id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0804.1602 | Akisato Kimura | Akisato Kimura and Tomohiko Uyematsu | Multiterminal source coding with complementary delivery | 13 pages in double-column format, 1 figure, submitted to IEICE
Transactions on Fundamentals | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A coding problem for correlated information sources is investigated. Messages
emitted from two correlated sources are jointly encoded, and delivered to two
decoders. Each decoder has access to one of the two messages to enable it to
reproduce the other message. The rate-distortion function for the coding
problem and its interesting properties are clarified.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 03:15:46 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2008 08:19:48 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Kimura",
"Akisato",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1607 | Sundhar Ram Srinivasan | S. Sundhar Ram, V. V. Veeravalli, and A. Nedic | Distributed and Recursive Parameter Estimation in Parametrized Linear
State-Space Models | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a network of sensors deployed to sense a spatio-temporal field
and estimate a parameter of interest. We are interested in the case where the
temporal process sensed by each sensor can be modeled as a state-space process
that is perturbed by random noise and parametrized by an unknown parameter. To
estimate the unknown parameter from the measurements that the sensors
sequentially collect, we propose a distributed and recursive estimation
algorithm, which we refer to as the incremental recursive prediction error
algorithm. This algorithm has the distributed property of incremental gradient
algorithms and the on-line property of recursive prediction error algorithms.
We study the convergence behavior of the algorithm and provide sufficient
conditions for its convergence. Our convergence result is rather general and
contains as special cases the known convergence results for the incremental
versions of the least-mean square algorithm. Finally, we use the algorithm
developed in this paper to identify the source of a gas-leak (diffusing source)
in a closed warehouse and also report numerical simulations to verify
convergence.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 03:47:05 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2008 14:45:10 GMT"
}
] | 2008-04-12T00:00:00 | [
[
"Ram",
"S. Sundhar",
""
],
[
"Veeravalli",
"V. V.",
""
],
[
"Nedic",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.1617 | Rui Zhang | Rui Zhang | Optimal Power Control over Fading Cognitive Radio Channels by Exploiting
Primary User CSI | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with spectrum sharing cognitive radio networks, where
a secondary user (SU) or cognitive radio link communicates simultaneously over
the same frequency band with an existing primary user (PU) link. It is assumed
that the SU transmitter has the perfect channel state information (CSI) on the
fading channels from SU transmitter to both PU and SU receivers (as usually
assumed in the literature), as well as the fading channel from PU transmitter
to PU receiver (a new assumption). With the additional PU CSI, we study the
optimal power control for the SU over different fading states to maximize the
SU ergodic capacity subject to a new proposed constraint to protect the PU
transmission, which limits the maximum ergodic capacity loss of the PU resulted
from the SU transmission. It is shown that the proposed SU power-control policy
is superior over the conventional policy under the constraint on the maximum
tolerable interference power/interperferecne temperature at the PU receiver, in
terms of the achievable ergodic capacities of both PU and SU.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 05:42:18 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 02:31:09 GMT"
}
] | 2009-02-17T00:00:00 | [
[
"Zhang",
"Rui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1649 | David Sevilla | Jaime Gutierrez, David Sevilla | On decomposition of tame polynomials and rational functions | 9 pages | Computer algebra in scientific computing, 219--226, Lecture Notes
in Comput. Sci., 4194, Springer, Berlin, 2006. MR2279795 (2008d:12001) | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present algorithmic considerations and theoretical results
about the relation between the orders of certain groups associated to the
components of a polynomial and the order of the group that corresponds to the
polynomial, proving it for arbitrary tame polynomials, and considering the case
of rational functions.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 09:31:04 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0804.1653 | Mario Figueiredo | Andre Martins, Pedro Aguiar, Mario Figueiredo | Nonextensive Generalizations of the Jensen-Shannon Divergence | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convexity is a key concept in information theory, namely via the many
implications of Jensen's inequality, such as the non-negativity of the
Kullback-Leibler divergence (KLD). Jensen's inequality also underlies the
concept of Jensen-Shannon divergence (JSD), which is a symmetrized and smoothed
version of the KLD. This paper introduces new JSD-type divergences, by
extending its two building blocks: convexity and Shannon's entropy. In
particular, a new concept of q-convexity is introduced and shown to satisfy a
Jensen's q-inequality. Based on this Jensen's q-inequality, the Jensen-Tsallis
q-difference is built, which is a nonextensive generalization of the JSD, based
on Tsallis entropies. Finally, the Jensen-Tsallis q-difference is charaterized
in terms of convexity and extrema.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 09:48:56 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Martins",
"Andre",
""
],
[
"Aguiar",
"Pedro",
""
],
[
"Figueiredo",
"Mario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.1667 | James Cheney | Christian Urban, James Cheney and Stefan Berghofer | Mechanizing the Metatheory of LF | Accepted to ACM Transactions on Computational Logic. Preprint. | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LF is a dependent type theory in which many other formal systems can be
conveniently embedded. However, correct use of LF relies on nontrivial
metatheoretic developments such as proofs of correctness of decision procedures
for LF's judgments. Although detailed informal proofs of these properties have
been published, they have not been formally verified in a theorem prover. We
have formalized these properties within Isabelle/HOL using the Nominal Datatype
Package, closely following a recent article by Harper and Pfenning. In the
process, we identified and resolved a gap in one of the proofs and a small
number of minor lacunae in others. We also formally derive a version of the
type checking algorithm from which Isabelle/HOL can generate executable code.
Besides its intrinsic interest, our formalization provides a foundation for
studying the adequacy of LF encodings, the correctness of Twelf-style
metatheoretic reasoning, and the metatheory of extensions to LF.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 11:10:26 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Oct 2009 14:43:37 GMT"
},
{
"version": "v3",
"created": "Mon, 3 May 2010 10:06:14 GMT"
}
] | 2010-05-04T00:00:00 | [
[
"Urban",
"Christian",
""
],
[
"Cheney",
"James",
""
],
[
"Berghofer",
"Stefan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.1669 | Sudhir R. Ghorpade | Sudhir R. Ghorpade, Arunkumar R. Patil and Harish K. Pillai | Subclose Families, Threshold Graphs, and the Weight Hierarchy of
Grassmann and Schubert Codes | 11 pages | Arithmetic, Geometry, Cryptography and Coding Theory, 87-99,
Contemp. Math. 487, Amer. Math. Soc., Providence, RI, 2009. | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the problem of determining the complete weight hierarchy of linear
error correcting codes associated to Grassmann varieties and, more generally,
to Schubert varieties in Grassmannians. The problem is partially solved in the
case of Grassmann codes, and one of the solutions uses the combinatorial notion
of a closed family. We propose a generalization of this to what is called a
subclose family. A number of properties of subclose families are proved, and
its connection with the notion of threshold graphs and graphs with maximum sum
of squares of vertex degrees is outlined.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 11:07:16 GMT"
}
] | 2009-11-06T00:00:00 | [
[
"Ghorpade",
"Sudhir R.",
""
],
[
"Patil",
"Arunkumar R.",
""
],
[
"Pillai",
"Harish K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1679 | David Sevilla | Jaime Gutierrez, David Sevilla | Computation of unirational fields | 28 pages | Computation of unirational fields. J. Symbolic Comput. 41 (2006),
no. 11, 1222--1244. MR2267134 (2007g:12003) | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the main contributions which Volker Weispfenning made to mathematics
is related to Groebner bases theory. In this paper we present an algorithm for
computing all algebraic intermediate subfields in a separably generated
unirational field extension (which in particular includes the zero
characteristic case). One of the main tools is Groebner bases theory. Our
algorithm also requires computing primitive elements and factoring over
algebraic extensions. Moreover, the method can be extended to finitely
generated K-algebras.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 11:59:15 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0804.1687 | David Sevilla | Jaime Gutierrez, David Sevilla | Building counterexamples to generalizations for rational functions of
Ritt's decomposition theorem | 17 pages | J. Algebra 303 (2006), no. 2, 655--667. MR2255128 (2007e:13032) | null | null | math.AC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical Ritt's Theorems state several properties of univariate
polynomial decomposition. In this paper we present new counterexamples to
Ritt's first theorem, which states the equality of length of decomposition
chains of a polynomial, in the case of rational functions. Namely, we provide
an explicit example of a rational function with coefficients in Q and two
decompositions of different length.
Another aspect is the use of some techniques that could allow for other
counterexamples, namely, relating groups and decompositions and using the fact
that the alternating group A_4 has two subgroup chains of different lengths;
and we provide more information about the generalizations of another property
of polynomial decomposition: the stability of the base field. We also present
an algorithm for computing the fixing group of a rational function providing
the complexity over Q.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 12:42:16 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.1696 | Freddy Munoz | Freddy Munoz (IRISA), Benoit Baudry (IRISA), Olivier Barais (IRISA) | A classification of invasive patterns in AOP | null | null | null | RR-6501 | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aspect-Oriented Programming (AOP) improves modularity by encapsulating
crosscutting concerns into aspects. Some mechanisms to compose aspects allow
invasiveness as a mean to integrate concerns. Invasiveness means that AOP
languages have unrestricted access to program properties. Such kind of
languages are interesting because they allow performing complex operations and
better introduce functionalities. In this report we present a classification of
invasive patterns in AOP. This classification characterizes the aspects
invasive behavior and allows developers to abstract about the aspect incidence
over the program they crosscut.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 13:21:32 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Apr 2008 15:46:28 GMT"
}
] | 2009-04-20T00:00:00 | [
[
"Munoz",
"Freddy",
"",
"IRISA"
],
[
"Baudry",
"Benoit",
"",
"IRISA"
],
[
"Barais",
"Olivier",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0804.1697 | Shrinivas Kudekar Mr. | Shrinivas Kudekar and Ruediger Urbanke | Lower Bounds on the Rate-Distortion Function of Individual LDGM Codes | 6 Pages, 5 Figures. Submitted to the 5th International Symposium on
Turbo Codes & Related Topics | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider lossy compression of a binary symmetric source by means of a
low-density generator-matrix code. We derive two lower bounds on the rate
distortion function which are valid for any low-density generator-matrix code
with a given node degree distribution L(x) on the set of generators and for any
encoding algorithm. These bounds show that, due to the sparseness of the code,
the performance is strictly bounded away from the Shannon rate-distortion
function. In this sense, our bounds represent a natural generalization of
Gallager's bound on the maximum rate at which low-density parity-check codes
can be used for reliable transmission. Our bounds are similar in spirit to the
technique recently developed by Dimakis, Wainwright, and Ramchandran, but they
apply to individual codes.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 13:12:12 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Kudekar",
"Shrinivas",
""
],
[
"Urbanke",
"Ruediger",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1707 | David Sevilla | Jaime Gutierrez, David Sevilla | Computation of unirational fields (extended abstract) | 6 pages, 2 images (pictures of authors) | Proceedings of the 2005 Algorithmic Algebra and Logic (A3L), p.
