id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0803.2856 | Christoph Schommer | T. Rothenberger, S. Oez, E. Tahirovic, C. Schommer | Figuring out Actors in Text Streams: Using Collocations to establish
Incremental Mind-maps | 10 pages, 3 Figures | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recognition, involvement, and description of main actors influences the
story line of the whole text. This is of higher importance as the text per se
represents a flow of words and expressions that once it is read it is lost. In
this respect, the understanding of a text and moreover on how the actor exactly
behaves is not only a major concern: as human beings try to store a given input
on short-term memory while associating diverse aspects and actors with
incidents, the following approach represents a virtual architecture, where
collocations are concerned and taken as the associative completion of the
actors' acting. Once that collocations are discovered, they become managed in
separated memory blocks broken down by the actors. As for human beings, the
memory blocks refer to associative mind-maps. We then present several priority
functions to represent the actual temporal situation inside a mind-map to
enable the user to reconstruct the recent events from the discovered temporal
results.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 18:00:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Rothenberger",
"T.",
""
],
[
"Oez",
"S.",
""
],
[
"Tahirovic",
"E.",
""
],
[
"Schommer",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0803.2874 | Wolfgang Steiner | Christiane Frougny (LIAFA), Wolfgang Steiner (LIAFA) | Minimal weight expansions in Pisot bases | null | null | null | null | cs.DM cs.CR math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For applications to cryptography, it is important to represent numbers with a
small number of non-zero digits (Hamming weight) or with small absolute sum of
digits. The problem of finding representations with minimal weight has been
solved for integer bases, e.g. by the non-adjacent form in base~2. In this
paper, we consider numeration systems with respect to real bases $\beta$ which
are Pisot numbers and prove that the expansions with minimal absolute sum of
digits are recognizable by finite automata. When $\beta$ is the Golden Ratio,
the Tribonacci number or the smallest Pisot number, we determine expansions
with minimal number of digits $\pm1$ and give explicitely the finite automata
recognizing all these expansions. The average weight is lower than for the
non-adjacent form.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 19:55:38 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2008 16:30:49 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Jan 2009 20:16:31 GMT"
}
] | 2009-01-09T00:00:00 | [
[
"Frougny",
"Christiane",
"",
"LIAFA"
],
[
"Steiner",
"Wolfgang",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0803.2904 | Gabriel Cardona | Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente | A Distance Metric for Tree-Sibling Time Consistent Phylogenetic Networks | 16 pages, 16 figures | null | null | null | q-bio.PE cs.CE cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The presence of reticulate evolutionary events in phylogenies turn
phylogenetic trees into phylogenetic networks. These events imply in particular
that there may exist multiple evolutionary paths from a non-extant species to
an extant one, and this multiplicity makes the comparison of phylogenetic
networks much more difficult than the comparison of phylogenetic trees. In
fact, all attempts to define a sound distance measure on the class of all
phylogenetic networks have failed so far. Thus, the only practical solutions
have been either the use of rough estimates of similarity (based on comparison
of the trees embedded in the networks), or narrowing the class of phylogenetic
networks to a certain class where such a distance is known and can be
efficiently computed. The first approach has the problem that one may identify
two networks as equivalent, when they are not; the second one has the drawback
that there may not exist algorithms to reconstruct such networks from
biological sequences.
We present in this paper a distance measure on the class of tree-sibling time
consistent phylogenetic networks, which generalize tree-child time consistent
phylogenetic networks, and thus also galled-trees. The practical interest of
this distance measure is twofold: it can be computed in polynomial time by
means of simple algorithms, and there also exist polynomial-time algorithms for
reconstructing networks of this class from DNA sequence data.
The Perl package Bio::PhyloNetwork, included in the BioPerl bundle,
implements many algorithms on phylogenetic networks, including the computation
of the distance presented in this paper.
| [
{
"version": "v1",
"created": "Wed, 19 Mar 2008 22:24:11 GMT"
}
] | 2008-03-21T00:00:00 | [
[
"Cardona",
"Gabriel",
""
],
[
"Llabres",
"Merce",
""
],
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.2919 | Travis Beals | Travis R. Beals, Barry C. Sanders | Distributed Relay Protocol for Probabilistic Information-Theoretic
Security in a Randomly-Compromised Network | 12 pages, 2 figures; added proof of verification sub-protocol, minor
corrections | ICITS 2008, LNCS 5155, pp. 29-39, 2008 | 10.1007/978-3-540-85093-9_4 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a simple, practical approach with probabilistic
information-theoretic security to mitigate one of quantum key distribution's
major limitations: the short maximum transmission distance (~200 km) possible
with present day technology. Our scheme uses classical secret sharing
techniques to allow secure transmission over long distances through a network
containing randomly-distributed compromised nodes. The protocol provides
arbitrarily high confidence in the security of the protocol, with modest
scaling of resource costs with improvement of the security parameter. Although
some types of failure are undetectable, users can take preemptive measures to
make the probability of such failures arbitrarily small.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 02:51:30 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Aug 2008 07:19:25 GMT"
}
] | 2008-08-23T00:00:00 | [
[
"Beals",
"Travis R.",
""
],
[
"Sanders",
"Barry C.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2925 | Marcus Hutter | Kassel Hingee and Marcus Hutter | Equivalence of Probabilistic Tournament and Polynomial Ranking Selection | 9 double-column pages, 5 figures | Proc. 2008 Congress on Evolutionary Computation (CEC 2008) pages
564-571 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crucial to an Evolutionary Algorithm's performance is its selection scheme.
We mathematically investigate the relation between polynomial rank and
probabilistic tournament methods which are (respectively) generalisations of
the popular linear ranking and tournament selection schemes. We show that every
probabilistic tournament is equivalent to a unique polynomial rank scheme. In
fact, we derived explicit operators for translating between these two types of
selection. Of particular importance is that most linear and most practical
quadratic rank schemes are probabilistic tournaments.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 03:50:53 GMT"
}
] | 2008-06-26T00:00:00 | [
[
"Hingee",
"Kassel",
""
],
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.2955 | Lenka Zdeborova | Lenka Zdeborov\'a, Marc M\'ezard | Locked constraint satisfaction problems | 4 pages, 2 figures | Phys. Rev. Lett. 101, 078702 (2008) | 10.1103/PhysRevLett.101.078702 | null | cond-mat.stat-mech cond-mat.dis-nn cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce and study the random "locked" constraint satisfaction problems.
When increasing the density of constraints, they display a broad "clustered"
phase in which the space of solutions is divided into many isolated points.
While the phase diagram can be found easily, these problems, in their clustered
phase, are extremely hard from the algorithmic point of view: the best known
algorithms all fail to find solutions. We thus propose new benchmarks of really
hard optimization problems and provide insight into the origin of their typical
hardness.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 10:11:00 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Sep 2008 16:54:42 GMT"
}
] | 2008-09-05T00:00:00 | [
[
"Zdeborová",
"Lenka",
""
],
[
"Mézard",
"Marc",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.2957 | Uwe Aickelin | Uwe Aickelin and Kathryn Dowsland | Enhanced Direct and Indirect Genetic Algorithm Approaches for a Mall
Layout and Tenant Selection Problem | null | Journal of Heuristics, 8(5), pp 503-514, 2002 | 10.1023/A:1016536623961, | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | During our earlier research, it was recognised that in order to be successful
with an indirect genetic algorithm approach using a decoder, the decoder has to
strike a balance between being an optimiser in its own right and finding
feasible solutions. Previously this balance was achieved manually. Here we
extend this by presenting an automated approach where the genetic algorithm
itself, simultaneously to solving the problem, sets weights to balance the
components out. Subsequently we were able to solve a complex and non-linear
scheduling problem better than with a standard direct genetic algorithm
implementation.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 10:19:01 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Dowsland",
"Kathryn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.2965 | Uwe Aickelin | Uwe Aickelin | An Indirect Genetic Algorithm for Set Covering Problems | null | Journal of the Operational Research Society, 53(10), pp 1118-1126
2002 | 10.1057/palgrave.jors.2601317 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new type of genetic algorithm for the set covering
problem. It differs from previous evolutionary approaches first because it is
an indirect algorithm, i.e. the actual solutions are found by an external
decoder function. The genetic algorithm itself provides this decoder with
permutations of the solution variables and other parameters. Second, it will be
shown that results can be further improved by adding another indirect
optimisation layer. The decoder will not directly seek out low cost solutions
but instead aims for good exploitable solutions. These are then post optimised
by another hill-climbing algorithm. Although seemingly more complicated, we
will show that this three-stage approach has advantages in terms of solution
quality, speed and adaptability to new types of problems over more direct
approaches. Extensive computational results are presented and compared to the
latest evolutionary and other heuristic approaches to the same data instances.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 10:58:32 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.2966 | Uwe Aickelin | Uwe Aickelin and Larry Bull | On the Application of Hierarchical Coevolutionary Genetic Algorithms:
Recombination and Evaluation Partners | null | Journal of Applied System Studies, 4(2), pp 2-17, 2003 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines the use of a hierarchical coevolutionary genetic
algorithm under different partnering strategies. Cascading clusters of
sub-populations are built from the bottom up, with higher-level sub-populations
optimising larger parts of the problem. Hence higher-level sub-populations
potentially search a larger search space with a lower resolution whilst
lower-level sub-populations search a smaller search space with a higher
resolution. The effects of different partner selection schemes amongst the
sub-populations on solution quality are examined for two constrained
optimisation problems. We examine a number of recombination partnering
strategies in the construction of higher-level individuals and a number of
related schemes for evaluating sub-solutions. It is shown that partnering
strategies that exploit problem-specific knowledge are superior and can counter
inappropriate (sub)fitness measurements.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 11:09:39 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Bull",
"Larry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.2967 | Uwe Aickelin | Uwe Aickelin and Paul White | Building Better Nurse Scheduling Algorithms | null | Annals of Operations Research, 128, pp 159-177, 2004 | 10.1023/B:ANOR.0000019103.31340.a6 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this research is twofold: Firstly, to model and solve a complex
nurse scheduling problem with an integer programming formulation and
evolutionary algorithms. Secondly, to detail a novel statistical method of
comparing and hence building better scheduling algorithms by identifying
successful algorithm modifications. The comparison method captures the results
of algorithms in a single figure that can then be compared using traditional
statistical techniques. Thus, the proposed method of comparing algorithms is an
objective procedure designed to assist in the process of improving an
algorithm. This is achieved even when some results are non-numeric or missing
due to infeasibility. The final algorithm outperforms all previous evolutionary
algorithms, which relied on human expertise for modification.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 11:15:37 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"White",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.2969 | Uwe Aickelin | Uwe Aickelin and Kathryn Dowsland | An Indirect Genetic Algorithm for a Nurse Scheduling Problem | null | Computers & Operations Research, 31(5), pp 761-778, 2004 | 10.1016/S0305-0548(03)00034-0 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a Genetic Algorithms approach to a manpower-scheduling
problem arising at a major UK hospital. Although Genetic Algorithms have been
successfully used for similar problems in the past, they always had to overcome
the limitations of the classical Genetic Algorithms paradigm in handling the
conflict between objectives and constraints. The approach taken here is to use
an indirect coding based on permutations of the nurses, and a heuristic decoder
that builds schedules from these permutations. Computational experiments based
on 52 weeks of live data are used to evaluate three different decoders with
varying levels of intelligence, and four well-known crossover operators.
