id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0804.0066 | Peter Schachte | Kevin Henshall, Peter Schachte, Harald S{\o}ndergaard and Leigh
Whiting | Binary Decision Diagrams for Affine Approximation | 15 pages | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Selman and Kautz's work on ``knowledge compilation'' established how
approximation (strengthening and/or weakening) of a propositional
knowledge-base can be used to speed up query processing, at the expense of
completeness. In this classical approach, querying uses Horn over- and
under-approximations of a given knowledge-base, which is represented as a
propositional formula in conjunctive normal form (CNF). Along with the class of
Horn functions, one could imagine other Boolean function classes that might
serve the same purpose, owing to attractive deduction-computational properties
similar to those of the Horn functions. Indeed, Zanuttini has suggested that
the class of affine Boolean functions could be useful in knowledge compilation
and has presented an affine approximation algorithm. Since CNF is awkward for
presenting affine functions, Zanuttini considers both a sets-of-models
representation and the use of modulo 2 congruence equations. In this paper, we
propose an algorithm based on reduced ordered binary decision diagrams
(ROBDDs). This leads to a representation which is more compact than the sets of
models and, once we have established some useful properties of affine Boolean
functions, a more efficient algorithm.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 05:08:44 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"Henshall",
"Kevin",
""
],
[
"Schachte",
"Peter",
""
],
[
"Søndergaard",
"Harald",
""
],
[
"Whiting",
"Leigh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0074 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Private Handshakes | null | n F. Stajano, editor, 4th Eur. Symp. on Security and Privacy in Ad
hoc and Sensor Networks, LNCS 4572, pages 31-42, Cambridge, UK, June 2-3 2007 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Private handshaking allows pairs of users to determine which (secret) groups
they are both a member of. Group membership is kept secret to everybody else.
Private handshaking is a more private form of secret handshaking, because it
does not allow the group administrator to trace users. We extend the original
definition of a handshaking protocol to allow and test for membership of
multiple groups simultaneously. We present simple and efficient protocols for
both the single group and multiple group membership case.
Private handshaking is a useful tool for mutual authentication, demanded by
many pervasive applications (including RFID) for privacy. Our implementations
are efficient enough to support such usually resource constrained scenarios.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 06:01:53 GMT"
}
] | 2008-04-02T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.0134 | Wojciech Mazurczyk | Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew
Kotulski, Radu Lupu, Wojciech Mazurczyk | SecMon: End-to-End Quality and Security Monitoring System | Paper was presented at 7th international conference IBIZA 2008: On
Computer Science - Research And Applications, Poland, Kazimierz Dolny
31.01-2.02 2008; 14 pages, 5 figures | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Voice over Internet Protocol (VoIP) is becoming a more available and
popular way of communicating for Internet users. This also applies to
Peer-to-Peer (P2P) systems and merging these two have already proven to be
successful (e.g. Skype). Even the existing standards of VoIP provide an
assurance of security and Quality of Service (QoS), however, these features are
usually optional and supported by limited number of implementations. As a
result, the lack of mandatory and widely applicable QoS and security guaranties
makes the contemporary VoIP systems vulnerable to attacks and network
disturbances. In this paper we are facing these issues and propose the SecMon
system, which simultaneously provides a lightweight security mechanism and
improves quality parameters of the call. SecMon is intended specially for VoIP
service over P2P networks and its main advantage is that it provides
authentication, data integrity services, adaptive QoS and (D)DoS attack
detection. Moreover, the SecMon approach represents a low-bandwidth consumption
solution that is transparent to the users and possesses a self-organizing
capability. The above-mentioned features are accomplished mainly by utilizing
two information hiding techniques: digital audio watermarking and network
steganography. These techniques are used to create covert channels that serve
as transport channels for lightweight QoS measurement's results. Furthermore,
these metrics are aggregated in a reputation system that enables best route
path selection in the P2P network. The reputation system helps also to mitigate
(D)DoS attacks, maximize performance and increase transmission efficiency in
the network.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 10:46:26 GMT"
}
] | 2008-04-02T00:00:00 | [
[
"Ciszkowski",
"Tomasz",
""
],
[
"Eliasson",
"Charlott",
""
],
[
"Fiedler",
"Markus",
""
],
[
"Kotulski",
"Zbigniew",
""
],
[
"Lupu",
"Radu",
""
],
[
"Mazurczyk",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0804.0143 | Benoit Lemaire | Beno\^it Lemaire (TIMC), Guy Denhi\`ere (LPC) | Effects of High-Order Co-occurrences on Word Semantic Similarities | null | Current Psychology Letters - Behaviour, Brain and Cognition 18, 1
(2006) 1 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A computational model of the construction of word meaning through exposure to
texts is built in order to simulate the effects of co-occurrence values on word
semantic similarities, paragraph by paragraph. Semantic similarity is here
viewed as association. It turns out that the similarity between two words W1
and W2 strongly increases with a co-occurrence, decreases with the occurrence
of W1 without W2 or W2 without W1, and slightly increases with high-order
co-occurrences. Therefore, operationalizing similarity as a frequency of
co-occurrence probably introduces a bias: first, there are cases in which there
is similarity without co-occurrence and, second, the frequency of co-occurrence
overestimates similarity.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 11:33:39 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lemaire",
"Benoît",
"",
"TIMC"
],
[
"Denhière",
"Guy",
"",
"LPC"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0804.0149 | Fabien Mathieu | Bruno Gaume (IRIT), Fabien Mathieu (FT R&D, INRIA Rocquencourt) | From Random Graph to Small World by Wandering | null | null | null | RR-6489 | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Numerous studies show that most known real-world complex networks share
similar properties in their connectivity and degree distribution. They are
called small worlds. This article gives a method to turn random graphs into
Small World graphs by the dint of random walks.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 11:59:43 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2008 08:12:38 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gaume",
"Bruno",
"",
"IRIT"
],
[
"Mathieu",
"Fabien",
"",
"FT R&D, INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0188 | Alexandre d'Aspremont | Ronny Luss, Alexandre d'Aspremont | Support Vector Machine Classification with Indefinite Kernels | Final journal version. A few typos fixed | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for support vector machine classification using
indefinite kernels. Instead of directly minimizing or stabilizing a nonconvex
loss function, our algorithm simultaneously computes support vectors and a
proxy kernel matrix used in forming the loss. This can be interpreted as a
penalized kernel learning problem where indefinite kernel matrices are treated
as a noisy observations of a true Mercer kernel. Our formulation keeps the
problem convex and relatively large problems can be solved efficiently using
the projected gradient or analytic center cutting plane methods. We compare the
performance of our technique with other methods on several classic data sets.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2008 14:55:33 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 11:48:14 GMT"
}
] | 2009-08-04T00:00:00 | [
[
"Luss",
"Ronny",
""
],
[
"d'Aspremont",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0273 | Alwen Tiu | Alwen Tiu and Rajeev Gore | A proof theoretic analysis of intruder theories | This is an extended version of a conference paper accepted to RTA
2009 | null | null | null | cs.LO cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of intruder deduction in security protocol analysis:
that is, deciding whether a given message $M$ can be deduced from a set of
messages $\Gamma$ under the theory of blind signatures and arbitrary convergent
equational theories modulo associativity and commutativity (AC) of certain
binary operators. The traditional formulations of intruder deduction are
usually given in natural-deduction-like systems and proving decidability
requires significant effort in showing that the rules are "local" in some
sense. By using the well-known translation between natural deduction and
sequent calculus, we recast the intruder deduction problem as proof search in
sequent calculus, in which locality is immediate. Using standard proof
theoretic methods, such as permutability of rules and cut elimination, we show
that the intruder deduction problem can be reduced, in polynomial time, to the
elementary deduction problems, which amounts to solving certain equations in
the underlying individual equational theories. We further show that this result
extends to combinations of disjoint AC-convergent theories whereby the
decidability of intruder deduction under the combined theory reduces to the
decidability of elementary deduction in each constituent theory. Although
various researchers have reported similar results for individual cases, our
work shows that these results can be obtained using a systematic and uniform
methodology based on the sequent calculus.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 00:21:27 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Apr 2009 06:52:58 GMT"
}
] | 2009-04-06T00:00:00 | [
[
"Tiu",
"Alwen",
""
],
[
"Gore",
"Rajeev",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.0277 | Marko A. Rodriguez | Marko A. Rodriguez | Mapping Semantic Networks to Undirected Networks | null | International Journal of Applied Mathematics and Computer
Sciences, volume 5, issue 1, pages 39-42, ISSN:2070-3902, LA-UR-07-5287, 2009 | null | LAUR-07-5287 | cs.DS | http://creativecommons.org/licenses/publicdomain/ | There exists an injective, information-preserving function that maps a
semantic network (i.e a directed labeled network) to a directed network (i.e. a
directed unlabeled network). The edge label in the semantic network is
represented as a topological feature of the directed network. Also, there
exists an injective function that maps a directed network to an undirected
network (i.e. an undirected unlabeled network). The edge directionality in the
directed network is represented as a topological feature of the undirected
network. Through function composition, there exists an injective function that
maps a semantic network to an undirected network. Thus, aside from space
constraints, the semantic network construct does not have any modeling
functionality that is not possible with either a directed or undirected network
representation. Two proofs of this idea will be presented. The first is a proof
of the aforementioned function composition concept. The second is a simpler
proof involving an undirected binary encoding of a semantic network.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 01:19:55 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0317 | Maurice H. T. Ling | Maurice HT Ling, Christophe Lefevre, Kevin R. Nicholas | Parts-of-Speech Tagger Errors Do Not Necessarily Degrade Accuracy in
Extracting Information from Biomedical Text | null | Ling, Maurice HT, Lefevre, Christophe, Nicholas, Kevin R. 2008.
Parts-of-Speech Tagger Errors Do Not Necessarily Degrade Accuracy in
Extracting Information from Biomedical Text. The Python Papers 3 (1): 65-80 | null | null | cs.CL cs.IR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | A recent study reported development of Muscorian, a generic text processing
tool for extracting protein-protein interactions from text that achieved
comparable performance to biomedical-specific text processing tools. This
result was unexpected since potential errors from a series of text analysis
processes is likely to adversely affect the outcome of the entire process. Most
biomedical entity relationship extraction tools have used biomedical-specific
parts-of-speech (POS) tagger as errors in POS tagging and are likely to affect
subsequent semantic analysis of the text, such as shallow parsing. This study
aims to evaluate the parts-of-speech (POS) tagging accuracy and attempts to
explore whether a comparable performance is obtained when a generic POS tagger,
MontyTagger, was used in place of MedPost, a tagger trained in biomedical text.