129--134, BOD Norderstedt, Germany, 2005. ISBN 3-8334-2669-1 | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an algorithm for computing all algebraic
intermediate subfields in a separably generated unirational field extension
(which in particular includes the zero characteristic case). One of the main
tools is Groebner bases theory. Our algorithm also requires computing computing
primitive elements and factoring over algebraic extensions. Moreover, the
method can be extended to finitely generated K-algebras.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 14:00:10 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0804.1724 | Sudipto Guha | Sudipto Guha and Kamesh Munagala and Saswati Sarkar | Information Acquisition and Exploitation in Multichannel Wireless
Networks | 29 pages | null | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A wireless system with multiple channels is considered, where each channel
has several transmission states. A user learns about the instantaneous state of
an available channel by transmitting a control packet in it. Since probing all
channels consumes significant energy and time, a user needs to determine what
and how much information it needs to acquire about the instantaneous states of
the available channels so that it can maximize its transmission rate. This
motivates the study of the trade-off between the cost of information
acquisition and its value towards improving the transmission rate.
A simple model is presented for studying this information acquisition and
exploitation trade-off when the channels are multi-state, with different
distributions and information acquisition costs. The objective is to maximize a
utility function which depends on both the cost and value of information.
Solution techniques are presented for computing near-optimal policies with
succinct representation in polynomial time. These policies provably achieve at
least a fixed constant factor of the optimal utility on any problem instance,
and in addition, have natural characterizations. The techniques are based on
exploiting the structure of the optimal policy, and use of Lagrangean
relaxations which simplify the space of approximately optimal solutions.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 14:53:30 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Guha",
"Sudipto",
""
],
[
"Munagala",
"Kamesh",
""
],
[
"Sarkar",
"Saswati",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.1728 | Maciej Dziemianczuk | A. K. Kwasniewski, M. Dziemianczuk | On cobweb posets most relevant codings | 26 pages, 15 figures, Presented at Gian-Carlo Polish Seminar:
http://ii.uwb.edu.pl/akk/sem/sem_rota.htm | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One considers here orderable acyclic digraphs named KoDAGs which represent
the outmost general chains of dibicliques denoting thus the outmost general
chains of binary relations. Because of this fact KoDAGs start to become an
outstanding concept of nowadays investigation. We propose here examples of
codings of KoDAGs looked upon as infinite hyper-boxes as well as chains of
rectangular hyper-boxes in N^\infty. Neither of KoDAGs codings considered here
is a poset isomorphism with Pi = <P, \leq>. Nevertheless every example of
coding supplies a new view on possible investigation of KoDAGs properties. The
codes proposed here down are by now recognized as most relevant codes for
practical purposes including visualization. More than that. Employing quite
arbitrary sequences F=\{n_F\}_{n\geq 0} infinitely many new representations of
natural numbers called base of F number system representations are introduced.
These constitute mixed radix-type numeral systems. F base nonstandard
positional numeral systems in which the numerical base varies from position to
position have picturesque interpretation due to KoDAGs graphs and their
correspondent posets which in turn are endowed on their own with combinatorial
interpretation of uniquely assigned to KoDAGs F-nomial coefficients. The base
of F number systems are used for KoDAGs coding and are interpreted as chain
coordinatization in KoDAGs pictures as well as systems of infinite number of
boxes sequences of F-varying containers capacity of subsequent boxes. Needless
to say how crucial is this base of F number system for KoDAGs hence
consequently for arbitrary chains of binary relations. New F based numeral
systems are umbral base of F number systems in a sense to be explained in what
follows.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 15:09:26 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2009 18:05:33 GMT"
}
] | 2009-02-27T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
],
[
"Dziemianczuk",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1729 | Roberto Amadio | Roberto Amadio (PPS), Mehdi Dogguy (PPS) | On affine usages in signal-based communication | null | Programming Languages and Systems, 6th Asian Symposium, APLAS
2008, France (2008) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a type system for a synchronous pi-calculus formalising the
notion of affine usage in signal-based communication. In particular, we
identify a limited number of usages that preserve affinity and that can be
composed. As a main application of the resulting system, we show that typable
programs are deterministic.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 15:16:06 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jun 2008 10:06:36 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Sep 2008 11:13:12 GMT"
}
] | 2010-07-01T00:00:00 | [
[
"Amadio",
"Roberto",
"",
"PPS"
],
[
"Dogguy",
"Mehdi",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.1740 | Carl Bracken | Carl Bracken | Pseudo Quasi-3 Designs and their Applications to Coding Theory | 9 pages, submitted to the European Journal of Comniatorics | null | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a pseudo quasi-3 design as a symmetric design with the property
that the derived and residual designs with respect to at least one block are
quasi-symmetric. Quasi-symmetric designs can be used to construct optimal self
complementary codes. In this article we give a construction of an infinite
family of pseudo quasi-3 designs whose residual designs allow us to construct a
family of codes with a new parameter set that meet the Grey Rankin bound.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 15:57:38 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Bracken",
"Carl",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1748 | Giuseppe Durisi | Giuseppe Durisi, Ulrich G. Schuster, Helmut B\"olcskei, Shlomo Shamai
(Shitz) | Noncoherent Capacity of Underspread Fading Channels | Submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2034807 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive bounds on the noncoherent capacity of wide-sense stationary
uncorrelated scattering (WSSUS) channels that are selective both in time and
frequency, and are underspread, i.e., the product of the channel's delay spread
and Doppler spread is small. For input signals that are peak constrained in
time and frequency, we obtain upper and lower bounds on capacity that are
explicit in the channel's scattering function, are accurate for a large range
of bandwidth and allow to coarsely identify the capacity-optimal bandwidth as a
function of the peak power and the channel's scattering function. We also
obtain a closed-form expression for the first-order Taylor series expansion of
capacity in the limit of large bandwidth, and show that our bounds are tight in
the wideband regime. For input signals that are peak constrained in time only
(and, hence, allowed to be peaky in frequency), we provide upper and lower
bounds on the infinite-bandwidth capacity and find cases when the bounds
coincide and the infinite-bandwidth capacity is characterized exactly. Our
lower bound is closely related to a result by Viterbi (1967).
The analysis in this paper is based on a discrete-time discrete-frequency
approximation of WSSUS time- and frequency-selective channels. This
discretization explicitly takes into account the underspread property, which is
satisfied by virtually all wireless communication channels.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 16:34:47 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Durisi",
"Giuseppe",
"",
"Shitz"
],
[
"Schuster",
"Ulrich G.",
"",
"Shitz"
],
[
"Bölcskei",
"Helmut",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1758 | Michel Grabisch | Dieter Denneberg, Michel Grabisch (LIP6) | Measure and integral with purely ordinal scales | null | Journal of Mathematical Psychology 48 (2004) 15-27 | null | null | cs.DM math.PR math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a purely ordinal model for aggregation functionals for lattice
valued functions, comprising as special cases quantiles, the Ky Fan metric and
the Sugeno integral. For modeling findings of psychological experiments like
the reflection effect in decision behaviour under risk or uncertainty, we
introduce reflection lattices. These are complete linear lattices endowed with
an order reversing bijection like the reflection at 0 on the real interval
$[-1,1]$. Mathematically we investigate the lattice of non-void intervals in a
complete linear lattice, then the class of monotone interval-valued functions
and their inner product.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 16:59:59 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Denneberg",
"Dieter",
"",
"LIP6"
],
[
"Grabisch",
"Michel",
"",
"LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0804.1760 | Michel Grabisch | Michel Grabisch (LIP6) | The Symmetric Sugeno Integral | null | Fuzzy Sets and Systems 139 (2003) 473-490 | null | null | cs.DM math.PR math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an extension of the Sugeno integral for negative numbers, in the
spirit of the symmetric extension of Choquet integral, also called \Sipos\
integral. Our framework is purely ordinal, since the Sugeno integral has its
interest when the underlying structure is ordinal. We begin by defining
negative numbers on a linearly ordered set, and we endow this new structure
with a suitable algebra, very close to the ring of real numbers. In a second
step, we introduce the M\"obius transform on this new structure. Lastly, we
define the symmetric Sugeno integral, and show its similarity with the
symmetric Choquet integral.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 17:00:36 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0804.1762 | Michel Grabisch | Christophe Labreuche (TRT), Michel Grabisch (LIP6) | The Choquet integral for the aggregation of interval scales in
multicriteria decision making | null | Fuzzy Sets and Systems 137 (2003) 11-26 | null | null | cs.DM cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the question of which models fit with information
concerning the preferences of the decision maker over each attribute, and his
preferences about aggregation of criteria (interacting criteria). We show that
the conditions induced by these information plus some intuitive conditions lead
to a unique possible aggregation operator: the Choquet integral.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 17:01:11 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Labreuche",
"Christophe",
"",
"TRT"
],
[
"Grabisch",
"Michel",
"",
"LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.1777 | Dariusz Dereniowski | Dariusz Dereniowski | Phutball is PSPACE-hard | 13 pages, 7 figures | Theoretical Computer Science 411 (2010) 3971-3978 | 10.1016/j.tcs.2010.08.019 | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the $n\times n$ game of Phutball. It is shown that, given an
arbitrary position of stones on the board, it is a PSPACE-hard problem to
determine whether the specified player can win the game, regardless of the
opponent's choices made during the game.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 18:22:47 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Mar 2009 19:27:23 GMT"
}
] | 2021-03-05T00:00:00 | [
[
"Dereniowski",
"Dariusz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1788 | David Sevilla | Domingo Gomez-Perez, Jaime Gutierrez, Alvar Ibeas, David Sevilla | Prediciendo el generador cuadratico (in Spanish) | 11 pages, in Spanish | Proceedings of the VIII Reunion Espanola sobre Criptologia y
Seguridad de la Informacion (RECSI), p. 185-195, Diaz de Santos, 2004. ISBN
84-7978-650-7 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let p be a prime and a, c be integers such that a<>0 mod p. The quadratic
generator is a sequence (u_n) of pseudorandom numbers defined by
u_{n+1}=a*(u_n)^2+c mod p. In this article we probe that if we know
sufficiently many of the most significant bits of two consecutive values u_n,
u_{n+1}, then we can compute the seed u_0 except for a small number of
exceptional values.
