of a system based on specific inputs. Simulation is not a decision making tool but a decision support tool, allowing better informed decisions to be made. Due to the complexity of the real world, a simulation model can only be an approximation of the target system. The essence of the art of simulation modelling is abstraction and simplification. Only those characteristics that are important for the study and analysis of the target system should be included in the simulation model.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 12:38:17 GMT" } ]
2013-05-30T00:00:00
[ [ "Siebers", "Peer-Olaf", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.3912
Uwe Aickelin
Uwe Aickelin and Dipankar Dasgupta
Artificial Immune Systems Tutorial
null
null
null
null
cs.NE cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years. A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 12:55:59 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Dasgupta", "Dipankar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0803.3946
Adam Smith
Shiva Prasad Kasiviswanathan and Adam Smith
On the `Semantics' of Differential Privacy: A Bayesian Formulation
Older version of this paper was titled: "A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information"
Journal of Privacy and Confidentiality, 6 (1), 2014
10.29012/jpc.v6i1.634
null
cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential privacy is a definition of "privacy'" for algorithms that analyze and publish information about statistical databases. It is often claimed that differential privacy provides guarantees against adversaries with arbitrary side information. In this paper, we provide a precise formulation of these guarantees in terms of the inferences drawn by a Bayesian adversary. We show that this formulation is satisfied by both "vanilla" differential privacy as well as a relaxation known as (epsilon,delta)-differential privacy. Our formulation follows the ideas originally due to Dwork and McSherry [Dwork 2006]. This paper is, to our knowledge, the first place such a formulation appears explicitly. The analysis of the relaxed definition is new to this paper, and provides some concrete guidance for setting parameters when using (epsilon,delta)-differential privacy.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 15:00:45 GMT" }, { "version": "v2", "created": "Sat, 21 Sep 2013 00:15:57 GMT" }, { "version": "v3", "created": "Tue, 22 Dec 2015 20:58:26 GMT" }, { "version": "v4", "created": "Mon, 23 Jan 2023 03:31:32 GMT" } ]
2023-01-24T00:00:00
[ [ "Kasiviswanathan", "Shiva Prasad", "" ], [ "Smith", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0803.3969
Alban Ponse
Jan A. Bergstra and Inge Bethke and Alban Ponse
Cancellation Meadows: a Generic Basis Theorem and Some Applications
24 pages, 6 tables; Inge Bethke is added as an extra author; new title (previous title: A Generic Basis Theorem for Cancellation Meadows)
The Computer Journal 56(1): 3-14, 2013
10.1093/comjnl/bxs028
null
math.RA cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let Q_0 denote the rational numbers expanded to a "meadow", that is, after taking its zero-totalized form (0^{-1}=0) as the preferred interpretation. In this paper we consider "cancellation meadows", i.e., meadows without proper zero divisors, such as $Q_0$ and prove a generic completeness result. We apply this result to cancellation meadows expanded with differentiation operators, the sign function, and with floor, ceiling and a signed variant of the square root, respectively. We give an equational axiomatization of these operators and thus obtain a finite basis for various expanded cancellation meadows.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 16:01:31 GMT" }, { "version": "v2", "created": "Sun, 30 Mar 2008 23:03:41 GMT" }, { "version": "v3", "created": "Wed, 22 May 2013 13:17:07 GMT" } ]
2013-05-23T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Bethke", "Inge", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0803.3976
David Sevilla
Jaime Gutierrez, David Sevilla
On Ritt's decomposition Theorem in the case of finite fields
13 pages. v2: added comment from reader and additional references
Finite Fields Appl. 12 (2006), no. 3, 403--412. MR2229324 (2007a:13024)
10.1016/j.ffa.2005.08.004
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A classical theorem by Ritt states that all the complete decomposition chains of a univariate polynomial satisfying a certain tameness condition have the same length. In this paper we present our conclusions about the generalization of these theorem in the case of finite coefficient fields when the tameness condition is dropped.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 16:39:03 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2008 09:01:01 GMT" } ]
2008-04-10T00:00:00
[ [ "Gutierrez", "Jaime", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0803.4018
Jose Javier Ramasco
Bruno Goncalves, Jose J. Ramasco
Human dynamics revealed through Web analytics
7 pages, 8 figures
Physical Review E 78, 026123 (2008)
10.1103/PhysRevE.78.026123
null
cs.HC cond-mat.stat-mech cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When the World Wide Web was first conceived as a way to facilitate the sharing of scientific information at the CERN (European Center for Nuclear Research) few could have imagined the role it would come to play in the following decades. Since then, the increasing ubiquity of Internet access and the frequency with which people interact with it raise the possibility of using the Web to better observe, understand, and monitor several aspects of human social behavior. Web sites with large numbers of frequently returning users are ideal for this task. If these sites belong to companies or universities, their usage patterns can furnish information about the working habits of entire populations. In this work, we analyze the properly anonymized logs detailing the access history to Emory University's Web site. Emory is a medium size university located in Atlanta, Georgia. We find interesting structure in the activity patterns of the domain and study in a systematic way the main forces behind the dynamics of the traffic. In particular, we show that both linear preferential linking and priority based queuing are essential ingredients to understand the way users navigate the Web.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 21:19:54 GMT" }, { "version": "v2", "created": "Wed, 21 May 2008 17:39:20 GMT" } ]