Our results demonstrated that MontyTagger, Muscorian's POS tagger, has a POS
tagging accuracy of 83.1% when tested on biomedical text. Replacing MontyTagger
with MedPost did not result in a significant improvement in entity relationship
extraction from text; precision of 55.6% from MontyTagger versus 56.8% from
MedPost on directional relationships and 86.1% from MontyTagger compared to
81.8% from MedPost on nondirectional relationships. This is unexpected as the
potential for poor POS tagging by MontyTagger is likely to affect the outcome
of the information extraction. An analysis of POS tagging errors demonstrated
that 78.5% of tagging errors are being compensated by shallow parsing. Thus,
despite 83.1% tagging accuracy, MontyTagger has a functional tagging accuracy
of 94.6%.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 09:34:13 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Ling",
"Maurice HT",
""
],
[
"Lefevre",
"Christophe",
""
],
[
"Nicholas",
"Kevin R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0804.0318 | Tobias Kretz | Tobias Kretz and Michael Schreckenberg | Moore and more and symmetry | Proceedings contribution in N. Waldau et al. (editors) "Pedestrian
and Evacuation Dynamics 2005" (2006) pages 297-308. Springer-Verlag Berlin
Heidelberg. ISBN: 978-3-540-47062-5 | null | 10.1007/978-3-540-47064-9_26 | null | cs.MA physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In any spatially discrete model of pedestrian motion which uses a regular
lattice as basis, there is the question of how the symmetry between the
different directions of motion can be restored as far as possible but with
limited computational effort. This question is equivalent to the question ''How
important is the orientation of the axis of discretization for the result of
the simulation?'' An optimization in terms of symmetry can be combined with the
implementation of higher and heterogeniously distributed walking speeds by
representing different walking speeds via different amounts of cells an agent
may move during one round. Therefore all different possible neighborhoods for
speeds up to v = 10 (cells per round) will be examined for the amount of
deviation from radial symmetry. Simple criteria will be stated which will allow
find an optimal neighborhood for each speed. It will be shown that following
these criteria even the best mixture of steps in Moore and von Neumann
neighborhoods is unable to reproduce the optimal neighborhood for a speed as
low as 4.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 09:47:04 GMT"
}
] | 2014-02-10T00:00:00 | [
[
"Kretz",
"Tobias",
""
],
[
"Schreckenberg",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0804.0337 | Raphael Hunger | Raphael Hunger, Michael Joham | On the Convexity of the MSE Region of Single-Antenna Users | submitted to Globecom 2008; fixed definition of matrix S, added 2 KKT
conditions, and few minor changes | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove convexity of the sum-power constrained mean square error (MSE)
region in case of two single-antenna users communicating with a multi-antenna
base station. Due to the MSE duality this holds both for the vector broadcast
channel and the dual multiple access channel. Increasing the number of users to
more than two, we show by means of a simple counter-example that the resulting
MSE region is not necessarily convex any longer, even under the assumption of
single-antenna users. In conjunction with our former observation that the two
user MSE region is not necessarily convex for two multi-antenna users, this
extends and corrects the hitherto existing notion of the MSE region geometry.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 11:57:56 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jul 2008 11:26:03 GMT"
}
] | 2008-07-29T00:00:00 | [
[
"Hunger",
"Raphael",
""
],
[
"Joham",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0352 | \^Hamed \"Owladeghaffari | M.Sharifzadeh, H.Owladeghaffari, K.Shahriar, E.Bakhtavar | Permeability Analysis based on information granulation theory | 8 pages,7 figures | null | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by/3.0/ | This paper describes application of information granulation theory, on the
analysis of "lugeon data". In this manner, using a combining of Self Organizing
Map (SOM) and Neuro-Fuzzy Inference System (NFIS), crisp and fuzzy granules are
obtained. Balancing of crisp granules and sub- fuzzy granules, within non fuzzy
information (initial granulation), is rendered in open-close iteration. Using
two criteria, "simplicity of rules "and "suitable adaptive threshold error
level", stability of algorithm is guaranteed. In other part of paper, rough set
theory (RST), to approximate analysis, has been employed >.Validation of the
proposed methods, on the large data set of in-situ permeability in rock masses,
in the Shivashan dam, Iran, has been highlighted. By the implementation of the
proposed algorithm on the lugeon data set, was proved the suggested method,
relating the approximate analysis on the permeability, could be applied.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 13:45:51 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Sharifzadeh",
"M.",
""
],
[
"Owladeghaffari",
"H.",
""
],
[
"Shahriar",
"K.",
""
],
[
"Bakhtavar",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0353 | \^Hamed \"Owladeghaffari | H.Owladeghaffari, K.Shahriar W. Pedrycz | Graphical Estimation of Permeability Using RST&NFIS | 6 pages;NAFIPS08 | null | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper pursues some applications of Rough Set Theory (RST) and
neural-fuzzy model to analysis of "lugeon data". In the manner, using Self
Organizing Map (SOM) as a pre-processing the data are scaled and then the
dominant rules by RST, are elicited. Based on these rules variations of
permeability in the different levels of Shivashan dam, Iran has been
highlighted. Then, via using a combining of SOM and an adaptive Neuro-Fuzzy
Inference System (NFIS) another analysis on the data was carried out. Finally,
a brief comparison between the obtained results of RST and SOM-NFIS (briefly
SONFIS) has been rendered.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 13:56:10 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Owladeghaffari",
"H.",
""
],
[
"Pedrycz",
"K. Shahriar W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0362 | Lenka Zdeborova | John Ardelius, Lenka Zdeborov\'a | Exhaustive enumeration unveils clustering and freezing in random 3-SAT | 4 pages, 3 figures | Phys. Rev. E 78, 040101(R) (2008) | 10.1103/PhysRevE.78.040101 | null | cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study geometrical properties of the complete set of solutions of the
random 3-satisfiability problem. We show that even for moderate system sizes
the number of clusters corresponds surprisingly well with the theoretic
asymptotic prediction. We locate the freezing transition in the space of
solutions which has been conjectured to be relevant in explaining the onset of
computational hardness in random constraint satisfaction problems.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 14:32:44 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 09:31:46 GMT"
}
] | 2008-10-02T00:00:00 | [
[
"Ardelius",
"John",
""
],
[
"Zdeborová",
"Lenka",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0366 | Patrick Ch\'enais | Patrick Ch\'enais | Merging Object and Process Diagrams for Business Information Modeling | 20 small format pages, 16 figures | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While developing an information system for the University of Bern, we were
faced with two major issues: managing software changes and adapting Business
Information Models. Software techniques well-suited to software development
teams exist, yet the models obtained are often too complex for the business
user. We will first highlight the conceptual problems encountered while
designing the Business Information Model. We will then propose merging class
diagrams and business process modeling to achieve a necessary transparency. We
will finally present a modeling tool we developed which, using pilot case
studies, helps to show some of the advantages of a dual model approach.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 14:50:29 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Chénais",
"Patrick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0804.0385 | Lalitha Sankar | Lalitha Sankar, Narayan B. Mandayam, H. Vincent Poor | On the Sum-Capacity of Degraded Gaussian Multiaccess Relay Channels | 50 pages, 4 figures, submitted to the IEEE IT Transactions | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sum-capacity is studied for a K-user degraded Gaussian multiaccess relay
channel (MARC) where the multiaccess signal received at the destination from
the K sources and relay is a degraded version of the signal received at the
relay from all sources, given the transmit signal at the relay. An outer bound
on the capacity region is developed using cutset bounds. An achievable rate
region is obtained for the decode-and-forward (DF) strategy. It is shown that
for every choice of input distribution, the rate regions for the inner (DF) and
outer bounds are given by the intersection of two K-dimensional polymatroids,
one resulting from the multiaccess link at the relay and the other from that at
the destination. Although the inner and outer bound rate regions are not
identical in general, for both cases, a classical result on the intersection of
two polymatroids is used to show that the intersection belongs to either the
set of active cases or inactive cases, where the two bounds on the K-user
sum-rate are active or inactive, respectively. It is shown that DF achieves the
capacity region for a class of degraded Gaussian MARCs in which the relay has a
high SNR link to the destination relative to the multiaccess link from the
sources to the relay. Otherwise, DF is shown to achieve the sum-capacity for an
active class of degraded Gaussian MARCs for which the DF sum-rate is maximized
by a polymatroid intersection belonging to the set of active cases. This class
is shown to include the class of symmetric Gaussian MARCs where all users
transmit at the same power.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 16:16:19 GMT"
}
] | 2008-04-03T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Mandayam",
"Narayan B.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0396 | Pawel Zielinski | Adam Kasperski, Pawel Zielinski | On the approximability of minmax (regret) network optimization problems | null | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper the minmax (regret) versions of some basic polynomially
solvable deterministic network problems are discussed. It is shown that if the
number of scenarios is unbounded, then the problems under consideration are not
approximable within $\log^{1-\epsilon} K$ for any $\epsilon>0$ unless NP
$\subseteq$ DTIME$(n^{\mathrm{poly} \log n})$, where $K$ is the number of
scenarios.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 16:56:03 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Aug 2008 12:39:52 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Oct 2008 23:39:46 GMT"
}
] | 2008-10-24T00:00:00 | [
[
"Kasperski",
"Adam",
""
],
[
"Zielinski",
"Pawel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.0409 | Ayoub Otmani | Ayoub Otmani, Jean-Pierre Tillich, Leonard Dallot | Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes | Major corrections. This version supersedes previuos ones | null | null | null | cs.CR cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We cryptanalyse here two variants of the McEliece cryptosystem based on
quasi-cyclic codes. Both aim at reducing the key size by restricting the public
and secret generator matrices to be in quasi-cyclic form. The first variant
considers subcodes of a primitive BCH code. We prove that this variant is not
secure by finding and solving a linear system satisfied by the entries of the
secret permutation matrix.
The other variant uses quasi-cyclic low density parity-check codes. This
scheme was devised to be immune against general attacks working for McEliece
type cryptosystems based on low density parity-check codes by choosing in the
McEliece scheme more general one-to-one mappings than permutation matrices. We
suggest here a structural attack exploiting the quasi-cyclic structure of the
code and a certain weakness in the choice of the linear transformations that
hide the generator matrix of the code. Our analysis shows that with high
probability a parity-check matrix of a punctured version of the secret code can
be recovered in cubic time complexity in its length. The complete
reconstruction of the secret parity-check matrix of the quasi-cyclic low
density parity-check codes requires the search of codewords of low weight which
can be done with about $2^{37}$ operations for the specific parameters
proposed.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 18:27:59 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Apr 2008 13:28:41 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Jan 2010 22:28:04 GMT"
}
] | 2010-01-04T00:00:00 | [
[
"Otmani",
"Ayoub",
""
],
[
"Tillich",
"Jean-Pierre",
""
],
[
"Dallot",
"Leonard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.0441 | Wei Dai | Wei Dai, Brian C. Rider and Youjian Liu | Joint Beamforming for Multiaccess MIMO Systems with Finite Rate Feedback | Technical report on "Joint Beamforming for Multiaccess MIMO Systems
with Finite Rate Feedback" | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers multiaccess multiple-input multiple-output (MIMO)
systems with finite rate feedback. The goal is to understand how to efficiently
employ the given finite feedback resource to maximize the sum rate by
characterizing the performance analytically. Towards this, we propose a joint
quantization and feedback strategy: the base station selects the strongest
users, jointly quantizes their strongest eigen-channel vectors and broadcasts a
common feedback to all the users. This joint strategy is different from an
individual strategy, in which quantization and feedback are performed across
users independently, and it improves upon the individual strategy in the same
way that vector quantization improves upon scalar quantization. In our proposed
strategy, the effect of user selection is analyzed by extreme order statistics,
while the effect of joint quantization is quantified by what we term ``the
composite Grassmann manifold''. The achievable sum rate is then estimated by
random matrix theory. Due to its simple implementation and solid performance
analysis, the proposed scheme provides a benchmark for multiaccess MIMO systems
with finite rate feedback.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2008 21:16:42 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2008 02:35:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Dai",
"Wei",
""
],
[
"Rider",
"Brian C.",
""
],
[
"Liu",
"Youjian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0506 | Gesualdo Scutari | Gesualdo Scutari and Sergio Barbarossa | Distributed Consensus over Wireless Sensor Networks Affected by
Multipath Fading | Paper submitted to IEEE Transactions on Signal Processing, August
2007. Revised November 30, 2007. Accepted January 14, 2008 | null | 10.1109/TSP.2008.924857 | null | cs.DC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The design of sensor networks capable of reaching a consensus on a globally
optimal decision test, without the need for a fusion center, is a problem that
has received considerable attention in the last years. Many consensus
algorithms have been proposed, with convergence conditions depending on the
graph describing the interaction among the nodes. In most works, the graph is
undirected and there are no propagation delays. Only recently, the analysis has
been extended to consensus algorithms incorporating propagation delays. In this
work, we propose a consensus algorithm able to converge to a globally optimal
decision statistic, using a wideband wireless network, governed by a fairly
simple MAC mechanism, where each link is a multipath, frequency-selective,
channel. The main contribution of the paper is to derive necessary and
sufficient conditions on the network topology and sufficient conditions on the
channel transfer functions guaranteeing the exponential convergence of the
consensus algorithm to a globally optimal decision value, for any bounded delay
condition.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 09:22:41 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Scutari",
"Gesualdo",
""
],
[
"Barbarossa",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0804.0510 | Daniil Ryabko | Daniil Ryabko (INRIA Lille - Nord Europe), Boris Ryabko (SIBSUTI, ICT
SBRAS) | Nonparametric Statistical Inference for Ergodic Processes | Conference version in: D. Ryabko, B. Ryabko, On hypotheses testing
for ergodic processes, in Proceedgings of Information Theory Workshop, 2008,
Porto, Portugal, pp. 281-283 | IEEE Transactions on Information Theory 56, 3 (2010) 1430-1435 | null | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work a method for statistical analysis of time series is proposed,
which is used to obtain solutions to some classical problems of mathematical
statistics under the only assumption that the process generating the data is
stationary ergodic. Namely, three problems are considered: goodness-of-fit (or
identity) testing, process classification, and the change point problem. For
each of the problems a test is constructed that is asymptotically accurate for
the case when the data is generated by stationary ergodic processes. The tests
are based on empirical estimates of distributional distance.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 09:24:26 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 09:16:49 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Jul 2009 09:04:00 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Apr 2012 06:25:44 GMT"
}
] | 2012-04-05T00:00:00 | [
[
"Ryabko",
"Daniil",
"",
"INRIA Lille - Nord Europe"
],
[
"Ryabko",
"Boris",
"",
"SIBSUTI, ICT\n SBRAS"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.0524 | Uwe Aickelin | Jingpeng Li and Uwe Aickelin | Bayesian Optimisation Algorithm for Nurse Scheduling | null | Scalable Optimization via Probabilistic Modeling: From Algorithms
to Applications (Studies in Computational Intelligence), edited by M Pelikan,
K Sastry and E Cantu Paz, Chapter 17, pp 315-332, Springer, 2006 | 10.1007/978-3-540-34954-9_14 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our research has shown that schedules can be built mimicking a human
scheduler by using a set of rules that involve domain knowledge. This chapter
presents a Bayesian Optimization Algorithm (BOA) for the nurse scheduling
problem that chooses such suitable scheduling rules from a set for each nurses
assignment. Based on the idea of using probabilistic models, the BOA builds a
Bayesian network for the set of promising solutions and samples these networks
to generate new candidate solutions. Computational results from 52 real data
instances demonstrate the success of this approach. It is also suggested that
the learning mechanism in the proposed algorithm may be suitable for other
scheduling problems.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 11:14:11 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0804.0528 | \^Hamed \"Owladeghaffari | H.Owladeghaffari, M.Ejtemaei, M.Irannajad | Application of Rough Set Theory to Analysis of Hydrocyclone Operation | InternationalConference on Smart Materials and Adaptive Structures:
Mathematical Modeling and Computation | null | null | null | cs.AI | http://creativecommons.org/licenses/by/3.0/ | This paper describes application of rough set theory, on the analysis of
hydrocyclone operation. In this manner, using Self Organizing Map (SOM) as
preprocessing step, best crisp granules of data are obtained. Then, using a
combining of SOM and rough set theory (RST)-called SORST-, the dominant rules
on the information table, obtained from laboratory tests, are extracted. Based
on these rules, an approximate estimation on decision attribute is fulfilled.