-----
Sean p un primo, a y c enteros tales que a<>0 mod p. El generador cuadratico
es una sucesion (u_n) de numeros pseudoaleatorios definidos por la relacion
u_{n+1}=a*(u_n)^2+c mod p. En este trabajo demostramos que si conocemos un
numero suficientemente grande de los bits mas significativos para dos valores
consecutivos u_n, u_{n+1}, entonces podemos descubrir en tiempo polinomial la
semilla u_0, excepto para un conjunto pequeno de valores excepcionales.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 19:59:29 GMT"
}
] | 2008-04-11T00:00:00 | [
[
"Gomez-Perez",
"Domingo",
""
],
[
"Gutierrez",
"Jaime",
""
],
[
"Ibeas",
"Alvar",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.1811 | K. Raj Kumar | K. Raj Kumar and Giuseppe Caire | Space-Time Codes from Structured Lattices | 25 pages, Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present constructions of Space-Time (ST) codes based on lattice coset
coding. First, we focus on ST code constructions for the short block-length
case, i.e., when the block-length is equal to or slightly larger than the
number of transmit antennas. We present constructions based on dense lattice
packings and nested lattice (Voronoi) shaping. Our codes achieve the optimal
diversity-multiplexing tradeoff of quasi-static MIMO fading channels for any
fading statistics, and perform very well also at practical, moderate values of
signal to noise ratios (SNR). Then, we extend the construction to the case of
large block lengths, by using trellis coset coding. We provide constructions of
trellis coded modulation (TCM) schemes that are endowed with good packing and
shaping properties. Both short-block and trellis constructions allow for a
reduced complexity decoding algorithm based on minimum mean squared error
generalized decision feedback equalizer (MMSE-GDFE) lattice decoding and a
combination of this with a Viterbi TCM decoder for the TCM case. Beyond the
interesting algebraic structure, we exhibit codes whose performance is among
the state-of-the art considering codes with similar encoding/decoding
complexity.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2008 21:43:49 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Kumar",
"K. Raj",
""
],
[
"Caire",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1839 | Alyson Fletcher | Alyson K. Fletcher, Sundeep Rangan, and Vivek K. Goyal | Necessary and Sufficient Conditions on Sparsity Pattern Recovery | Submitted to IEEE Transactions on Information Theory | IEEE Trans. on Information Theory, vol. 55, no. 12, pp. 5758-5772,
December 2009 | 10.1109/TIT.2009.2032726 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of detecting the sparsity pattern of a k-sparse vector in R^n
from m random noisy measurements is of interest in many areas such as system
identification, denoising, pattern recognition, and compressed sensing. This
paper addresses the scaling of the number of measurements m, with signal
dimension n and sparsity-level nonzeros k, for asymptotically-reliable
detection. We show a necessary condition for perfect recovery at any given SNR
for all algorithms, regardless of complexity, is m = Omega(k log(n-k))
measurements. Conversely, it is shown that this scaling of Omega(k log(n-k))
measurements is sufficient for a remarkably simple ``maximum correlation''
estimator. Hence this scaling is optimal and does not require more
sophisticated techniques such as lasso or matching pursuit. The constants for
both the necessary and sufficient conditions are precisely defined in terms of
the minimum-to-average ratio of the nonzero components and the SNR. The
necessary condition improves upon previous results for maximum likelihood
estimation. For lasso, it also provides a necessary condition at any SNR and
for low SNR improves upon previous work. The sufficient condition provides the
first asymptotically-reliable detection guarantee at finite SNR.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 07:16:32 GMT"
}
] | 2010-09-03T00:00:00 | [
[
"Fletcher",
"Alyson K.",
""
],
[
"Rangan",
"Sundeep",
""
],
[
"Goyal",
"Vivek K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1840 | Sudhir Singh | Aditya Ramamoorthy, Vwani Roychowdhury, Sudhir Kumar Singh | Selfish Distributed Compression over Networks: Correlation Induces
Anarchy | replaced with revised version, 32 pages, 2 figures | null | null | null | cs.GT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the min-cost multicast problem (under network coding) with
multiple correlated sources where each terminal wants to losslessly reconstruct
all the sources. We study the inefficiency brought forth by the selfish
behavior of the terminals in this scenario by modeling it as a noncooperative
game among the terminals. The degradation in performance due to the lack of
regulation is measured by the {\it Price of Anarchy} (POA), which is defined as
the ratio between the cost of the worst possible \textit{Wardrop equilibrium}
and the socially optimum cost. Our main result is that in contrast with the
case of independent sources, the presence of source correlations can
significantly increase the price of anarchy. Towards establishing this result,
we first characterize the socially optimal flow and rate allocation in terms of
four intuitive conditions. Next, we show that the Wardrop equilibrium is a
socially optimal solution for a different set of (related) cost functions.
Using this, we construct explicit examples that demonstrate that the POA $> 1$
and determine near-tight upper bounds on the POA as well. The main techniques
in our analysis are Lagrangian duality theory and the usage of the
supermodularity of conditional entropy.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 07:22:39 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Mar 2009 21:23:31 GMT"
}
] | 2009-03-01T00:00:00 | [
[
"Ramamoorthy",
"Aditya",
""
],
[
"Roychowdhury",
"Vwani",
""
],
[
"Singh",
"Sudhir Kumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.1845 | Ely Porat | Ely Porat | An Optimal Bloom Filter Replacement Based on Matrix Solving | A lectureon this paper will be available in Google video | null | null | null | cs.DS cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We suggest a method for holding a dictionary data structure, which maps keys
to values, in the spirit of Bloom Filters. The space requirements of the
dictionary we suggest are much smaller than those of a hashtable. We allow
storing n keys, each mapped to value which is a string of k bits. Our suggested
method requires nk + o(n) bits space to store the dictionary, and O(n) time to
produce the data structure, and allows answering a membership query in O(1)
memory probes. The dictionary size does not depend on the size of the keys.
However, reducing the space requirements of the data structure comes at a
certain cost. Our dictionary has a small probability of a one sided error. When
attempting to obtain the value for a key that is stored in the dictionary we
always get the correct answer. However, when testing for membership of an
element that is not stored in the dictionary, we may get an incorrect answer,
and when requesting the value of such an element we may get a certain random
value. Our method is based on solving equations in GF(2^k) and using several
hash functions. Another significant advantage of our suggested method is that
we do not require using sophisticated hash functions. We only require pairwise
independent hash functions. We also suggest a data structure that requires only
nk bits space, has O(n2) preprocessing time, and has a O(log n) query time.
However, this data structures requires a uniform hash functions. In order
replace a Bloom Filter of n elements with an error proability of 2^{-k}, we
require nk + o(n) memory bits, O(1) query time, O(n) preprocessing time, and
only pairwise independent hash function. Even the most advanced previously
known Bloom Filter would require nk+O(n) space, and a uniform hash functions,
so our method is significantly less space consuming especially when k is small.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 11:24:04 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Porat",
"Ely",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0804.1879 | Robin Adams | Robin Adams | Lambda-Free Logical Frameworks | v2: Mistakes were found in several proofs in v1. Several results have
been weakened. v3: Minor mistakes corrected and line lengths fixed. This
version submitted to APAL | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the definition of the logical framework TF, the Type Framework. TF
is a lambda-free logical framework; it does not include lambda-abstraction or
product kinds. We give formal proofs of several results in the metatheory of
TF, and show how it can be conservatively embedded in the logical framework LF:
its judgements can be seen as the judgements of LF that are in beta-normal,
eta-long normal form. We show how several properties, such as adequacy theorems
for object theories and the injectivity of constants, can be proven more easily
in TF, and then `lifted' to LF.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 11:32:51 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 15:55:56 GMT"
}
] | 2008-11-18T00:00:00 | [
[
"Adams",
"Robin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.1888 | Latorre | Frank Verstraete, J. Ignacio Cirac, Jose I. Latorre | Quantum circuits for strongly correlated quantum systems | null | null | 10.1103/PhysRevA.79.032316 | null | quant-ph cond-mat.str-el cs.DS hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, we have witnessed an explosion of experimental tools by
which quantum systems can be manipulated in a controlled and coherent way. One
of the most important goals now is to build quantum simulators, which would
open up the possibility of exciting experiments probing various theories in
regimes that are not achievable under normal lab circumstances. Here we present
a novel approach to gain detailed control on the quantum simulation of strongly
correlated quantum many-body systems by constructing the explicit quantum
circuits that diagonalize their dynamics. We show that the exact quantum
circuits underlying some of the most relevant many-body Hamiltonians only need
a finite amount of local gates. As a particularly simple instance, the full
dynamics of a one-dimensional Quantum Ising model in a transverse field with
four spins is shown to be reproduced using a quantum circuit of only six local
gates. This opens up the possibility of experimentally producing strongly
correlated states, their time evolution at zero time and even thermal
superpositions at zero temperature. Our method also allows to uncover the exact
circuits corresponding to models that exhibit topological order and to
stabilizer states.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 12:52:44 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Verstraete",
"Frank",
""
],
[
"Cirac",
"J. Ignacio",
""
],
[
"Latorre",
"Jose I.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.str-el",
"description": "Quantum magnetism, non-Fermi liquids, spin liquids, quantum criticality, charge density waves, metal-insulator transitions",
"span": "(Strongly Correlated Electrons)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
}
] |
0804.1893 | Tobias Kretz | Tobias Kretz and Michael Schreckenberg | The F.A.S.T.-Model | Extended version of proceedings contriution | Cellular Automata -- 7th International Conference on Cellular
Automata for Research and Industry, ACRI 2006, Perpignan, France, September
20-23, pages 712--715, Springer 2006, Proceedings | 10.1007/11861201_85 | null | cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A discrete model of pedestrian motion is presented that is implemented in the
Floor field- and Agentbased Simulation Tool (F.A.S.T.) which has already been
applicated to a variety of real life scenarios.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 13:33:42 GMT"
}
] | 2008-08-19T00:00:00 | [
[
"Kretz",
"Tobias",
""
],
[
"Schreckenberg",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0804.1894 | Marcello Caleffi | Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura | A Reliability-based Framework for Multi-path Routing Analysis in Mobile
Ad-Hoc Networks | To appear on IJCNDS: International Journal of Communication Networks
and Distributed Systems | International Journal of Communication Networks and Distributed
Systems, Vol.1 No.4/5/6, 2008 | 10.1504/IJCNDS.2008.021079 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unlike traditional routing procedures that, at the best, single out a unique
route, multi-path routing protocols discover proactively several alternative
routes. It has been recognized that multi-path routing can be more efficient
than traditional one mainly for mobile ad hoc networks, where route failure
events are frequent. Most studies in the area of multi-path routing focus on
heuristic methods, and the performances of these strategies are commonly
evaluated by numerical simulations. The need of a theoretical analysis
motivates such a paper, which proposes to resort to the terminal-pair routing
reliability as performance metric. This metric allows one to assess the
performance gain due to the availability of route diversity. By resorting to
graph theory, we propose an analytical framework to evaluate the tolerance of
multi-path route discovery processes against route failures for mobile ad hoc
networks. Moreover, we derive a useful bound to easily estimate the performance
improvements achieved by multi-path routing with respect to any traditional
routing protocol. Finally, numerical simulation results show the effectiveness
of this performance analysis.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 13:37:49 GMT"
}
] | 2020-05-12T00:00:00 | [
[
"Caleffi",
"Marcello",
""
],
[
"Ferraiuolo",
"Giancarlo",
""
],
[
"Paura",
"Luigi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.1921 | Michel Grabisch | Michel Grabisch (LIP6), Christophe Labreuche (TRT), Jean-Claude
Vansnick | On the Extension of Pseudo-Boolean Functions for the Aggregation of
Interacting Criteria | null | European Journal of Operational Research (2003) 28-47 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents an analysis on the use of integrals defined for
non-additive measures (or capacities) as the Choquet and the \Sipos{} integral,
and the multilinear model, all seen as extensions of pseudo-Boolean functions,
and used as a means to model interaction between criteria in a multicriteria
decision making problem. The emphasis is put on the use, besides classical
comparative information, of information about difference of attractiveness
between acts, and on the existence, for each point of view, of a ``neutral
level'', allowing to introduce the absolute notion of attractive or repulsive
act. It is shown that in this case, the Sipos integral is a suitable solution,
although not unique. Properties of the Sipos integral as a new way of
aggregating criteria are shown, with emphasis on the interaction among
criteria.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 15:49:45 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"LIP6"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
],
[
"Vansnick",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1928 | Pietro Michiardi Dr. | Chi-Anh La, Pietro Michiardi | Characterizing User Mobility in Second Life | null | null | null | rr08212 | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we present a measurement study of user mobility in Second Life.