Results are further enhanced by introducing a hybrid crossover operator and by
making use of simple bounds to reduce the size of the solution space. The
results reveal that the proposed algorithm is able to find high quality
solutions and is both faster and more flexible than a recently published Tabu
Search approach.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 11:21:19 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Dowsland",
"Kathryn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.2970 | Uwe Aickelin | Steve Cayzer and Uwe Aickelin | A Recommender System based on Idiotypic Artificial Immune Networks | null | Journal of Mathematical Modelling and Algorithms, 4(2), pp
181-198, 2005 | 10.1007/s10852-004-5336-7 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The immune system is a complex biological system with a highly distributed,
adaptive and self-organising nature. This paper presents an Artificial Immune
System (AIS) that exploits some of these characteristics and is applied to the
task of film recommendation by Collaborative Filtering (CF). Natural evolution
and in particular the immune system have not been designed for classical
optimisation. However, for this problem, we are not interested in finding a
single optimum. Rather we intend to identify a sub-set of good matches on which
recommendations can be based. It is our hypothesis that an AIS built on two
central aspects of the biological immune system will be an ideal candidate to
achieve this: Antigen-antibody interaction for matching and idiotypic
antibody-antibody interaction for diversity. Computational results are
presented in support of this conjecture and compared to those found by other CF
techniques.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 11:27:56 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 10:45:28 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Cayzer",
"Steve",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.2973 | Uwe Aickelin | Uwe Aickelin, Jamie Twycross and Thomas Hesketh-Roberts | Rule Generalisation in Intrusion Detection Systems using Snort | null | International Journal of Electronic Security and Digital
Forensics, 1 (1), pp 101-116, 2007 | 10.1504/IJESDF.2007.013596, | null | cs.NE cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intrusion Detection Systems (ids)provide an important layer of security for
computer systems and networks, and are becoming more and more necessary as
reliance on Internet services increases and systems with sensitive data are
more commonly open to Internet access. An ids responsibility is to detect
suspicious or unacceptable system and network activity and to alert a systems
administrator to this activity. The majority of ids use a set of signatures
that define what suspicious traffic is, and Snort is one popular and actively
developing open-source ids that uses such a set of signatures known as Snort
rules. Our aim is to identify a way in which Snort could be developed further
by generalising rules to identify novel attacks. In particular, we attempted to
relax and vary the conditions and parameters of current Snort rules, using a
similar approach to classic rule learning operators such as generalisation and
specialisation. We demonstrate the effectiveness of our approach through
experiments with standard datasets and show that we are able to detect
previously undeleted variants of various attacks. We conclude by discussing the
general effectiveness and appropriateness of generalisation in Snort based ids
rule processing.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 11:59:27 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 10:42:09 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Twycross",
"Jamie",
""
],
[
"Hesketh-Roberts",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.2975 | Uwe Aickelin | Uwe Aickelin and Jingpeng Li | An Estimation of Distribution Algorithm for Nurse Scheduling | null | Annals of Operations Research, 155 (1), pp 289-309, 2007 | 10.1007/s10479-007-0214-0 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Schedules can be built in a similar way to a human scheduler by using a set
of rules that involve domain knowledge. This paper presents an Estimation of
Distribution Algorithm (eda) for the nurse scheduling problem, which involves
choosing a suitable scheduling rule from a set for the assignment of each
nurse. Unlike previous work that used Genetic Algorithms (ga) to implement
implicit learning, the learning in the proposed algorithm is explicit, i.e. we
identify and mix building blocks directly. The eda is applied to implement such
explicit learning by building a Bayesian network of the joint distribution of
solutions. The conditional probability of each variable in the network is
computed according to an initial set of promising solutions. Subsequently, each
new instance for each variable is generated by using the corresponding
conditional probabilities, until all variables have been generated, i.e. in our
case, a new rule string has been obtained. Another set of rule strings will be
generated in this way, some of which will replace previous strings based on
fitness selection. If stopping conditions are not met, the conditional
probabilities for all nodes in the Bayesian network are updated again using the
current set of promising rule strings. Computational results from 52 real data
instances demonstrate the success of this approach. It is also suggested that
the learning mechanism in the proposed approach might be suitable for other
scheduling problems.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 12:07:26 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 10:46:10 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Li",
"Jingpeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.2981 | Uwe Aickelin | Amanda Whitbrook, Uwe Aickelin and Jonathan Garibaldi | Idiotypic Immune Networks in Mobile Robot Control | null | IEEE Transactions on Systems, Man and Cybernetics, Part B, 37(6),
1581- 1598, 2007 | 10.1109/TSMCB.2007.907334 | null | cs.NE cs.AI cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Jerne's idiotypic network theory postulates that the immune response involves
inter-antibody stimulation and suppression as well as matching to antigens. The
theory has proved the most popular Artificial Immune System (ais) model for
incorporation into behavior-based robotics but guidelines for implementing
idiotypic selection are scarce. Furthermore, the direct effects of employing
the technique have not been demonstrated in the form of a comparison with
non-idiotypic systems. This paper aims to address these issues. A method for
integrating an idiotypic ais network with a Reinforcement Learning based
control system (rl) is described and the mechanisms underlying antibody
stimulation and suppression are explained in detail. Some hypotheses that
account for the network advantage are put forward and tested using three
systems with increasing idiotypic complexity. The basic rl, a simplified hybrid
ais-rl that implements idiotypic selection independently of derived
concentration levels and a full hybrid ais-rl scheme are examined. The test bed
takes the form of a simulated Pioneer robot that is required to navigate
through maze worlds detecting and tracking door markers.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 12:24:43 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Whitbrook",
"Amanda",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Garibaldi",
"Jonathan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0803.2995 | Uwe Aickelin | Peer-Olaf Siebers, Uwe Aickelin, Giuliana Battisti, Helen Celia,
Christopher Clegg, Xiaolan Fu, Raphael De Hoyos, Alfonsiana Iona, Alina
Petrescu and Peixoto Adriano | The Role of Management Practices in Closing the Productivity Gap | null | AIM Working Paper Series Number 065, 2008 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is no doubt that management practices are linked to the productivity
and performance of a company. However, research findings are mixed. This paper
provides a multi-disciplinary review of the current evidence of such a
relationship and offers suggestions for further exploration. We provide an
extensive review of the literature in terms of research findings from studies
that have been trying to measure and understand the impact that individual
management practices and clusters of management practices have on productivity
at different levels of analysis. We focus our review on Operations Management
(om) and Human Resource Management (hrm) practices as well as joint
applications of these practices. In conclusion, we can say that taken as a
whole, the research findings are equivocal. Some studies have found a positive
relationship between the adoption of management practices and productivity,
some negative and some no association whatsoever. We believe that the lack of
universal consensus on the effect of the adoption of complementary management
practices might be driven either by measurement issues or by the level of
analysis. Consequently, there is a need for further research. In particular,
for a multi-level approach from the lowest possible level of aggregation up to
the firm-level of analysis in order to assess the impact of management
practices upon the productivity of firms.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 13:15:11 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Mar 2008 12:46:10 GMT"
}
] | 2013-05-30T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Battisti",
"Giuliana",
""
],
[
"Celia",
"Helen",
""
],
[
"Clegg",
"Christopher",
""
],
[
"Fu",
"Xiaolan",
""
],
[
"De Hoyos",
"Raphael",
""
],
[
"Iona",
"Alfonsiana",
""
],
[
"Petrescu",
"Alina",
""
],
[
"Adriano",
"Peixoto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.3027 | Adrien Poteaux | Adrien Poteaux, Marc Rybowicz | Towards a Symbolic-Numeric Method to Compute Puiseux Series: The Modular
Part | null | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have designed a new symbolic-numeric strategy to compute efficiently and
accurately floating point Puiseux series defined by a bivariate polynomial over
an algebraic number field. In essence, computations modulo a well chosen prime
$p$ are used to obtain the exact information required to guide floating point
computations. In this paper, we detail the symbolic part of our algorithm:
First of all, we study modular reduction of Puiseux series and give a good
reduction criterion to ensure that the information required by the numerical
part is preserved. To establish our results, we introduce a simple modification
of classical Newton polygons, that we call "generic Newton polygons", which
happen to be very convenient. Then, we estimate the arithmetic complexity of
computing Puiseux series over finite fields and improve known bounds. Finally,
we give bit-complexity bounds for deterministic and randomized versions of the
symbolic part. The details of the numerical part will be described in a
forthcoming paper.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2008 16:23:40 GMT"
}
] | 2008-03-21T00:00:00 | [
[
"Poteaux",
"Adrien",
""
],
[
"Rybowicz",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0803.3099 | Mark Burgin | Mark Burgin a and Marc L. Smith | Concurrent Composition and Algebras of Events, Actions, and Processes | null | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are many different models of concurrent processes. The goal of this
work is to introduce a common formalized framework for current research in this
area and to eliminate shortcomings of existing models of concurrency. Following
up the previous research of the authors and other researchers on concurrency,
here we build a high-level metamodel EAP (event-action-process) for concurrent
processes. This metamodel comprises a variety of other models of concurrent
processes. We shape mathematical models for, and study events, actions, and
processes in relation to important practical problems, such as communication in
networks, concurrent programming, and distributed computations. In the third
section of the work, a three-level algebra of events, actions and processes is
constructed and studied as a new stage of algebra for concurrent processes.
Relations between EAP process algebra and other models of concurrency are
considered in the fourth section of this work.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 00:27:38 GMT"
}
] | 2008-03-24T00:00:00 | [
[
"a",
"Mark Burgin",
""
],
[
"Smith",
"Marc L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0803.3117 | Shahab Oveis Gharan | Shahab Oveis Gharan, Alireza Bayesteh, and Amir K. Khandani | On the Diversity-Multiplexing Tradeoff in Multiple-Relay Network | Submitted to IEEE Trans. on Information Theory, April 28 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the setup of a multiple-relay network in which $K$
half-duplex multiple-antenna relays assist in the transmission between
a/several multiple-antenna transmitter(s) and a multiple-antenna receiver. Each
two nodes are assumed to be either connected through a quasi-static Rayleigh
fading channel, or disconnected. We propose a new scheme, which we call
\textit{random sequential} (RS), based on the amplify-and-forward relaying. We
prove that for general multiple-antenna multiple-relay networks, the proposed
scheme achieves the maximum diversity gain. Furthermore, we derive
diversity-multiplexing tradeoff (DMT) of the proposed RS scheme for general
single-antenna multiple-relay networks. It is shown that for single-antenna
two-hop multiple-access multiple-relay ($K>1$) networks (without direct link
between the transmitter(s) and the receiver), the proposed RS scheme achieves
the optimum DMT. However, for the case of multiple access single relay setup,
we show that the RS scheme reduces to the naive amplify-and-forward relaying
and is not optimum in terms of DMT, while the dynamic decode-and-forward scheme
is shown to be optimum for this scenario.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 06:49:42 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Jun 2008 22:33:24 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Jun 2008 01:01:44 GMT"
}
] | 2008-06-08T00:00:00 | [
[
"Gharan",
"Shahab Oveis",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3186 | Denis Pallez | Denis Pallez (I3S), Laurent Brisson (I3S), Thierry Baccino (LPEQ) | Towards a human eye behavior model by applying Data Mining Techniques on
Gaze Information from IEC | null | Dans Proceedings of the Third International Conference on Human
Centered Processes - Human Centered Processes, Delft : Pays-Bas (2008) | null | null | cs.HC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we firstly present what is Interactive Evolutionary
Computation (IEC) and rapidly how we have combined this artificial intelligence
technique with an eye-tracker for visual optimization. Next, in order to
correctly parameterize our application, we present results from applying data
mining techniques on gaze information coming from experiments conducted on
about 80 human individuals.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 15:38:25 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pallez",
"Denis",
"",
"I3S"
],
[
"Brisson",
"Laurent",
"",
"I3S"
],
[
"Baccino",
"Thierry",
"",
"LPEQ"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.3187 | Luca Vigan\`o | Luca Vigan\`o and Marco Volpe | Labeled Natural Deduction Systems for a Family of Tense Logics | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give labeled natural deduction systems for a family of tense logics
extending the basic linear tense logic Kl. We prove that our systems are sound
and complete with respect to the usual Kripke semantics, and that they possess
a number of useful normalization properties (in particular, derivations reduce
to a normal form that enjoys a subformula property). We also discuss how to
extend our systems to capture richer logics like (fragments of) LTL.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 15:53:56 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 14:34:59 GMT"
}
] | 2008-03-25T00:00:00 | [
[
"Viganò",
"Luca",
""
],
[
"Volpe",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.3192 | Denis Pallez | Denis Pallez (LIRIS), Philippe Collard (I3S), Thierry Baccino (LPEQ),
Laurent Dumercy (LPEQ) | Eye-Tracking Evolutionary Algorithm to minimize user's fatigue in IEC
applied to Interactive One-Max problem | null | Dans Proceedings of the 2007 GECCO conference companion on Genetic
and evolutionary computation - GECCO '07: the 2007 GECCO conference companion
on Genetic and evolutionary computation, London : Royaume-Uni (2007) | 10.1145/1274000.1274098 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe a new algorithm that consists in combining an
eye-tracker for minimizing the fatigue of a user during the evaluation process
of Interactive Evolutionary Computation. The approach is then applied to the
Interactive One-Max optimization problem.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 16:11:38 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pallez",
"Denis",
"",
"LIRIS"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Baccino",
"Thierry",
"",
"LPEQ"
],
[
"Dumercy",
"Laurent",
"",
"LPEQ"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.3224 | Michael Hahsler | Michael Hahsler | A Model-Based Frequency Constraint for Mining Associations from
Transaction Data | null | Michael Hahsler. A model-based frequency constraint for mining
associations from transaction data. Data Mining and Knowledge Discovery,
13(2):137-166, September 2006 | 10.1007/s10618-005-0026-2 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining frequent itemsets is a popular method for finding associated items in
databases. For this method, support, the co-occurrence frequency of the items
which form an association, is used as the primary indicator of the
associations's significance. A single user-specified support threshold is used
to decided if associations should be further investigated. Support has some
known problems with rare items, favors shorter itemsets and sometimes produces
misleading associations.
In this paper we develop a novel model-based frequency constraint as an
alternative to a single, user-specified minimum support. The constraint
utilizes knowledge of the process generating transaction data by applying a
simple stochastic mixture model (the NB model) which allows for transaction
data's typically highly skewed item frequency distribution. A user-specified
precision threshold is used together with the model to find local frequency
thresholds for groups of itemsets. Based on the constraint we develop the
notion of NB-frequent itemsets and adapt a mining algorithm to find all
NB-frequent itemsets in a database. In experiments with publicly available
transaction databases we show that the new constraint provides improvements
over a single minimum support threshold and that the precision threshold is
more robust and easier to set and interpret by the user.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 20:39:53 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hahsler",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0803.3230 | Avik Chaudhuri | Avik Chaudhuri, Prasad Naldurg, and Sriram Rajamani | A Type System for Data-Flow Integrity on Windows Vista | null | null | null | null | cs.CR cs.OS cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Windows Vista operating system implements an interesting model of
multi-level integrity. We observe that in this model, trusted code can be
blamed for any information-flow attack; thus, it is possible to eliminate such
attacks by static analysis of trusted code. We formalize this model by
designing a type system that can efficiently enforce data-flow integrity on
Windows Vista. Typechecking guarantees that objects whose contents are
statically trusted never contain untrusted values, regardless of what untrusted
code runs in the environment. Some of Windows Vista's runtime access checks are
necessary for soundness; others are redundant and can be optimized away.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 21:28:16 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2008 02:55:57 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chaudhuri",
"Avik",
""
],
[
"Naldurg",
"Prasad",
""
],
[
"Rajamani",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0803.3231 | Grenville Croll | Victoria Lemieux | Archiving: The Overlooked Spreadsheet Risk | 16 Pages. Recovered by OCR from paper conference proceedings | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 213-226
ISBN:1-902724-16-X | null | null | cs.SE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper maintains that archiving has been overlooked as a key spreadsheet
internal control. The case of failed Jamaican commercial banks demonstrates how
poor archiving can lead to weaknesses in spreadsheet control that contribute to
operational risk. In addition, the Sarbanes-0xley Act contains a number of
provisions that require tighter control over the archiving of spreadsheets. To
mitigate operational risks and achieve compliance with the records-related
provisions of Sarbanes-Oxley, the author argues that organisations should
introduce records management programmes that provide control over the archiving
of spreadsheets. At a minimum, spreadsheet archiving controls should identify
and ensure compliance with retention requirements, support document production
in the event of regulatory inquiries or litigation, and prevent unauthorised
destruction of records.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2008 21:35:40 GMT"
}
] | 2008-03-25T00:00:00 | [
[
"Lemieux",
"Victoria",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0803.3314 | Igor V. Lerner | I. V. Lerner, I. V. Yurkevich A. S. Stepanenko and C. C. Constantinou | Loss Fluctuations and Temporal Correlations in Network Queues | 6 pages, 2 figures; an invited talk at the 1st Workshop on
Physics-Inspired Paradigms in Wireless Communications and Networks, April
4th, 2008, Berlin, Germany | null | null | null | cs.NI cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider data losses in a single node of a packet-switched Internet-like
network. We employ two distinct models, one with discrete and the other with
continuous one-dimensional random walks, representing the state of a queue in a
router. Both models {have} a built-in critical behavior with {a sharp}
transition from exponentially small to finite losses. It turns out that the
finite capacity of a buffer and the packet-dropping procedure give rise to
specific boundary conditions which lead to strong loss rate fluctuations at the
critical point even in the absence of such fluctuations in the data arrival
process.