Finally, a brief comparison of this method with the SOM-NFIS system (briefly
SONFIS) is highlighted.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 11:47:55 GMT"
}
] | 2008-04-04T00:00:00 | [
[
"Owladeghaffari",
"H.",
""
],
[
"Ejtemaei",
"M.",
""
],
[
"Irannajad",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0539 | Valentin Savin | Ghassan M. Kraidy, Valentin Savin | Irregular turbo code design for the binary erasure channel | 6 pages, submitted Turbo-Symposium 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the design of irregular turbo codes for the binary erasure
channel is investigated. An analytic expression of the erasure probability of
punctured recursive systematic convolutional codes is derived. This exact
expression will be used to track the density evolution of turbo codes over the
erasure channel, that will allow for the design of capacity-approaching
irregular turbo codes. Next, we propose a graph-optimal interleaver for
irregular turbo codes. Simulation results for different coding rates is shown
at the end.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 12:31:08 GMT"
}
] | 2008-04-04T00:00:00 | [
[
"Kraidy",
"Ghassan M.",
""
],
[
"Savin",
"Valentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0556 | Gery Casiez | G\'ery Casiez (LIFL, INRIA Lille - Nord Europe), Daniel Vogel, Qing
Pan (LIFL, INRIA Lille - Nord Europe), Christophe Chaillou (INRIA Lille -
Nord Europe) | RubberEdge: Reducing Clutching by Combining Position and Rate Control
with Elastic Feedback | 10 pages | Dans Proceedings of the 20th annual ACM symposium on User
interface software and technology - Symposium on User Interface Software and
Technology, Lille : France (2007) | 10.1145/1294211.1294234 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Position control devices enable precise selection, but significant clutching
degrades performance. Clutching can be reduced with high control-display gain
or pointer acceleration, but there are human and device limits. Elastic rate
control eliminates clutching completely, but can make precise selection
difficult. We show that hybrid position-rate control can outperform position
control by 20% when there is significant clutching, even when using pointer
acceleration. Unlike previous work, our RubberEdge technique eliminates
trajectory and velocity discontinuities. We derive predictive models for
position control with clutching and hybrid control, and present a prototype
RubberEdge position-rate control device including initial user feedback.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 13:40:02 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Casiez",
"Géry",
"",
"LIFL, INRIA Lille - Nord Europe"
],
[
"Vogel",
"Daniel",
"",
"LIFL, INRIA Lille - Nord Europe"
],
[
"Pan",
"Qing",
"",
"LIFL, INRIA Lille - Nord Europe"
],
[
"Chaillou",
"Christophe",
"",
"INRIA Lille -\n Nord Europe"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0804.0558 | Fahem Kebair | Fahem Kebair (LITIS), Fr\'ed\'eric Serin (LITIS), Cyrille Bertelle
(LITIS) | Agent-Based Perception of an Environment in an Emergency Situation | null | Dans Proceedings of the World Congress on Engineering -
Proceedings of the World Congress on Engineering, London : Royaume-Uni (2007) | 10.1007/978-988-98671-5-7,978-988-98671-2-6 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are interested in the problem of multiagent systems development for risk
detecting and emergency response in an uncertain and partially perceived
environment. The evaluation of the current situation passes by three stages
inside the multiagent system. In a first time, the situation is represented in
a dynamic way. The second step, consists to characterise the situation and
finally, it is compared with other similar known situations. In this paper, we
present an information modelling of an observed environment, that we have
applied on the RoboCupRescue Simulation System. Information coming from the
environment are formatted according to a taxonomy and using semantic features.
The latter are defined thanks to a fine ontology of the domain and are managed
by factual agents that aim to represent dynamically the current situation.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 13:45:43 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kebair",
"Fahem",
"",
"LITIS"
],
[
"Serin",
"Frédéric",
"",
"LITIS"
],
[
"Bertelle",
"Cyrille",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0561 | Christian Duriez | Christian Duriez (INRIA Lille - Nord Europe), Fr\'ed\'eric Dubois
(LMGC), Abderrahmane Kheddar (JRL), Claude Andriot (LIST) | Realistic Haptic Rendering of Interacting Deformable Objects in Virtual
Environments | null | IEEE Transactions on Visualization and Computer Graphics 12, 1
(2006) 36-47 | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new computer haptics algorithm to be used in general interactive
manipulations of deformable virtual objects is presented. In multimodal
interactive simulations, haptic feedback computation often comes from contact
forces. Subsequently, the fidelity of haptic rendering depends significantly on
contact space modeling. Contact and friction laws between deformable models are
often simplified in up to date methods. They do not allow a "realistic"
rendering of the subtleties of contact space physical phenomena (such as slip
and stick effects due to friction or mechanical coupling between contacts). In
this paper, we use Signorini's contact law and Coulomb's friction law as a
computer haptics basis. Real-time performance is made possible thanks to a
linearization of the behavior in the contact space, formulated as the so-called
Delassus operator, and iteratively solved by a Gauss-Seidel type algorithm.
Dynamic deformation uses corotational global formulation to obtain the Delassus
operator in which the mass and stiffness ratio are dissociated from the
simulation time step. This last point is crucial to keep stable haptic
feedback. This global approach has been packaged, implemented, and tested.
Stable and realistic 6D haptic feedback is demonstrated through a clipping task
experiment.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 13:49:51 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Duriez",
"Christian",
"",
"INRIA Lille - Nord Europe"
],
[
"Dubois",
"Frédéric",
"",
"LMGC"
],
[
"Kheddar",
"Abderrahmane",
"",
"JRL"
],
[
"Andriot",
"Claude",
"",
"LIST"
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0804.0570 | Daniel Raible | Jianer Chen, Henning Fernau, Dan Ning, Daniel Raible, Jianxin Wang | A Parameterized Perspective on $P_2$-Packings | null | null | null | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | }We study (vertex-disjoint) $P_2$-packings in graphs under a parameterized
perspective. Starting from a maximal $P_2$-packing $\p$ of size $j$ we use
extremal arguments for determining how many vertices of $\p$ appear in some
$P_2$-packing of size $(j+1)$. We basically can 'reuse' $2.5j$ vertices. We
also present a kernelization algorithm that gives a kernel of size bounded by
$7k$. With these two results we build an algorithm which constructs a
$P_2$-packing of size $k$ in time $\Oh^*(2.482^{3k})$.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 14:36:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chen",
"Jianer",
""
],
[
"Fernau",
"Henning",
""
],
[
"Ning",
"Dan",
""
],
[
"Raible",
"Daniel",
""
],
[
"Wang",
"Jianxin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.0573 | Uwe Aickelin | Tom Morrison and Uwe Aickelin | An Artificial Immune System as a Recommender System for Web Sites | null | Proceedings of the 1st International Conference on Artificial
Immune Systems (ICARIS 2002), pp 161-169, Canterbury, UK, 2002 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Immune Systems have been used successfully to build recommender
systems for film databases. In this research, an attempt is made to extend this
idea to web site recommendation. A collection of more than 1000 individuals web
profiles (alternatively called preferences / favourites / bookmarks file) will
be used. URLs will be classified using the DMOZ (Directory Mozilla) database of
the Open Directory Project as our ontology. This will then be used as the data
for the Artificial Immune Systems rather than the actual addresses. The first
attempt will involve using a simple classification code number coupled with the
number of pages within that classification code. However, this implementation
does not make use of the hierarchical tree-like structure of DMOZ.
Consideration will then be given to the construction of a similarity measure
for web profiles that makes use of this hierarchical information to build a
better-informed Artificial Immune System.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 14:43:44 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Morrison",
"Tom",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0577 | Oskar Sandberg | Oskar Sandberg | Decentralized Search with Random Costs | null | null | null | null | math.PR cs.DS | http://creativecommons.org/licenses/by-nc-sa/3.0/ | A decentralized search algorithm is a method of routing on a random graph
that uses only limited, local, information about the realization of the graph.
In some random graph models it is possible to define such algorithms which
produce short paths when routing from any vertex to any other, while for others
it is not.
We consider random graphs with random costs assigned to the edges. In this
situation, we use the methods of stochastic dynamic programming to create a
decentralized search method which attempts to minimize the total cost, rather
than the number of steps, of each path. We show that it succeeds in doing so
among all decentralized search algorithms which monotonically approach the
destination. Our algorithm depends on knowing the expected cost of routing from
every vertex to any other, but we show that this may be calculated iteratively,
and in practice can be easily estimated from the cost of previous routes and
compressed into a small routing table. The methods applied here can also be
applied directly in other situations, such as efficient searching in graphs
with varying vertex degrees.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 15:32:29 GMT"
}
] | 2008-04-04T00:00:00 | [
[
"Sandberg",
"Oskar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0580 | Uwe Aickelin | Jingpeng Li and Uwe Aickelin | Explicit Learning: an Effort towards Human Scheduling Algorithms | null | Proceedings of the 1st Multidisciplinary International Conference
on Scheduling: Theory and Applications (MISTA 2003), pp 240-241, Nottingham,
UK 2003 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scheduling problems are generally NP-hard combinatorial problems, and a lot
of research has been done to solve these problems heuristically. However, most
of the previous approaches are problem-specific and research into the
development of a general scheduling algorithm is still in its infancy.
Mimicking the natural evolutionary process of the survival of the fittest,
Genetic Algorithms (GAs) have attracted much attention in solving difficult
scheduling problems in recent years. Some obstacles exist when using GAs: there
is no canonical mechanism to deal with constraints, which are commonly met in
most real-world scheduling problems, and small changes to a solution are
difficult. To overcome both difficulties, indirect approaches have been
presented (in [1] and [2]) for nurse scheduling and driver scheduling, where
GAs are used by mapping the solution space, and separate decoding routines then
build solutions to the original problem.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 15:31:52 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0581 | Oliver Schuetze | Oliver Schuetze (INRIA Futurs), Carlos A. Coello Coello (INRIA Lille -
Nord Europe), Emilia Tantar (INRIA Lille - Nord Europe), El-Ghazali Talbi
(INRIA Futurs, LIFIA, LGI - IMAG, LIFL) | Computing a Finite Size Representation of the Set of Approximate
Solutions of an MOP | null | null | null | RR-6492 | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, a framework for the approximation of the entire set of
$\epsilon$-efficient solutions (denote by $E_\epsilon$) of a multi-objective
optimization problem with stochastic search algorithms has been proposed. It
was proven that such an algorithm produces -- under mild assumptions on the
process to generate new candidate solutions --a sequence of archives which
converges to $E_{\epsilon}$ in the limit and in the probabilistic sense. The
result, though satisfactory for most discrete MOPs, is at least from the
practical viewpoint not sufficient for continuous models: in this case, the set
of approximate solutions typically forms an $n$-dimensional object, where $n$
denotes the dimension of the parameter space, and thus, it may come to
perfomance problems since in practise one has to cope with a finite archive.
Here we focus on obtaining finite and tight approximations of $E_\epsilon$, the
latter measured by the Hausdorff distance. We propose and investigate a novel
archiving strategy theoretically and empirically. For this, we analyze the
convergence behavior of the algorithm, yielding bounds on the obtained
approximation quality as well as on the cardinality of the resulting
approximation, and present some numerical results.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 15:32:17 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Apr 2008 08:39:23 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Schuetze",
"Oliver",
"",
"INRIA Futurs"
],
[
"Coello",
"Carlos A. Coello",
"",
"INRIA Lille -\n Nord Europe"
],
[
"Tantar",
"Emilia",
"",
"INRIA Lille - Nord Europe"
],
[
"Talbi",
"El-Ghazali",
"",
"INRIA Futurs, LIFIA, LGI - IMAG, LIFL"
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0804.0599 | Joao Marques-Silva | Joao Marques-Silva, Ines Lynce and Vasco Manquinho | Symmetry Breaking for Maximum Satisfiability | null | null | null | RT/039/08-CDIL | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Symmetries are intrinsic to many combinatorial problems including Boolean
Satisfiability (SAT) and Constraint Programming (CP). In SAT, the
identification of symmetry breaking predicates (SBPs) is a well-known, often
effective, technique for solving hard problems. The identification of SBPs in
SAT has been the subject of significant improvements in recent years, resulting
in more compact SBPs and more effective algorithms. The identification of SBPs
has also been applied to pseudo-Boolean (PB) constraints, showing that symmetry
breaking can also be an effective technique for PB constraints. This paper
extends further the application of SBPs, and shows that SBPs can be identified
and used in Maximum Satisfiability (MaxSAT), as well as in its most well-known
variants, including partial MaxSAT, weighted MaxSAT and weighted partial
MaxSAT. As with SAT and PB, symmetry breaking predicates for MaxSAT and
variants are shown to be effective for a representative number of problem
domains, allowing solving problem instances that current state of the art
MaxSAT solvers could not otherwise solve.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 18:19:43 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Marques-Silva",
"Joao",
""
],
[
"Lynce",
"Ines",
""
],
[
"Manquinho",
"Vasco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.0611 | Hooman Shirani-Mehr | Hooman Shirani-Mehr and Giuseppe Caire | Channel State Feedback Schemes for Multiuser MIMO-OFDM Downlink | 28 pages, 5 figures, submitted to IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Channel state feedback schemes for the MIMO broadcast downlink have been
widely studied in the frequency-flat case. This work focuses on the more
relevant frequency selective case, where some important new aspects emerge. We
consider a MIMO-OFDM broadcast channel and compare achievable ergodic rates
under three channel state feedback schemes: analog feedback, direction
quantized feedback and "time-domain" channel quantized feedback. The first two
schemes are direct extensions of previously proposed schemes. The third scheme
is novel, and it is directly inspired by rate-distortion theory of Gaussian
correlated sources. For each scheme we derive the conditions under which the
system achieves full multiplexing gain. The key difference with respect to the
widely treated frequency-flat case is that in MIMO-OFDM the frequency-domain
channel transfer function is a Gaussian correlated source. The new time-domain
quantization scheme takes advantage of the channel frequency correlation
structure and outperforms the other schemes. Furthermore, it is by far simpler
to implement than complicated spherical vector quantization. In particular, we
observe that no structured codebook design and vector quantization is actually
needed for efficient channel state information feedback.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 19:33:24 GMT"
}
] | 2008-04-04T00:00:00 | [
[
"Shirani-Mehr",
"Hooman",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0629 | Boaz Tsaban | Arkadius Kalka, Mina Teicher, and Boaz Tsaban | Short expressions of permutations as products and cryptanalysis of the
Algebraic Eraser | Final version, accepted to Advances in Applied Mathematics. Title
slightly changed | Advances in Applied Mathematics 49 (2012) 57-76 | 10.1016/j.aam.2012.03.001 | null | math.GR cs.CR math.CO math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | On March 2004, Anshel, Anshel, Goldfeld, and Lemieux introduced the
\emph{Algebraic Eraser} scheme for key agreement over an insecure channel,
using a novel hybrid of infinite and finite noncommutative groups. They also
introduced the \emph{Colored Burau Key Agreement Protocol (CBKAP)}, a concrete
realization of this scheme.
We present general, efficient heuristic algorithms, which extract the shared
key out of the public information provided by CBKAP. These algorithms are,
according to heuristic reasoning and according to massive experiments,
successful for all sizes of the security parameters, assuming that the keys are
chosen with standard distributions.
Our methods come from probabilistic group theory (permutation group actions
and expander graphs). In particular, we provide a simple algorithm for finding
short expressions of permutations in $S_n$, as products of given random
permutations. Heuristically, our algorithm gives expressions of length
$O(n^2\log n)$, in time and space $O(n^3)$. Moreover, this is provable from
\emph{the Minimal Cycle Conjecture}, a simply stated hypothesis concerning the
uniform distribution on $S_n$. Experiments show that the constants in these
estimations are small. This is the first practical algorithm for this problem
for $n\ge 256$.