We first discuss different techniques to collect user traces and then focus on
results obtained using a crawler that we built. Tempted by the question whether
our methodology could provide similar results to those obtained in real-world
experiments, we study the statistical distribution of user contacts and show
that from a qualitative point of view user mobility in Second Life presents
similar traits to those of real humans. We further push our analysis to line of
sight networks that emerge from user interaction and show that they are highly
clustered. Lastly, we focus on the spatial properties of user movements and
observe that users in Second Life revolve around several point of interests
traveling in general short distances. Besides our findings, the traces
collected in this work can be very useful for trace-driven simulations of
communication schemes in delay tolerant networks and their performance
evaluation.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 16:32:44 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2008 00:12:03 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"La",
"Chi-Anh",
""
],
[
"Michiardi",
"Pietro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.1932 | Martin Grohe | Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, Marc Thurley | A complexity dichotomy for partition functions with mixed signs | null | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Partition functions, also known as homomorphism functions, form a rich family
of graph invariants that contain combinatorial invariants such as the number of
k-colourings or the number of independent sets of a graph and also the
partition functions of certain "spin glass" models of statistical physics such
as the Ising model.
Building on earlier work by Dyer, Greenhill and Bulatov, Grohe, we completely
classify the computational complexity of partition functions. Our main result
is a dichotomy theorem stating that every partition function is either
computable in polynomial time or #P-complete. Partition functions are described
by symmetric matrices with real entries, and we prove that it is decidable in
polynomial time in terms of the matrix whether a given partition function is in
polynomial time or #P-complete.
While in general it is very complicated to give an explicit algebraic or
combinatorial description of the tractable cases, for partition functions
described by a Hadamard matrices -- these turn out to be central in our proofs
-- we obtain a simple algebraic tractability criterion, which says that the
tractable cases are those "representable" by a quadratic polynomial over the
field GF(2).
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 18:36:01 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jul 2008 15:24:13 GMT"
},
{
"version": "v3",
"created": "Tue, 5 May 2009 16:47:49 GMT"
}
] | 2009-05-05T00:00:00 | [
[
"Goldberg",
"Leslie Ann",
""
],
[
"Grohe",
"Martin",
""
],
[
"Jerrum",
"Mark",
""
],
[
"Thurley",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.1970 | Srikanth Chava | Srikanth Chava | A Security Protocol for Multi-User Authentication | 6 pages, 3 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we propose an encryption communication protocol which also
provides database security. For the encryption of the data communication we use
a transformation similar to the Cubic Public-key transformation. This method
represents a many-to-one mapping which increases the complexity for any brute
force attack. Some interesting properties of the transformation are also
included which are basic in the authentication protocol.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 21:57:01 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Chava",
"Srikanth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.1974 | Nitin Saxena | G\'abor Ivanyos, Marek Karpinski, Nitin Saxena | Schemes for Deterministic Polynomial Factoring | 14 pages, preliminary version | null | null | null | cs.CC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we relate the deterministic complexity of factoring polynomials
(over finite fields) to certain combinatorial objects we call m-schemes. We
extend the known conditional deterministic subexponential time polynomial
factoring algorithm for finite fields to get an underlying m-scheme. We
demonstrate how the properties of m-schemes relate to improvements in the
deterministic complexity of factoring polynomials over finite fields assuming
the generalized Riemann Hypothesis (GRH). In particular, we give the first
deterministic polynomial time algorithm (assuming GRH) to find a nontrivial
factor of a polynomial of prime degree n where (n-1) is a smooth number.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2008 23:04:17 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Ivanyos",
"Gábor",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Saxena",
"Nitin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.1982 | Li Chen | Li Chen, Yongwu Rong | Linear Time Recognition Algorithms for Topological Invariants in 3D | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we design linear time algorithms to recognize and determine
topological invariants such as the genus and homology groups in 3D. These
properties can be used to identify patterns in 3D image recognition. This has
tremendous amount of applications in 3D medical image analysis. Our method is
based on cubical images with direct adjacency, also called (6,26)-connectivity
images in discrete geometry. According to the fact that there are only six
types of local surface points in 3D and a discrete version of the well-known
Gauss-Bonnett Theorem in differential geometry, we first determine the genus of
a closed 2D-connected component (a closed digital surface). Then, we use
Alexander duality to obtain the homology groups of a 3D object in 3D space.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2008 03:13:33 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Aug 2008 05:06:51 GMT"
}
] | 2008-08-04T00:00:00 | [
[
"Chen",
"Li",
""
],
[
"Rong",
"Yongwu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0804.2032 | Frederic Dorn Harald | Paul Bonsma and Frederic Dorn | Tight Bounds and Faster Algorithms for Directed Max-Leaf Problems | 17 pages, 6 figures | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An out-tree $T$ of a directed graph $D$ is a rooted tree subgraph with all
arcs directed outwards from the root. An out-branching is a spanning out-tree.
By $l(D)$ and $l_s(D)$ we denote the maximum number of leaves over all
out-trees and out-branchings of $D$, respectively.
We give fixed parameter tractable algorithms for deciding whether $l_s(D)\geq
k$ and whether $l(D)\geq k$ for a digraph $D$ on $n$ vertices, both with time
complexity $2^{O(k\log k)} \cdot n^{O(1)}$. This improves on previous
algorithms with complexity $2^{O(k^3\log k)} \cdot n^{O(1)}$ and $2^{O(k\log^2
k)} \cdot n^{O(1)}$, respectively.
To obtain the complexity bound in the case of out-branchings, we prove that
when all arcs of $D$ are part of at least one out-branching, $l_s(D)\geq
l(D)/3$. The second bound we prove in this paper states that for strongly
connected digraphs $D$ with minimum in-degree 3, $l_s(D)\geq \Theta(\sqrt{n})$,
where previously $l_s(D)\geq \Theta(\sqrt[3]{n})$ was the best known bound.
This bound is tight, and also holds for the larger class of digraphs with
minimum in-degree 3 in which every arc is part of at least one out-branching.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2008 20:50:59 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bonsma",
"Paul",
""
],
[
"Dorn",
"Frederic",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.2035 | Serban Vlad E. | Serban E. Vlad | The non-anticipation of the asynchronous systems | the 6-th Congress of the Romanian mathematicians, Bucharest, June 28
- July 4, 2007 | null | null | null | cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The asynchronous systems are the models of the asynchronous circuits from the
digital electrical engineering and non-anticipation is one of the most
important properties in systems theory. Our present purpose is to introduce
several concepts of non-anticipation of the asynchronous systems.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2008 23:58:30 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0804.2036 | Andrew Adamatzky | Andrew Adamatzky | Towards Physarum robots: computing and manipulating on water surface | Submitted to Int J Intelligent and Robotic Systems, February 2008 | Journal of Bionic Engineering Volume 5, Issue 4, December 2008,
Pages 348-357 | 10.1016/S1672-6529(08)60180-8 | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Plasmodium of Physarym polycephalum is an ideal biological substrate for
implementing concurrent and parallel computation, including combinatorial
geometry and optimization on graphs. We report results of scoping experiments
on Physarum computing in conditions of minimal friction, on the water surface.
We show that plasmodium of Physarum is capable for computing a basic spanning
trees and manipulating of light-weight objects. We speculate that our results
pave the pathways towards design and implementation of amorphous biological
robots.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2008 00:42:28 GMT"
}
] | 2010-11-23T00:00:00 | [
[
"Adamatzky",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.2037 | Serban Vlad E. | Serban E. Vlad | Some properties of the regular asynchronous systems | International Conference on Computers, Communications & Control 2008,
May 15-17, Baile Felix, Romania | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The asynchronous systems are the models of the asynchronous circuits from the
digital electrical engineering. An asynchronous system f is a multi-valued
function that assigns to each admissible input u a set f(u) of possible states
x in f(u). A special case of asynchronous system consists in the existence of a
Boolean function \Upsilon such that for any u and any x in f(u), a certain
equation involving \Upsilon is fulfilled. Then \Upsilon is called the generator
function of f (Moisil used the terminology of network function) and we say that
f is generated by \Upsilon. The systems that have a generator function are
called regular.
Our purpose is to continue the study of the generation of the asynchronous
systems that was started in [2], [3].
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2008 01:11:43 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Vlad",
"Serban E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0804.2043 | Tingrong Lu | Tingrong Lu | Analytical correlation of routing table length index and routing path
length index in hierarchical routing model | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Kleinrock and Kamoun's paper, the inverse relation of routing table length
index and routing path length index in hierarchical routing model is
illustrated. In this paper we give the analytical correlation of routing table
length index and routing path length index in hierarchical routing model.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2008 06:04:26 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Lu",
"Tingrong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.2057 | Jos\'e R. P\'erez-Ag\"uera Phd. | Jos\'e R. P\'erez-Ag\"uera and Lourdes Araujo | Comparing and Combining Methods for Automatic Query Expansion | 12 pages | Advances in Natural Language Processing and Applications. Research
in Computing Science 33, 2008, pp. 177-188 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Query expansion is a well known method to improve the performance of
information retrieval systems. In this work we have tested different approaches
to extract the candidate query terms from the top ranked documents returned by
the first-pass retrieval.
One of them is the cooccurrence approach, based on measures of cooccurrence
of the candidate and the query terms in the retrieved documents. The other one,
the probabilistic approach, is based on the probability distribution of terms
in the collection and in the top ranked set.
We compare the retrieval improvement achieved by expanding the query with
terms obtained with different methods belonging to both approaches. Besides, we
have developed a na\"ive combination of both kinds of method, with which we
have obtained results that improve those obtained with any of them separately.
This result confirms that the information provided by each approach is of a
different nature and, therefore, can be used in a combined manner.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2008 11:38:28 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Pérez-Agüera",
"José R.",
""
],
[
"Araujo",
"Lourdes",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0804.2058 | Zhang Shengli | Zhang Shengli, Soung chang Liew and Lu Lu | Physical Layer Network Coding Over Finite And Infinite Fields | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Direct application of network coding at the physical layer - physical layer
network coding (PNC) - is a promising technique for two-way relay wireless
networks. In a two-way relay network, relay nodes are used to relay two-way
information flows between pairs of end nodes. This paper proposes a precise
definition for PNC. Specifically, in PNC, a relay node does not decode the
source information from the two ends separately, but rather directly maps the
combined signals received simultaneously to a signal to be relayed. Based on
this definition, PNC can be further sub-classed into two categories - PNCF (PNC
over finite field) and PNCI (PNC over infinite field) - according to whether
the network-code field (or groups, rings) adopted is finite or infinite. For
each of PNCF and PNCI, we consider two specific estimation techniques for
dealing with noise in the mapping process. The performance of the four schemes
is investigated by means of analysis and simulation, assuming symbol-level
synchronization only.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2008 11:43:24 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Shengli",
"Zhang",
""
],
[
"Liew",
"Soung chang",
""
],
[
"Lu",
"Lu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.2095 | Paul Tarau | Paul Tarau and Brenda Luderman | A Logic Programming Framework for Combinational Circuit Synthesis | null | 23rd International Conference on Logic Programming (ICLP), LNCS
4670, 2007, pages 180-194 | null | null | cs.LO cs.CE cs.DM cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logic Programming languages and combinational circuit synthesis tools share a
common "combinatorial search over logic formulae" background. This paper
attempts to reconnect the two fields with a fresh look at Prolog encodings for
the combinatorial objects involved in circuit synthesis. While benefiting from
Prolog's fast unification algorithm and built-in backtracking mechanism,
efficiency of our search algorithm is ensured by using parallel bitstring
operations together with logic variable equality propagation, as a mapping
mechanism from primary inputs to the leaves of candidate Leaf-DAGs implementing
a combinational circuit specification. After an exhaustive expressiveness
comparison of various minimal libraries, a surprising first-runner, Strict
Boolean Inequality "<" together with constant function "1" also turns out to
have small transistor-count implementations, competitive to NAND-only or
NOR-only libraries. As a practical outcome, a more realistic circuit
synthesizer is implemented that combines rewriting-based simplification of
(<,1) circuits with exhaustive Leaf-DAG circuit search.