2009-11-13T00:00:00
[ [ "Goncalves", "Bruno", "" ], [ "Ramasco", "Jose J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0803.4025
Ganesh M. Narayan
Ganesh M. Narayan, K. Gopinath, V. Sridhar
Structure and Interpretation of Computer Programs
9 pages, 10pt, double column, 15 figures
2nd IEEE International Symposium on Theoretical Aspects of Software Engineering, 2008, Nanjing, China
10.1109/TASE.2008.40
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Call graphs depict the static, caller-callee relation between "functions" in a program. With most source/target languages supporting functions as the primitive unit of composition, call graphs naturally form the fundamental control flow representation available to understand/develop software. They are also the substrate on which various interprocedural analyses are performed and are integral part of program comprehension/testing. Given their universality and usefulness, it is imperative to ask if call graphs exhibit any intrinsic graph theoretic features -- across versions, program domains and source languages. This work is an attempt to answer these questions: we present and investigate a set of meaningful graph measures that help us understand call graphs better; we establish how these measures correlate, if any, across different languages and program domains; we also assess the overall, language independent software quality by suitably interpreting these measures.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 22:58:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Narayan", "Ganesh M.", "" ], [ "Gopinath", "K.", "" ], [ "Sridhar", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0803.4026
Martin Wainwright
Arash A. Amini, Martin J. Wainwright
High-dimensional analysis of semidefinite relaxations for sparse principal components
Published in at http://dx.doi.org/10.1214/08-AOS664 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2009, Vol. 37, No. 5B, 2877-2921
10.1214/08-AOS664
IMS-AOS-AOS664
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal component analysis (PCA) is a classical method for dimensionality reduction based on extracting the dominant eigenvectors of the sample covariance matrix. However, PCA is well known to behave poorly in the ``large $p$, small $n$'' setting, in which the problem dimension $p$ is comparable to or larger than the sample size $n$. This paper studies PCA in this high-dimensional regime, but under the additional assumption that the maximal eigenvector is sparse, say, with at most $k$ nonzero components. We consider a spiked covariance model in which a base matrix is perturbed by adding a $k$-sparse maximal eigenvector, and we analyze two computationally tractable methods for recovering the support set of this maximal eigenvector, as follows: (a) a simple diagonal thresholding method, which transitions from success to failure as a function of the rescaled sample size $\theta_{\mathrm{dia}}(n,p,k)=n/[k^2\log(p-k)]$; and (b) a more sophisticated semidefinite programming (SDP) relaxation, which succeeds once the rescaled sample size $\theta_{\mathrm{sdp}}(n,p,k)=n/[k\log(p-k)]$ is larger than a critical threshold. In addition, we prove that no method, including the best method which has exponential-time complexity, can succeed in recovering the support if the order parameter $\theta_{\mathrm{sdp}}(n,p,k)$ is below a threshold. Our results thus highlight an interesting trade-off between computational and statistical efficiency in high-dimensional inference.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 23:08:05 GMT" }, { "version": "v2", "created": "Wed, 26 Aug 2009 05:38:39 GMT" } ]
2009-08-26T00:00:00
[ [ "Amini", "Arash A.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0803.4030
David Eppstein
David Eppstein
Learning Sequences
37 pages, 15 figures. To appear as a chapter of J.-Cl. Falmagne, C. Doble, and X. Hu, eds., Knowledge Spaces: Applications in Education
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the algorithms used by the ALEKS computer learning system for manipulating combinatorial descriptions of human learners' states of knowledge, generating all states that are possible according to a description of a learning space in terms of a partial order, and using Bayesian statistics to determine the most likely state of a student. As we describe, a representation of a knowledge space using learning sequences (basic words of an antimatroid) allows more general learning spaces to be implemented with similar algorithmic complexity. We show how to define a learning space from a set of learning sequences, find a set of learning sequences that concisely represents a given learning space, generate all states of a learning space represented in this way, and integrate this state generation procedure into a knowledge assessment algorithm. We also describe some related theoretical results concerning projections of learning spaces, decomposition and dimension of learning spaces, and algebraic representation of learning spaces.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 00:07:55 GMT" } ]
2008-03-31T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.4049
Ke Liu
Ke Liu and Nael Abu-Ghazaleh
Stateless and Delivery Guaranteed Geometric Routing on Virtual Coordinate System