Remark: \emph{Algebraic Eraser} is a trademark of SecureRF. The variant of
CBKAP actually implemented by SecureRF uses proprietary distributions, and thus
our results do not imply its vulnerability. See also arXiv:abs/12020598
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2008 21:49:21 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jun 2008 08:38:06 GMT"
},
{
"version": "v3",
"created": "Wed, 18 May 2011 19:13:00 GMT"
},
{
"version": "v4",
"created": "Thu, 19 May 2011 18:37:33 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Mar 2012 16:58:37 GMT"
}
] | 2012-07-04T00:00:00 | [
[
"Kalka",
"Arkadius",
""
],
[
"Teicher",
"Mina",
""
],
[
"Tsaban",
"Boaz",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0804.0635 | Urs Niesen | Urs Niesen, Devavrat Shah, Gregory Wornell | Source Coding with Mismatched Distortion Measures | 28 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of lossy source coding with a mismatched distortion
measure. That is, we investigate what distortion guarantees can be made with
respect to distortion measure $\tilde{\rho}$, for a source code designed such
that it achieves distortion less than $D$ with respect to distortion measure
$\rho$. We find a single-letter characterization of this mismatch distortion
and study properties of this quantity. These results give insight into the
robustness of lossy source coding with respect to modeling errors in the
distortion measure. They also provide guidelines on how to choose a good
tractable approximation of an intractable distortion measure.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 00:14:54 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Niesen",
"Urs",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0659 | Boris Skoric | Boris Skoric | Steganography from weak cryptography | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a problem setting which we call ``the freedom fighters'
problem''. It subtly differs from the prisoners' problem. We propose a
steganographic method that allows Alice and Bob to fool Wendy the warden in
this setting. Their messages are hidden in encryption keys. The recipient has
no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order
to recover them. We show an example of the protocol and give a partial security
analysis.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 07:50:44 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Skoric",
"Boris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.0660 | Luca Roversi | Luca Roversi | Weak Affine Light Typing is complete with respect to Safe Recursion on
Notation | null | null | null | null | cs.LO | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Weak affine light typing (WALT) assigns light affine linear formulae as types
to a subset of lambda-terms of System F. WALT is poly-time sound: if a
lambda-term M has type in WALT, M can be evaluated with a polynomial cost in
the dimension of the derivation that gives it a type. The evaluation proceeds
under any strategy of a rewriting relation which is a mix of both call-by-name
and call-by-value beta-reductions. WALT weakens, namely generalizes, the notion
of "stratification of deductions", common to some Light Systems -- those
logical systems, derived from Linear logic, to characterize the set of
Polynomial functions -- . A weaker stratification allows to define a
compositional embedding of Safe recursion on notation (SRN) into WALT. It turns
out that the expressivity of WALT is strictly stronger than the one of the
known Light Systems. The embedding passes through the representation of a
subsystem of SRN. It is obtained by restricting the composition scheme of SRN
to one that can only use its safe variables linearly. On one side, this
suggests that SRN, in fact, can be redefined in terms of more primitive
constructs. On the other, the embedding of SRN into WALT enjoys the two
following remarkable aspects. Every datatype, required by the embedding, is
represented from scratch, showing the strong structural proof-theoretical roots
of WALT. Moreover, the embedding highlights a stratification structure of the
normal and safe arguments, normally hidden inside the world of SRN-normal/safe
variables: the less an argument is "polyomially impredicative", the deeper, in
a formal, proof-theoretical sense, it is represented inside WALT. Finally,
since WALT is SRN-complete it is also polynomial-time complete since SRN is.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 08:14:22 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Roversi",
"Luca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.0686 | Masahito Hayashi | Masahito Hayashi | Discrimination of two channels by adaptive methods and its application
to quantum system | null | IEEE Transactions on Information Theory, Volume 55, Issue 8, 3807
- 3820 (2009) | 10.1109/TIT.2009.2023726 | null | quant-ph cs.IT math.IT math.ST stat.TH | http://creativecommons.org/licenses/publicdomain/ | The optimal exponential error rate for adaptive discrimination of two
channels is discussed. In this problem, adaptive choice of input signal is
allowed. This problem is discussed in various settings. It is proved that
adaptive choice does not improve the exponential error rate in these settings.
These results are applied to quantum state discrimination.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 10:16:40 GMT"
}
] | 2011-06-24T00:00:00 | [
[
"Hayashi",
"Masahito",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.0722 | Daniel Karapetyan | Gregory Gutin, Daniel Karapetyan | A Memetic Algorithm for the Generalized Traveling Salesman Problem | 15 pages, to appear in Natural Computing, Springer, available online:
http://www.springerlink.com/content/5v4568l492272865/?p=e1779dd02e4d4cbfa49d0d27b19b929f&pi=13 | Natural Computing 9(1) (2010) 47-60 | 10.1007/s11047-009-9111-6 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The generalized traveling salesman problem (GTSP) is an extension of the
well-known traveling salesman problem. In GTSP, we are given a partition of
cities into groups and we are required to find a minimum length tour that
includes exactly one city from each group. The recent studies on this subject
consider different variations of a memetic algorithm approach to the GTSP. The
aim of this paper is to present a new memetic algorithm for GTSP with a
powerful local search procedure. The experiments show that the proposed
algorithm clearly outperforms all of the known heuristics with respect to both
solution quality and running time. While the other memetic algorithms were
designed only for the symmetric GTSP, our algorithm can solve both symmetric
and asymmetric instances.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 13:21:40 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2008 23:58:20 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Mar 2009 22:13:27 GMT"
}
] | 2010-03-30T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Karapetyan",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0735 | Daniel Karapetyan | Gregory Gutin and Daniel Karapetyan | Generalized Traveling Salesman Problem Reduction Algorithms | To appear in Algorithmic Operations Research | Algorithmic Operations Research 4 (2009) 144-154 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The generalized traveling salesman problem (GTSP) is an extension of the
well-known traveling salesman problem. In GTSP, we are given a partition of
cities into groups and we are required to find a minimum length tour that
includes exactly one city from each group. The aim of this paper is to present
a problem reduction algorithm that deletes redundant vertices and edges,
preserving the optimal solution. The algorithm's running time is O(N^3) in the
worst case, but it is significantly faster in practice. The algorithm has
reduced the problem size by 15-20% on average in our experiments and this has
decreased the solution time by 10-60% for each of the considered solvers.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 13:36:19 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2009 17:36:47 GMT"
}
] | 2010-03-30T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Karapetyan",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0742 | Adam Lipowski | Adam Lipowski, Krzysztof Gontarek, and Marcel Ausloos | Statistical-mechanics approach to a reinforcement learning model with
memory | 6 pages, some additional numerical calculations | Physica A vol. 388 (2009) pp. 1849-1856 | 10.1016/j.physa.2009.01.028 | null | cond-mat.stat-mech cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a two-player model of reinforcement learning with memory. Past
actions of an iterated game are stored in a memory and used to determine
player's next action. To examine the behaviour of the model some approximate
methods are used and confronted against numerical simulations and exact master
equation. When the length of memory of players increases to infinity the model
undergoes an absorbing-state phase transition. Performance of examined
strategies is checked in the prisoner' dilemma game. It turns out that it is
advantageous to have a large memory in symmetric games, but it is better to
have a short memory in asymmetric ones.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 14:05:07 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Apr 2008 09:21:40 GMT"
},
{
"version": "v3",
"created": "Sat, 30 Aug 2008 21:27:50 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Lipowski",
"Adam",
""
],
[
"Gontarek",
"Krzysztof",
""
],
[
"Ausloos",
"Marcel",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0804.0743 | Fabien Mathieu | Laurent Viennot (INRIA Rocquencourt), Yacine Boufkhad (INRIA
Rocquencourt, LIAFA), Fabien Mathieu (INRIA Rocquencourt, FT R&D), Fabien De
Montgolfier (INRIA Rocquencourt, LIAFA), Diego Perino (INRIA Rocquencourt, FT
R&D) | Scalable Distributed Video-on-Demand: Theoretical Bounds and Practical
Algorithms | null | null | null | RR-6496 | cs.NI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze a distributed system where n nodes called boxes store a large set
of videos and collaborate to serve simultaneously n videos or less. We explore
under which conditions such a system can be scalable while serving any sequence
of demands. We model this problem through a combination of two algorithms: a
video allocation algorithm and a connection scheduling algorithm. The latter
plays against an adversary that incrementally proposes video requests.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 14:08:49 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 07:16:36 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
],
[
"Boufkhad",
"Yacine",
"",
"INRIA\n Rocquencourt, LIAFA"
],
[
"Mathieu",
"Fabien",
"",
"INRIA Rocquencourt, FT R&D"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt, LIAFA"
],
[
"Perino",
"Diego",
"",
"INRIA Rocquencourt, FT\n R&D"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0790 | Siavash Ekbatani | Siavash Ekbatani, Farzad Etemadi, and Hamid Jafarkhani | Outage behavior of slow fading channels with power control using noisy
quantized CSIT | Submitted to IEEE Transactions on Information Theory, April 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The topic of this study is the outage behavior of multiple-antenna slow
fading channels with quantized feedback and partial power control. A fixed-rate
communication system is considered. It is known from the literature that with
error-free feedback, the outage-optimal quantizer for power control has a
circular structure. Moreover, the diversity gain of the system increases
polynomially with the cardinality of the power control codebook. Here, a
similar system is studied, but when the feedback link is error-prone. We prove
that in the high-SNR regime, the optimal quantizer structure with noisy
feedback is still circular and the optimal Voronoi regions are contiguous
non-zero probability intervals. Furthermore, the optimal power control codebook
resembles a channel optimized scalar quantizer (COSQ), i.e., the Voronoi
regions merge with erroneous feedback information. Using a COSQ, the outage
performance of the system is superior to that of a no-feedback scheme. However,
asymptotic analysis shows that the diversity gain of the system is the same as
a no-CSIT scheme if there is a non-zero and non-vanishing feedback error
probability.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 17:53:17 GMT"
}
] | 2008-04-07T00:00:00 | [
[
"Ekbatani",
"Siavash",
""
],
[
"Etemadi",
"Farzad",
""
],
[
"Jafarkhani",
"Hamid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0797 | Grenville Croll | Raymond R. Panko, Nicholas Ordway | Sarbanes-Oxley: What About all the Spreadsheets? | 45 pages, 7 figures | European Spreadsheet Risks Int. Grp. (EuSpRIG) 2005 15-47
ISBN:1-902724-16-X | null | null | cs.SE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Sarbanes-Oxley Act of 2002 has finally forced corporations to examine the
validity of their spreadsheets. They are beginning to understand the
spreadsheet error literature, including what it tells them about the need for
comprehensive spreadsheet testing. However, controlling for fraud will require
a completely new set of capabilities, and a great deal of new research will be
needed to develop fraud control capabilities. This paper discusses the
riskiness of spreadsheets, which can now be quantified to a considerable
degree. It then discusses how to use control frameworks to reduce the dangers
created by spreadsheets. It focuses especially on testing, which appears to be
the most crucial element in spreadsheet controls.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2008 23:42:29 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Panko",
"Raymond R.",
""
],
[
"Ordway",
"Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.0813 | Kaibin Huang | Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath, Jr, Dongning Guo,
Randall A. Berry | Spatial Interference Cancelation for Mobile Ad Hoc Networks: Perfect CSI | 6 pages; submitted to IEEE Globecom 2008 | null | 10.1109/ACSSC.2008.5074377 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interference between nodes directly limits the capacity of mobile ad hoc
networks. This paper focuses on spatial interference cancelation with perfect
channel state information (CSI), and analyzes the corresponding network
capacity. Specifically, by using multiple antennas, zero-forcing beamforming is
applied at each receiver for canceling the strongest interferers. Given spatial
interference cancelation, the network transmission capacity is analyzed in this
paper, which is defined as the maximum transmitting node density under
constraints on outage and the signal-to-interference-noise ratio. Assuming the
Poisson distribution for the locations of network nodes and spatially i.i.d.
Rayleigh fading channels, mathematical tools from stochastic geometry are
applied for deriving scaling laws for transmission capacity. Specifically, for
small target outage probability, transmission capacity is proved to increase
following a power law, where the exponent is the inverse of the size of antenna
array or larger depending on the pass loss exponent. As shown by simulations,
spatial interference cancelation increases transmission capacity by an order of
magnitude or more even if only one extra antenna is added to each node.
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 21:45:57 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Huang",
"Kaibin",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Heath,",
"Robert W.",
"Jr"
],
[
"Guo",
"Dongning",
""
],
[
"Berry",
"Randall A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0819 | Namrata Vaswani | Namrata Vaswani | Kalman Filtered Compressed Sensing | A slightly shorter version submitted to IEEE Intl. Conf. Image Proc.
(ICIP) 2008. (5 pages, 1 figure) | null | 10.1109/ICIP.2008.4711899 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of reconstructing time sequences of spatially sparse
signals (with unknown and time-varying sparsity patterns) from a limited number
of linear "incoherent" measurements, in real-time. The signals are sparse in
some transform domain referred to as the sparsity basis. For a single spatial
signal, the solution is provided by Compressed Sensing (CS). The question that
we address is, for a sequence of sparse signals, can we do better than CS, if
(a) the sparsity pattern of the signal's transform coefficients' vector changes
slowly over time, and (b) a simple prior model on the temporal dynamics of its
current non-zero elements is available. The overall idea of our solution is to
use CS to estimate the support set of the initial signal's transform vector. At
future times, run a reduced order Kalman filter with the currently estimated
support and estimate new additions to the support set by applying CS to the
Kalman innovations or filtering error (whenever it is "large").
| [
{
"version": "v1",
"created": "Fri, 4 Apr 2008 22:56:33 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Vaswani",
"Namrata",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.0852 | Sebastien Verel | David Simoncini (I3S), Philippe Collard (I3S), S\'ebastien Verel
(I3S), Manuel Clergue (I3S) | On the Influence of Selection Operators on Performances in Cellular
Genetic Algorithms | null | Dans Proceedings of the IEEE Congress on Evolutionary Computation
CEC2007 - IEEE Congress on Evolutionary Computation CEC2007, singapore :
Singapour (2007) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the influence of the selective pressure on the
performance of cellular genetic algorithms. Cellular genetic algorithms are
genetic algorithms where the population is embedded on a toroidal grid. This
structure makes the propagation of the best so far individual slow down, and
allows to keep in the population potentially good solutions. We present two
selective pressure reducing strategies in order to slow down even more the best
solution propagation. We experiment these strategies on a hard optimization
problem, the quadratic assignment problem, and we show that there is a value
for of the control parameter for both which gives the best performance. This
optimal value does not find explanation on only the selective pressure,
measured either by take over time and diversity evolution. This study makes us
conclude that we need other tools than the sole selective pressure measures to
explain the performances of cellular genetic algorithms.