Keywords: logic programming and circuit design, combinatorial object
generation, exact combinational circuit synthesis, universal boolean logic
libraries, symbolic rewriting, minimal transistor-count circuit synthesis
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 02:40:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Tarau",
"Paul",
""
],
[
"Luderman",
"Brenda",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.2097 | Tim Roughgarden | Jason D. Hartline and Tim Roughgarden | Optimal Mechansim Design and Money Burning | 23 pages, 1 figure | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mechanism design is now a standard tool in computer science for aligning the
incentives of self-interested agents with the objectives of a system designer.
There is, however, a fundamental disconnect between the traditional application
domains of mechanism design (such as auctions) and those arising in computer
science (such as networks): while monetary transfers (i.e., payments) are
essential for most of the known positive results in mechanism design, they are
undesirable or even technologically infeasible in many computer systems.
Classical impossibility results imply that the reach of mechanisms without
transfers is severely limited.
Computer systems typically do have the ability to reduce service
quality--routing systems can drop or delay traffic, scheduling protocols can
delay the release of jobs, and computational payment schemes can require
computational payments from users (e.g., in spam-fighting systems). Service
degradation is tantamount to requiring that users burn money}, and such
``payments'' can be used to influence the preferences of the agents at a cost
of degrading the social surplus.
We develop a framework for the design and analysis of money-burning
mechanisms to maximize the residual surplus--the total value of the chosen
outcome minus the payments required.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 04:32:45 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Hartline",
"Jason D.",
""
],
[
"Roughgarden",
"Tim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.2112 | Shai Gutner | Yossi Azar, Iftah Gamzu and Shai Gutner | Truthful Unsplittable Flow for Large Capacity Networks | null | Proc. of 19th SPAA (2007), 320-329 | null | null | cs.DS cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we focus our attention on the large capacities unsplittable
flow problem in a game theoretic setting. In this setting, there are selfish
agents, which control some of the requests characteristics, and may be
dishonest about them. It is worth noting that in game theoretic settings many
standard techniques, such as randomized rounding, violate certain monotonicity
properties, which are imperative for truthfulness, and therefore cannot be
employed. In light of this state of affairs, we design a monotone deterministic
algorithm, which is based on a primal-dual machinery, which attains an
approximation ratio of $\frac{e}{e-1}$, up to a disparity of $\epsilon$ away.
This implies an improvement on the current best truthful mechanism, as well as
an improvement on the current best combinatorial algorithm for the problem
under consideration. Surprisingly, we demonstrate that any algorithm in the
family of reasonable iterative path minimizing algorithms, cannot yield a
better approximation ratio. Consequently, it follows that in order to achieve a
monotone PTAS, if exists, one would have to exert different techniques. We also
consider the large capacities \textit{single-minded multi-unit combinatorial
auction problem}. This problem is closely related to the unsplittable flow
problem since one can formulate it as a special case of the integer linear
program of the unsplittable flow problem. Accordingly, we obtain a comparable
performance guarantee by refining the algorithm suggested for the unsplittable
flow problem.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 08:03:30 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Azar",
"Yossi",
""
],
[
"Gamzu",
"Iftah",
""
],
[
"Gutner",
"Shai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0804.2138 | Alexey Koloydenko | J. Lember, A. Koloydenko | A constructive proof of the existence of Viterbi processes | Submitted to the IEEE Transactions on Information Theory, focuses on
the proofs of the results presented in arXiv:0709.2317, and arXiv:0803.2394 | IEEE Transactions on Information Theory, volume 56, issue 4, 2010,
pages 2017 - 2033 | 10.1109/TIT.2010.2040897 | null | math.ST cs.IT math.IT math.PR stat.CO stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the early days of digital communication, hidden Markov models (HMMs)
have now been also routinely used in speech recognition, processing of natural
languages, images, and in bioinformatics. In an HMM $(X_i,Y_i)_{i\ge 1}$,
observations $X_1,X_2,...$ are assumed to be conditionally independent given an
``explanatory'' Markov process $Y_1,Y_2,...$, which itself is not observed;
moreover, the conditional distribution of $X_i$ depends solely on $Y_i$.
Central to the theory and applications of HMM is the Viterbi algorithm to find
{\em a maximum a posteriori} (MAP) estimate $q_{1:n}=(q_1,q_2,...,q_n)$ of
$Y_{1:n}$ given observed data $x_{1:n}$. Maximum {\em a posteriori} paths are
also known as Viterbi paths or alignments. Recently, attempts have been made to
study the behavior of Viterbi alignments when $n\to \infty$. Thus, it has been
shown that in some special cases a well-defined limiting Viterbi alignment
exists. While innovative, these attempts have relied on rather strong
assumptions and involved proofs which are existential. This work proves the
existence of infinite Viterbi alignments in a more constructive manner and for
a very general class of HMMs.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 18:31:18 GMT"
}
] | 2012-07-24T00:00:00 | [
[
"Lember",
"J.",
""
],
[
"Koloydenko",
"A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.2155 | Joseph Y. Halpern | Joseph Y. Halpern | From Qualitative to Quantitative Proofs of Security Properties Using
First-Order Conditional Logic | null | null | null | null | cs.CR cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A first-order conditional logic is considered, with semantics given by a
variant of epsilon-semantics, where p -> q means that Pr(q | p) approaches 1
super-polynomially --faster than any inverse polynomial. This type of
convergence is needed for reasoning about security protocols. A complete
axiomatization is provided for this semantics, and it is shown how a
qualitative proof of the correctness of a security protocol can be
automatically converted to a quantitative proof appropriate for reasoning about
concrete security.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 12:06:04 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.2181 | Frederic Chyzak | Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA
Rocquencourt), Nicolas Le Roux (INRIA Rocquencourt) | Products of Ordinary Differential Operators by Evaluation and
Interpolation | null | Dans ISSAC'08 (2008) | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is known that multiplication of linear differential operators over ground
fields of characteristic zero can be reduced to a constant number of matrix
products. We give a new algorithm by evaluation and interpolation which is
faster than the previously-known one by a constant factor, and prove that in
characteristic zero, multiplication of differential operators and of matrices
are computationally equivalent problems. In positive characteristic, we show
that differential operators can be multiplied in nearly optimal time.
Theoretical results are validated by intensive experiments.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 13:37:14 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Chyzak",
"Frédéric",
"",
"INRIA\n Rocquencourt"
],
[
"Roux",
"Nicolas Le",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.2189 | Zouheir Rezki Mr. | Z. Rezki, David Haccoun, Fran\c{c}ois Gagnon and Wessam Ajib | Impact of Spatial Correlation on the Finite-SNR Diversity-Multiplexing
Tradeoff | Accepted for publication to IEEE Transaction on Wireless
Communication on June 4th 2007 | null | 10.1109/TWC.2008.060984 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The impact of spatial correlation on the performance limits of multielement
antenna (MEA) channels is analyzed in terms of the diversity-multiplexing
tradeoff (DMT) at finite signal-to-noise ratio (SNR) values. A lower bound on
the outage probability is first derived. Using this bound accurate finite-SNR
estimate of the DMT is then derived. This estimate allows to gain insight on
the impact of spatial correlation on the DMT at finite SNR. As expected, the
DMT is severely degraded as the spatial correlation increases. Moreover, using
asymptotic analysis, we show that our framework encompasses well-known results
concerning the asymptotic behavior of the DMT.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 19:26:24 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Rezki",
"Z.",
""
],
[
"Haccoun",
"David",
""
],
[
"Gagnon",
"François",
""
],
[
"Ajib",
"Wessam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2191 | Novella Bartolini | N. Bartolini, T. Calamoneri, E. G. Fusco, A. Massini, S. Silvestri | Push & Pull: autonomous deployment of mobile sensors for a complete
coverage | Technical Report. This paper has been published on Wireless Networks,
Springer. Animations and the complete code of the proposed algorithm are
available for download at the address:
http://www.dsi.uniroma1.it/~novella/mobile_sensors/ | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mobile sensor networks are important for several strategic applications
devoted to monitoring critical areas. In such hostile scenarios, sensors cannot
be deployed manually and are either sent from a safe location or dropped from
an aircraft. Mobile devices permit a dynamic deployment reconfiguration that
improves the coverage in terms of completeness and uniformity.
In this paper we propose a distributed algorithm for the autonomous
deployment of mobile sensors called Push&Pull. According to our proposal,
movement decisions are made by each sensor on the basis of locally available
information and do not require any prior knowledge of the operating conditions
or any manual tuning of key parameters.
We formally prove that, when a sufficient number of sensors are available,
our approach guarantees a complete and uniform coverage. Furthermore, we
demonstrate that the algorithm execution always terminates preventing movement
oscillations.
Numerous simulations show that our algorithm reaches a complete coverage
within reasonable time with moderate energy consumption, even when the target
area has irregular shapes. Performance comparisons between Push&Pull and one of
the most acknowledged algorithms show how the former one can efficiently reach
a more uniform and complete coverage under a wide range of working scenarios.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 14:38:52 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Jun 2008 15:23:54 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Jul 2008 13:43:10 GMT"
},
{
"version": "v4",
"created": "Thu, 29 Jan 2009 14:58:50 GMT"
}
] | 2009-01-29T00:00:00 | [
[
"Bartolini",
"N.",
""
],
[
"Calamoneri",
"T.",
""
],
[
"Fusco",
"E. G.",
""
],
[
"Massini",
"A.",
""
],
[
"Silvestri",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.2249 | Martin Haenggi | Martin Haenggi | The Secrecy Graph and Some of its Properties | 5 pages. Accepted at 2008 IEEE Symposium on Information Theory
(ISIT'08) | null | 10.1109/ISIT.2008.4595044 | null | cs.IT cs.DM math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new random geometric graph model, the so-called secrecy graph, is
introduced and studied. The graph represents a wireless network and includes
only edges over which secure communication in the presence of eavesdroppers is
possible. The underlying point process models considered are lattices and
Poisson point processes. In the lattice case, analogies to standard bond and
site percolation can be exploited to determine percolation thresholds. In the
Poisson case, the node degrees are determined and percolation is studied using
analytical bounds and simulations. It turns out that a small density of
eavesdroppers already has a drastic impact on the connectivity of the secrecy
graph.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 19:40:08 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0804.2273 | Carl Lagoze | Carl Lagoze, Herbert Van de Sompel, Michael L. Nelson, Simeon Warner,
Robert Sanderson, Pete Johnston | Object Re-Use & Exchange: A Resource-Centric Approach | null | null | null | null | cs.DL cs.NI | http://creativecommons.org/licenses/by/3.0/ | The OAI Object Reuse and Exchange (OAI-ORE) framework recasts the
repository-centric notion of digital object to a bounded aggregation of Web
resources. In this manner, digital library content is more integrated with the
Web architecture, and thereby more accessible to Web applications and clients.