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stateless geographic routing provides relatively good performance at a fixed overhead, which is typically much lower than conventional routing protocols such as AODV. However, the performance of geographic routing is impacted by physical voids, and localization errors. Accordingly, virtual coordinate systems (VCS) were proposed as an alternative approach that is resilient to localization errors and that naturally routes around physical voids. However, VCS also faces virtual anomalies, causing their performance to trail geographic routing. In existing VCS routing protocols, there is a lack of an effective stateless and delivery guaranteed complementary routing algorithm that can be used to traverse voids. Most proposed solutions use variants of flooding or blind searching when a void is encountered. In this paper, we propose a spanning-path virtual coordinate system which can be used as a complete routing algorithm or as the complementary algorithm to greedy forwarding that is invoked when voids are encountered. With this approach, and for the first time, we demonstrate a stateless and delivery guaranteed geometric routing algorithm on VCS. When used in conjunction with our previously proposed aligned virtual coordinate system (AVCS), it out-performs not only all geometric routing protocols on VCS, but also geographic routing with accurate location information.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 05:58:51 GMT" }, { "version": "v2", "created": "Sat, 29 Mar 2008 02:53:24 GMT" } ]
2008-12-18T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0803.4074
Yoshiharu Maeno
Yoshiharu Maeno and Yukio Ohsawa
Reflective visualization and verbalization of unconscious preference
This will be submitted to KES Journal
International Journal of Advanced Intelligence Paradigms Vol.2, pp.125-139 (2010)
10.1504/IJAIP.2010.030531
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new method is presented, that can help a person become aware of his or her unconscious preferences, and convey them to others in the form of verbal explanation. The method combines the concepts of reflection, visualization, and verbalization. The method was tested in an experiment where the unconscious preferences of the subjects for various artworks were investigated. In the experiment, two lessons were learned. The first is that it helps the subjects become aware of their unconscious preferences to verbalize weak preferences as compared with strong preferences through discussion over preference diagrams. The second is that it is effective to introduce an adjustable factor into visualization to adapt to the differences in the subjects and to foster their mutual understanding.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 09:36:58 GMT" }, { "version": "v2", "created": "Mon, 2 Feb 2009 14:43:13 GMT" } ]
2010-09-28T00:00:00
[ [ "Maeno", "Yoshiharu", "" ], [ "Ohsawa", "Yukio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0803.4096
J. G. Esteve
J. G. Esteve and Fernando Falceto
On the number of $k$-cycles in the assignment problem for random matrices
To appear in Journal of Statistical Mechanics
null
10.1088/1742-5468/2008/03/P03019
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We continue the study of the assignment problem for a random cost matrix. We analyse the number of $k$-cycles for the solution and their dependence on the symmetry of the random matrix. We observe that for a symmetric matrix one and two-cycles are dominant in the optimal solution. In the antisymmetric case the situation is the opposite and the one and two-cycles are suppressed. We solve the model for a pure random matrix (without correlations between its entries) and give analytic arguments to explain the numerical results in the symmetric and antisymmetric case. We show that the results can be explained to great accuracy by a simple ansatz that connects the expected number of $k$-cycles to that of one and two cycles.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 12:23:13 GMT" } ]
2009-11-13T00:00:00
[ [ "Esteve", "J. G.", "" ], [ "Falceto", "Fernando", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.4197
Vladimir Privman
V. Privman, G. Strack, D. Solenov, M. Pita, E. Katz
Optimization of Enzymatic Biochemical Logic for Noise Reduction and Scalability: How Many Biocomputing Gates Can Be Interconnected in a Circuit?
null
J. Phys. Chem. B 112, 11777-11784 (2008)
10.1021/jp802673q
null
q-bio.MN cond-mat.other cond-mat.soft cs.CC q-bio.BM q-bio.OT q-bio.QM quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report an experimental evaluation of the "input-output surface" for a biochemical AND gate. The obtained data are modeled within the rate-equation approach, with the aim to map out the gate function and cast it in the language of logic variables appropriate for analysis of Boolean logic for scalability. In order to minimize "analog" noise, we consider a theoretical approach for determining an optimal set for the process parameters to minimize "analog" noise amplification for gate concatenation. We establish that under optimized conditions, presently studied biochemical gates can be concatenated for up to order 10 processing steps. Beyond that, new paradigms for avoiding noise build-up will have to be developed. We offer a general discussion of the ideas and possible future challenges for both experimental and theoretical research for advancing scalable biochemical computing.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 19:52:30 GMT" }, { "version": "v2", "created": "Sat, 13 Sep 2008 16:34:17 GMT" } ]
2010-10-12T00:00:00
[ [ "Privman", "V.", "" ], [ "Strack", "G.", "" ], [ "Solenov", "D.", "" ], [ "Pita", "M.", "" ], [ "Katz", "E.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Physics", "code": "cond-mat.soft", "description": "Membranes, polymers, liquid crystals, glasses, colloids, granular matter", "span": "(Soft Condensed Matter)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" }, { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0803.4206
Troy Lee
Troy Lee, Rajat Mittal
Product theorems via semidefinite programming
Typos corrected, some points clarified
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The tendency of semidefinite programs to compose perfectly under product has been exploited many times in complexity theory: for example, by Lovasz to determine the Shannon capacity of the pentagon; to show a direct sum theorem for non-deterministic communication complexity and direct product theorems for discrepancy; and in interactive proof systems to show parallel repetition theorems for restricted classes of games. Despite all these examples of product theorems--some going back nearly thirty years--it was only recently that Mittal and Szegedy began to develop a general theory to explain when and why semidefinite programs behave perfectly under product. This theory captured many examples in the literature, but there were also some notable exceptions which it could not explain--namely, an early parallel repetition result of Feige and Lovasz, and a direct product theorem for the discrepancy method of communication complexity by Lee, Shraibman, and Spalek. We extend the theory of Mittal and Szegedy to explain these cases as well. Indeed, to the best of our knowledge, our theory captures all examples of semidefinite product theorems in the literature.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 20:27:47 GMT" }, { "version": "v2", "created": "Thu, 1 May 2008 20:12:53 GMT" } ]