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2008 13:27:51 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Simoncini",
"David",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0862 | Mark Braverman | Mark Braverman | On ad hoc routing with guaranteed delivery | null | null | null | null | cs.DC cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We point out a simple poly-time log-space routing algorithm in ad hoc
networks with guaranteed delivery using universal exploration sequences.
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2008 16:16:38 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Braverman",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.0876 | Andreas Abel | Andreas Abel | Semi-continuous Sized Types and Termination | 33 pages, extended version of CSL'06 | Logical Methods in Computer Science, Volume 4, Issue 2 (April 10,
2008) lmcs:1236 | 10.2168/LMCS-4(2:3)2008 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some type-based approaches to termination use sized types: an ordinal bound
for the size of a data structure is stored in its type. A recursive function
over a sized type is accepted if it is visible in the type system that
recursive calls occur just at a smaller size. This approach is only sound if
the type of the recursive function is admissible, i.e., depends on the size
index in a certain way. To explore the space of admissible functions in the
presence of higher-kinded data types and impredicative polymorphism, a
semantics is developed where sized types are interpreted as functions from
ordinals into sets of strongly normalizing terms. It is shown that upper
semi-continuity of such functions is a sufficient semantic criterion for
admissibility. To provide a syntactical criterion, a calculus for
semi-continuous functions is developed.
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2008 22:27:29 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Apr 2008 15:26:49 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Abel",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.0879 | Serban E. Vlad | Serban E. Vlad | The equations of the ideal latches | The 12-th Conference on Applied and Industrial Mathematics CAIM 2004,
University of Pitesti, October 15-17, 2004 | null | null | null | cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The latches are simple circuits with feedback from the digital electrical
engineering. We have included in our work the C element of Muller, the RS
latch, the clocked RS latch, the D latch and also circuits containing two
interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the
JK flip-flop, the T flip-flop. The purpose of this study is to model with
equations the previous circuits, considered to be ideal, i.e. non-inertial. The
technique of analysis is the pseudoboolean differential calculus.
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2008 23:55:16 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0804.0924 | Ratthachat Chatpatanasiri | Ratthachat Chatpatanasiri and Boonserm Kijsirikul | A Unified Semi-Supervised Dimensionality Reduction Framework for
Manifold Learning | 22 pages, 9 figures | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general framework of semi-supervised dimensionality reduction
for manifold learning which naturally generalizes existing supervised and
unsupervised learning frameworks which apply the spectral decomposition.
Algorithms derived under our framework are able to employ both labeled and
unlabeled examples and are able to handle complex problems where data form
separate clusters of manifolds. Our framework offers simple views, explains
relationships among existing frameworks and provides further extensions which
can improve existing algorithms. Furthermore, a new semi-supervised
kernelization framework called ``KPCA trick'' is proposed to handle non-linear
problems.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2008 18:14:34 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jul 2009 04:25:24 GMT"
}
] | 2009-07-29T00:00:00 | [
[
"Chatpatanasiri",
"Ratthachat",
""
],
[
"Kijsirikul",
"Boonserm",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.0936 | Shripad Thite | Mark de Berg and Shripad Thite | Cache-Oblivious Selection in Sorted X+Y Matrices | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let X[0..n-1] and Y[0..m-1] be two sorted arrays, and define the mxn matrix A
by A[j][i]=X[i]+Y[j]. Frederickson and Johnson gave an efficient algorithm for
selecting the k-th smallest element from A. We show how to make this algorithm
IO-efficient. Our cache-oblivious algorithm performs O((m+n)/B) IOs, where B is
the block size of memory transfers.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2008 22:31:04 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"de Berg",
"Mark",
""
],
[
"Thite",
"Shripad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0937 | Grenville Croll | Paula Jennings | Issues in Strategic Decision Modelling | 7 Pages | Proc. European Spreadsheet Risks Int. Grp. 2003 111-116 ISBN 1
86166 199 1 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | [Spreadsheet] Models are invaluable tools for strategic planning. Models help
key decision makers develop a shared conceptual understanding of complex
decisions, identify sensitivity factors and test management scenarios.
Different modelling approaches are specialist areas in themselves. Model
development can be onerous, expensive, time consuming, and often bewildering.
It is also an iterative process where the true magnitude of the effort, time
and data required is often not fully understood until well into the process.
This paper explores the traditional approaches to strategic planning modelling
commonly used in organisations and considers the application of a real-options
approach to match and benefit from the increasing uncertainty in today's
rapidly changing world.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2008 23:20:15 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Jennings",
"Paula",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0804.0940 | Shripad Thite | Shripad Thite | Optimum Binary Search Trees on the Hierarchical Memory Model | M.S. thesis; Department of Computer Science, University of Illinois
at Urbana-Champaign; CSL Technical Report UILU-ENG-00-2215 ACT-142; November
2000 | null | null | UILU-ENG-00-2215 ACT-142 | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hierarchical Memory Model (HMM) of computation is similar to the standard
Random Access Machine (RAM) model except that the HMM has a non-uniform memory
organized in a hierarchy of levels numbered 1 through h. The cost of accessing
a memory location increases with the level number, and accesses to memory
locations belonging to the same level cost the same. Formally, the cost of a
single access to the memory location at address a is given by m(a), where m: N
-> N is the memory cost function, and the h distinct values of m model the
different levels of the memory hierarchy.
We study the problem of constructing and storing a binary search tree (BST)
of minimum cost, over a set of keys, with probabilities for successful and
unsuccessful searches, on the HMM with an arbitrary number of memory levels,
and for the special case h=2.
While the problem of constructing optimum binary search trees has been well
studied for the standard RAM model, the additional parameter m for the HMM
increases the combinatorial complexity of the problem. We present two dynamic
programming algorithms to construct optimum BSTs bottom-up. These algorithms
run efficiently under some natural assumptions about the memory hierarchy. We
also give an efficient algorithm to construct a BST that is close to optimum,
by modifying a well-known linear-time approximation algorithm for the RAM
model. We conjecture that the problem of constructing an optimum BST for the
HMM with an arbitrary memory cost function m is NP-complete.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 00:06:08 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.0941 | Grenville Croll | Raymond R. Panko | Reducing Overconfidence in Spreadsheet Development | null | Proc. European Spreadsheet Risks Int. Grp. 2003 49-66 ISBN 1 86166
199 1 | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite strong evidence of widespread errors, spreadsheet developers rarely
subject their spreadsheets to post-development testing to reduce errors. This
may be because spreadsheet developers are overconfident in the accuracy of
their spreadsheets. This conjecture is plausible because overconfidence is
present in a wide variety of human cognitive domains, even among experts. This
paper describes two experiments in overconfidence in spreadsheet development.
The first is a pilot study to determine the existence of overconfidence. The
second tests a manipulation to reduce overconfidence and errors. The
manipulation is modestly successful, indicating that overconfidence reduction
is a promising avenue to pursue.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 00:20:24 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Panko",
"Raymond R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0804.0942 | Shripad Thite | Shripad Thite | Spacetime Meshing for Discontinuous Galerkin Methods | Ph.D. Thesis; Department of Computer Science, University of Illinois
at Urbana-Champaign; Report no. UIUCDCS-R-2005-2612 (UILU-ENG-2005-1803);
August 2005 | null | null | UIUCDCS-R-2005-2612 | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spacetime discontinuous Galerkin (SDG) finite element methods are used to
solve such PDEs involving space and time variables arising from wave
propagation phenomena in important applications in science and engineering.
To support an accurate and efficient solution procedure using SDG methods and
to exploit the flexibility of these methods, we give a meshing algorithm to
construct an unstructured simplicial spacetime mesh over an arbitrary
simplicial space domain. Our algorithm is the first spacetime meshing algorithm
suitable for efficient solution of nonlinear phenomena in anisotropic media
using novel discontinuous Galerkin finite element methods for implicit
solutions directly in spacetime. Given a triangulated d-dimensional Euclidean
space domain M (a simplicial complex) and initial conditions of the underlying
hyperbolic spacetime PDE, we construct an unstructured simplicial mesh of the
(d+1)-dimensional spacetime domain M x [0,infinity). Our algorithm uses a
near-optimal number of spacetime elements, each with bounded temporal aspect
ratio for any finite prefix M x [0,T] of spacetime. Our algorithm is an
advancing front procedure that constructs the spacetime mesh incrementally, an
extension of the Tent Pitcher algorithm of Ungor and Sheffer (2000).
In 2DxTime, our algorithm simultaneously adapts the size and shape of
spacetime tetrahedra to a spacetime error indicator. We are able to incorporate
more general front modification operations, such as edge flips and limited mesh
smoothing. Our algorithm represents recent progress towards a meshing algorithm
in 2DxTime to track moving domain boundaries and other singular surfaces such
as shock fronts.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 00:44:42 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.0943 | Grenville Croll | Richard J. Irons | The Wall and The Ball: A Study of Domain Referent Spreadsheet Errors | 15 pages | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2003 33-48
ISBN 1 86166 199 1 | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Cell Error Rate in simple spreadsheets averages about 2% to 5%. This CER
has been measured in domain free environments. This paper compares the CERs
occurring in domain free and applied domain tasks. The applied domain task
requires the application of simple linear algebra to a costing problem. The
results show that domain referent knowledge influences participants' approaches
to spreadsheet creation and spreadsheet usage. The conclusion is that
spreadsheet error making is influenced by domain knowledge and domain
perception. Qualitative findings also suggest that spreadsheet error making is
a part of overall human behaviour, and ought to be analyzed against this wider
canvas.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 00:46:41 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Irons",
"Richard J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0804.0946 | Shripad Thite | Shripad Thite | Efficient Spacetime Meshing with Nonlocal Cone Constraints | In Proceedings of the 13th International Meshing Roundtable (IMR),
pages 47--58, September 19--22, 2004 (Williamsburg, VA) | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spacetime Discontinuous Galerkin (DG) methods are used to solve hyperbolic
PDEs describing wavelike physical phenomena. When the PDEs are nonlinear, the
speed of propagation of the phenomena, called the wavespeed, at any point in
the spacetime domain is computed as part of the solution. We give an advancing
front algorithm to construct a simplicial mesh of the spacetime domain suitable
for DG solutions. Given a simplicial mesh of a bounded linear or planar space
domain M, we incrementally construct a mesh of the spacetime domain M x
[0,infinity) such that the solution can be computed in constant time per
element. We add a patch of spacetime elements to the mesh at every step. The
boundary of every patch is causal which means that the elements in the patch
can be solved immediately and that the patches in the mesh are partially
ordered by dependence. The elements in a single patch are coupled because they
share implicit faces; however, the number of elements in each patch is bounded.
The main contribution of this paper is sufficient constraints on the progress
in time made by the algorithm at each step which guarantee that a new patch
with causal boundary can be added to the mesh at every step even when the
wavespeed is increasing discontinuously. Our algorithm adapts to the local
gradation of the space mesh as well as the wavespeed that most constrains
progress at each step. Previous algorithms have been restricted at each step by
the maximum wavespeed throughout the entire spacetime domain.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 01:26:39 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Thite",
"Shripad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.0957 | Partha Mukhopadhyay | V. Arvind and Partha Mukhopadhyay | Derandomizing the Isolation Lemma and Lower Bounds for Circuit Size | 12 pages | null | null | null | cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The isolation lemma of Mulmuley et al \cite{MVV87} is an important tool in
the design of randomized algorithms and has played an important role in several
nontrivial complexity upper bounds. On the other hand, polynomial identity
testing is a well-studied algorithmic problem with efficient randomized
algorithms and the problem of obtaining efficient \emph{deterministic} identity
tests has received a lot of attention recently. The goal of this note is to
compare the isolation lemma with polynomial identity testing: 1. We show that
derandomizing reasonably restricted versions of the isolation lemma implies
circuit size lower bounds. We derive the circuit lower bounds by examining the
connection between the isolation lemma and polynomial identity testing. We give
a randomized polynomial-time identity test for noncommutative circuits of
polynomial degree based on the isolation lemma. Using this result, we show that
derandomizing the isolation lemma implies noncommutative circuit size lower
bounds. The restricted versions of the isolation lemma we consider are natural
and would suffice for the standard applications of the isolation lemma. 2. From
the result of Klivans-Spielman \cite{KS01} we observe that there is a
randomized polynomial-time identity test for commutative circuits of polynomial
degree, also based on a more general isolation lemma for linear forms.
Consequently, derandomization of (a suitable version of) this isolation lemma
also implies circuit size lower bounds in the commutative setting.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 04:04:21 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Apr 2008 10:04:22 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Mukhopadhyay",
"Partha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.0970 | Marie-Claude Gaudel | Marie-Claude Gaudel (LRI), Pascale Le Gall (IBISC) | Testing data types implementations from algebraic specifications | null | Formal Methods and Testing, Springer-Verlag (Ed.) (2008) 209-239 | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algebraic specifications of data types provide a natural basis for testing
data types implementations. In this framework, the conformance relation is
based on the satisfaction of axioms. This makes it possible to formally state
the fundamental concepts of testing: exhaustive test set, testability
hypotheses, oracle. Various criteria for selecting finite test sets have been
proposed. They depend on the form of the axioms, and on the possibilities of
observation of the implementation under test. This last point is related to the
well-known oracle problem. As the main interest of algebraic specifications is
data type abstraction, testing a concrete implementation raises the issue of
the gap between the abstract description and the concrete representation. The
observational semantics of algebraic specifications bring solutions on the
basis of the so-called observable contexts. After a description of testing
methods based on algebraic specifications, the chapter gives a brief
presentation of some tools and case studies, and presents some applications to
other formal methods involving datatypes.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 06:35:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gaudel",
"Marie-Claude",
"",
"LRI"
],
[
"Gall",
"Pascale Le",
"",
"IBISC"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.0980 | Ananthanarayanan Chockalingam | K. Vishnu Vardhan, Saif K. Mohammed, A. Chockalingam, and B. Sundar
Rajan | Large MIMO Detection: A Low-Complexity Detector at High Spectral
Efficiencies | Parts of this paper appeared in IEEE JSAC Special Issue on Multiuser
Detection in Advanced Communication Systems and Networks, vol. 26, no. 3, pp.