This generalized notion of an aggregation that is independent of repository
containment conforms more closely with notions in eScience and eScholarship,
where content is distributed across multiple services and databases. We provide
a motivation for the OAI-ORE project, review previous interoperability efforts,
describe draft ORE specifications and report on promising results from early
experimentation that illustrate improved interoperability and reuse of digital
objects.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2008 21:02:00 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Warner",
"Simeon",
""
],
[
"Sanderson",
"Robert",
""
],
[
"Johnston",
"Pete",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.2288 | Shipra Agrawal | Shipra Agrawal, Zizhuo Wang, Yinyu Ye | Parimutuel Betting on Permutations | null | null | null | null | cs.GT cs.CC cs.DS cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on a permutation betting market under parimutuel call auction model
where traders bet on the final ranking of n candidates. We present a
Proportional Betting mechanism for this market. Our mechanism allows the
traders to bet on any subset of the n x n 'candidate-rank' pairs, and rewards
them proportionally to the number of pairs that appear in the final outcome. We
show that market organizer's decision problem for this mechanism can be
formulated as a convex program of polynomial size. More importantly, the
formulation yields a set of n x n unique marginal prices that are sufficient to
price the bets in this mechanism, and are computable in polynomial-time. The
marginal prices reflect the traders' beliefs about the marginal distributions
over outcomes. We also propose techniques to compute the joint distribution
over n! permutations from these marginal distributions. We show that using a
maximum entropy criterion, we can obtain a concise parametric form (with only n
x n parameters) for the joint distribution which is defined over an
exponentially large state space. We then present an approximation algorithm for
computing the parameters of this distribution. In fact, the algorithm addresses
the generic problem of finding the maximum entropy distribution over
permutations that has a given mean, and may be of independent interest.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 00:20:17 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Agrawal",
"Shipra",
""
],
[
"Wang",
"Zizhuo",
""
],
[
"Ye",
"Yinyu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0804.2337 | Bruno Salvy | Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt),
\'Eric Schost | Power Series Composition and Change of Basis | null | null | 10.1145/1390768.1390806 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient algorithms are known for many operations on truncated power series
(multiplication, powering, exponential, ...). Composition is a more complex
task. We isolate a large class of power series for which composition can be
performed efficiently. We deduce fast algorithms for converting polynomials
between various bases, including Euler, Bernoulli, Fibonacci, and the
orthogonal Laguerre, Hermite, Jacobi, Krawtchouk, Meixner and
Meixner-Pollaczek.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 09:43:27 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Schost",
"Éric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.2343 | Charilaos Efthymiou | Charilaos Efthymiou (1,2) and Paul G. Spirakis (1,2) ((1) Research
Academic Computer Technology Institute (2) Computer Engineering and
Informatics Department of the University of Patras, Greece) | Random sampling of colourings of sparse random graphs with a constant
number of colours | 30 pages 0 figures, uses fullpage.sty | null | 10.1016/j.tcs.2008.05.008 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we present a simple and efficient algorithm which, with high
probability, provides an almost uniform sample from the set of proper
k-colourings on an instance of a sparse random graph G(n,d/n), where k=k(d) is
a sufficiently large constant. Our algorithm is not based on the Markov Chain
Monte Carlo method (M.C.M.C.). Instead, we provide a novel proof of correctness
of our Algorithm that is based on interesting "spatial mixing" properties of
colourings of G(n,d/n). Our result improves upon previous results (based on
M.C.M.C.) that required a number of colours growing unboundedly with n.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 09:58:28 GMT"
}
] | 2008-06-26T00:00:00 | [
[
"Efthymiou",
"Charilaos",
""
],
[
"Spirakis",
"Paul G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.2346 | Sudhakar Sahoo | Pabitra Pal Choudhury, Birendra Kumar Nayak, Sudhakar Sahoo, Sunil
Pankaj Rath | Theory and Applications of Two-dimensional, Null-boundary,
Nine-Neighborhood, Cellular Automata Linear rules | 17 pages, 41 figures, a portion of this paper is accepted in the
journal as well as proceedings at WSEAS,2006 | null | null | Tech.Report No. ASD/2005/4, 13 May 2005 | cs.DM cs.CC cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the theory and application of 2-Dimensional,
nine-neighborhood, null- boundary, uniform as well as hybrid Cellular Automata
(2D CA) linear rules in image processing. These rules are classified into nine
groups depending upon the number of neighboring cells influences the cell under
consideration. All the Uniform rules have been found to be rendering multiple
copies of a given image depending on the groups to which they belong where as
Hybrid rules are also shown to be characterizing the phenomena of zooming in,
zooming out, thickening and thinning of a given image. Further, using hybrid CA
rules a new searching algorithm is developed called Sweepers algorithm which is
found to be applicable to simulate many inter disciplinary research areas like
migration of organisms towards a single point destination, Single Attractor and
Multiple Attractor Cellular Automata Theory, Pattern Classification and
Clustering Problem, Image compression, Encryption and Decryption problems,
Density Classification problem etc.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 10:17:35 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Nayak",
"Birendra Kumar",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Rath",
"Sunil Pankaj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0804.2349 | Lukasz Nitschke | Lukasz Nitschke | Secure Remote Voting Using Paper Ballots | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Internet voting will probably be one of the most significant achievements of
the future information society. It will have an enormous impact on the election
process making it fast, reliable and inexpensive. Nonetheless, so far remote
voting is considered to be very difficult, as one has to take into account
susceptibility of the voter's PC to various cyber-attacks. As a result, most
the research effort is put into developing protocols and machines for poll-site
electronic voting. Although these solutions yield promising results, they
cannot be directly adopted to Internet voting because of secure platform
problem. However, the cryptographic components they utilize may be very useful.
This paper presents a scheme based on combination of mixnets and homomorphic
encryption borrowed from robust poll-site voting, along with techniques
recommended for remote voting -- code sheets and test ballots. The protocol
tries to minimize the trust put in voter's PC by making the voter responsible
for manual encryption of his vote. To achieve this, the voter obtains a paper
ballot that allows him to scramble the vote by performing simple operations
(lookup in a table). Creation of paper ballots, as well as decryption of votes,
is performed by a group of cooperating trusted servers. As a result, the scheme
is characterized by strong asymmetry -- all computations are carried out on the
server side. In consequence it does not require any additional hardware on the
voter's side, and offers distributed trust, receipt-freeness and verifiability.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 10:26:40 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Nitschke",
"Lukasz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.2354 | Andrew Krizhanovsky A | A. V. Smirnov, A. A. Krizhanovsky | Information filtering based on wiki index database | 9 pages, 1 table, 2 figures, 8th International FLINS Conference on
Computational Intelligence in Decision and Control, Madrid, Spain, September
21-24, 2008; v2: typo | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a profile-based approach to information filtering by
an analysis of the content of text documents. The Wikipedia index database is
created and used to automatically generate the user profile from the user
document collection. The problem-oriented Wikipedia subcorpora are created
(using knowledge extracted from the user profile) for each topic of user
interests. The index databases of these subcorpora are applied to filtering
information flow (e.g., mails, news). Thus, the analyzed texts are classified
into several topics explicitly presented in the user profile. The paper
concentrates on the indexing part of the approach. The architecture of an
application implementing the Wikipedia indexing is described. The indexing
method is evaluated using the Russian and Simple English Wikipedia.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 11:05:59 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2008 12:35:01 GMT"
}
] | 2008-05-08T00:00:00 | [
[
"Smirnov",
"A. V.",
""
],
[
"Krizhanovsky",
"A. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0804.2373 | Alin Bostan | Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt),
\'Eric Schost | Fast Conversion Algorithms for Orthogonal Polynomials | null | null | 10.1016/j.laa.2009.08.002 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss efficient conversion algorithms for orthogonal polynomials. We
describe a known conversion algorithm from an arbitrary orthogonal basis to the
monomial basis, and deduce a new algorithm of the same complexity for the
converse operation.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 12:47:14 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Schost",
"Éric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.2401 | Sanjiang Li | Sanjiang Li | Causal models have no complete axiomatic characterization | 7 pages, 1 figure | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Markov networks and Bayesian networks are effective graphic representations
of the dependencies embedded in probabilistic models. It is well known that
independencies captured by Markov networks (called graph-isomorphs) have a
finite axiomatic characterization. This paper, however, shows that
independencies captured by Bayesian networks (called causal models) have no
axiomatization by using even countably many Horn or disjunctive clauses. This
is because a sub-independency model of a causal model may be not causal, while
graph-isomorphs are closed under sub-models.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 14:28:34 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Li",
"Sanjiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.2429 | Debajyoti Bera | Debajyoti Bera, Stephen Fenner, Frederic Green and Steve Homer | Universal Quantum Circuits | 13 pages | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define and construct efficient depth-universal and almost-size-universal
quantum circuits. Such circuits can be viewed as general-purpose simulators for
central classes of quantum circuits and can be used to capture the
computational power of the circuit class being simulated. For depth we
construct universal circuits whose depth is the same order as the circuits
being simulated. For size, there is a log factor blow-up in the universal
circuits constructed here. We prove that this construction is nearly optimal.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 16:44:23 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Bera",
"Debajyoti",
""
],
[
"Fenner",
"Stephen",
""
],
[
"Green",
"Frederic",
""
],
[
"Homer",
"Steve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0804.2435 | Nicolas Markey | Francois Laroussinie, Nicolas Markey, and Ghassan Oreiby | On the Expressiveness and Complexity of ATL | 25 pages | Logical Methods in Computer Science, Volume 4, Issue 2 (May 15,
2008) lmcs:826 | 10.2168/LMCS-4(2:7)2008 | null | cs.LO cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | ATL is a temporal logic geared towards the specification and verification of
properties in multi-agents systems. It allows to reason on the existence of
strategies for coalitions of agents in order to enforce a given property. In
this paper, we first precisely characterize the complexity of ATL
model-checking over Alternating Transition Systems and Concurrent Game
Structures when the number of agents is not fixed. We prove that it is
\Delta^P_2 - and \Delta^P_?_3-complete, depending on the underlying multi-agent
model (ATS and CGS resp.). We also consider the same problems for some
extensions of ATL. We then consider expressiveness issues. We show how ATS and
CGS are related and provide translations between these models w.r.t.
alternating bisimulation. We also prove that the standard definition of ATL
(built on modalities "Next", "Always" and "Until") cannot express the duals of
its modalities: it is necessary to explicitely add the modality "Release".