2008-05-01T00:00:00
[ [ "Lee", "Troy", "" ], [ "Mittal", "Rajat", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.4223
Greig Cowan Dr
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell
Unified storage systems for distributed Tier-2 centres
12 pages, 14 figures. Contribution to CHEP 2007
J.Phys.Conf.Ser.119:062027,2008
10.1088/1742-6596/119/6/062027
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes will be shipped to Tier-2 centres for analysis by the LHC experiments using the Worldwide LHC Computing Grid (WLCG). In many countries Tier-2 centres are distributed between a number of institutes, e.g., the geographically spread Tier-2s of GridPP in the UK. This presents a number of challenges for experiments to utilise these centres efficaciously, as CPU and storage resources may be sub-divided and exposed in smaller units than the experiment would ideally want to work with. In addition, unhelpful mismatches between storage and CPU at the individual centres may be seen, which make efficient exploitation of a Tier-2's resources difficult. One method of addressing this is to unify the storage across a distributed Tier-2, presenting the centres' aggregated storage as a single system. This greatly simplifies data management for the VO, which then can access a greater amount of data across the Tier-2. However, such an approach will lead to scenarios where analysis jobs on one site's batch system must access data hosted on another site. We investigate this situation using the Glasgow and Edinburgh clusters, which are part of the ScotGrid distributed Tier-2. In particular we look at how to mitigate the problems associated with ``distant'' data access and discuss the security implications of having LAN access protocols traverse the WAN between centres.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 23:26:31 GMT" } ]
2008-12-18T00:00:00
[ [ "Cowan", "Greig A.", "" ], [ "Stewart", "Graeme A.", "" ], [ "Elwell", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.4240
Sebastien Verel
S\'ebastien Verel (I3S), Philippe Collard (I3S), Marco Tomassini (ISI), Leonardo Vanneschi (ISI)
Neutral Fitness Landscape in the Cellular Automata Majority Problem
null
Dans ACRI 2006 - 7th International Conference on Cellular Automata For Research and Industry - ACRI 2006, France (2006)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study in detail the fitness landscape of a difficult cellular automata computational task: the majority problem. Our results show why this problem landscape is so hard to search, and we quantify the large degree of neutrality found in various ways. We show that a particular subspace of the solution space, called the "Olympus", is where good solutions concentrate, and give measures to quantitatively characterize this subspace.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 07:50:24 GMT" } ]
2008-12-18T00:00:00
[ [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Tomassini", "Marco", "", "ISI" ], [ "Vanneschi", "Leonardo", "", "ISI" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.4241
Sebastien Verel
Maroun Bercachi (I3S), Philippe Collard (I3S), Manuel Clergue (I3S), S\'ebastien Verel (I3S)
Evolving Dynamic Change and Exchange of Genotype Encoding in Genetic Algorithms for Difficult Optimization Problems
null
Dans Proceedings of the IEEE Congress on Evolutionary Computation CEC2007 - IEEE Congress on Evolutionary Computation CEC2007, singapore : Singapour (2007)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The application of genetic algorithms (GAs) to many optimization problems in organizations often results in good performance and high quality solutions. For successful and efficient use of GAs, it is not enough to simply apply simple GAs (SGAs). In addition, it is necessary to find a proper representation for the problem and to develop appropriate search operators that fit well to the properties of the genotype encoding. The representation must at least be able to encode all possible solutions of an optimization problem, and genetic operators such as crossover and mutation should be applicable to it. In this paper, serial alternation strategies between two codings are formulated in the framework of dynamic change of genotype encoding in GAs for function optimization. Likewise, a new variant of GAs for difficult optimization problems denoted {\it Split-and-Merge} GA (SM-GA) is developed using a parallel implementation of an SGA and evolving a dynamic exchange of individual representation in the context of Dual Coding concept. Numerical experiments show that the evolved SM-GA significantly outperforms an SGA with static single coding.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 07:51:18 GMT" } ]
2008-12-18T00:00:00
[ [ "Bercachi", "Maroun", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.4248
Sebastien Verel
David Simoncini (I3S), Philippe Collard (I3S), S\'ebastien Verel (I3S), Manuel Clergue (I3S)
From Cells to Islands: An unified Model of Cellular Parallel Genetic Algorithms
null
Dans ACRI 2006, 7th International Conference - 7th International Conference on Cellular Automata For Research and Industry - ACRI 2006, Perpignan : France (2006)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the Anisotropic selection scheme for cellular Genetic Algorithms (cGA). This new scheme allows to enhance diversity and to control the selective pressure which are two important issues in Genetic Algorithms, especially when trying to solve difficult optimization problems. Varying the anisotropic degree of selection allows swapping from a cellular to an island model of parallel genetic algorithm. Measures of performances and diversity have been performed on one well-known problem: the Quadratic Assignment Problem which is known to be difficult to optimize. Experiences show that, tuning the anisotropic degree, we can find the accurate trade-off between cGA and island models to optimize performances of parallel evolutionary algorithms. This trade-off can be interpreted as the suitable degree of migration among subpopulations in a parallel Genetic Algorithm.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 08:20:58 GMT" } ]