| [
{
"version": "v1",
"created": "Sun, 23 Mar 2008 11:05:23 GMT"
}
] | 2008-03-26T00:00:00 | [
[
"Lerner",
"I. V.",
""
],
[
"Stepanenko",
"I. V. Yurkevich A. S.",
""
],
[
"Constantinou",
"C. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0803.3338 | Ganesh M. Narayan | Bhargava Kumar K, Ganesh M. Narayan, K. Gopinath | Performance Evaluation of Multiple TCP connections in iSCSI | 10pt, 11 pages, two column, 15 figures | Proceedings of the 24th IEEE Conference on Mass Storage Systems
and Technologies, 2007 - MSST '07 | null | null | cs.NI cs.DC cs.OS cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scaling data storage is a significant concern in enterprise systems and
Storage Area Networks (SANs) are deployed as a means to scale enterprise
storage. SANs based on Fibre Channel have been used extensively in the last
decade while iSCSI is fast becoming a serious contender due to its reduced
costs and unified infrastructure. This work examines the performance of iSCSI
with multiple TCP connections. Multiple TCP connections are often used to
realize higher bandwidth but there may be no fairness in how bandwidth is
distributed. We propose a mechanism to share congestion information across
multiple flows in ``Fair-TCP'' for improved performance. Our results show that
Fair-TCP significantly improves the performance for I/O intensive workloads.
| [
{
"version": "v1",
"created": "Sun, 23 Mar 2008 19:10:00 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"K",
"Bhargava Kumar",
""
],
[
"Narayan",
"Ganesh M.",
""
],
[
"Gopinath",
"K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0803.3360 | Guangyue Han | Guangyue Han, Brian Marcus | Asymptotics of input-constrained binary symmetric channel capacity | Published in at http://dx.doi.org/10.1214/08-AAP570 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2009, Vol. 19, No. 3, 1063-1091 | 10.1214/08-AAP570 | IMS-AAP-AAP570 | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the classical problem of noisy constrained capacity in the case of
the binary symmetric channel (BSC), namely, the capacity of a BSC whose inputs
are sequences chosen from a constrained set. Motivated by a result of
Ordentlich and Weissman [In Proceedings of IEEE Information Theory Workshop
(2004) 117--122], we derive an asymptotic formula (when the noise parameter is
small) for the entropy rate of a hidden Markov chain, observed when a Markov
chain passes through a BSC. Using this result, we establish an asymptotic
formula for the capacity of a BSC with input process supported on an
irreducible finite type constraint, as the noise parameter tends to zero.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 04:39:32 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Sep 2008 04:19:33 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Aug 2009 06:59:54 GMT"
}
] | 2009-08-10T00:00:00 | [
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3363 | Yoshiharu Maeno | Yoshiharu Maeno | Node discovery in a networked organization | null | Proceedings of the IEEE International Conference on Systems, Man
and Cybernetics, San Antonio, October 2009 | 10.1109/ICSMC.2009.5346826 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, I present a method to solve a node discovery problem in a
networked organization. Covert nodes refer to the nodes which are not
observable directly. They affect social interactions, but do not appear in the
surveillance logs which record the participants of the social interactions.
Discovering the covert nodes is defined as identifying the suspicious logs
where the covert nodes would appear if the covert nodes became overt. A
mathematical model is developed for the maximal likelihood estimation of the
network behind the social interactions and for the identification of the
suspicious logs. Precision, recall, and F measure characteristics are
demonstrated with the dataset generated from a real organization and the
computationally synthesized datasets. The performance is close to the
theoretical limit for any covert nodes in the networks of any topologies and
sizes if the ratio of the number of observation to the number of possible
communication patterns is large.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 05:53:39 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 05:13:58 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.3394 | Grenville Croll | Patrick O'Beirne | Facing the Facts | 7 pages, 1 table, 1 figure | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2007 209-214
ISBN 978-905617-58-6 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human error research on overconfidence supports the benefits of early
visibility of defects and disciplined development. If risk to the enterprise is
to be reduced, individuals need to become aware of the reality of the quality
of their work. Several cycles of inspection and defect removal are inevitable.
Software Quality Management measurements of defect density and removal
efficiency are applicable. Research of actual spreadsheet error rates shows
data consistent with other software depending on the extent to which the work
product was reviewed before inspection. The paper argues that the payback for
an investment in early review time is justified by the saving in project delay
and expensive errors in use.
'If debugging is the process of removing bugs, then programming must be the
process of putting them in' - Anon.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 12:01:16 GMT"
}
] | 2008-03-25T00:00:00 | [
[
"O'Beirne",
"Patrick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0803.3404 | Wesley Calvert | Wesley Calvert and John E. Porter | Some results on $\mathbb{R}$-computable structures | null | null | null | null | cs.DB cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This survey paper examines the effective model theory obtained with the BSS
model of real number computation. It treats the following topics: computable
ordinals, satisfaction of computable infinitary formulas, forcing as a
construction technique, effective categoricity, effective topology, and
relations with other models for the effective theory of uncountable structures.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 13:59:53 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 17:03:07 GMT"
}
] | 2009-06-09T00:00:00 | [
[
"Calvert",
"Wesley",
""
],
[
"Porter",
"John E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0803.3419 | David Sevilla | John McKay, David Sevilla | Decomposing replicable functions | 25 pages, 2 data tables; to be published in LMS Journal of
Computation and Mathematics. v2: page format adjustment | LMS Journal of Computation and Mathematics 11 (June 2008), p.
146-171. ISSN 1461-1570. | null | null | math.NT cs.SC math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an algorithm to decompose rational functions from which we
determine the poset of groups fixing these functions.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 16:02:26 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 07:18:19 GMT"
}
] | 2008-08-21T00:00:00 | [
[
"McKay",
"John",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
] |
0803.3422 | Sergey Dorogovtsev | S. N. Dorogovtsev, J. F. F. Mendes, A. N. Samukhin, A. Y. Zyuzin | Organization of modular networks | 9 pages, 3 figures | Phys. Rev. E 78, 056106 (2008) | 10.1103/PhysRevE.78.056106 | null | cond-mat.stat-mech cs.NI math-ph math.MP physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the global organization of heterogeneous equilibrium networks
consisting of a number of well distinguished interconnected
parts--``communities'' or modules. We develop an analytical approach allowing
us to obtain the statistics of connected components and an intervertex distance
distribution in these modular networks, and to describe their global
organization and structure. In particular, we study the evolution of the
intervertex distance distribution with an increasing number of interlinks
connecting two infinitely large uncorrelated networks. We demonstrate that even
a relatively small number of shortcuts unite the networks into one. In more
precise terms, if the number of the interlinks is any finite fraction of the
total number of connections, then the intervertex distance distribution
approaches a delta-function peaked form, and so the network is united.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 16:20:12 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Mar 2008 20:42:46 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dorogovtsev",
"S. N.",
""
],
[
"Mendes",
"J. F. F.",
""
],
[
"Samukhin",
"A. N.",
""
],
[
"Zyuzin",
"A. Y.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0803.3435 | Tomas Rokicki | Tomas Rokicki | Twenty-Five Moves Suffice for Rubik's Cube | null | null | null | null | cs.SC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How many moves does it take to solve Rubik's Cube? Positions are known that
require 20 moves, and it has already been shown that there are no positions
that require 27 or more moves; this is a surprisingly large gap. This paper
describes a program that is able to find solutions of length 20 or less at a
rate of more than 16 million positions a second. We use this program, along
with some new ideas and incremental improvements in other techniques, to show
that there is no position that requires 26 moves.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 19:37:09 GMT"
}
] | 2008-03-25T00:00:00 | [
[
"Rokicki",
"Tomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.3448 | Salah A. Aly | Esam Mlaih, Salah A. Aly | Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless
Sensor Networks | null | Proc. 2nd IEEE MCN'08 workshop in conj. with Infocom'08, Phoenix,
AZ, 2008 | 10.1109/INFOCOM.2008.4544601 | null | cs.CR cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In-network data aggregation is an essential technique in mission critical
wireless sensor networks (WSNs) for achieving effective transmission and hence
better power conservation. Common security protocols for aggregated WSNs are
either hop-by-hop or end-to-end, each of which has its own encryption schemes
considering different security primitives. End-to-end encrypted data
aggregation protocols introduce maximum data secrecy with in-efficient data
aggregation and more vulnerability to active attacks, while hop-by-hop data
aggregation protocols introduce maximum data integrity with efficient data
aggregation and more vulnerability to passive attacks.
In this paper, we propose a secure aggregation protocol for aggregated WSNs
deployed in hostile environments in which dual attack modes are present. Our
proposed protocol is a blend of flexible data aggregation as in hop-by-hop
protocols and optimal data confidentiality as in end-to-end protocols. Our
protocol introduces an efficient O(1) heuristic for checking data integrity
along with cost-effective heuristic-based divide and conquer attestation
process which is $O(\ln{n})$ in average -O(n) in the worst scenario- for
further verification of aggregated results.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 18:08:03 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Mlaih",
"Esam",
""
],
[
"Aly",
"Salah A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3455 | Marc Lelarge | Marc Lelarge and Jean Bolot | A Local Mean Field Analysis of Security Investments in Networks | Proofs added | null | null | null | cs.GT cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Getting agents in the Internet, and in networks in general, to invest in and
deploy security features and protocols is a challenge, in particular because of
economic reasons arising from the presence of network externalities. Our goal
in this paper is to carefully model and quantify the impact of such
externalities on the investment in, and deployment of, security features and
protocols in a network.
Specifically, we study a network of interconnected agents, which are subject
to epidemic risks such as those caused by propagating viruses and worms, and
which can decide whether or not to invest some amount to self-protect and
deploy security solutions. We make three contributions in the paper. First, we
introduce a general model which combines an epidemic propagation model with an
economic model for agents which captures network effects and externalities.
Second, borrowing ideas and techniques used in statistical physics, we
introduce a Local Mean Field (LMF) model, which extends the standard mean-field
approximation to take into account the correlation structure on local
neighborhoods. Third, we solve the LMF model in a network with externalities,
and we derive analytic solutions for sparse random graphs, for which we obtain
asymptotic results. We explicitly identify the impact of network externalities
on the decision to invest in and deploy security features. In other words, we
identify both the economic and network properties that determine the adoption
of security technologies.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 18:29:17 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jun 2008 09:59:52 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Lelarge",
"Marc",
""
],
[
"Bolot",
"Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.3459 | Franklin Marquezino | F.L. Marquezino, R. Portugal | The QWalk Simulator of Quantum Walks | 21 pages, 11 figures. Accepted in Computer Physics Communications.
Simulator can be downloaded from http://qubit.lncc.br/qwalk | Computer Physics Communications, Volume 179, Issue 5, Pages
359-369. (2008) | 10.1016/j.cpc.2008.02.019 | null | quant-ph cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several research groups are giving special attention to quantum walks
recently, because this research area have been used with success in the
development of new efficient quantum algorithms. A general simulator of quantum
walks is very important for the development of this area, since it allows the
researchers to focus on the mathematical and physical aspects of the research
instead of deviating the efforts to the implementation of specific numerical
simulations. In this paper we present QWalk, a quantum walk simulator for one-
and two-dimensional lattices. Finite two-dimensional lattices with generic
topologies can be used. Decoherence can be simulated by performing measurements
or by breaking links of the lattice. We use examples to explain the usage of
the software and to show some recent results of the literature that are easily
reproduced by the simulator.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2008 20:25:49 GMT"
}
] | 2012-05-18T00:00:00 | [
[
"Marquezino",
"F. L.",
""
],
[
"Portugal",
"R.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0803.3482 | Tad Hogg | Tad Hogg and Gabor Szabo | Diversity of Online Community Activities | 14 pages | null | 10.1209/0295-5075/86/38003 | null | cs.CY cs.HC physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Web sites where users create and rate content as well as form networks with
other users display long-tailed distributions in many aspects of behavior.