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 17:18:46 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2008 13:13:15 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 12:50:23 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Laroussinie",
"Francois",
""
],
[
"Markey",
"Nicolas",
""
],
[
"Oreiby",
"Ghassan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0804.2469 | Alexander Sch\"onhuth | Alexander Sch\"onhuth | On analytic properties of entropy rate | IEEE Transactions on Information Theory, to appear | IEEE Transactions on Information Theory, 55(5), 2119-2127, 2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entropy rate is a real valued functional on the space of discrete random
sources which lacks a closed formula even for subclasses of sources which have
intuitive parameterizations. A good way to overcome this problem is to examine
its analytic properties relative to some reasonable topology. A canonical
choice of a topology is that of the norm of total variation as it immediately
arises with the idea of a discrete random source as a probability measure on
sequence space. It is shown that entropy rate is Lipschitzian relative to this
topology, which, by well known facts, is close to differentiability. An
application of this theorem leads to a simple and elementary proof of the
existence of entropy rate of random sources with finite evolution dimension.
This class of sources encompasses arbitrary hidden Markov sources and quantum
random walks.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 19:35:43 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Apr 2008 20:35:05 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Feb 2009 17:33:10 GMT"
}
] | 2015-01-14T00:00:00 | [
[
"Schönhuth",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2473 | Michael Botros Shenouda | Michael Botros Shenouda and Timothy Davidson | A Design Framework for Limited Feedback MIMO Systems with Zero-Forcing
DFE | Submitted to JSAC: Manuscript submitted 4 November 2007; revised 15
April 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the design of multiple-input multiple-output communication
systems with a linear precoder at the transmitter, zero-forcing decision
feedback equalization (ZF-DFE) at the receiver, and a low-rate feedback channel
that enables communication from the receiver to the transmitter. The channel
state information (CSI) available at the receiver is assumed to be perfect, and
based on this information the receiver selects a suitable precoder from a
codebook and feeds back the index of this precoder to the transmitter. Our
approach to the design of the components of this limited feedback scheme is
based on the development, herein, of a unified framework for the joint design
of the precoder and the ZF-DFE under the assumption that perfect CSI is
available at both the transmitter and the receiver. The framework is general
and embraces a wide range of design criteria. This framework enables us to
characterize the statistical distribution of the optimal precoder in a standard
Rayleigh fading environment. Using this distribution, we show that codebooks
constructed from Grassmann packings minimize an upper bound on an average
distortion measure, and hence are natural candidates for the codebook in
limited feedback systems. We also show that for any given codebook the
performance of the proposed limited feedback schemes is an upper bound on the
corresponding schemes with linear zero-forcing receivers. Our simulation
studies show that the proposed limited feedback scheme can provide
significantly better performance at a lower feedback rate than existing schemes
in which the detection order is fed back to the transmitter.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 19:55:21 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Apr 2008 20:08:09 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Shenouda",
"Michael Botros",
""
],
[
"Davidson",
"Timothy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2487 | Alexander Sch\"onhuth | Alexander Schoenhuth | The ergodic decomposition of asymptotically mean stationary random
sources | Submitted to IEEE Transactions on Information Theory, Apr. 2008 | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is demonstrated how to represent asymptotically mean stationary (AMS)
random sources with values in standard spaces as mixtures of ergodic AMS
sources. This an extension of the well known decomposition of stationary
sources which has facilitated the generalization of prominent source coding
theorems to arbitrary, not necessarily ergodic, stationary sources. Asymptotic
mean stationarity generalizes the definition of stationarity and covers a much
larger variety of real-world examples of random sources of practical interest.
It is sketched how to obtain source coding and related theorems for arbitrary,
not necessarily ergodic, AMS sources, based on the presented ergodic
decomposition.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2008 20:25:21 GMT"
}
] | 2008-04-17T00:00:00 | [
[
"Schoenhuth",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0804.2535 | Aleksander Wojdyga | Aleksander Wojdyga | Short proofs of strong normalization | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents simple, syntactic strong normalization proofs for the
simply-typed lambda-calculus and the polymorphic lambda-calculus (system F)
with the full set of logical connectives, and all the permutative reductions.
The normalization proofs use translations of terms and types to systems, for
which strong normalization property is known.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 07:09:59 GMT"
}
] | 2008-04-17T00:00:00 | [
[
"Wojdyga",
"Aleksander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.2576 | Lars Eirik Danielsen | Lars Eirik Danielsen, Matthew G. Parker | Interlace Polynomials: Enumeration, Unimodality, and Connections to
Codes | 19 pages, 17 figures | Discrete Appl. Math. 158(6), pp. 636-648, 2010. | 10.1016/j.dam.2009.11.011 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The interlace polynomial q was introduced by Arratia, Bollobas, and Sorkin.
It encodes many properties of the orbit of a graph under edge local
complementation (ELC). The interlace polynomial Q, introduced by Aigner and van
der Holst, similarly contains information about the orbit of a graph under
local complementation (LC). We have previously classified LC and ELC orbits,
and now give an enumeration of the corresponding interlace polynomials of all
graphs of order up to 12. An enumeration of all circle graphs of order up to 12
is also given. We show that there exist graphs of all orders greater than 9
with interlace polynomials q whose coefficient sequences are non-unimodal,
thereby disproving a conjecture by Arratia et al. We have verified that for
graphs of order up to 12, all polynomials Q have unimodal coefficients. It has
been shown that LC and ELC orbits of graphs correspond to equivalence classes
of certain error-correcting codes and quantum states. We show that the
properties of these codes and quantum states are related to properties of the
associated interlace polynomials.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 11:36:09 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 12:02:05 GMT"
}
] | 2010-02-18T00:00:00 | [
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2614 | Laura Anna Ripamonti | Laura Anna Ripamonti, Ines Di Loreto, Dario Maggiorini | Augmenting Actual Life Through MUVEs | null | null | null | null | cs.HC cs.CY | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The necessity of supporting more and more social interaction (and not only
the mere information sharing) in online environments is the disruptive force
upon which phenomena ascribed to the Web2.0 paradigm continuously bud. People
interacting in online socio-technical environments mould technology on their
needs, seamlessly integrating it into their everyday life. MUVEs (Multi User
Virtual Environments) are no exception and, in several cases, represent the new
frontier in this field. In this work we analyze if and how MUVEs can be
considered a mean for augmenting communities (and more in general people) life.
We trace a framework of analysis based on four main observations, and through
these lenses we look at Second Life and at several projects we are currently
developing in that synthetic world.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 14:43:31 GMT"
}
] | 2008-04-17T00:00:00 | [
[
"Ripamonti",
"Laura Anna",
""
],
[
"Di Loreto",
"Ines",
""
],
[
"Maggiorini",
"Dario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.2621 | Christoph Schommer | Christoph Schommer | Design and Implementation of a Master of Science in Information and
Computer Sciences - An Inventory and retrospect for the last four years | 27 pages, 4 Figures | null | null | null | cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This Master of Science in Computer and Information Sciences (MICS) is an
international accredited master program that has been initiated in 2004 and
started in September 2005. MICS is a research-oriented academic study of 4
semesters and a continuation of the Bachelor towards the PhD. It is completely
taught in English, supported by lecturers coming from more than ten different
countries. This report compass a description of its underlying architecture,
describes some implementation details and gives a presentation of diverse
experiences and results. As the program has been designed and implemented right
after the creation of the University, the significance of the program is
moreover a self-discovery of the computer science department, which has finally
led to the creation of the today's research institutes and research axes.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 15:43:27 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0804.2642 | Michel Grabisch | Pedro Miranda, Michel Grabisch (LIP6), Pedro Gil | p-Symmetric fuzzy measures | null | International Journal of Uncertainty Fuzziness and Knowledge-Based
Systems (2002) 105-123 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a generalization of the concept of symmetric fuzzy
measure based in a decomposition of the universal set in what we have called
subsets of indifference. Some properties of these measures are studied, as well
as their Choquet integral. Finally, a degree of interaction between the subsets
of indifference is defined.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 16:47:45 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Miranda",
"Pedro",
"",
"LIP6"
],
[
"Grabisch",
"Michel",
"",
"LIP6"
],
[
"Gil",
"Pedro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.2699 | Dennis Huo | Ian Christopher, Dennis Huo, and Bryan Jacobs | A Critique of a Polynomial-time SAT Solver Devised by Sergey Gubin | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper refutes the validity of the polynomial-time algorithm for solving
satisfiability proposed by Sergey Gubin. Gubin introduces the algorithm using
3-SAT and eventually expands it to accept a broad range of forms of the Boolean
satisfiability problem. Because 3-SAT is NP-complete, the algorithm would have
implied P = NP, had it been correct. Additionally, this paper refutes the
correctness of his polynomial-time reduction of SAT to 2-SAT.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 23:00:51 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Christopher",
"Ian",
""
],
[
"Huo",
"Dennis",
""
],
[
"Jacobs",
"Bryan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.2701 | Travis C. Brooks | Anne Gentil-Beccot, Salvatore Mele, Annette Holtkamp, Heath B.
O'Connell, Travis C. Brooks | Information Resources in High-Energy Physics: Surveying the Present
Landscape and Charting the Future Course | Removed internal pdf links broken on some pdf viewers | J.Am.Soc.Inf.Sci.60:150-160,2009 | 10.1002/asi.20944 | CERN-OPEN-2008-010,DESY-08-040,FERMILAB-PUB-08-077-BSS,SLAC-PUB-13199 | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Access to previous results is of paramount importance in the scientific
process. Recent progress in information management focuses on building
e-infrastructures for the optimization of the research workflow, through both
policy-driven and user-pulled dynamics. For decades, High-Energy Physics (HEP)
has pioneered innovative solutions in the field of information management and
dissemination. In light of a transforming information environment, it is
important to assess the current usage of information resources by researchers
and HEP provides a unique test-bed for this assessment. A survey of about 10%
of practitioners in the field reveals usage trends and information needs.
Community-based services, such as the pioneering arXiv and SPIRES systems,
largely answer the need of the scientists, with a limited but increasing
fraction of younger users relying on Google. Commercial services offered by
publishers or database vendors are essentially unused in the field. The survey
offers an insight into the most important features that users require to
optimize their research workflow. These results inform the future evolution of
information management in HEP and, as these researchers are traditionally
``early adopters'' of innovation in scholarly communication, can inspire
developments of disciplinary repositories serving other communities.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2008 23:01:51 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2008 16:35:02 GMT"
}
] | 2009-01-08T00:00:00 | [
[
"Gentil-Beccot",
"Anne",
""
],
[
"Mele",
"Salvatore",
""
],
[
"Holtkamp",
"Annette",
""
],
[
"O'Connell",
"Heath B.",
""
],
[
"Brooks",
"Travis C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0804.2729 | Henning Schnoor | Edith Hemaspaandra, Henning Schnoor, Ilka Schnoor | Generalized Modal Satisfiability | 32 pages, 3 figures. Some of the results appeared in STACS 2006 | null | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that modal satisfiability is PSPACE-complete (Ladner 1977).