2008-12-18T00:00:00
[ [ "Simoncini", "David", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0803.4253
Jean-Marie Chauvet
Jean-Marie Chauvet
Combinatorial Explorations in Su-Doku
null
null
null
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Su-Doku, a popular combinatorial puzzle, provides an excellent testbench for heuristic explorations. Several interesting questions arise from its deceptively simple set of rules. How many distinct Su-Doku grids are there? How to find a solution to a Su-Doku puzzle? Is there a unique solution to a given Su-Doku puzzle? What is a good estimation of a puzzle's difficulty? What is the minimum puzzle size (the number of "givens")? This paper explores how these questions are related to the well-known alldifferent constraint which emerges in a wide variety of Constraint Satisfaction Problems (CSP) and compares various algorithmic approaches based on different formulations of Su-Doku.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 10:07:42 GMT" } ]
2008-04-01T00:00:00
[ [ "Chauvet", "Jean-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.4260
Xin Han
Xin Han, Kazuo Iwama, Guochuan Zhang
On Two Dimensional Orthogonal Knapsack Problem
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the following knapsack problem: Given a list of squares with profits, we are requested to pack a sublist of them into a rectangular bin (not a unit square bin) to make profits in the bin as large as possible. We first observe there is a Polynomial Time Approximation Scheme (PTAS) for the problem of packing weighted squares into rectangular bins with large resources, then apply the PTAS to the problem of packing squares with profits into a rectangular bin and get a $\frac65+\epsilon$ approximation algorithm.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 11:15:11 GMT" } ]
2008-12-18T00:00:00
[ [ "Han", "Xin", "" ], [ "Iwama", "Kazuo", "" ], [ "Zhang", "Guochuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.4261
Mari\'an Dvorsk\'y
Mari\'an Dvorsk\'y
Common Permutation Problem
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show that the following problem is NP-complete: Given an alphabet $\Sigma$ and two strings over $\Sigma$, the question is whether there exists a permutation of $\Sigma$ which is a subsequence of both of the given strings.
[ { "version": "v1", "created": "Sat, 29 Mar 2008 11:32:29 GMT" } ]
2008-04-01T00:00:00
[ [ "Dvorský", "Marián", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.4308
Vandy Berten
Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo
Discrete Frequency Selection of Frame-Based Stochastic Real-Time Tasks
10 pages
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy-efficient real-time task scheduling has been actively explored in the past decade. Different from the past work, this paper considers schedulability conditions for stochastic real-time tasks. A schedulability condition is first presented for frame-based stochastic real-time tasks, and several algorithms are also examined to check the schedulability of a given strategy. An approach is then proposed based on the schedulability condition to adapt a continuous-speed-based method to a discrete-speed system. The approach is able to stay as close as possible to the continuous-speed-based method, but still guaranteeing the schedulability. It is shown by simulations that the energy saving can be more than 20% for some system configurations
[ { "version": "v1", "created": "Sun, 30 Mar 2008 09:26:38 GMT" }, { "version": "v2", "created": "Mon, 7 Apr 2008 07:55:38 GMT" } ]
2008-04-07T00:00:00
[ [ "Berten", "Vandy", "" ], [ "Chang", "Chi-Ju", "" ], [ "Kuo", "Tei-Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0803.4311
Victor Grishchenko
Victor Grishchenko
Locator/identifier split using the data link layer
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The locator/identifier split approach assumes separating functions of a locator (i.e. topology--dependent attachment point address) and identifier (topology-independent unique identifier) currently both served by an IP address. This work is an attempt to redefine semantics of MAC address to make it a pure layer-2 locator instead of a pure globally-unique identifier. Such an exercise might be interesting from the standpoint of Ethernet scaling and Metro Ethernet technologies. From the global routing perspective, introduction of multihoming, traffic engineering and failover at the 2nd layer may reduce pressure on the 3rd layer.
[ { "version": "v1", "created": "Sun, 30 Mar 2008 09:38:53 GMT" } ]
2008-04-01T00:00:00
[ [ "Grishchenko", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.4321
Samuel Marateck
Samuel L. Marateck
How good is the Warnsdorff's knight's tour heuristic?
3 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Warnsdorffs rule for a knights tour is a heuristic, i.e., it is a rule that does not produce the desired result all the time. It is a classic example of a greedy method in that it is based on a series of locally optimal choices. This note describes an analysis that determines how good the heuristic is on an 8 X 8 chessboard. The order of appearance in a permutation of the eight possible moves a knight can make determines the path the knight takes. A computer analysis is done of the 8! permutations of the order of a knights moves in Warnsdorffs rule on an 8 X 8 chessboard for tours starting on each of the 64 squares. Whenever a tie occurs for moves to vertices that have the lowest degree, the first of these vertices encountered in the programming loop is chosen. The number of permutations of the 8! total that yield non-Hamiltonian paths is tallied. This will be the same value if we consistently choose the last of these vertices encountered.