Using behavior on one such community site, Essembly, we propose and evaluate
plausible mechanisms to explain these behaviors. Unlike purely descriptive
models, these mechanisms rely on user behaviors based on information available
locally to each user. For Essembly, we find the long-tails arise from large
differences among user activity rates and qualities of the rated content, as
well as the extensive variability in the time users devote to the site. We show
that the models not only explain overall behavior but also allow estimating the
quality of content from their early behaviors.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 00:23:05 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Hogg",
"Tad",
""
],
[
"Szabo",
"Gabor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0803.3490 | Huan Xu Mr. | Huan Xu, Constantine Caramanis and Shie Mannor | Robustness and Regularization of Support Vector Machines | null | Journal of Machine Learning Research, vol 10, 1485-1510, year 2009 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider regularized support vector machines (SVMs) and show that they are
precisely equivalent to a new robust optimization formulation. We show that
this equivalence of robust optimization and regularization has implications for
both algorithms, and analysis. In terms of algorithms, the equivalence suggests
more general SVM-like algorithms for classification that explicitly build in
protection to noise, and at the same time control overfitting. On the analysis
front, the equivalence of robustness and regularization, provides a robust
optimization interpretation for the success of regularized SVMs. We use the
this new robustness interpretation of SVMs to give a new proof of consistency
of (kernelized) SVMs, thus establishing robustness as the reason regularized
SVMs generalize well.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 03:51:59 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2008 22:36:47 GMT"
}
] | 2010-02-25T00:00:00 | [
[
"Xu",
"Huan",
""
],
[
"Caramanis",
"Constantine",
""
],
[
"Mannor",
"Shie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.3501 | Fahem Kebair | Fahem Kebair (LITIS), Fr\'ed\'eric Serin (LITIS) | Multiagent Approach for the Representation of Information in a Decision
Support System | null | Multiagent Approach for the Representation of Information in a
Decision Support System, Springer Berlin / Heidelberg (Ed.) (2006) 98-107 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an emergency situation, the actors need an assistance allowing them to
react swiftly and efficiently. In this prospect, we present in this paper a
decision support system that aims to prepare actors in a crisis situation
thanks to a decision-making support. The global architecture of this system is
presented in the first part. Then we focus on a part of this system which is
designed to represent the information of the current situation. This part is
composed of a multiagent system that is made of factual agents. Each agent
carries a semantic feature and aims to represent a partial part of a situation.
The agents develop thanks to their interactions by comparing their semantic
features using proximity measures and according to specific ontologies.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 07:43:36 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kebair",
"Fahem",
"",
"LITIS"
],
[
"Serin",
"Frédéric",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.3515 | Mahesh Pal Dr. | V. K. Bansal and Mahesh Pal | Geographic Information Systems in Evaluation and Visualization of
Construction Schedule | Presented in Second ESRI Asia-Pacific User Conference New Delhi, 2007 | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Commercially available scheduling tools such as Primavera and Microsoft
Project fail to provide information pertaining to the spatial aspects of
construction project. A methodology using geographical information systems
(GIS) is developed to represent spatial aspects of the construction progress
graphically by synchronizing it with construction schedule. The spatial aspects
are depicted by 3D model developed in AutoCAD and construction schedule is
generated using Microsoft Excel. Spatial and scheduling information are linked
together into the GIS environment (ArcGIS). The GIS-based system developed in
this study may help in better understanding the schedule along with its spatial
aspects.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 09:27:44 GMT"
}
] | 2008-03-26T00:00:00 | [
[
"Bansal",
"V. K.",
""
],
[
"Pal",
"Mahesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0803.3531 | Daniel Raible | Daniel Raible and Henning Fernau | A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach | null | null | null | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In {\sc MaxSat}, we ask for an assignment which satisfies the maximum number
of clauses for a boolean formula in CNF. We present an algorithm yielding a run
time upper bound of $O^*(2^{\frac{1}{6.2158}})$ for {\sc Max-2-Sat} (each
clause contains at most 2 literals), where $K$ is the number of clauses. The
run time has been achieved by using heuristic priorities on the choice of the
variable on which we branch. The implementation of these heuristic priorities
is rather simple, though they have a significant effect on the run time. The
analysis is done using a tailored non-standard measure.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 11:32:22 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2008 08:36:18 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Raible",
"Daniel",
""
],
[
"Fernau",
"Henning",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.3539 | Michael Fairbank Mr | Michael Fairbank | Reinforcement Learning by Value Gradients | null | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of the value-gradient is introduced and developed in the context
of reinforcement learning. It is shown that by learning the value-gradients
exploration or stochastic behaviour is no longer needed to find locally optimal
trajectories. This is the main motivation for using value-gradients, and it is
argued that learning value-gradients is the actual objective of any
value-function learning algorithm for control problems. It is also argued that
learning value-gradients is significantly more efficient than learning just the
values, and this argument is supported in experiments by efficiency gains of
several orders of magnitude, in several problem domains. Once value-gradients
are introduced into learning, several analyses become possible. For example, a
surprising equivalence between a value-gradient learning algorithm and a
policy-gradient learning algorithm is proven, and this provides a robust
convergence proof for control problems using a value function with a general
function approximator.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 11:57:15 GMT"
}
] | 2008-03-26T00:00:00 | [
[
"Fairbank",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.3553 | Carl Bracken | Carl Bracken | New Families of Triple Error Correcting Codes with BCH Parameters | 11 pages. Submitted to IEEE Transactions on information Theory | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discovered by Bose, Chaudhuri and Hocquenghem, the BCH family of error
correcting codes are one of the most studied families in coding theory. They
are also among the best performing codes, particularly when the number of
errors being corrected is small relative to the code length. In this article we
consider binary codes with minimum distance of 7. We construct new families of
codes with these BCH parameters via a generalisation of the Kasami-Welch
Theorem.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 13:08:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bracken",
"Carl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3608 | Benjamin Allen | Benjamin Allen | The Category-Theoretic Arithmetic of Information | v3: Changed presentation and incorporated reviewers' suggestions | null | null | null | math.CT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We highlight the underlying category-theoretic structure of measures of
information flow. We present an axiomatic framework in which communication
systems are represented as morphisms, and information flow is characterized by
its behavior when communication systems are combined. Our framework includes a
variety of discrete, continuous, and, conjecturally, quantum information
measures. It also includes some familiar mathematical constructs not normally
associated with information, such as vector space dimension. We discuss these
examples and prove basic results from the axioms.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 18:57:14 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Mar 2008 15:16:17 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Jul 2008 18:05:21 GMT"
}
] | 2008-07-21T00:00:00 | [
[
"Allen",
"Benjamin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3632 | Mikhail Nesterenko | Mikhail Nesterenko, Adnan Vora | Void Traversal for Guaranteed Delivery in Geometric Routing | null | The 2nd IEEE International Conference on Mobile Ad-hoc and Sensor
Systems (MASS 2005), Washington, DC, November, 2005 | 10.1109/MAHSS.2005.1542862 | null | cs.OS cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Geometric routing algorithms like GFG (GPSR) are lightweight, scalable
algorithms that can be used to route in resource-constrained ad hoc wireless
networks. However, such algorithms run on planar graphs only. To efficiently
construct a planar graph, they require a unit-disk graph. To make the topology
unit-disk, the maximum link length in the network has to be selected
conservatively. In practical setting this leads to the designs where the node
density is rather high. Moreover, the network diameter of a planar subgraph is
greater than the original graph, which leads to longer routes. To remedy this
problem, we propose a void traversal algorithm that works on arbitrary
geometric graphs. We describe how to use this algorithm for geometric routing
with guaranteed delivery and compare its performance with GFG.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 20:52:17 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Nesterenko",
"Mikhail",
""
],
[
"Vora",
"Adnan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.3642 | Hariharan Narayanan | Hariharan Narayanan | Distributed Averaging in the presence of a Sparse Cut | 8 pages | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the question of averaging on a graph that has one sparse cut
separating two subgraphs that are internally well connected.
While there has been a large body of work devoted to algorithms for
distributed averaging, nearly all algorithms involve only {\it convex} updates.
In this paper, we suggest that {\it non-convex} updates can lead to significant
improvements. We do so by exhibiting a decentralized algorithm for graphs with
one sparse cut that uses non-convex averages and has an averaging time that can
be significantly smaller than the averaging time of known distributed
algorithms, such as those of \cite{tsitsiklis, Boyd}. We use stochastic
dominance to prove this result in a way that may be of independent interest.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 22:04:50 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2008 01:47:20 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Apr 2008 23:33:40 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Narayanan",
"Hariharan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.3645 | Ali Nazari | Ali Nazari, Sandeep Pradhan, Achilleas Anastasopoulos | A New Sphere-Packing Bound for Maximal Error Exponent for
Multiple-Access Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, a new lower bound for the maximal error probability of a
two-user discrete memoryless (DM) multiple-access channel (MAC) is derived.
This is the first bound of this type that explicitly imposes independence of
the users' input distributions (conditioned on the time-sharing auxiliary
variable) and thus results in a tighter sphere-packing exponent when compared
to the tightest known exponent derived by Haroutunian.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2008 23:05:39 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Nazari",
"Ali",
""
],
[
"Pradhan",
"Sandeep",
""
],
[
"Anastasopoulos",
"Achilleas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3657 | Yeow Meng Chee | Yeow Meng Chee and San Ling | Improved Lower Bounds for Constant GC-Content DNA Codes | 4 pages | IEEE Transactions on Information Theory, vol. 54, no. 1, pp.
391-394, 2008 | 10.1109/TIT.2007.911167 | null | cs.IT cs.DS math.CO math.IT q-bio.GN q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The design of large libraries of oligonucleotides having constant GC-content
and satisfying Hamming distance constraints between oligonucleotides and their
Watson-Crick complements is important in reducing hybridization errors in DNA
computing, DNA microarray technologies, and molecular bar coding. Various
techniques have been studied for the construction of such oligonucleotide
libraries, ranging from algorithmic constructions via stochastic local search
to theoretical constructions via coding theory. We introduce a new stochastic
local search method which yields improvements up to more than one third of the
benchmark lower bounds of Gaborit and King (2005) for n-mer oligonucleotide
libraries when n <= 14. We also found several optimal libraries by computing
maximum cliques on certain graphs.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 02:26:36 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Chee",
"Yeow Meng",
""
],
[
"Ling",
"San",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0803.3658 | Yeow Meng Chee | Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, and San Ling | The Sizes of Optimal q-Ary Codes of Weight Three and Distance Four: A
Complete Solution | 5 pages | IEEE Transactions on Information Theory, vol. 54, no. 3, pp.
1291-1295, 2008 | 10.1109/TIT.2007.915885 | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This correspondence introduces two new constructive techniques to complete
the determination of the sizes of optimal q-ary codes of constant weight three
and distance four.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 02:33:51 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Chee",
"Yeow Meng",
""
],
[
"Dau",
"Son Hoang",
""
],
[
"Ling",
"Alan C. H.",
""
],
[
"Ling",
"San",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3670 | Mathew Francis | L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan | On the cubicity of AT-free graphs and circular-arc graphs | 9 pages, 0 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A unit cube in $k$ dimensions ($k$-cube) is defined as the the Cartesian
product $R_1\times R_2\times...\times R_k$ where $R_i$(for $1\leq i\leq k$) is
a closed interval of the form $[a_i,a_i+1]$ on the real line. A graph $G$ on
$n$ nodes is said to be representable as the intersection of $k$-cubes (cube
representation in $k$ dimensions) if each vertex of $G$ can be mapped to a
$k$-cube such that two vertices are adjacent in $G$ if and only if their
corresponding $k$-cubes have a non-empty intersection. The \emph{cubicity} of
$G$ denoted as $\cubi(G)$ is the minimum $k$ for which $G$ can be represented
as the intersection of $k$-cubes.
We give an $O(bw\cdot n)$ algorithm to compute the cube representation of a
general graph $G$ in $bw+1$ dimensions given a bandwidth ordering of the
vertices of $G$, where $bw$ is the \emph{bandwidth} of $G$. As a consequence,
we get $O(\Delta)$ upper bounds on the cubicity of many well-known graph
classes such as AT-free graphs, circular-arc graphs and co-comparability graphs
which have $O(\Delta)$ bandwidth. Thus we have: 1) $\cubi(G)\leq 3\Delta-1$, if
$G$ is an AT-free graph. 2) $\cubi(G)\leq 2\Delta+1$, if $G$ is a circular-arc
graph. 3) $\cubi(G)\leq 2\Delta$, if $G$ is a co-comparability graph. Also for
these graph classes, there are constant factor approximation algorithms for
bandwidth computation that generate orderings of vertices with $O(\Delta)$
width. We can thus generate the cube representation of such graphs in
$O(\Delta)$ dimensions in polynomial time.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 07:11:20 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Chandran",
"L. Sunil",
""
],
[
"Francis",
"Mathew C.",
""
],
[
"Sivadasan",
"Naveen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.3693 | Rasmus Pagh | Martin Dietzfelbinger and Rasmus Pagh | Succinct Data Structures for Retrieval and Approximate Membership | null | null | null | null | cs.DS cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The retrieval problem is the problem of associating data with keys in a set.