473-485, April 2008, and accepted in IEEE ICC'2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider large MIMO systems, where by `{\em large}' we mean number of
transmit and receive antennas of the order of tens to hundreds. Such large MIMO
systems will be of immense interest because of the very high spectral
efficiencies possible in such systems. We present a low-complexity detector
which achieves uncoded near-exponential diversity performance for hundreds of
antennas (i.e., achieves near SISO AWGN performance in a large MIMO fading
environment) with an average per-bit complexity of just $O(N_tN_r)$, where
$N_t$ and $N_r$ denote the number of transmit and receive antennas,
respectively. With an outer turbo code, the proposed detector achieves good
coded bit error performance as well. For example, in a 600 transmit and 600
receive antennas V-BLAST system with a high spectral efficiency of 200 bps/Hz
(using BPSK and rate-1/3 turbo code), our simulation results show that the
proposed detector performs close to within about 4.6 dB from theoretical
capacity. We also adopt the proposed detector for the low-complexity decoding
of high-rate non-orthogonal space-time block codes (STBC) from division
algebras (DA). For example, we have decoded the $16\times 16$ full-rate
non-orthogonal STBC from DA using the proposed detector and show that it
performs close to within about 5.5 dB of the capacity using 4-QAM and rate-3/4
turbo code at a spectral efficiency of 24 bps/Hz. The practical feasibility of
the proposed high-performance low-complexity detector could potentially trigger
wide interest in the implementation of large MIMO systems. In large MC-CDMA
systems with hundreds of users, the proposed detector is shown to achieve near
single-user performance at an average per-bit complexity linear in number of
users, which is quite appealing for its use in practical CDMA systems.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 08:50:23 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Vardhan",
"K. Vishnu",
""
],
[
"Mohammed",
"Saif K.",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.0986 | Sebastien Collette | Zachary Abel, David Charlton, Sebastien Collette, Erik D. Demaine,
Martin L. Demaine, Stefan Langerman, Joseph O'Rourke, Val Pinciu and Godfried
Toussaint | Cauchy's Arm Lemma on a Growing Sphere | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a variant of Cauchy's Lemma, proving that when a convex chain on
one sphere is redrawn (with the same lengths and angles) on a larger sphere,
the distance between its endpoints increases. The main focus of this work is a
comparison of three alternate proofs, to show the links between Toponogov's
Comparison Theorem, Legendre's Theorem and Cauchy's Arm Lemma.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 08:49:47 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Abel",
"Zachary",
""
],
[
"Charlton",
"David",
""
],
[
"Collette",
"Sebastien",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Langerman",
"Stefan",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Pinciu",
"Val",
""
],
[
"Toussaint",
"Godfried",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.0996 | Boris Kudryashov D. | Irina E. Bocharova, Rolf Johannesson, Boris D.Kudryashov, Victor V.
Zyablov | Woven Graph Codes: Asymptotic Performances and Examples | Submitted to IEEE Trans. Inform. Theory | null | 10.1109/TIT.2009.2034787 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructions of woven graph codes based on constituent block and
convolutional codes are studied. It is shown that within the random ensemble of
such codes based on $s$-partite, $s$-uniform hypergraphs, where $s$ depends
only on the code rate, there exist codes satisfying the Varshamov-Gilbert (VG)
and the Costello lower bound on the minimum distance and the free distance,
respectively. A connection between regular bipartite graphs and tailbiting
codes is shown. Some examples of woven graph codes are presented. Among them an
example of a rate $R_{\rm wg}=1/3$ woven graph code with $d_{\rm free}=32$
based on Heawood's bipartite graph and containing $n=7$ constituent rate
$R^{c}=2/3$ convolutional codes with overall constraint lengths $\nu^{c}=5$ is
given. An encoding procedure for woven graph codes with complexity proportional
to the number of constituent codes and their overall constraint length
$\nu^{c}$ is presented.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 09:56:10 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2008 09:21:50 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Bocharova",
"Irina E.",
""
],
[
"Johannesson",
"Rolf",
""
],
[
"Kudryashov",
"Boris D.",
""
],
[
"Zyablov",
"Victor V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1021 | Gilles Villard | Gilles Villard (LIP) | Differentiation of Kaltofen's division-free determinant algorithm | null | Journal of Symbolic Computation 7, 46 (2011) 773-790 | 10.1016/j.jsc.2010.08.012 | null | cs.SC cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Kaltofen has proposed a new approach in [Kaltofen 1992] for computing matrix
determinants. The algorithm is based on a baby steps/giant steps construction
of Krylov subspaces, and computes the determinant as the constant term of a
characteristic polynomial. For matrices over an abstract field and by the
results of Baur and Strassen 1983, the determinant algorithm, actually a
straight-line program, leads to an algorithm with the same complexity for
computing the adjoint of a matrix [Kaltofen 1992]. However, the latter is
obtained by the reverse mode of automatic differentiation and somehow is not
``explicit''. We study this adjoint algorithm, show how it can be implemented
(without resorting to an automatic transformation), and demonstrate its use on
polynomial matrices.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 12:37:43 GMT"
}
] | 2011-12-13T00:00:00 | [
[
"Villard",
"Gilles",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0804.1033 | Christoph Schommer | Sviatlana Danilava, Christoph Schommer | A Semi-Automatic Framework to Discover Epistemic Modalities in
Scientific Articles | 18 pages, 5 Figures | null | null | null | cs.CL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Documents in scientific newspapers are often marked by attitudes and opinions
of the author and/or other persons, who contribute with objective and
subjective statements and arguments as well. In this respect, the attitude is
often accomplished by a linguistic modality. As in languages like english,
french and german, the modality is expressed by special verbs like can, must,
may, etc. and the subjunctive mood, an occurrence of modalities often induces
that these verbs take over the role of modality. This is not correct as it is
proven that modality is the instrument of the whole sentence where both the
adverbs, modal particles, punctuation marks, and the intonation of a sentence
contribute. Often, a combination of all these instruments are necessary to
express a modality. In this work, we concern with the finding of modal verbs in
scientific texts as a pre-step towards the discovery of the attitude of an
author. Whereas the input will be an arbitrary text, the output consists of
zones representing modalities.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 14:13:27 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Danilava",
"Sviatlana",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.1041 | Sebastien Collette | Prosenjit Bose, Paz Carmi, Sebastien Collette and Michiel Smid | On the Stretch Factor of Convex Delaunay Graphs | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let C be a compact and convex set in the plane that contains the origin in
its interior, and let S be a finite set of points in the plane. The Delaunay
graph DG_C(S) of S is defined to be the dual of the Voronoi diagram of S with
respect to the convex distance function defined by C. We prove that DG_C(S) is
a t-spanner for S, for some constant t that depends only on the shape of the
set C. Thus, for any two points p and q in S, the graph DG_C(S) contains a path
between p and q whose Euclidean length is at most t times the Euclidean
distance between p and q.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 14:33:04 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Collette",
"Sebastien",
""
],
[
"Smid",
"Michiel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.1046 | Xu Zhiqiang | Zhiqiang Xu, Guoliang Xu | Discrete schemes for Gaussian curvature and their convergence | null | null | null | null | cs.CV cs.CG cs.GR cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, several discrete schemes for Gaussian curvature are surveyed.
The convergence property of a modified discrete scheme for the Gaussian
curvature is considered. Furthermore, a new discrete scheme for Gaussian
curvature is resented. We prove that the new scheme converges at the regular
vertex with valence not less than 5. By constructing a counterexample, we also
show that it is impossible for building a discrete scheme for Gaussian
curvature which converges over the regular vertex with valence 4. Finally,
asymptotic errors of several discrete scheme for Gaussian curvature are
compared.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 14:47:03 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Xu",
"Zhiqiang",
""
],
[
"Xu",
"Guoliang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0804.1079 | Jerrald Meek | Jerrald Meek | P is a proper subset of NP | 17 Pages;
ftp://ftp%40micrognu%2ecom:anon%[email protected]/pnenp/pnenp.pdf | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this article is to examine and limit the conditions in which
the P complexity class could be equivalent to the NP complexity class. Proof is
provided by demonstrating that as the number of clauses in a NP-complete
problem approaches infinity, the number of input sets processed per computation
performed also approaches infinity when solved by a polynomial time solution.
It is then possible to determine that the only deterministic optimization of a
NP-complete problem that could prove P = NP would be one that examines no more
than a polynomial number of input sets for a given problem.
It is then shown that subdividing the set of all possible input sets into a
representative polynomial search partition is a problem in the FEXP complexity
class. The findings of this article are combined with the findings of other
articles in this series of 4 articles. The final conclusion will be
demonstrated that P =/= NP.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 16:58:59 GMT"
},
{
"version": "v10",
"created": "Thu, 8 May 2008 18:03:04 GMT"
},
{
"version": "v11",
"created": "Sun, 24 Aug 2008 03:06:55 GMT"
},
{
"version": "v12",
"created": "Sun, 7 Sep 2008 03:32:13 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 09:41:53 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Apr 2008 22:50:37 GMT"
},
{
"version": "v4",
"created": "Thu, 10 Apr 2008 21:41:19 GMT"
},
{
"version": "v5",
"created": "Wed, 16 Apr 2008 15:23:46 GMT"
},
{
"version": "v6",
"created": "Fri, 18 Apr 2008 08:31:55 GMT"
},
{
"version": "v7",
"created": "Tue, 22 Apr 2008 06:45:41 GMT"
},
{
"version": "v8",
"created": "Thu, 24 Apr 2008 17:51:47 GMT"
},
{
"version": "v9",
"created": "Mon, 5 May 2008 12:49:28 GMT"
}
] | 2008-09-07T00:00:00 | [
[
"Meek",
"Jerrald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.1083 | Ambedkar Dukkipati | Ambedkar Dukkipati | Towards algebraic methods for maximum entropy estimation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that various formulations (e.g., dual and Kullback-Csiszar
iterations) of estimation of maximum entropy (ME) models can be transformed to
solving systems of polynomial equations in several variables for which one can
use celebrated Grobner bases methods. Posing of ME estimation as solving
polynomial equations is possible, in the cases where feature functions
(sufficient statistic) that provides the information about the underlying
random variable in the form of expectations are integer valued.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 17:09:00 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Dukkipati",
"Ambedkar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1115 | Oskar Sandberg | Olof Mogren, Oskar Sandberg, Vilhelm Verendel and Devdatt Dubhashi | Adaptive Dynamics of Realistic Small-World Networks | null | null | null | null | cs.DS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Continuing in the steps of Jon Kleinberg's and others celebrated work on
decentralized search in small-world networks, we conduct an experimental
analysis of a dynamic algorithm that produces small-world networks. We find
that the algorithm adapts robustly to a wide variety of situations in realistic
geographic networks with synthetic test data and with real world data, even
when vertices are uneven and non-homogeneously distributed.
We investigate the same algorithm in the case where some vertices are more
popular destinations for searches than others, for example obeying power-laws.
We find that the algorithm adapts and adjusts the networks according to the
distributions, leading to improved performance. The ability of the dynamic
process to adapt and create small worlds in such diverse settings suggests a
possible mechanism by which such networks appear in nature.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 19:39:59 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Mogren",
"Olof",
""
],
[
"Sandberg",
"Oskar",
""
],
[
"Verendel",
"Vilhelm",
""
],
[
"Dubhashi",
"Devdatt",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.1117 | Yindi Jing | Y. Jing, H. Jafarkhani | Network Beamforming Using Relays with Perfect Channel Information | 33 pages, 12 figures. This paper was submitted to IEEE Trans. on
Information Theory. In this version, some modification is made on the
presentation. Parts of this work were presented at ICASSP07 and ITA08 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is on beamforming in wireless relay networks with perfect channel
information at relays, the receiver, and the transmitter if there is a direct
link between the transmitter and receiver. It is assumed that every node in the
network has its own power constraint. A two-step amplify-and-forward protocol
is used, in which the transmitter and relays not only use match filters to form
a beam at the receiver but also adaptively adjust their transmit powers
according to the channel strength information. For a network with any number of
relays and no direct link, the optimal power control is solved analytically.
The complexity of finding the exact solution is linear in the number of relays.
Our results show that the transmitter should always use its maximal power and
the optimal power used at a relay is not a binary function. It can take any
value between zero and its maximum transmit power. Also, this value depends on
the quality of all other channels in addition to the relay's own channels.
Despite this coupling fact, distributive strategies are proposed in which, with
the aid of a low-rate broadcast from the receiver, a relay needs only its own
channel information to implement the optimal power control. Simulated
performance shows that network beamforming achieves the maximal diversity and
outperforms other existing schemes. Then, beamforming in networks with a direct
link are considered. We show that when the direct link exists during the first
step only, the optimal power control is the same as that of networks with no
direct link. For networks with a direct link during the second step, recursive
numerical algorithms are proposed to solve the power control problem.
Simulation shows that by adjusting the transmitter and relays' powers
adaptively, network performance is significantly improved.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 19:44:06 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Jing",
"Y.",
""
],
[
"Jafarkhani",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1118 | Donald Sofge | Donald A. Sofge | A Survey of Quantum Programming Languages: History, Methods, and Tools | 6 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum computer programming is emerging as a new subject domain from
multidisciplinary research in quantum computing, computer science, mathematics
(especially quantum logic, lambda calculi, and linear logic), and engineering
attempts to build the first non-trivial quantum computer. This paper briefly
surveys the history, methods, and proposed tools for programming quantum
computers circa late 2007. It is intended to provide an extensive but
non-exhaustive look at work leading up to the current state-of-the-art in
quantum computer programming. Further, it is an attempt to analyze the needed
programming tools for quantum programmers, to use this analysis to predict the
direction in which the field is moving, and to make recommendations for further
development of quantum programming language tools.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 19:48:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sofge",
"Donald A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.1133 | Donald Sofge | Donald A. Sofge | Prospective Algorithms for Quantum Evolutionary Computation | 8 pages | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This effort examines the intersection of the emerging field of quantum
computing and the more established field of evolutionary computation. The goal
is to understand what benefits quantum computing might offer to computational
intelligence and how computational intelligence paradigms might be implemented
as quantum programs to be run on a future quantum computer. We critically
examine proposed algorithms and methods for implementing computational
intelligence paradigms, primarily focused on heuristic optimization methods
including and related to evolutionary computation, with particular regard for
their potential for eventual implementation on quantum computing hardware.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2008 20:11:24 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sofge",
"Donald A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.1170 | Daniel \v{S}tefankovi\v{c} | Satyaki Mahalanabis, Daniel Stefankovic | Approximating L1-distances between mixture distributions using random
projections | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of computing L1-distances between every pair
ofcprobability densities from a given family. We point out that the technique
of Cauchy random projections (Indyk'06) in this context turns into stochastic
integrals with respect to Cauchy motion.