[ { "version": "v1", "created": "Sun, 30 Mar 2008 20:09:54 GMT" } ]
2008-04-01T00:00:00
[ [ "Marateck", "Samuel L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.4332
Gusztav Morvai
G. Morvai and B. Weiss
On Sequential Estimation and Prediction for Discrete Time Series
null
Stochastics and Dynamics, Vol. 7, No. 4. pp. 417-437, 2007
null
null
math.PR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of extracting as much information as possible from a sequence of observations of a stationary stochastic process $X_0,X_1,...X_n$ has been considered by many authors from different points of view. It has long been known through the work of D. Bailey that no universal estimator for $\textbf{P}(X_{n+1}|X_0,X_1,...X_n)$ can be found which converges to the true estimator almost surely. Despite this result, for restricted classes of processes, or for sequences of estimators along stopping times, universal estimators can be found. We present here a survey of some of the recent work that has been done along these lines.
[ { "version": "v1", "created": "Sun, 30 Mar 2008 18:07:02 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "G.", "" ], [ "Weiss", "B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0803.4354
Moustapha Diaby
Moustapha Diaby
A O(n^8) X O(n^7) Linear Programming Model of the Traveling Salesman Problem
Theorem 25 and Corollary 26 are incorrect. The modeling needs 9-dimensional variables instead of the 8-dimensional variables defined in notations 10.2. For fully-detailed exposition of the correct model see the book available at: The correct modeling is fully detailed in the book available at: http://www.worldscientific.com/worldscibooks/10.1142/9725
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new linear programming (LP) formulation of the Traveling Salesman Problem (TSP). The proposed model has O(n^8) variables and O(n^7) constraints, where n is the number of cities. Our numerical experimentation shows that computational times for the proposed linear program are several orders of magnitude smaller than those for the existing model [3].
[ { "version": "v1", "created": "Sun, 30 Mar 2008 23:26:50 GMT" }, { "version": "v2", "created": "Sat, 11 Sep 2010 21:08:18 GMT" }, { "version": "v3", "created": "Fri, 6 Sep 2013 03:16:08 GMT" }, { "version": "v4", "created": "Sun, 2 Mar 2014 15:12:27 GMT" }, { "version": "v5", "created": "Tue, 18 Mar 2014 19:34:06 GMT" }, { "version": "v6", "created": "Thu, 20 Oct 2016 16:58:38 GMT" } ]
2016-10-21T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0803.4355
Marko A. Rodriguez
Marko A. Rodriguez
Grammar-Based Random Walkers in Semantic Networks
First draft of manuscript originally written in November 2006
Rodriguez, M.A., "Grammar-Based Random Walkers in Semantic Networks", Knowledge-Based Systems, volume 21, issue 7, pages 727-739, ISSN: 0950-7051, Elsevier, October 2008
10.1016/j.knosys.2008.03.030
LA-UR-06-7791
cs.AI cs.DS
http://creativecommons.org/licenses/publicdomain/
Semantic networks qualify the meaning of an edge relating any two vertices. Determining which vertices are most "central" in a semantic network is difficult because one relationship type may be deemed subjectively more important than another. For this reason, research into semantic network metrics has focused primarily on context-based rankings (i.e. user prescribed contexts). Moreover, many of the current semantic network metrics rank semantic associations (i.e. directed paths between two vertices) and not the vertices themselves. This article presents a framework for calculating semantically meaningful primary eigenvector-based metrics such as eigenvector centrality and PageRank in semantic networks using a modified version of the random walker model of Markov chain analysis. Random walkers, in the context of this article, are constrained by a grammar, where the grammar is a user defined data structure that determines the meaning of the final vertex ranking. The ideas in this article are presented within the context of the Resource Description Framework (RDF) of the Semantic Web initiative.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 00:13:26 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2008 23:58:07 GMT" } ]
2008-09-11T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0803.4370
L.T. Handoko
Z. Akbar and L.T. Handoko
GRID Architecture through a Public Cluster
5 pages, Proceeding of the 2008 International Conference on Computer and Communication Engineering
null
10.1109/ICCCE.2008.4580761
FISIKALIPI-08032
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An architecture to enable some blocks consisting of several nodes in a public cluster connected to different grid collaborations is introduced. It is realized by inserting a web-service in addition to the standard Globus Toolkit. The new web-service performs two main tasks : authenticate the digital certificate contained in an incoming requests and forward it to the designated block. The appropriate block is mapped with the username of the block's owner contained in the digital certificate. It is argued that this algorithm opens an opportunity for any blocks in a public cluster to join various global grids.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 05:05:04 GMT" }, { "version": "v2", "created": "Wed, 9 Apr 2008 13:04:20 GMT" }, { "version": "v3", "created": "Thu, 1 Jan 2009 01:58:27 GMT" } ]
2009-03-06T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0803.4373
Yeong-Cherng Liang