Formally, the data structure must store a function f: U ->{0,1}^r that has
specified values on the elements of a given set S, a subset of U, |S|=n, but
may have any value on elements outside S. Minimal perfect hashing makes it
possible to avoid storing the set S, but this induces a space overhead of
Theta(n) bits in addition to the nr bits needed for function values. In this
paper we show how to eliminate this overhead. Moreover, we show that for any k
query time O(k) can be achieved using space that is within a factor 1+e^{-k} of
optimal, asymptotically for large n. If we allow logarithmic evaluation time,
the additive overhead can be reduced to O(log log n) bits whp. The time to
construct the data structure is O(n), expected. A main technical ingredient is
to utilize existing tight bounds on the probability of almost square random
matrices with rows of low weight to have full row rank. In addition to direct
constructions, we point out a close connection between retrieval structures and
hash tables where keys are stored in an array and some kind of probing scheme
is used. Further, we propose a general reduction that transfers the results on
retrieval into analogous results on approximate membership, a problem
traditionally addressed using Bloom filters. Again, we show how to eliminate
the space overhead present in previously known methods, and get arbitrarily
close to the lower bound. The evaluation procedures of our data structures are
extremely simple (similar to a Bloom filter). For the results stated above we
assume free access to fully random hash functions. However, we show how to
justify this assumption using extra space o(n) to simulate full randomness on a
RAM.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 10:53:49 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Dietzfelbinger",
"Martin",
""
],
[
"Pagh",
"Rasmus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0803.3742 | Costas Constantinou | C. C. Constantinou and A. S. Stepanenko | Network protocol scalability via a topological Kadanoff transformation | 4 pages, 5 figures, PhysComNet 2008 workshop submission | null | null | null | cs.NI cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A natural hierarchical framework for network topology abstraction is
presented based on an analogy with the Kadanoff transformation and
renormalisation group in theoretical physics. Some properties of the
renormalisation group bear similarities to the scalability properties of
network routing protocols (interactions). Central to our abstraction are two
intimately connected and complementary path diversity units: simple cycles, and
cycle adjacencies. A recursive network abstraction procedure is presented,
together with an associated generic recursive routing protocol family that
offers many desirable features.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 14:59:38 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Constantinou",
"C. C.",
""
],
[
"Stepanenko",
"A. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0803.3746 | Leonid Litinskii | Leonid B. Litinskii | Cluster Approach to the Domains Formation | 11 pages, 5 figures, PDF-file | Optical Memory & Neural Networks (Information Optics), 2007,
v.16(3) pp.144-153 | null | null | cs.NE cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a rule, a quadratic functional depending on a great number of binary
variables has a lot of local minima. One of approaches allowing one to find in
averaged deeper local minima is aggregation of binary variables into larger
blocks/domains. To minimize the functional one has to change the states of
aggregated variables (domains). In the present publication we discuss methods
of domains formation. It is shown that the best results are obtained when
domains are formed by variables that are strongly connected with each other.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 15:14:33 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Litinskii",
"Leonid B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.3773 | Rafael Wyrembelski | Rafael F. Wyrembelski, Tobias J. Oechtering, Igor Bjelakovic, Clemens
Schnurr, Holger Boche | Capacity of Gaussian MIMO Bidirectional Broadcast Channels | Proc. IEEE International Symposium on Information Theory (ISIT 2008),
Toronto, Canada, July 2008 | null | 10.1109/ISIT.2008.4595053 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the broadcast phase of a three-node network, where a relay node
establishes a bidirectional communication between two nodes using a spectrally
efficient two-phase decode-and-forward protocol. In the first phase the two
nodes transmit their messages to the relay node. Then the relay node decodes
the messages and broadcasts a re-encoded composition of them in the second
phase. We consider Gaussian MIMO channels and determine the capacity region for
the second phase which we call the Gaussian MIMO bidirectional broadcast
channel.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 17:22:34 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2008 14:01:00 GMT"
}
] | 2011-04-19T00:00:00 | [
[
"Wyrembelski",
"Rafael F.",
""
],
[
"Oechtering",
"Tobias J.",
""
],
[
"Bjelakovic",
"Igor",
""
],
[
"Schnurr",
"Clemens",
""
],
[
"Boche",
"Holger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3777 | Vitaly Skachek | Vitaly Skachek and Mark F. Flanagan | Lower Bounds on the Minimum Pseudodistance for Linear Codes with $q$-ary
PSK Modulation over AWGN | 6 pages, Proceedings 5-th International Symposium on Turbo Codes &
related topics | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present lower bounds on the minimum pseudocodeword effective Euclidean
distance (or minimum "pseudodistance") for coded modulation systems using
linear codes with $q$-ary phase-shift keying (PSK) modulation over the additive
white Gaussian noise (AWGN) channel. These bounds apply to both binary and
nonbinary coded modulation systems which use direct modulation mapping of coded
symbols. The minimum pseudodistance may serve as a first-order measure of
error-correcting performance for both linear-programming and message-passing
based receivers. In the case of a linear-programming based receiver, the
minimum pseudodistance may be used to form an exact bound on the codeword error
rate of the system.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 17:28:46 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jun 2008 18:01:07 GMT"
}
] | 2008-06-12T00:00:00 | [
[
"Skachek",
"Vitaly",
""
],
[
"Flanagan",
"Mark F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3781 | Carl Bracken | Carl Bracken, Eimear Byrne, Nadya Markin and Gary McGuire | Fourier Spectra of Binomial APN Functions | 20 pages. Submitted to the SIAM Journal on Discrete Mathematics | null | null | null | cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we compute the Fourier spectra of some recently discovered
binomial APN functions. One consequence of this is the determination of the
nonlinearity of the functions, which measures their resistance to linear
cryptanalysis. Another consequence is that certain error-correcting codes
related to these functions have the same weight distribution as the
2-error-correcting BCH code. Furthermore, for fields of odd degree, our results
provide an alternative proof of the APN property of the functions.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 17:51:20 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bracken",
"Carl",
""
],
[
"Byrne",
"Eimear",
""
],
[
"Markin",
"Nadya",
""
],
[
"McGuire",
"Gary",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3796 | Franck van Breugel | Franck van Breugel, Babita Sharma, James Worrell | Approximating a Behavioural Pseudometric without Discount for<br>
Probabilistic Systems | null | Logical Methods in Computer Science, Volume 4, Issue 2 (April 9,
2008) lmcs:822 | 10.2168/LMCS-4(2:2)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Desharnais, Gupta, Jagadeesan and Panangaden introduced a family of
behavioural pseudometrics for probabilistic transition systems. These
pseudometrics are a quantitative analogue of probabilistic bisimilarity.
Distance zero captures probabilistic bisimilarity. Each pseudometric has a
discount factor, a real number in the interval (0, 1]. The smaller the discount
factor, the more the future is discounted. If the discount factor is one, then
the future is not discounted at all. Desharnais et al. showed that the
behavioural distances can be calculated up to any desired degree of accuracy if
the discount factor is smaller than one. In this paper, we show that the
distances can also be approximated if the future is not discounted. A key
ingredient of our algorithm is Tarski's decision procedure for the first order
theory over real closed fields. By exploiting the Kantorovich-Rubinstein
duality theorem we can restrict to the existential fragment for which more
efficient decision procedures exist.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 19:08:40 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Mar 2008 20:02:18 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Apr 2008 14:23:31 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"van Breugel",
"Franck",
""
],
[
"Sharma",
"Babita",
""
],
[
"Worrell",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.3812 | Juan Carlos Nieves | Juan Carlos Nieves, Mauricio Osorio, Ulises Cort\'es | Preferred extensions as stable models | 17 pages, 2 Figures; to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.AI cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an argumentation framework AF, we introduce a mapping function that
constructs a disjunctive logic program P, such that the preferred extensions of
AF correspond to the stable models of P, after intersecting each stable model
with the relevant atoms. The given mapping function is of polynomial size
w.r.t. AF. In particular, we identify that there is a direct relationship
between the minimal models of a propositional formula and the preferred
extensions of an argumentation framework by working on representing the
defeated arguments. Then we show how to infer the preferred extensions of an
argumentation framework by using UNSAT algorithms and disjunctive stable model
solvers. The relevance of this result is that we define a direct relationship
between one of the most satisfactory argumentation semantics and one of the
most successful approach of non-monotonic reasoning i.e., logic programming
with the stable model semantics.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 20:08:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Nieves",
"Juan Carlos",
""
],
[
"Osorio",
"Mauricio",
""
],
[
"Cortés",
"Ulises",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0803.3816 | Syed Jafar | Krishna Gomadam, Viveck R. Cadambe, Syed A. Jafar | Approaching the Capacity of Wireless Networks through Distributed
Interference Alignment | 10 pages 2 columns | IEEE Transactions on Information Theory, Vol. 57, No. 6, June,
2011, Pages: 3309-3322 | 10.1109/GLOCOM.2008.ECP.817 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent results establish the optimality of interference alignment to approach
the Shannon capacity of interference networks at high SNR. However, the extent
to which interference can be aligned over a finite number of signalling
dimensions remains unknown. Another important concern for interference
alignment schemes is the requirement of global channel knowledge. In this work
we provide examples of iterative algorithms that utilize the reciprocity of
wireless networks to achieve interference alignment with only local channel
knowledge at each node. These algorithms also provide numerical insights into
the feasibility of interference alignment that are not yet available in theory.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 20:32:08 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gomadam",
"Krishna",
""
],
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3838 | Ted Dunning | Ted Dunning | Recorded Step Directional Mutation for Faster Convergence | 15 pages, 4 figures, presented at EP-98 | null | null | null | cs.NE cs.LG | http://creativecommons.org/licenses/by/3.0/ | Two meta-evolutionary optimization strategies described in this paper
accelerate the convergence of evolutionary programming algorithms while still
retaining much of their ability to deal with multi-modal problems. The
strategies, called directional mutation and recorded step in this paper, can
operate independently but together they greatly enhance the ability of
evolutionary programming algorithms to deal with fitness landscapes
characterized by long narrow valleys. The directional mutation aspect of this
combined method uses correlated meta-mutation but does not introduce a full
covariance matrix. These new methods are thus much more economical in terms of
storage for problems with high dimensionality. Additionally, directional
mutation is rotationally invariant which is a substantial advantage over
self-adaptive methods which use a single variance per coordinate for problems
where the natural orientation of the problem is not oriented along the axes.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2008 22:49:40 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Mar 2009 20:37:59 GMT"
}
] | 2009-03-26T00:00:00 | [
[
"Dunning",
"Ted",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0803.3850 | Alex Leong | Alex S. Leong, Subhrakanti Dey, and Jamie S. Evans | State Estimation Over Wireless Channels Using Multiple Sensors:
Asymptotic Behaviour and Optimal Power Allocation | 25 pages, 6 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers state estimation of linear systems using analog amplify
and forwarding with multiple sensors, for both multiple access and orthogonal
access schemes. Optimal state estimation can be achieved at the fusion center
using a time varying Kalman filter. We show that in many situations, the
estimation error covariance decays at a rate of $1/M$ when the number of
sensors $M$ is large. We consider optimal allocation of transmission powers
that 1) minimizes the sum power usage subject to an error covariance constraint
and 2) minimizes the error covariance subject to a sum power constraint. In the
case of fading channels with channel state information the optimization
problems are solved using a greedy approach, while for fading channels without
channel state information but with channel statistics available a sub-optimal
linear estimator is derived.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 01:41:06 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jun 2009 06:59:21 GMT"
}
] | 2009-06-11T00:00:00 | [
[
"Leong",
"Alex S.",
""
],
[
"Dey",
"Subhrakanti",
""
],
[
"Evans",
"Jamie S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3880 | Pedro Comesa\~na | P. Comesa\~na, N. Merhav and M. Barni | Asymptotically Optimum Universal One-Bit Watermarking for Gaussian
Covertexts and Gaussian Attacks | 20 pages, 7 Postscript figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of optimum watermark embedding and detection was addressed in a
recent paper by Merhav and Sabbag, where the optimality criterion was the
maximum false-negative error exponent subject to a guaranteed false-positive
error exponent. In particular, Merhav and Sabbag derived universal
asymptotically optimum embedding and detection rules under the assumption that
the detector relies solely on second order joint empirical statistics of the
received signal and the watermark. In the case of a Gaussian host signal and a
Gaussian attack, however, closed-form expressions for the optimum embedding
strategy and the false-negative error exponent were not obtained in that work.
In this paper, we derive such expressions, again, under the universality
assumption that neither the host variance nor the attack power are known to
either the embedder or the detector. The optimum embedding rule turns out to be
very simple and with an intuitively-appealing geometrical interpretation. The
improvement with respect to existing sub-optimum schemes is demonstrated by
displaying the optimum false-negative error exponent as a function of the
guaranteed false-positive error exponent.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 10:17:49 GMT"
}
] | 2008-03-28T00:00:00 | [
[
"Comesaña",
"P.",
""
],
[
"Merhav",
"N.",
""
],
[
"Barni",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.3900 | Uwe Aickelin | Jingpeng Li, Uwe Aickelin and Edmund Burke | A Component Based Heuristic Search method with Adaptive Perturbations
for Hospital Personnel Scheduling | null | Technical Report NOTTCS-TR-2007-4, University of Nottingham, UK,,
2006 | null | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nurse rostering is a complex scheduling problem that affects hospital
personnel on a daily basis all over the world. This paper presents a new
component-based approach with adaptive perturbations, for a nurse scheduling
problem arising at a major UK hospital. The main idea behind this technique is
to decompose a schedule into its components (i.e. the allocated shift pattern
of each nurse), and then mimic a natural evolutionary process on these
components to iteratively deliver better schedules. The worthiness of all
components in the schedule has to be continuously demonstrated in order for
them to remain there. This demonstration employs a dynamic evaluation function
which evaluates how well each component contributes towards the final
objective. Two perturbation steps are then applied: the first perturbation
eliminates a number of components that are deemed not worthy to stay in the
current schedule; the second perturbation may also throw out, with a low level
of probability, some worthy components. The eliminated components are
replenished with new ones using a set of constructive heuristics using local
optimality criteria. Computational results using 52 data instances demonstrate
the applicability of the proposed approach in solving real-world problems.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 12:15:43 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Burke",
"Edmund",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0803.3905 | Uwe Aickelin | Peer-Olaf Siebers and Uwe Aickelin | Introduction to Multi-Agent Simulation | null | Encyclopaedia of Decision Making and Decision Support
Technologies, 554-564, 2008 | null | null | cs.NE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When designing systems that are complex, dynamic and stochastic in nature,
simulation is generally recognised as one of the best design support
technologies, and a valuable aid in the strategic and tactical decision making
process. A simulation model consists of a set of rules that define how a system
changes over time, given its current state. Unlike analytical models, a
simulation model is not solved but is run and the changes of system states can
be observed at any point in time. This provides an insight into system dynamics
rather than just predicting the output of a system based on specific inputs.
Simulation is not a decision making tool but a decision support tool, allowing
better informed decisions to be made. Due to the complexity of the real world,
a simulation model can only be an approximation of the target system. The
essence of the art of simulation modelling is abstraction and simplification.