For piecewise-linear densities these integrals can be sampled from if one can
sample from the stochastic integral of the function x->(1,x). We give an
explicit density function for this stochastic integral and present an efficient
sampling algorithm. As a consequence we obtain an efficient algorithm to
approximate the L1-distances with a small relative error.
For piecewise-polynomial densities we show how to approximately sample from
the distributions resulting from the stochastic integrals. This also results in
an efficient algorithm to approximate the L1-distances, although our inability
to get exact samples worsens the dependence on the parameters.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 02:11:13 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Mahalanabis",
"Satyaki",
""
],
[
"Stefankovic",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.1172 | Jaspreet Singh | Jaspreet Singh, Onkar Dabeer, Upamanyu Madhow | Transceiver Design with Low-Precision Analog-to-Digital Conversion : An
Information-Theoretic Perspective | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern communication receiver architectures center around digital signal
processing (DSP), with the bulk of the receiver processing being performed on
digital signals obtained after analog-to-digital conversion (ADC). In this
paper, we explore Shannon-theoretic performance limits when ADC precision is
drastically reduced, from typical values of 8-12 bits used in current
communication transceivers, to 1-3 bits. The goal is to obtain insight on
whether DSP-centric transceiver architectures are feasible as communication
bandwidths scale up, recognizing that high-precision ADC at high sampling rates
is either unavailable, or too costly or power-hungry. Specifically, we evaluate
the communication limits imposed by low-precision ADC for the ideal real
discrete-time Additive White Gaussian Noise (AWGN) channel, under an average
power constraint on the input. For an ADC with K quantization bins (i.e., a
precision of log2 K bits), we show that the Shannon capacity is achievable by a
discrete input distribution with at most K + 1 mass points. For 2-bin (1-bit)
symmetric ADC, this result is tightened to show that binary antipodal signaling
is optimum for any signal-to-noise ratio (SNR). For multi-bit ADC, the capacity
is computed numerically, and the results obtained are used to make the
following encouraging observations regarding system design with low-precision
ADC : (a) even at moderately high SNR of up to 20 dB, 2-3 bit quantization
results in only 10-20% reduction of spectral efficiency, which is acceptable
for large communication bandwidths, (b) standard equiprobable pulse amplitude
modulation with ADC thresholds set to implement maximum likelihood hard
decisions is asymptotically optimum at high SNR, and works well at low to
moderate SNRs as well.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 02:15:26 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Singh",
"Jaspreet",
""
],
[
"Dabeer",
"Onkar",
""
],
[
"Madhow",
"Upamanyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1173 | Benjamin Lafreniere | Peter Brass, Ferran Hurtado, Benjamin Lafreniere, Anna Lubiw | A Lower Bound on the Area of a 3-Coloured Disk Packing | 15 pages (11 pages + 4 page appendix), 12 figures | null | null | null | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a set of unit-disks in the plane with union area $A$, what fraction of
$A$ can be covered by selecting a pairwise disjoint subset of the disks? Rado
conjectured 1/4 and proved $1/4.41$. Motivated by the problem of
channel-assignment for wireless access points, in which use of 3 channels is a
standard practice, we consider a variant where the selected subset of disks
must be 3-colourable with disks of the same colour pairwise-disjoint. For this
variant of the problem, we conjecture that it is always possible to cover at
least $1/1.41$ of the union area and prove $1/2.09$. We also provide an
$O(n^2)$ algorithm to select a subset achieving a $1/2.77$ bound.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 07:26:04 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Brass",
"Peter",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Lafreniere",
"Benjamin",
""
],
[
"Lubiw",
"Anna",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1179 | Genta Ito | Genta Ito | A Dynamical Boolean Network | 37 pages, 31 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a Dynamical Boolean Network (DBN), which is a Virtual Boolean
Network (VBN) whose set of states is fixed but whose transition matrix can
change from one discrete time step to another. The transition matrix $T_{k}$ of
our DBN for time step $k$ is of the form $Q^{-1}TQ$, where $T$ is a transition
matrix (of a VBN) defined at time step $k$ in the course of the construction of
our DBN and $Q$ is the matrix representation of some randomly chosen
permutation $P$ of the states of our DBN. For each of several classes of such
permutations, we carried out a number of simulations of a DBN with two nodes;
each of our simulations consisted of 1,000 trials of 10,000 time steps each. In
one of our simulations, only six of the 16 possible single-node transition
rules for a VBN with two nodes were visited a total of 300,000 times (over all
1,000 trials). In that simulation, linearity appears to play a significant role
in that three of those six single-node transition rules are transition rules of
a Linear Virtual Boolean Network (LVBN); the other three are the negations of
the first three. We also discuss the notions of a Probabilistic Boolean Network
and a Hidden Markov Model--in both cases, in the context of using an arbitrary
(though not necessarily one-to-one) function to label the states of a VBN.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 03:26:39 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2008 15:14:58 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2008 16:29:28 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Ito",
"Genta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1183 | Jun Muramatsu | Jun Muramatsu and Shigeki Miyake | Hash Property and Fixed-rate Universal Coding Theorems | submitted to IEEE Transactions on Information Theory, Mar. 2008. 15
pages | IEEE Transactions on Information Theory, vol. 56, no. 6, pp.
2688-2698, June 2010. Corrections: IEEE Transactions on Information Theory,
vol. 58, no. 5, pp. 3305-3307, May 2012 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove the achievability of fixed-rate universal
coding problems by using our previously introduced notion of hash property.
These problems are the fixed-rate lossless universal source coding problem and
the fixed-rate universal channel coding problem. Since an ensemble of sparse
matrices satisfies the hash property requirement, it is proved that we can
construct universal codes by using sparse matrices.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 05:11:01 GMT"
}
] | 2012-05-22T00:00:00 | [
[
"Muramatsu",
"Jun",
""
],
[
"Miyake",
"Shigeki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1184 | Al-Sakib Khan Pathan | Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong | Securing U-Healthcare Sensor Networks using Public Key Based Scheme | 4 Pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent emergence of electronic culture uplifts healthcare facilities to a new
era with the aid of wireless sensor network (WSN) technology. Due to the
sensitiveness of medical data, austere privacy and security are inevitable for
all parts of healthcare systems. However, the constantly evolving nature and
constrained resources of sensors in WSN inflict unavailability of a lucid line
of defense to ensure perfect security. In order to provide holistic security,
protections must be incorporated in every component of healthcare sensor
networks. This paper proposes an efficient security scheme for healthcare
applications of WSN which uses the notion of public key cryptosystem. Our
entire security scheme comprises basically of two parts; a key handshaking
scheme based on simple linear operations and the derivation of decryption key
by a receiver node for a particular sender in the network. Our architecture
allows both base station to node or node to base station secure communications,
and node-to-node secure communications. We consider both the issues of
stringent security and network performance to propose our security scheme.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 05:17:51 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Haque",
"Md. Mokammel",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.1185 | Al-Sakib Khan Pathan | Al-Sakib Khan Pathan and Choong Seon Hong | Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with
Smart Cards | 3 Pages | 10th IEEE International Conference on Advanced Communication
Technology (IEEE ICACT 2008), Volume III, February 17-20, 2008, Phoenix Park,
Korea, pp. 1618-1620 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password
authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s
legendary timestamp-based remote authentication scheme using smart cards. After
analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that
their scheme is still insecure and vulnerable to four types of forgery attacks.
Hence, in this paper, we prove that, their claim that their scheme is
intractable is incorrect. Also, we show that even an attack based on Sun et
al._s attack could be launched against their scheme which they claimed to
resolve with their proposal.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 05:22:27 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Hong",
"Choong Seon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.1187 | Marianne Viallet | Marianne Viallet (LTDS), G\'erald Poum\'erol, Olivier Dessombz (LTDS),
Louis Jezequel (LTDS) | M\'ethode de calcul du rayonnement acoustique de structures complexes | null | Dans Actes du huiti\`eme colloque national en Calcul des
structures - GIENS 2007 - Huiti\`eme colloque national en Calcul des
structures, Giens : France (2007) | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the automotive industry, predicting noise during design cycle is a
necessary step. Well-known methods exist to answer this issue in low frequency
domain. Among these, Finite Element Methods, adapted to closed domains, are
quite easy to implement whereas Boundary Element Methods are more adapted to
infinite domains, but may induce singularity problems. In this article, the
described method, the SDM, allows to use both methods in their best application
domain. A new method is also presented to solve the SDM exterior problem.
Instead of using Boundary Element Methods, an original use of Finite Elements
is made. Efficiency of this new version of the Substructure Deletion Method is
discussed.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 06:24:49 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Viallet",
"Marianne",
"",
"LTDS"
],
[
"Poumérol",
"Gérald",
"",
"LTDS"
],
[
"Dessombz",
"Olivier",
"",
"LTDS"
],
[
"Jezequel",
"Louis",
"",
"LTDS"
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0804.1193 | Dana Porrat | Elchanan Zwecher and Dana Porrat | Spreading Signals in the Wideband Limit | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wideband communications are impossible with signals that are spread over a
very large band and are transmitted over multipath channels unknown ahead of
time. This work exploits the I-mmse connection to bound the achievable
data-rate of spreading signals in wideband settings, and to conclude that the
achievable data-rate diminishes as the bandwidth increases due to channel
uncertainty. The result applies to all spreading modulations, i.e. signals that
are evenly spread over the bandwidth available to the communication system,
with SNR smaller than log(W/L)/(W/L) and holds for communications over channels
where the number of paths L is unbounded by sub-linear in the bandwidth W.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 07:14:59 GMT"
}
] | 2008-04-09T00:00:00 | [
[
"Zwecher",
"Elchanan",
""
],
[
"Porrat",
"Dana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1214 | Kazuhiko Kusano | Kazuhiko Kusano, Wataru Matsubara, Akira Ishino, Hideo Bannai, Ayumi
Shinohara | New Lower Bounds for the Maximum Number of Runs in a String | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show a new lower bound for the maximum number of runs in a string. We
prove that for any e > 0, (a -- e)n is an asymptotic lower bound, where a =
56733/60064 = 0.944542. It is superior to the previous bound 0.927 given by
Franek et al. Moreover, our construction of the strings and the proof is much
simpler than theirs.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 09:08:37 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kusano",
"Kazuhiko",
""
],
[
"Matsubara",
"Wataru",
""
],
[
"Ishino",
"Akira",
""
],
[
"Bannai",
"Hideo",
""
],
[
"Shinohara",
"Ayumi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1244 | Fionn Murtagh | Fionn Murtagh | Geometric Data Analysis, From Correspondence Analysis to Structured Data
Analysis (book review) | 5 pages, 8 citations. Accepted in Journal of Classification | Journal of Classification 25, 137-141, 2008 | 10.1007/s00357-008-9007-7 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Review of: Brigitte Le Roux and Henry Rouanet, Geometric Data Analysis, From
Correspondence Analysis to Structured Data Analysis, Kluwer, Dordrecht, 2004,
xi+475 pp.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 11:31:55 GMT"
}
] | 2011-06-14T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.1266 | Uwe Aickelin | Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni
Tedesco, Jamie Twycross | Immune System Approaches to Intrusion Detection - A Review | null | Natural Computing, 6(4), pp 413-466, 2007 | 10.1007/s11047-006-9026-4 | null | cs.NE cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of artificial immune systems in intrusion detection is an appealing
concept for two reasons. Firstly, the human immune system provides the human
body with a high level of protection from invading pathogens, in a robust,
self-organised and distributed manner. Secondly, current techniques used in
computer security are not able to cope with the dynamic and increasingly
complex nature of computer systems and their security. It is hoped that
biologically inspired approaches in this area, including the use of
immune-based systems will be able to meet this challenge. Here we review the
algorithms used, the development of the systems and the outcome of their
implementation. We provide an introduction and analysis of the key developments
within this field, in addition to making suggestions for future research.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 11:44:38 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Kim",
"Jungwon",
""
],
[
"Bentley",
"Peter J.",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Greensmith",
"Julie",
""
],
[
"Tedesco",
"Gianni",
""
],
[
"Twycross",
"Jamie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.1270 | Michel Grabisch | Michel Grabisch (LIP6), Bernard De Baets, Janos Fodor | The quest for rings on bipolar scales | null | International Journal of Uncertainty Fuzziness and Knowledge-Based
Systems (2004) 499-512 | null | null | cs.DM math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the interval $]{-1},1[$ and intend to endow it with an algebraic
structure like a ring. The motivation lies in decision making, where scales
that are symmetric w.r.t. 0 are needed in order to represent a kind of symmetry
in the behaviour of the decision maker. A former proposal due to Grabisch was
based on maximum and minimum. In this paper, we propose to build our structure
on t-conorms and t-norms, and we relate this construction to uninorms. We show
that the only way to build a group is to use strict t-norms, and that there is
no way to build a ring. Lastly, we show that the main result of this paper is
connected to the theory of ordered Abelian groups.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 13:23:54 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"LIP6"
],
[
"De Baets",
"Bernard",
""
],
[
"Fodor",
"Janos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0804.1281 | Uwe Aickelin | Gianni Tedesco and Uwe Aickelin | Data Reduction in Intrusion Alert Correlation | null | WSEAS Transactions on Computers, 5(1), pp 186-193, 2006 | null | null | cs.CR cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network intrusion detection sensors are usually built around low level models
of network traffic. This means that their output is of a similarly low level
and as a consequence, is difficult to analyze. Intrusion alert correlation is
the task of automating some of this analysis by grouping related alerts
together. Attack graphs provide an intuitive model for such analysis.