Andrew C. Doherty (University of Queensland), Yeong-Cherng Liang (University of Queensland), Ben Toner (CWI), Stephanie Wehner (Caltech)
The quantum moment problem and bounds on entangled multi-prover games
33 pages, To appear at CCC'08
Proceedings of IEEE Conference on Computational Complexity 2008, pages 199--210
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the quantum moment problem: Given a conditional probability distribution together with some polynomial constraints, does there exist a quantum state rho and a collection of measurement operators such that (i) the probability of obtaining a particular outcome when a particular measurement is performed on rho is specified by the conditional probability distribution, and (ii) the measurement operators satisfy the constraints. For example, the constraints might specify that some measurement operators must commute. We show that if an instance of the quantum moment problem is unsatisfiable, then there exists a certificate of a particular form proving this. Our proof is based on a recent result in algebraic geometry, the noncommutative Positivstellensatz of Helton and McCullough [Trans. Amer. Math. Soc., 356(9):3721, 2004]. A special case of the quantum moment problem is to compute the value of one-round multi-prover games with entangled provers. Under the conjecture that the provers need only share states in finite-dimensional Hilbert spaces, we prove that a hierarchy of semidefinite programs similar to the one given by Navascues, Pironio and Acin [Phys. Rev. Lett., 98:010401, 2007] converges to the entangled value of the game. It follows that the class of languages recognized by a multi-prover interactive proof system where the provers share entanglement is recursive.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 18:39:29 GMT" } ]
2009-01-20T00:00:00
[ [ "Doherty", "Andrew C.", "", "University of Queensland" ], [ "Liang", "Yeong-Cherng", "", "University of Queensland" ], [ "Toner", "Ben", "", "CWI" ], [ "Wehner", "Stephanie", "", "Caltech" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0803.4479
Laszlo Kish
Laszlo B. Kish and Olivier Saidi
Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives
4 pages
Fluctuation and Noise Letters 8 (2008) L95-L98
10.1142/S0219477508004362
null
physics.gen-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the case of the need of extraordinary security, Kirchhoff-loop-Johnson-(like)-noise ciphers can easily be integrated on existing types of digital chips in order to provide secure data communication between hardware processors, memory chips, hard disks and other units within a computer or other data processor system. The secure key exchange can take place at the very first run and the system can renew the key later at random times with an authenticated fashion to prohibit man-in-the-middle attack. The key can be stored in flash memories within the communicating chip units at hidden random addresses among other random bits that are continuously generated by the secure line but are never actually used. Thus, even if the system is disassembled, and the eavesdropper can have direct access to the communication lines between the units, or even if she is trying to use a man-in-the-middle attack, no information can be extracted. The only way to break the code is to learn the chip structure, to understand the machine code program and to read out the information during running by accessing the proper internal ports of the working chips. However such an attack needs extraordinary resources and even that can be prohibited by a password lockout. The unconditional security of commercial algorithms against piracy can be provided in a similar way.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 15:36:33 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2008 16:57:53 GMT" }, { "version": "v3", "created": "Thu, 24 Apr 2008 01:03:12 GMT" } ]
2011-08-16T00:00:00
[ [ "Kish", "Laszlo B.", "" ], [ "Saidi", "Olivier", "" ] ]
[ { "class": "Physics", "code": "physics.gen-ph", "description": "Description coming soon", "span": "(General Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0803.4511
Herbert van de Sompel
Herbert Van de Sompel, Ryan Chute, Patrick Hochstenbach
The aDORe Federation Architecture
43 pages, 4 figures, 2 tables
null
null
null
cs.DL
http://creativecommons.org/licenses/publicdomain/
The need to federate repositories emerges in two distinctive scenarios. In one scenario, scalability-related problems in the operation of a repository reach a point beyond which continued service requires parallelization and hence federation of the repository infrastructure. In the other scenario, multiple distributed repositories manage collections of interest to certain communities or applications, and federation is an approach to present a unified perspective across these repositories. The high-level, 3-Tier aDORe federation architecture can be used as a guideline to federate repositories in both cases. This paper describes the architecture, consisting of core interfaces for federated repositories in Tier-1, two shared infrastructure components in Tier-2, and a single-point of access to the federation in Tier-3. The paper also illustrates two large-scale deployments of the aDORe federation architecture: the aDORe Archive repository (over 100,000,000 digital objects) at the Los Alamos National Laboratory and the Ghent University Image Repository federation (multiple terabytes of image files).