Only those characteristics that are important for the study and analysis of the
target system should be included in the simulation model.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 12:38:17 GMT"
}
] | 2013-05-30T00:00:00 | [
[
"Siebers",
"Peer-Olaf",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.3912 | Uwe Aickelin | Uwe Aickelin and Dipankar Dasgupta | Artificial Immune Systems Tutorial | null | null | null | null | cs.NE cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The biological immune system is a robust, complex, adaptive system that
defends the body from foreign pathogens. It is able to categorize all cells (or
molecules) within the body as self-cells or non-self cells. It does this with
the help of a distributed task force that has the intelligence to take action
from a local and also a global perspective using its network of chemical
messengers for communication. There are two major branches of the immune
system. The innate immune system is an unchanging mechanism that detects and
destroys certain invading organisms, whilst the adaptive immune system responds
to previously unknown foreign cells and builds a response to them that can
remain in the body over a long period of time. This remarkable information
processing biological system has caught the attention of computer science in
recent years. A novel computational intelligence technique, inspired by
immunology, has emerged, called Artificial Immune Systems. Several concepts
from the immune have been extracted and applied for solution to real world
science and engineering problems. In this tutorial, we briefly describe the
immune system metaphors that are relevant to existing Artificial Immune Systems
methods. We will then show illustrative real-world problems suitable for
Artificial Immune Systems and give a step-by-step algorithm walkthrough for one
such problem. A comparison of the Artificial Immune Systems to other well-known
algorithms, areas for future work, tips & tricks and a list of resources will
round this tutorial off. It should be noted that as Artificial Immune Systems
is still a young and evolving field, there is not yet a fixed algorithm
template and hence actual implementations might differ somewhat from time to
time and from those examples given here.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 12:55:59 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Aickelin",
"Uwe",
""
],
[
"Dasgupta",
"Dipankar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0803.3946 | Adam Smith | Shiva Prasad Kasiviswanathan and Adam Smith | On the `Semantics' of Differential Privacy: A Bayesian Formulation | Older version of this paper was titled: "A Note on Differential
Privacy: Defining Resistance to Arbitrary Side Information" | Journal of Privacy and Confidentiality, 6 (1), 2014 | 10.29012/jpc.v6i1.634 | null | cs.CR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Differential privacy is a definition of "privacy'" for algorithms that
analyze and publish information about statistical databases. It is often
claimed that differential privacy provides guarantees against adversaries with
arbitrary side information. In this paper, we provide a precise formulation of
these guarantees in terms of the inferences drawn by a Bayesian adversary. We
show that this formulation is satisfied by both "vanilla" differential privacy
as well as a relaxation known as (epsilon,delta)-differential privacy. Our
formulation follows the ideas originally due to Dwork and McSherry [Dwork
2006]. This paper is, to our knowledge, the first place such a formulation
appears explicitly. The analysis of the relaxed definition is new to this
paper, and provides some concrete guidance for setting parameters when using
(epsilon,delta)-differential privacy.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 15:00:45 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Sep 2013 00:15:57 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Dec 2015 20:58:26 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Jan 2023 03:31:32 GMT"
}
] | 2023-01-24T00:00:00 | [
[
"Kasiviswanathan",
"Shiva Prasad",
""
],
[
"Smith",
"Adam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0803.3969 | Alban Ponse | Jan A. Bergstra and Inge Bethke and Alban Ponse | Cancellation Meadows: a Generic Basis Theorem and Some Applications | 24 pages, 6 tables; Inge Bethke is added as an extra author; new
title (previous title: A Generic Basis Theorem for Cancellation Meadows) | The Computer Journal 56(1): 3-14, 2013 | 10.1093/comjnl/bxs028 | null | math.RA cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let Q_0 denote the rational numbers expanded to a "meadow", that is, after
taking its zero-totalized form (0^{-1}=0) as the preferred interpretation. In
this paper we consider "cancellation meadows", i.e., meadows without proper
zero divisors, such as $Q_0$ and prove a generic completeness result. We apply
this result to cancellation meadows expanded with differentiation operators,
the sign function, and with floor, ceiling and a signed variant of the square
root, respectively. We give an equational axiomatization of these operators and
thus obtain a finite basis for various expanded cancellation meadows.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 16:01:31 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Mar 2008 23:03:41 GMT"
},
{
"version": "v3",
"created": "Wed, 22 May 2013 13:17:07 GMT"
}
] | 2013-05-23T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Bethke",
"Inge",
""
],
[
"Ponse",
"Alban",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0803.3976 | David Sevilla | Jaime Gutierrez, David Sevilla | On Ritt's decomposition Theorem in the case of finite fields | 13 pages. v2: added comment from reader and additional references | Finite Fields Appl. 12 (2006), no. 3, 403--412. MR2229324
(2007a:13024) | 10.1016/j.ffa.2005.08.004 | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A classical theorem by Ritt states that all the complete decomposition chains
of a univariate polynomial satisfying a certain tameness condition have the
same length. In this paper we present our conclusions about the generalization
of these theorem in the case of finite coefficient fields when the tameness
condition is dropped.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 16:39:03 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Apr 2008 09:01:01 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0803.4018 | Jose Javier Ramasco | Bruno Goncalves, Jose J. Ramasco | Human dynamics revealed through Web analytics | 7 pages, 8 figures | Physical Review E 78, 026123 (2008) | 10.1103/PhysRevE.78.026123 | null | cs.HC cond-mat.stat-mech cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When the World Wide Web was first conceived as a way to facilitate the
sharing of scientific information at the CERN (European Center for Nuclear
Research) few could have imagined the role it would come to play in the
following decades. Since then, the increasing ubiquity of Internet access and
the frequency with which people interact with it raise the possibility of using
the Web to better observe, understand, and monitor several aspects of human
social behavior. Web sites with large numbers of frequently returning users are
ideal for this task. If these sites belong to companies or universities, their
usage patterns can furnish information about the working habits of entire
populations. In this work, we analyze the properly anonymized logs detailing
the access history to Emory University's Web site. Emory is a medium size
university located in Atlanta, Georgia. We find interesting structure in the
activity patterns of the domain and study in a systematic way the main forces
behind the dynamics of the traffic. In particular, we show that both linear
preferential linking and priority based queuing are essential ingredients to
understand the way users navigate the Web.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 21:19:54 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2008 17:39:20 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Goncalves",
"Bruno",
""
],
[
"Ramasco",
"Jose J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0803.4025 | Ganesh M. Narayan | Ganesh M. Narayan, K. Gopinath, V. Sridhar | Structure and Interpretation of Computer Programs | 9 pages, 10pt, double column, 15 figures | 2nd IEEE International Symposium on Theoretical Aspects of
Software Engineering, 2008, Nanjing, China | 10.1109/TASE.2008.40 | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Call graphs depict the static, caller-callee relation between "functions" in
a program. With most source/target languages supporting functions as the
primitive unit of composition, call graphs naturally form the fundamental
control flow representation available to understand/develop software. They are
also the substrate on which various interprocedural analyses are performed and
are integral part of program comprehension/testing. Given their universality
and usefulness, it is imperative to ask if call graphs exhibit any intrinsic
graph theoretic features -- across versions, program domains and source
languages. This work is an attempt to answer these questions: we present and
investigate a set of meaningful graph measures that help us understand call
graphs better; we establish how these measures correlate, if any, across
different languages and program domains; we also assess the overall, language
independent software quality by suitably interpreting these measures.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 22:58:43 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Narayan",
"Ganesh M.",
""
],
[
"Gopinath",
"K.",
""
],
[
"Sridhar",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0803.4026 | Martin Wainwright | Arash A. Amini, Martin J. Wainwright | High-dimensional analysis of semidefinite relaxations for sparse
principal components | Published in at http://dx.doi.org/10.1214/08-AOS664 the Annals of
Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical
Statistics (http://www.imstat.org) | Annals of Statistics 2009, Vol. 37, No. 5B, 2877-2921 | 10.1214/08-AOS664 | IMS-AOS-AOS664 | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal component analysis (PCA) is a classical method for dimensionality
reduction based on extracting the dominant eigenvectors of the sample
covariance matrix. However, PCA is well known to behave poorly in the ``large
$p$, small $n$'' setting, in which the problem dimension $p$ is comparable to
or larger than the sample size $n$. This paper studies PCA in this
high-dimensional regime, but under the additional assumption that the maximal
eigenvector is sparse, say, with at most $k$ nonzero components. We consider a
spiked covariance model in which a base matrix is perturbed by adding a
$k$-sparse maximal eigenvector, and we analyze two computationally tractable
methods for recovering the support set of this maximal eigenvector, as follows:
(a) a simple diagonal thresholding method, which transitions from success to
failure as a function of the rescaled sample size
$\theta_{\mathrm{dia}}(n,p,k)=n/[k^2\log(p-k)]$; and (b) a more sophisticated
semidefinite programming (SDP) relaxation, which succeeds once the rescaled
sample size $\theta_{\mathrm{sdp}}(n,p,k)=n/[k\log(p-k)]$ is larger than a
critical threshold. In addition, we prove that no method, including the best
method which has exponential-time complexity, can succeed in recovering the
support if the order parameter $\theta_{\mathrm{sdp}}(n,p,k)$ is below a
threshold. Our results thus highlight an interesting trade-off between
computational and statistical efficiency in high-dimensional inference.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2008 23:08:05 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Aug 2009 05:38:39 GMT"
}
] | 2009-08-26T00:00:00 | [
[
"Amini",
"Arash A.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0803.4030 | David Eppstein | David Eppstein | Learning Sequences | 37 pages, 15 figures. To appear as a chapter of J.-Cl. Falmagne, C.
Doble, and X. Hu, eds., Knowledge Spaces: Applications in Education | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe the algorithms used by the ALEKS computer learning system for
manipulating combinatorial descriptions of human learners' states of knowledge,
generating all states that are possible according to a description of a
learning space in terms of a partial order, and using Bayesian statistics to
determine the most likely state of a student. As we describe, a representation
of a knowledge space using learning sequences (basic words of an antimatroid)
allows more general learning spaces to be implemented with similar algorithmic
complexity. We show how to define a learning space from a set of learning
sequences, find a set of learning sequences that concisely represents a given
learning space, generate all states of a learning space represented in this
way, and integrate this state generation procedure into a knowledge assessment
algorithm. We also describe some related theoretical results concerning
projections of learning spaces, decomposition and dimension of learning spaces,
and algebraic representation of learning spaces.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 00:07:55 GMT"
}
] | 2008-03-31T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.4049 | Ke Liu | Ke Liu and Nael Abu-Ghazaleh | Stateless and Delivery Guaranteed Geometric Routing on Virtual
Coordinate System | null | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stateless geographic routing provides relatively good performance at a fixed
overhead, which is typically much lower than conventional routing protocols
such as AODV. However, the performance of geographic routing is impacted by
physical voids, and localization errors. Accordingly, virtual coordinate
systems (VCS) were proposed as an alternative approach that is resilient to
localization errors and that naturally routes around physical voids. However,
VCS also faces virtual anomalies, causing their performance to trail geographic
routing. In existing VCS routing protocols, there is a lack of an effective
stateless and delivery guaranteed complementary routing algorithm that can be
used to traverse voids. Most proposed solutions use variants of flooding or
blind searching when a void is encountered. In this paper, we propose a
spanning-path virtual coordinate system which can be used as a complete routing
algorithm or as the complementary algorithm to greedy forwarding that is
invoked when voids are encountered. With this approach, and for the first time,
we demonstrate a stateless and delivery guaranteed geometric routing algorithm
on VCS. When used in conjunction with our previously proposed aligned virtual
coordinate system (AVCS), it out-performs not only all geometric routing
protocols on VCS, but also geographic routing with accurate location
information.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 05:58:51 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Mar 2008 02:53:24 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Liu",
"Ke",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0803.4074 | Yoshiharu Maeno | Yoshiharu Maeno and Yukio Ohsawa | Reflective visualization and verbalization of unconscious preference | This will be submitted to KES Journal | International Journal of Advanced Intelligence Paradigms Vol.2,
pp.125-139 (2010) | 10.1504/IJAIP.2010.030531 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new method is presented, that can help a person become aware of his or her
unconscious preferences, and convey them to others in the form of verbal
explanation. The method combines the concepts of reflection, visualization, and
verbalization. The method was tested in an experiment where the unconscious
preferences of the subjects for various artworks were investigated. In the
experiment, two lessons were learned. The first is that it helps the subjects
become aware of their unconscious preferences to verbalize weak preferences as
compared with strong preferences through discussion over preference diagrams.
The second is that it is effective to introduce an adjustable factor into
visualization to adapt to the differences in the subjects and to foster their
mutual understanding.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 09:36:58 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Feb 2009 14:43:13 GMT"
}
] | 2010-09-28T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
],
[
"Ohsawa",
"Yukio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0803.4096 | J. G. Esteve | J. G. Esteve and Fernando Falceto | On the number of $k$-cycles in the assignment problem for random
matrices | To appear in Journal of Statistical Mechanics | null | 10.1088/1742-5468/2008/03/P03019 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We continue the study of the assignment problem for a random cost matrix. We
analyse the number of $k$-cycles for the solution and their dependence on the
symmetry of the random matrix. We observe that for a symmetric matrix one and
two-cycles are dominant in the optimal solution. In the antisymmetric case the
situation is the opposite and the one and two-cycles are suppressed. We solve
the model for a pure random matrix (without correlations between its entries)
and give analytic arguments to explain the numerical results in the symmetric
and antisymmetric case. We show that the results can be explained to great
accuracy by a simple ansatz that connects the expected number of $k$-cycles to
that of one and two cycles.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 12:23:13 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Esteve",
"J. G.",
""
],
[
"Falceto",
"Fernando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.4197 | Vladimir Privman | V. Privman, G. Strack, D. Solenov, M. Pita, E. Katz | Optimization of Enzymatic Biochemical Logic for Noise Reduction and
Scalability: How Many Biocomputing Gates Can Be Interconnected in a Circuit? | null | J. Phys. Chem. B 112, 11777-11784 (2008) | 10.1021/jp802673q | null | q-bio.MN cond-mat.other cond-mat.soft cs.CC q-bio.BM q-bio.OT q-bio.QM quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report an experimental evaluation of the "input-output surface" for a
biochemical AND gate. The obtained data are modeled within the rate-equation
approach, with the aim to map out the gate function and cast it in the language
of logic variables appropriate for analysis of Boolean logic for scalability.