Unfortunately alert flooding attacks can still cause a loss of service on
sensors, and when performing attack graph correlation, there can be a large
number of extraneous alerts included in the output graph. This obscures the
fine structure of genuine attacks and makes them more difficult for human
operators to discern. This paper explores modified correlation algorithms which
attempt to minimize the impact of this attack.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 14:15:34 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 10:47:11 GMT"
}
] | 2010-07-05T00:00:00 | [
[
"Tedesco",
"Gianni",
""
],
[
"Aickelin",
"Uwe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.1302 | Francis Bach | Francis Bach (INRIA Rocquencourt) | Bolasso: model consistent Lasso estimation through the bootstrap | null | null | null | null | cs.LG math.ST stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the least-square linear regression problem with regularization by
the l1-norm, a problem usually referred to as the Lasso. In this paper, we
present a detailed asymptotic analysis of model consistency of the Lasso. For
various decays of the regularization parameter, we compute asymptotic
equivalents of the probability of correct model selection (i.e., variable
selection). For a specific rate decay, we show that the Lasso selects all the
variables that should enter the model with probability tending to one
exponentially fast, while it selects all other variables with strictly positive
probability. We show that this property implies that if we run the Lasso for
several bootstrapped replications of a given sample, then intersecting the
supports of the Lasso bootstrap estimates leads to consistent model selection.
This novel variable selection algorithm, referred to as the Bolasso, is
compared favorably to other linear regression methods on synthetic data and
datasets from the UCI machine learning repository.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 15:40:03 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.1327 | Fran\c{c}ois Nicolas | Julien Cassaigne, Christian Mauduit and Francois Nicolas | Asymptotic behavior of growth functions of D0L-systems | Might appear in the book "Combinatorics, Automata and Number Theory",
which is in preparation | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A D0L-system is a triple (A, f, w) where A is a finite alphabet, f is an
endomorphism of the free monoid over A, and w is a word over A. The
D0L-sequence generated by (A, f, w) is the sequence of words (w, f(w), f(f(w)),
f(f(f(w))), ...). The corresponding sequence of lengths, that is the function
mapping each non-negative integer n to |f^n(w)|, is called the growth function
of (A, f, w). In 1978, Salomaa and Soittola deduced the following result from
their thorough study of the theory of rational power series: if the
D0L-sequence generated by (A, f, w) is not eventually the empty word then there
exist a non-negative integer d and a real number b greater than or equal to one
such that |f^n(w)| behaves like n^d b^n as n tends to infinity. The aim of the
present paper is to present a short, direct, elementary proof of this theorem.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 18:57:42 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2008 18:44:47 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Jul 2009 03:15:47 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Aug 2009 11:57:51 GMT"
},
{
"version": "v5",
"created": "Sat, 12 Sep 2009 23:53:09 GMT"
}
] | 2009-09-13T00:00:00 | [
[
"Cassaigne",
"Julien",
""
],
[
"Mauduit",
"Christian",
""
],
[
"Nicolas",
"Francois",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1366 | Dmitri Krioukov | Paul Krapivsky, Dmitri Krioukov | Scale-free networks as preasymptotic regimes of superlinear preferential
attachment | null | Phys. Rev. E 78, 026114 (2008) | 10.1103/PhysRevE.78.026114 | null | cond-mat.stat-mech cond-mat.dis-nn cs.NI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the following paradox associated with networks growing according to
superlinear preferential attachment: superlinear preference cannot produce
scale-free networks in the thermodynamic limit, but there are superlinearly
growing network models that perfectly match the structure of some real
scale-free networks, such as the Internet. We obtain an analytic solution,
supported by extensive simulations, for the degree distribution in
superlinearly growing networks with arbitrary average degree, and confirm that
in the true thermodynamic limit these networks are indeed degenerate, i.e.,
almost all nodes have low degrees. We then show that superlinear growth has
vast preasymptotic regimes whose depths depend both on the average degree in
the network and on how superlinear the preference kernel is. We demonstrate
that a superlinearly growing network model can reproduce, in its preasymptotic
regime, the structure of a real network, if the model captures some
sufficiently strong structural constraints -- rich-club connectivity, for
example. These findings suggest that real scale-free networks of finite size
may exist in preasymptotic regimes of network evolution processes that lead to
degenerate network formations in the thermodynamic limit.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2008 21:15:35 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 18:12:16 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Aug 2008 02:50:54 GMT"
}
] | 2008-08-23T00:00:00 | [
[
"Krapivsky",
"Paul",
""
],
[
"Krioukov",
"Dmitri",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0804.1382 | Ruoheng Liu | Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor | Interference-Assisted Secret Communication | To appear in the Proceedings of the 2008 IEEE Information Theory
Workshop, Porto, Portugal, May 5 - 9, 2008 | null | 10.1109/TIT.2011.2121450 | null | cs.IT cs.CR math.IT | http://creativecommons.org/licenses/by/3.0/ | Wireless communication is susceptible to adversarial eavesdropping due to the
broadcast nature of the wireless medium. In this paper it is shown how
eavesdropping can be alleviated by exploiting the superposition property of the
wireless medium. A wiretap channel with a helping interferer (WT-HI), in which
a transmitter sends a confidential message to its intended receiver in the
presence of a passive eavesdropper, and with the help of an independent
interferer, is considered. The interferer, which does not know the confidential
message, helps in ensuring the secrecy of the message by sending independent
signals. An achievable secrecy rate for the WT-HI is given. The results show
that interference can be exploited to assist secrecy in wireless
communications. An important example of the Gaussian case, in which the
interferer has a better channel to the intended receiver than to the
eavesdropper, is considered. In this situation, the interferer can send a
(random) codeword at a rate that ensures that it can be decoded and subtracted
from the received signal by the intended receiver but cannot be decoded by the
eavesdropper. Hence, only the eavesdropper is interfered with and the secrecy
level of the confidential message is increased.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 00:18:43 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Tang",
"Xiaojun",
""
],
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1409 | Murat Ali Bayir Mr. | Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar, Guven Fidan | Discovering More Accurate Frequent Web Usage Patterns | 19 pages, 6 figures | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Web usage mining is a type of web mining, which exploits data mining
techniques to discover valuable information from navigation behavior of World
Wide Web users. As in classical data mining, data preparation and pattern
discovery are the main issues in web usage mining. The first phase of web usage
mining is the data processing phase, which includes the session reconstruction
operation from server logs. Session reconstruction success directly affects the
quality of the frequent patterns discovered in the next phase. In reactive web
usage mining techniques, the source data is web server logs and the topology of
the web pages served by the web server domain. Other kinds of information
collected during the interactive browsing of web site by user, such as cookies
or web logs containing similar information, are not used. The next phase of web
usage mining is discovering frequent user navigation patterns. In this phase,
pattern discovery methods are applied on the reconstructed sessions obtained in
the first phase in order to discover frequent user patterns. In this paper, we
propose a frequent web usage pattern discovery method that can be applied after
session reconstruction phase. In order to compare accuracy performance of
session reconstruction phase and pattern discovery phase, we have used an agent
simulator, which models behavior of web users and generates web user navigation
as well as the log data kept by the web server.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 05:46:26 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bayir",
"Murat Ali",
""
],
[
"Toroslu",
"Ismail Hakki",
""
],
[
"Cosar",
"Ahmet",
""
],
[
"Fidan",
"Guven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.1421 | Christopher Homan | Jason Covey and Christopher Homan | A $O(\log m)$, deterministic, polynomial-time computable approximation
of Lewis Carroll's scoring rule | null | null | null | null | cs.GT cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide deterministic, polynomial-time computable voting rules that
approximate Dodgson's and (the ``minimization version'' of) Young's scoring
rules to within a logarithmic factor. Our approximation of Dodgson's rule is
tight up to a constant factor, as Dodgson's rule is $\NP$-hard to approximate
to within some logarithmic factor. The ``maximization version'' of Young's rule
is known to be $\NP$-hard to approximate by any constant factor. Both
approximations are simple, and natural as rules in their own right: Given a
candidate we wish to score, we can regard either its Dodgson or Young score as
the edit distance between a given set of voter preferences and one in which the
candidate to be scored is the Condorcet winner. (The difference between the two
scoring rules is the type of edits allowed.) We regard the marginal cost of a
sequence of edits to be the number of edits divided by the number of reductions
(in the candidate's deficit against any of its opponents in the pairwise race
against that opponent) that the edits yield. Over a series of rounds, our
scoring rules greedily choose a sequence of edits that modify exactly one
voter's preferences and whose marginal cost is no greater than any other such
single-vote-modifying sequence.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 07:12:29 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Covey",
"Jason",
""
],
[
"Homan",
"Christopher",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0804.1435 | Marc de Falco | Marc de Falco | The Geometry of Interaction of Differential Interaction Nets | 20 pagee, to be published in the proceedings of LICS08 | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Geometry of Interaction purpose is to give a semantic of proofs or
programs accounting for their dynamics. The initial presentation, translated as
an algebraic weighting of paths in proofnets, led to a better characterization
of the lambda-calculus optimal reduction. Recently Ehrhard and Regnier have
introduced an extension of the Multiplicative Exponential fragment of Linear
Logic (MELL) that is able to express non-deterministic behaviour of programs
and a proofnet-like calculus: Differential Interaction Nets. This paper
constructs a proper Geometry of Interaction (GoI) for this extension. We
consider it both as an algebraic theory and as a concrete reversible
computation. We draw links between this GoI and the one of MELL. As a
by-product we give for the first time an equational theory suitable for the GoI
of the Multiplicative Additive fragment of Linear Logic.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 08:57:47 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"de Falco",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.1440 | Natacha Portier | Pacal Koiran (LIP), J\"urgen Landes, Natacha Portier (LIP), Penghui
Yao | Adversary lower bounds for nonadaptive quantum algorithms | null | Dans proceedings of WoLLIC 2008 - WoLLIC 2008 15th Workshop on
Logic, Language, Information and Computation, Edinburgh : Royaume-Uni | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present general methods for proving lower bounds on the query complexity
of nonadaptive quantum algorithms. Our results are based on the adversary
method of Ambainis.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 09:36:50 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Koiran",
"Pacal",
"",
"LIP"
],
[
"Landes",
"Jürgen",
"",
"LIP"
],
[
"Portier",
"Natacha",
"",
"LIP"
],
[
"Yao",
"Penghui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0804.1441 | Ratthachat Chatpatanasiri | Ratthachat Chatpatanasiri, Teesid Korsrilabutr, Pasakorn
Tangchanachaianan and Boonserm Kijsirikul | On Kernelization of Supervised Mahalanobis Distance Learners | 23 pages, 5 figures. There is a seriously wrong formula in derivation
of a gradient formula of the "kernel NCA" in the two previous versions. In
this new version, a new theoretical result is provided to properly account
kernel NCA | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the problem of kernelizing an existing supervised
Mahalanobis distance learner. The following features are included in the paper.
Firstly, three popular learners, namely, "neighborhood component analysis",
"large margin nearest neighbors" and "discriminant neighborhood embedding",
which do not have kernel versions are kernelized in order to improve their
classification performances. Secondly, an alternative kernelization framework
called "KPCA trick" is presented. Implementing a learner in the new framework
gains several advantages over the standard framework, e.g. no mathematical
formulas and no reprogramming are required for a kernel implementation, the
framework avoids troublesome problems such as singularity, etc. Thirdly, while
the truths of representer theorems are just assumptions in previous papers
related to ours, here, representer theorems are formally proven. The proofs
validate both the kernel trick and the KPCA trick in the context of Mahalanobis
distance learning. Fourthly, unlike previous works which always apply brute
force methods to select a kernel, we investigate two approaches which can be
efficiently adopted to construct an appropriate kernel for a given dataset.
Finally, numerical results on various real-world datasets are presented.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 09:40:51 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Dec 2008 09:51:46 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2009 02:19:27 GMT"
}
] | 2009-01-30T00:00:00 | [
[
"Chatpatanasiri",
"Ratthachat",
""
],
[
"Korsrilabutr",
"Teesid",
""
],
[
"Tangchanachaianan",
"Pasakorn",
""
],
[
"Kijsirikul",
"Boonserm",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.1448 | Vincent Garcia | Vincent Garcia, Eric Debreuve and Michel Barlaud | Fast k Nearest Neighbor Search using GPU | 13 pages, 2figures, submitted to CVGPU 2008 | null | null | null | cs.CV cs.DC | http://creativecommons.org/licenses/by/3.0/ | The recent improvements of graphics processing units (GPU) offer to the
computer vision community a powerful processing platform. Indeed, a lot of
highly-parallelizable computer vision problems can be significantly accelerated
using GPU architecture. Among these algorithms, the k nearest neighbor search
(KNN) is a well-known problem linked with many applications such as
classification, estimation of statistical properties, etc. The main drawback of
this task lies in its computation burden, as it grows polynomially with the
data size. In this paper, we show that the use of the NVIDIA CUDA API
accelerates the search for the KNN up to a factor of 120.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 10:06:15 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"Garcia",
"Vincent",
""
],
[
"Debreuve",
"Eric",
""
],
[
"Barlaud",
"Michel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.1490 | Jean-Claude Belfiore | Maya Badr and Jean-Claude Belfiore | Distributed Space-Time Block Codes for the MIMO Multiple Access Channel | 5 pages, 6 figures, accepted to ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, the Multiple transmit antennas Multiple Access Channel is
considered. A construction of a family of distributed space-time codes for this
channel is proposed. No Channel Side Information at the transmitters is assumed
and users are not allowed to cooperate together. It is shown that the proposed
code achieves the Diversity Multiplexing Tradeoff of the channel. As an
example, we consider the two-user MIMO-MAC channel. Simulation results show the
significant gain offered by the new coding scheme compared to an orthogonal
transmission scheme, e.g. time sharing.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 14:13:28 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"Badr",
"Maya",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1493 | Jean-Claude Belfiore | Maya Badr and Jean-Claude Belfiore | Distributed Space Time Codes for the Amplify-and-Forward Multiple-Access
Relay Channel | 5 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we present a construction of a family of space-time block codes
for a Multi-Access Amplify-and- Forward Relay channel with two users and a
single half-duplex relay. It is assumed that there is no Channel Side
Information at the transmitters and that they are not allowed to cooperate
together. Using the Diversity Multiplexing Tradeoff as a tool to evaluate the
performance, we prove that the proposed scheme is optimal in some sense.
Moreover, we provide numerical results which show that the new scheme
outperforms the orthogonal transmission scheme, e. g. time sharing and offers a
significant gain.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2008 14:34:41 GMT"
}
] | 2008-04-10T00:00:00 | [
[
"Badr",
"Maya",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.