[ { "version": "v1", "created": "Mon, 31 Mar 2008 18:02:57 GMT" } ]
2008-04-01T00:00:00
[ [ "Van de Sompel", "Herbert", "" ], [ "Chute", "Ryan", "" ], [ "Hochstenbach", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0803.4516
Robert Spalek
Robert Spalek (Google)
A Dual Polynomial for OR
6 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We reprove that the approximate degree of the OR function on n bits is Omega(sqrt(n)). We consider a linear program which is feasible if and only if there is an approximate polynomial for a given function, and apply the duality theory. The duality theory says that the primal program has no solution if and only if its dual has a solution. Therefore one can prove the nonexistence of an approximate polynomial by exhibiting a dual solution, coined the dual polynomial. We construct such a polynomial.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 18:20:53 GMT" } ]
2008-04-01T00:00:00
[ [ "Spalek", "Robert", "", "Google" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0804.0006
Denis Krotov
Sergey Avgustinovich (Sobolev Institute of Mathematics, Novosibirsk, Russia), Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Embedding in a perfect code
Eng: 5pp, Rus: 5pp. V3: revised, a survey added; the accepted version; Russian translation added
J. Comb. Des. 17(5) 2009, 419-423
10.1002/jcd.20207
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binary 1-error-correcting code can always be embedded in a 1-perfect code of some larger length
[ { "version": "v1", "created": "Tue, 1 Apr 2008 01:42:59 GMT" }, { "version": "v2", "created": "Sat, 13 Sep 2008 18:09:39 GMT" }, { "version": "v3", "created": "Sat, 30 Apr 2016 21:12:50 GMT" } ]
2016-05-03T00:00:00
[ [ "Avgustinovich", "Sergey", "", "Sobolev Institute of Mathematics, Novosibirsk,\n Russia" ], [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.0036
Mathieu Dutour Sikiri\'c
Mathieu Dutour Sikiric, Achill Schuermann, Frank Vallentin
Complexity and algorithms for computing Voronoi cells of lattices
20 pages, 2 figures, 5 tables
Math. Comp. 267 (2009), 1713-1731
10.1090/S0025-5718-09-02224-8
null
math.MG cs.CG cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we are concerned with finding the vertices of the Voronoi cell of a Euclidean lattice. Given a basis of a lattice, we prove that computing the number of vertices is a #P-hard problem. On the other hand we describe an algorithm for this problem which is especially suited for low dimensional (say dimensions at most 12) and for highly-symmetric lattices. We use our implementation, which drastically outperforms those of current computer algebra systems, to find the vertices of Voronoi cells and quantizer constants of some prominent lattices.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 22:02:47 GMT" }, { "version": "v2", "created": "Fri, 16 May 2008 08:46:52 GMT" }, { "version": "v3", "created": "Tue, 19 Aug 2008 09:10:56 GMT" }, { "version": "v4", "created": "Wed, 24 Sep 2008 07:55:26 GMT" } ]
2009-05-04T00:00:00
[ [ "Sikiric", "Mathieu Dutour", "" ], [ "Schuermann", "Achill", "" ], [ "Vallentin", "Frank", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0804.0041
Farzad Parvaresh
Mihailo Stojnic, Farzad Parvaresh and Babak Hassibi
On the reconstruction of block-sparse signals with an optimal number of measurements
null
null
10.1016/j.jmr.2011.02.015
null
cs.IT cs.NA math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let A be an M by N matrix (M < N) which is an instance of a real random Gaussian ensemble. In compressed sensing we are interested in finding the sparsest solution to the system of equations A x = y for a given y. In general, whenever the sparsity of x is smaller than half the dimension of y then with overwhelming probability over A the sparsest solution is unique and can be found by an exhaustive search over x with an exponential time complexity for any y. The recent work of Cand\'es, Donoho, and Tao shows that minimization of the L_1 norm of x subject to A x = y results in the sparsest solution provided the sparsity of x, say K, is smaller than a certain threshold for a given number of measurements. Specifically, if the dimension of y approaches the dimension of x, the sparsity of x should be K < 0.239 N. Here, we consider the case where x is d-block sparse, i.e., x consists of n = N / d blocks where each block is either a zero vector or a nonzero vector. Instead of L_1-norm relaxation, we consider the following relaxation min x \| X_1 \|_2 + \| X_2 \|_2 + ... + \| X_n \|_2, subject to A x = y where X_i = (x_{(i-1)d+1}, x_{(i-1)d+2}, ..., x_{i d}) for i = 1,2, ..., N. Our main result is that as n -> \infty, the minimization finds the sparsest solution to Ax = y, with overwhelming probability in A, for any x whose block sparsity is k/n < 1/2 - O(\epsilon), provided M/N > 1 - 1/d, and d = \Omega(\log(1/\epsilon)/\epsilon). The relaxation can be solved in polynomial time using semi-definite programming.
[ { "version": "v1", "created": "Mon, 31 Mar 2008 23:00:33 GMT" } ]
2011-03-09T00:00:00
[ [ "Stojnic", "Mihailo", "" ], [ "Parvaresh", "Farzad", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.0050
Nicholas Letzepis A
Nick Letzepis and Albert Guillen i Fabregas
Outage Probability of the Gaussian MIMO Free-Space Optical Channel with PPM
24 pages, 3 figures, 2 tables. Submitted to the IEEE Journal of Lightwave Technology
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The free-space optical channel has the potential to facilitate inexpensive, wireless communication with fiber-like bandwidth under short deployment timelines. However, atmospheric effects can significantly degrade the reliability of a free-space optical link. In particular, atmospheric turbulence causes random fluctuations in the irradiance of the received laser beam, commonly referred to as scintillation. The scintillation process is slow compared to the large data rates typical of optical transmission. As such, we adopt a quasi-static block fading model and study the outage probability of the channel under the assumption of orthogonal pulse-position modulation. We investigate the mitigation of scintillation through the use of multiple lasers and multiple apertures, thereby creating a multiple-input multiple output (MIMO) channel. Non-ideal photodetection is also assumed such that the combined shot noise and thermal noise are considered as signal-independent Additive Gaussian white noise. Assuming perfect receiver channel state information (CSI), we compute the signal-to-noise ratio exponents for the cases when the scintillation is lognormal, exponential and gamma-gamma distributed, which cover a wide range of atmospheric turbulence conditions. Furthermore, we illustrate very large gains, in some cases larger than 15 dB, when transmitter CSI is also available by adapting the transmitted electrical power.
[ { "version": "v1", "created": "Tue, 1 Apr 2008 00:30:10 GMT" } ]
2008-04-02T00:00:00
[ [ "Letzepis", "Nick", "" ], [ "Fabregas", "Albert Guillen i", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]