In order to minimize "analog" noise, we consider a theoretical approach for
determining an optimal set for the process parameters to minimize "analog"
noise amplification for gate concatenation. We establish that under optimized
conditions, presently studied biochemical gates can be concatenated for up to
order 10 processing steps. Beyond that, new paradigms for avoiding noise
build-up will have to be developed. We offer a general discussion of the ideas
and possible future challenges for both experimental and theoretical research
for advancing scalable biochemical computing.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 19:52:30 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Sep 2008 16:34:17 GMT"
}
] | 2010-10-12T00:00:00 | [
[
"Privman",
"V.",
""
],
[
"Strack",
"G.",
""
],
[
"Solenov",
"D.",
""
],
[
"Pita",
"M.",
""
],
[
"Katz",
"E.",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Physics",
"code": "cond-mat.soft",
"description": "Membranes, polymers, liquid crystals, glasses, colloids, granular matter",
"span": "(Soft Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0803.4206 | Troy Lee | Troy Lee, Rajat Mittal | Product theorems via semidefinite programming | Typos corrected, some points clarified | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The tendency of semidefinite programs to compose perfectly under product has
been exploited many times in complexity theory: for example, by Lovasz to
determine the Shannon capacity of the pentagon; to show a direct sum theorem
for non-deterministic communication complexity and direct product theorems for
discrepancy; and in interactive proof systems to show parallel repetition
theorems for restricted classes of games.
Despite all these examples of product theorems--some going back nearly thirty
years--it was only recently that Mittal and Szegedy began to develop a general
theory to explain when and why semidefinite programs behave perfectly under
product. This theory captured many examples in the literature, but there were
also some notable exceptions which it could not explain--namely, an early
parallel repetition result of Feige and Lovasz, and a direct product theorem
for the discrepancy method of communication complexity by Lee, Shraibman, and
Spalek.
We extend the theory of Mittal and Szegedy to explain these cases as well.
Indeed, to the best of our knowledge, our theory captures all examples of
semidefinite product theorems in the literature.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 20:27:47 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2008 20:12:53 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Lee",
"Troy",
""
],
[
"Mittal",
"Rajat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.4223 | Greig Cowan Dr | Greig A. Cowan, Graeme A. Stewart, Andrew Elwell | Unified storage systems for distributed Tier-2 centres | 12 pages, 14 figures. Contribution to CHEP 2007 | J.Phys.Conf.Ser.119:062027,2008 | 10.1088/1742-6596/119/6/062027 | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The start of data taking at the Large Hadron Collider will herald a new era
in data volumes and distributed processing in particle physics. Data volumes of
hundreds of Terabytes will be shipped to Tier-2 centres for analysis by the LHC
experiments using the Worldwide LHC Computing Grid (WLCG).
In many countries Tier-2 centres are distributed between a number of
institutes, e.g., the geographically spread Tier-2s of GridPP in the UK. This
presents a number of challenges for experiments to utilise these centres
efficaciously, as CPU and storage resources may be sub-divided and exposed in
smaller units than the experiment would ideally want to work with. In addition,
unhelpful mismatches between storage and CPU at the individual centres may be
seen, which make efficient exploitation of a Tier-2's resources difficult.
One method of addressing this is to unify the storage across a distributed
Tier-2, presenting the centres' aggregated storage as a single system. This
greatly simplifies data management for the VO, which then can access a greater
amount of data across the Tier-2. However, such an approach will lead to
scenarios where analysis jobs on one site's batch system must access data
hosted on another site.
We investigate this situation using the Glasgow and Edinburgh clusters, which
are part of the ScotGrid distributed Tier-2. In particular we look at how to
mitigate the problems associated with ``distant'' data access and discuss the
security implications of having LAN access protocols traverse the WAN between
centres.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2008 23:26:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Cowan",
"Greig A.",
""
],
[
"Stewart",
"Graeme A.",
""
],
[
"Elwell",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.4240 | Sebastien Verel | S\'ebastien Verel (I3S), Philippe Collard (I3S), Marco Tomassini
(ISI), Leonardo Vanneschi (ISI) | Neutral Fitness Landscape in the Cellular Automata Majority Problem | null | Dans ACRI 2006 - 7th International Conference on Cellular Automata
For Research and Industry - ACRI 2006, France (2006) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study in detail the fitness landscape of a difficult cellular automata
computational task: the majority problem. Our results show why this problem
landscape is so hard to search, and we quantify the large degree of neutrality
found in various ways. We show that a particular subspace of the solution
space, called the "Olympus", is where good solutions concentrate, and give
measures to quantitatively characterize this subspace.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 07:50:24 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Tomassini",
"Marco",
"",
"ISI"
],
[
"Vanneschi",
"Leonardo",
"",
"ISI"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.4241 | Sebastien Verel | Maroun Bercachi (I3S), Philippe Collard (I3S), Manuel Clergue (I3S),
S\'ebastien Verel (I3S) | Evolving Dynamic Change and Exchange of Genotype Encoding in Genetic
Algorithms for Difficult Optimization Problems | null | Dans Proceedings of the IEEE Congress on Evolutionary Computation
CEC2007 - IEEE Congress on Evolutionary Computation CEC2007, singapore :
Singapour (2007) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The application of genetic algorithms (GAs) to many optimization problems in
organizations often results in good performance and high quality solutions. For
successful and efficient use of GAs, it is not enough to simply apply simple
GAs (SGAs). In addition, it is necessary to find a proper representation for
the problem and to develop appropriate search operators that fit well to the
properties of the genotype encoding. The representation must at least be able
to encode all possible solutions of an optimization problem, and genetic
operators such as crossover and mutation should be applicable to it. In this
paper, serial alternation strategies between two codings are formulated in the
framework of dynamic change of genotype encoding in GAs for function
optimization. Likewise, a new variant of GAs for difficult optimization
problems denoted {\it Split-and-Merge} GA (SM-GA) is developed using a parallel
implementation of an SGA and evolving a dynamic exchange of individual
representation in the context of Dual Coding concept. Numerical experiments
show that the evolved SM-GA significantly outperforms an SGA with static single
coding.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 07:51:18 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bercachi",
"Maroun",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.4248 | Sebastien Verel | David Simoncini (I3S), Philippe Collard (I3S), S\'ebastien Verel
(I3S), Manuel Clergue (I3S) | From Cells to Islands: An unified Model of Cellular Parallel Genetic
Algorithms | null | Dans ACRI 2006, 7th International Conference - 7th International
Conference on Cellular Automata For Research and Industry - ACRI 2006,
Perpignan : France (2006) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the Anisotropic selection scheme for cellular Genetic
Algorithms (cGA). This new scheme allows to enhance diversity and to control
the selective pressure which are two important issues in Genetic Algorithms,
especially when trying to solve difficult optimization problems. Varying the
anisotropic degree of selection allows swapping from a cellular to an island
model of parallel genetic algorithm. Measures of performances and diversity
have been performed on one well-known problem: the Quadratic Assignment Problem
which is known to be difficult to optimize. Experiences show that, tuning the
anisotropic degree, we can find the accurate trade-off between cGA and island
models to optimize performances of parallel evolutionary algorithms. This
trade-off can be interpreted as the suitable degree of migration among
subpopulations in a parallel Genetic Algorithm.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 08:20:58 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Simoncini",
"David",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0803.4253 | Jean-Marie Chauvet | Jean-Marie Chauvet | Combinatorial Explorations in Su-Doku | null | null | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Su-Doku, a popular combinatorial puzzle, provides an excellent testbench for
heuristic explorations. Several interesting questions arise from its
deceptively simple set of rules. How many distinct Su-Doku grids are there? How
to find a solution to a Su-Doku puzzle? Is there a unique solution to a given
Su-Doku puzzle? What is a good estimation of a puzzle's difficulty? What is the
minimum puzzle size (the number of "givens")?
This paper explores how these questions are related to the well-known
alldifferent constraint which emerges in a wide variety of Constraint
Satisfaction Problems (CSP) and compares various algorithmic approaches based
on different formulations of Su-Doku.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 10:07:42 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Chauvet",
"Jean-Marie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.4260 | Xin Han | Xin Han, Kazuo Iwama, Guochuan Zhang | On Two Dimensional Orthogonal Knapsack Problem | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the following knapsack problem: Given a list of
squares with profits, we are requested to pack a sublist of them into a
rectangular bin (not a unit square bin) to make profits in the bin as large as
possible. We first observe there is a Polynomial Time Approximation Scheme
(PTAS) for the problem of packing weighted squares into rectangular bins with
large resources, then apply the PTAS to the problem of packing squares with
profits into a rectangular bin and get a $\frac65+\epsilon$ approximation
algorithm.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 11:15:11 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Zhang",
"Guochuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.4261 | Mari\'an Dvorsk\'y | Mari\'an Dvorsk\'y | Common Permutation Problem | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we show that the following problem is NP-complete: Given an
alphabet $\Sigma$ and two strings over $\Sigma$, the question is whether there
exists a permutation of $\Sigma$ which is a subsequence of both of the given
strings.
| [
{
"version": "v1",
"created": "Sat, 29 Mar 2008 11:32:29 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Dvorský",
"Marián",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.4308 | Vandy Berten | Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo | Discrete Frequency Selection of Frame-Based Stochastic Real-Time Tasks | 10 pages | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy-efficient real-time task scheduling has been actively explored in the
past decade. Different from the past work, this paper considers schedulability
conditions for stochastic real-time tasks. A schedulability condition is first
presented for frame-based stochastic real-time tasks, and several algorithms
are also examined to check the schedulability of a given strategy. An approach
is then proposed based on the schedulability condition to adapt a
continuous-speed-based method to a discrete-speed system. The approach is able
to stay as close as possible to the continuous-speed-based method, but still
guaranteeing the schedulability. It is shown by simulations that the energy
saving can be more than 20% for some system configurations
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2008 09:26:38 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2008 07:55:38 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Berten",
"Vandy",
""
],
[
"Chang",
"Chi-Ju",
""
],
[
"Kuo",
"Tei-Wei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0803.4311 | Victor Grishchenko | Victor Grishchenko | Locator/identifier split using the data link layer | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The locator/identifier split approach assumes separating functions of a
locator (i.e. topology--dependent attachment point address) and identifier
(topology-independent unique identifier) currently both served by an IP
address. This work is an attempt to redefine semantics of MAC address to make
it a pure layer-2 locator instead of a pure globally-unique identifier. Such an
exercise might be interesting from the standpoint of Ethernet scaling and Metro
Ethernet technologies. From the global routing perspective, introduction of
multihoming, traffic engineering and failover at the 2nd layer may reduce
pressure on the 3rd layer.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2008 09:38:53 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Grishchenko",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.4321 | Samuel Marateck | Samuel L. Marateck | How good is the Warnsdorff's knight's tour heuristic? | 3 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Warnsdorffs rule for a knights tour is a heuristic, i.e., it is a rule that
does not produce the desired result all the time. It is a classic example of a
greedy method in that it is based on a series of locally optimal choices. This
note describes an analysis that determines how good the heuristic is on an 8 X
8 chessboard. The order of appearance in a permutation of the eight possible
moves a knight can make determines the path the knight takes. A computer
analysis is done of the 8! permutations of the order of a knights moves in
Warnsdorffs rule on an 8 X 8 chessboard for tours starting on each of the 64
squares. Whenever a tie occurs for moves to vertices that have the lowest
degree, the first of these vertices encountered in the programming loop is
chosen. The number of permutations of the 8! total that yield non-Hamiltonian
paths is tallied. This will be the same value if we consistently choose the
last of these vertices encountered.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2008 20:09:54 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Marateck",
"Samuel L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.4332 | Gusztav Morvai | G. Morvai and B. Weiss | On Sequential Estimation and Prediction for Discrete Time Series | null | Stochastics and Dynamics, Vol. 7, No. 4. pp. 417-437, 2007 | null | null | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of extracting as much information as possible from a sequence of
observations of a stationary stochastic process $X_0,X_1,...X_n$ has been
considered by many authors from different points of view. It has long been
known through the work of D. Bailey that no universal estimator for
$\textbf{P}(X_{n+1}|X_0,X_1,...X_n)$ can be found which converges to the true
estimator almost surely. Despite this result, for restricted classes of
processes, or for sequences of estimators along stopping times, universal
estimators can be found. We present here a survey of some of the recent work
that has been done along these lines.
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2008 18:07:02 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Weiss",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0803.4354 | Moustapha Diaby | Moustapha Diaby | A O(n^8) X O(n^7) Linear Programming Model of the Traveling Salesman
Problem | Theorem 25 and Corollary 26 are incorrect. The modeling needs
9-dimensional variables instead of the 8-dimensional variables defined in
notations 10.2. For fully-detailed exposition of the correct model see the
book available at: The correct modeling is fully detailed in the book
available at: http://www.worldscientific.com/worldscibooks/10.1142/9725 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a new linear programming (LP) formulation of the
Traveling Salesman Problem (TSP). The proposed model has O(n^8) variables and
O(n^7) constraints, where n is the number of cities. Our numerical
experimentation shows that computational times for the proposed linear program
are several orders of magnitude smaller than those for the existing model [3].
| [
{
"version": "v1",
"created": "Sun, 30 Mar 2008 23:26:50 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Sep 2010 21:08:18 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Sep 2013 03:16:08 GMT"
},
{
"version": "v4",
"created": "Sun, 2 Mar 2014 15:12:27 GMT"
},
{
"version": "v5",
"created": "Tue, 18 Mar 2014 19:34:06 GMT"
},
{
"version": "v6",
"created": "Thu, 20 Oct 2016 16:58:38 GMT"
}
] | 2016-10-21T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0803.4355 | Marko A. Rodriguez | Marko A. Rodriguez | Grammar-Based Random Walkers in Semantic Networks | First draft of manuscript originally written in November 2006 | Rodriguez, M.A., "Grammar-Based Random Walkers in Semantic
Networks", Knowledge-Based Systems, volume 21, issue 7, pages 727-739, ISSN:
0950-7051, Elsevier, October 2008 | 10.1016/j.knosys.2008.03.030 | LA-UR-06-7791 | cs.AI cs.DS | http://creativecommons.org/licenses/publicdomain/ | Semantic networks qualify the meaning of an edge relating any two vertices.
Determining which vertices are most "central" in a semantic network is
difficult because one relationship type may be deemed subjectively more
important than another. For this reason, research into semantic network metrics
has focused primarily on context-based rankings (i.e. user prescribed
contexts). Moreover, many of the current semantic network metrics rank semantic
associations (i.e. directed paths between two vertices) and not the vertices
themselves. This article presents a framework for calculating semantically
meaningful primary eigenvector-based metrics such as eigenvector centrality and
PageRank in semantic networks using a modified version of the random walker
model of Markov chain analysis. Random walkers, in the context of this article,
are constrained by a grammar, where the grammar is a user defined data
structure that determines the meaning of the final vertex ranking. The ideas in
this article are presented within the context of the Resource Description
Framework (RDF) of the Semantic Web initiative.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 00:13:26 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Sep 2008 23:58:07 GMT"
}
] | 2008-09-11T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0803.4370 | L.T. Handoko | Z. Akbar and L.T. Handoko | GRID Architecture through a Public Cluster | 5 pages, Proceeding of the 2008 International Conference on Computer
and Communication Engineering | null | 10.1109/ICCCE.2008.4580761 | FISIKALIPI-08032 | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An architecture to enable some blocks consisting of several nodes in a public
cluster connected to different grid collaborations is introduced. It is
realized by inserting a web-service in addition to the standard Globus Toolkit.
The new web-service performs two main tasks : authenticate the digital
certificate contained in an incoming requests and forward it to the designated
block. The appropriate block is mapped with the username of the block's owner
contained in the digital certificate. It is argued that this algorithm opens an
opportunity for any blocks in a public cluster to join various global grids.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 05:05:04 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2008 13:04:20 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Jan 2009 01:58:27 GMT"
}
] | 2009-03-06T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0803.4373 | Yeong-Cherng Liang | Andrew C. Doherty (University of Queensland), Yeong-Cherng Liang
(University of Queensland), Ben Toner (CWI), Stephanie Wehner (Caltech) | The quantum moment problem and bounds on entangled multi-prover games | 33 pages, To appear at CCC'08 | Proceedings of IEEE Conference on Computational Complexity 2008,
pages 199--210 | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the quantum moment problem: Given a conditional probability
distribution together with some polynomial constraints, does there exist a
quantum state rho and a collection of measurement operators such that (i) the
probability of obtaining a particular outcome when a particular measurement is
performed on rho is specified by the conditional probability distribution, and
(ii) the measurement operators satisfy the constraints. For example, the
constraints might specify that some measurement operators must commute.
We show that if an instance of the quantum moment problem is unsatisfiable,
then there exists a certificate of a particular form proving this. Our proof is
based on a recent result in algebraic geometry, the noncommutative
Positivstellensatz of Helton and McCullough [Trans. Amer. Math. Soc.,
356(9):3721, 2004].
A special case of the quantum moment problem is to compute the value of
one-round multi-prover games with entangled provers. Under the conjecture that
the provers need only share states in finite-dimensional Hilbert spaces, we
prove that a hierarchy of semidefinite programs similar to the one given by
Navascues, Pironio and Acin [Phys. Rev. Lett., 98:010401, 2007] converges to
the entangled value of the game. It follows that the class of languages
recognized by a multi-prover interactive proof system where the provers share
entanglement is recursive.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 18:39:29 GMT"
}
] | 2009-01-20T00:00:00 | [
[
"Doherty",
"Andrew C.",
"",
"University of Queensland"
],
[
"Liang",
"Yeong-Cherng",
"",
"University of Queensland"
],
[
"Toner",
"Ben",
"",
"CWI"
],
[
"Wehner",
"Stephanie",
"",
"Caltech"
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0803.4479 | Laszlo Kish | Laszlo B. Kish and Olivier Saidi | Unconditionally secure computers, algorithms and hardware, such as
memories, processors, keyboards, flash and hard drives | 4 pages | Fluctuation and Noise Letters 8 (2008) L95-L98 | 10.1142/S0219477508004362 | null | physics.gen-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the case of the need of extraordinary security,
Kirchhoff-loop-Johnson-(like)-noise ciphers can easily be integrated on
existing types of digital chips in order to provide secure data communication
between hardware processors, memory chips, hard disks and other units within a
computer or other data processor system. The secure key exchange can take place
at the very first run and the system can renew the key later at random times
with an authenticated fashion to prohibit man-in-the-middle attack. The key can
be stored in flash memories within the communicating chip units at hidden
random addresses among other random bits that are continuously generated by the
secure line but are never actually used. Thus, even if the system is
disassembled, and the eavesdropper can have direct access to the communication
lines between the units, or even if she is trying to use a man-in-the-middle
attack, no information can be extracted. The only way to break the code is to
learn the chip structure, to understand the machine code program and to read
out the information during running by accessing the proper internal ports of
the working chips. However such an attack needs extraordinary resources and
even that can be prohibited by a password lockout. The unconditional security
of commercial algorithms against piracy can be provided in a similar way.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 15:36:33 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 16:57:53 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Apr 2008 01:03:12 GMT"
}
] | 2011-08-16T00:00:00 | [
[
"Kish",
"Laszlo B.",
""
],
[
"Saidi",
"Olivier",
""
]
] | [
{
"class": "Physics",
"code": "physics.gen-ph",
"description": "Description coming soon",
"span": "(General Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0803.4511 | Herbert van de Sompel | Herbert Van de Sompel, Ryan Chute, Patrick Hochstenbach | The aDORe Federation Architecture | 43 pages, 4 figures, 2 tables | null | null | null | cs.DL | http://creativecommons.org/licenses/publicdomain/ | The need to federate repositories emerges in two distinctive scenarios. In
one scenario, scalability-related problems in the operation of a repository
reach a point beyond which continued service requires parallelization and hence
federation of the repository infrastructure. In the other scenario, multiple
distributed repositories manage collections of interest to certain communities
or applications, and federation is an approach to present a unified perspective
across these repositories. The high-level, 3-Tier aDORe federation architecture
can be used as a guideline to federate repositories in both cases. This paper
describes the architecture, consisting of core interfaces for federated
repositories in Tier-1, two shared infrastructure components in Tier-2, and a
single-point of access to the federation in Tier-3. The paper also illustrates
two large-scale deployments of the aDORe federation architecture: the aDORe
Archive repository (over 100,000,000 digital objects) at the Los Alamos
National Laboratory and the Ghent University Image Repository federation
(multiple terabytes of image files).
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 18:02:57 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Van de Sompel",
"Herbert",
""
],
[
"Chute",
"Ryan",
""
],
[
"Hochstenbach",
"Patrick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0803.4516 | Robert Spalek | Robert Spalek (Google) | A Dual Polynomial for OR | 6 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We reprove that the approximate degree of the OR function on n bits is
Omega(sqrt(n)). We consider a linear program which is feasible if and only if
there is an approximate polynomial for a given function, and apply the duality
theory. The duality theory says that the primal program has no solution if and
only if its dual has a solution. Therefore one can prove the nonexistence of an
approximate polynomial by exhibiting a dual solution, coined the dual
polynomial. We construct such a polynomial.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 18:20:53 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Spalek",
"Robert",
"",
"Google"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.0006 | Denis Krotov | Sergey Avgustinovich (Sobolev Institute of Mathematics, Novosibirsk,
Russia), Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | Embedding in a perfect code | Eng: 5pp, Rus: 5pp. V3: revised, a survey added; the accepted
version; Russian translation added | J. Comb. Des. 17(5) 2009, 419-423 | 10.1002/jcd.20207 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A binary 1-error-correcting code can always be embedded in a 1-perfect code
of some larger length
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 01:42:59 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Sep 2008 18:09:39 GMT"
},
{
"version": "v3",
"created": "Sat, 30 Apr 2016 21:12:50 GMT"
}
] | 2016-05-03T00:00:00 | [
[
"Avgustinovich",
"Sergey",
"",
"Sobolev Institute of Mathematics, Novosibirsk,\n Russia"
],
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0036 | Mathieu Dutour Sikiri\'c | Mathieu Dutour Sikiric, Achill Schuermann, Frank Vallentin | Complexity and algorithms for computing Voronoi cells of lattices | 20 pages, 2 figures, 5 tables | Math. Comp. 267 (2009), 1713-1731 | 10.1090/S0025-5718-09-02224-8 | null | math.MG cs.CG cs.IT math.IT math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we are concerned with finding the vertices of the Voronoi cell
of a Euclidean lattice. Given a basis of a lattice, we prove that computing the
number of vertices is a #P-hard problem. On the other hand we describe an
algorithm for this problem which is especially suited for low dimensional (say
dimensions at most 12) and for highly-symmetric lattices. We use our
implementation, which drastically outperforms those of current computer algebra
systems, to find the vertices of Voronoi cells and quantizer constants of some
prominent lattices.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 22:02:47 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 08:46:52 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Aug 2008 09:10:56 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Sep 2008 07:55:26 GMT"
}
] | 2009-05-04T00:00:00 | [
[
"Sikiric",
"Mathieu Dutour",
""
],
[
"Schuermann",
"Achill",
""
],
[
"Vallentin",
"Frank",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0804.0041 | Farzad Parvaresh | Mihailo Stojnic, Farzad Parvaresh and Babak Hassibi | On the reconstruction of block-sparse signals with an optimal number of
measurements | null | null | 10.1016/j.jmr.2011.02.015 | null | cs.IT cs.NA math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let A be an M by N matrix (M < N) which is an instance of a real random
Gaussian ensemble. In compressed sensing we are interested in finding the
sparsest solution to the system of equations A x = y for a given y. In general,
whenever the sparsity of x is smaller than half the dimension of y then with
overwhelming probability over A the sparsest solution is unique and can be
found by an exhaustive search over x with an exponential time complexity for
any y. The recent work of Cand\'es, Donoho, and Tao shows that minimization of
the L_1 norm of x subject to A x = y results in the sparsest solution provided
the sparsity of x, say K, is smaller than a certain threshold for a given
number of measurements. Specifically, if the dimension of y approaches the
dimension of x, the sparsity of x should be K < 0.239 N. Here, we consider the
case where x is d-block sparse, i.e., x consists of n = N / d blocks where each
block is either a zero vector or a nonzero vector. Instead of L_1-norm
relaxation, we consider the following relaxation min x \| X_1 \|_2 + \| X_2
\|_2 + ... + \| X_n \|_2, subject to A x = y where X_i = (x_{(i-1)d+1},
x_{(i-1)d+2}, ..., x_{i d}) for i = 1,2, ..., N. Our main result is that as n
-> \infty, the minimization finds the sparsest solution to Ax = y, with
overwhelming probability in A, for any x whose block sparsity is k/n < 1/2 -
O(\epsilon), provided M/N > 1 - 1/d, and d = \Omega(\log(1/\epsilon)/\epsilon).
The relaxation can be solved in polynomial time using semi-definite
programming.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2008 23:00:33 GMT"
}
] | 2011-03-09T00:00:00 | [
[
"Stojnic",
"Mihailo",
""
],
[
"Parvaresh",
"Farzad",
""
],
[
"Hassibi",
"Babak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0050 | Nicholas Letzepis A | Nick Letzepis and Albert Guillen i Fabregas | Outage Probability of the Gaussian MIMO Free-Space Optical Channel with
PPM | 24 pages, 3 figures, 2 tables. Submitted to the IEEE Journal of
Lightwave Technology | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The free-space optical channel has the potential to facilitate inexpensive,
wireless communication with fiber-like bandwidth under short deployment
timelines. However, atmospheric effects can significantly degrade the
reliability of a free-space optical link. In particular, atmospheric turbulence
causes random fluctuations in the irradiance of the received laser beam,
commonly referred to as scintillation. The scintillation process is slow
compared to the large data rates typical of optical transmission. As such, we
adopt a quasi-static block fading model and study the outage probability of the
channel under the assumption of orthogonal pulse-position modulation. We
investigate the mitigation of scintillation through the use of multiple lasers
and multiple apertures, thereby creating a multiple-input multiple output
(MIMO) channel. Non-ideal photodetection is also assumed such that the combined
shot noise and thermal noise are considered as signal-independent Additive
Gaussian white noise. Assuming perfect receiver channel state information
(CSI), we compute the signal-to-noise ratio exponents for the cases when the
scintillation is lognormal, exponential and gamma-gamma distributed, which
cover a wide range of atmospheric turbulence conditions. Furthermore, we
illustrate very large gains, in some cases larger than 15 dB, when transmitter
CSI is also available by adapting the transmitted electrical power.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 00:30:10 GMT"
}
] | 2008-04-02T00:00:00 | [
[
"Letzepis",
"Nick",
""
],
[
"Fabregas",
"Albert Guillen i",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.