However, the complexity may decrease if we restrict the set of propositional
operators used. Note that there exist an infinite number of propositional
operators, since a propositional operator is simply a Boolean function. We
completely classify the complexity of modal satisfiability for every finite set
of propositional operators, i.e., in contrast to previous work, we classify an
infinite number of problems. We show that, depending on the set of
propositional operators, modal satisfiability is PSPACE-complete,
coNP-complete, or in P. We obtain this trichotomy not only for modal formulas,
but also for their more succinct representation using modal circuits. We
consider both the uni-modal and the multi-modal case, and study the dual
problem of validity as well.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 06:57:50 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Schnoor",
"Henning",
""
],
[
"Schnoor",
"Ilka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.2808 | Ananthanarayanan Chockalingam | P. Ubaidulla and A. Chockalingam | Robust Precoder for Multiuser MISO Downlink with SINR Constraints | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider linear precoding with SINR constraints for the
downlink of a multiuser MISO (multiple-input single-output) communication
system in the presence of imperfect channel state information (CSI). The base
station is equipped with multiple transmit antennas and each user terminal is
equipped with a single receive antenna. We propose a robust design of linear
precoder which transmits minimum power to provide the required SINR at the user
terminals when the true channel state lies in a region of a given size around
the channel state available at the transmitter. We show that this design
problem can be formulated as a Second Order Cone Program (SOCP) which can be
solved efficiently. We compare the performance of the proposed design with some
of the robust designs reported in the literature. Simulation results show that
the proposed robust design provides better performance with reduced complexity.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 13:47:30 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Ubaidulla",
"P.",
""
],
[
"Chockalingam",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2819 | Michel Grabisch | Michel Grabisch (CES), Christophe Labreuche (TRT) | Bipolarization of posets and natural interpolation | null | Journal of Mathematical Analysis and applications (2008) 1080-1097 | 10.1016/j.jmaa.2008.02.008 | null | cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Choquet integral w.r.t. a capacity can be seen in the finite case as a
parsimonious linear interpolator between vertices of $[0,1]^n$. We take this
basic fact as a starting point to define the Choquet integral in a very general
way, using the geometric realization of lattices and their natural
triangulation, as in the work of Koshevoy. A second aim of the paper is to
define a general mechanism for the bipolarization of ordered structures. Bisets
(or signed sets), as well as bisubmodular functions, bicapacities,
bicooperative games, as well as the Choquet integral defined for them can be
seen as particular instances of this scheme. Lastly, an application to
multicriteria aggregation with multiple reference levels illustrates all the
results presented in the paper.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 14:05:41 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0804.2831 | Yi Su | Yi Su and Mihaela van der Schaar | Decentralized Knowledge and Learning in Strategic Multi-user
Communication | 32 pages, 15 figures | null | null | null | cs.GT cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Please see the content of this report.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 14:47:48 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.2844 | Chris Kimble | Isabelle Bourdon and Chris Kimble | An Analysis of Key Factors for the Success of the Communal Management of
Knowledge | in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth,
UK | null | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the links between Knowledge Management and new
community-based models of the organization from both a theoretical and an
empirical perspective. From a theoretical standpoint, we look at Communities of
Practice (CoPs) and Knowledge Management (KM) and explore the links between the
two as they relate to the use of information systems to manage knowledge. We
begin by reviewing technologically supported approaches to KM and introduce the
idea of "Systemes d'Aide a la Gestion des Connaissances" SAGC (Systems to aid
the Management of Knowledge). Following this we examine the contribution that
communal structures such as CoPs can make to intraorganizational KM and
highlight some of 'success factors' for this approach to KM that are found in
the literature. From an empirical standpoint, we present the results of a
survey involving the Chief Knowledge Officers (CKOs) of twelve large French
businesses; the objective of this study was to identify the factors that might
influence the success of such approaches. The survey was analysed using
thematic content analysis and the results are presented here with some short
illustrative quotes from the CKOs. Finally, the paper concludes with some brief
reflections on what can be learnt from looking at this problem from these two
perspectives.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 16:00:47 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Bourdon",
"Isabelle",
""
],
[
"Kimble",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.2847 | Chris Kimble | Pamela Baillette and Chris Kimble | The Concept of Appropriation as a Heuristic for Conceptualising the
Relationship between Technology, People and Organisations | in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth,
UK | null | null | null | cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The stated aim of this conference is to debate the continuing evolution of IS
in businesses and other organisations. This paper seeks to contribute to this
debate by exploring the concept of appropriation from a number of different
epistemological, cultural and linguistic viewpoints to allow us to explore 'the
black box' of appropriation and to gain a fuller understanding of the term. At
the conceptual level, it will examine some of the different ways in which
people have attempted to explain the relationship between the objective and
concrete features of technology and the subjective and shifting nature of the
people and organisation within which that technology is deployed. At the
cultural and linguistic level the paper will examine the notion as it is found
in the Francophone literature, where the term has a long and rich history, and
the Anglophone literature where appropriation is seen as a rather more
specialist term. The paper will conclude with some observations on the ongoing
nature of the debate, the value of reading beyond the literature with which one
is familiar and the rewards that come from exploring different historical (and
linguistic) viewpoints.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 16:13:49 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Baillette",
"Pamela",
""
],
[
"Kimble",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0804.2851 | Chris Kimble | Richard Ribeiro and Chris Kimble | Identifying 'Hidden' Communities of Practice within Electronic Networks:
Some Preliminary Premises | in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth,
UK | null | null | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines the possibility of discovering 'hidden' (potential)
Communities of Practice (CoPs) inside electronic networks, and then using this
knowledge to nurture them into a fully developed Virtual Community of Practice
(VCoP). Starting from the standpoint of the need to manage knowledge, it
discusses several questions related to this subject: the characteristics of
'hidden' communities; the relation between CoPs, Virtual Communities (VCs),
Distributed Communities of Practice (DCoPs) and Virtual Communities of Practice
(VCoPs); the methods used to search for 'hidden' CoPs; and the possible ways of
changing 'hidden' CoPs into fully developed VCoPs. The paper also presents some
preliminary findings from a semi-structured interview conducted in The Higher
Education Academy Psychology Network (UK). These findings are contrasted
against the theory discussed and some additional proposals are suggested at the
end.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 16:33:53 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Ribeiro",
"Richard",
""
],
[
"Kimble",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.2852 | Chris Kimble | David King and Chris Kimble | Philosophical Smoke Signals: Theory and Practice in Information Systems
Design | in Proceedings of 10th UKAIS Conference, (May 2005), Northumbria
University, UK | null | null | null | cs.SE cs.GL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the gulf between the theory and practice in Information Systems is
much lamented, few researchers have offered a way forward except through a
number of (failed) attempts to develop a single systematic theory for
Information Systems. In this paper, we encourage researchers to re-examine the
practical consequences of their theoretical arguments. By examining these
arguments we may be able to form a number of more rigorous theories of
Information Systems, allowing us to draw theory and practice together without
undertaking yet another attempt at the holy grail of a single unified
systematic theory of Information Systems.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2008 16:46:55 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"King",
"David",
""
],
[
"Kimble",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0804.2940 | Shun Watanabe | Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko
Uyematsu | Secret Key Agreement by Soft-decision of Signals in Gaussian Maurer's
Model | 10 pages, 4 figures, to be appear in Proc. of 2008 IEEE International
Symposium on Information Theory in Toronto, Canada | IEICE Trans. Fundamentals, vol. 92, no. 2, pp. 525-534, February
2009 | 10.1587/transfun.E92.A.525 | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of secret key agreement in Gaussian Maurer's Model.
In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a
wire-tapper, Eve, receive signals randomly generated by a satellite through
three independent memoryless Gaussian channels respectively. Then Alice and Bob
generate a common secret key from their received signals. In this model, we
propose a protocol for generating a common secret key by using the result of
soft-decision of Alice and Bob's received signals. Then, we calculate a lower
bound on the secret key rate in our proposed protocol. As a result of
comparison with the protocol that only uses hard-decision, we found that the
higher rate is obtained by using our protocol.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 04:57:52 GMT"
}
] | 2009-03-12T00:00:00 | [
[
"Naito",
"Masashi",
""
],
[
"Watanabe",
"Shun",
""
],
[
"Matsumoto",
"Ryutaroh",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2950 | Tomaz Korosec | Tomaz Korosec and Saso Tomazic (Faculty of Electrical Engineering,
University of Ljubljana, Ljubljana, Slovenia) | An Adaptive-Parity Error-Resilient LZ'77 Compression Algorithm | 8 pages, 7 figures, 1 table; submitted to IEEE Transactions on
Information Theory, April 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper proposes an improved error-resilient Lempel-Ziv'77 (LZ'77)
algorithm employing an adaptive amount of parity bits for error protection. It
is a modified version of error resilient algorithm LZRS'77, proposed recently,
which uses a constant amount of parity over all of the encoded blocks of data.
The constant amount of parity is bounded by the lowest-redundancy part of the
encoded string, whereas the adaptive parity more efficiently utilizes the
available redundancy of the encoded string, and can be on average much higher.
The proposed algorithm thus provides better error protection of encoded data.
The performance of both algorithms was measured. The comparison showed a
noticeable improvement by use of adaptive parity. The proposed algorithm is
capable of correcting up to a few times as many errors as the original
algorithm, while the compression performance remains practically unchanged.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 07:11:43 GMT"
}
] | 2008-04-21T00:00:00 | [
[
"Korosec",
"Tomaz",
"",
"Faculty of Electrical Engineering,\n University of Ljubljana, Ljubljana, Slovenia"
],
[
"Tomazic",
"Saso",
"",
"Faculty of Electrical Engineering,\n University of Ljubljana, Ljubljana, Slovenia"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2960 | Yonghong Zeng | Yonghong Zeng and Ying-Chang Liang | Eigenvalue based Spectrum Sensing Algorithms for Cognitive Radio | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sensing is a fundamental component is a cognitive radio. In this
paper, we propose new sensing methods based on the eigenvalues of the
covariance matrix of signals received at the secondary users. In particular,
two sensing algorithms are suggested, one is based on the ratio of the maximum
eigenvalue to minimum eigenvalue; the other is based on the ratio of the
average eigenvalue to minimum eigenvalue. Using some latest random matrix
theories (RMT), we quantify the distributions of these ratios and derive the
probabilities of false alarm and probabilities of detection for the proposed
algorithms. We also find the thresholds of the methods for a given probability
of false alarm. The proposed methods overcome the noise uncertainty problem,
and can even perform better than the ideal energy detection when the signals to
be detected are highly correlated. The methods can be used for various signal
detection applications without requiring the knowledge of signal, channel and
noise power. Simulations based on randomly generated signals, wireless
microphone signals and captured ATSC DTV signals are presented to verify the
effectiveness of the proposed methods.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 07:56:14 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Zeng",
"Yonghong",
""
],
[
"Liang",
"Ying-Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2991 | Enrico Paolini | Enrico Paolini, Gianluigi Liva, Michela Varrella, Balazs Matuz, Marco
Chiani | Low-Complexity LDPC Codes with Near-Optimum Performance over the BEC | 2008 Advanced Satellite Mobile Systems Conference. 9 pages, 12
figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent works showed how low-density parity-check (LDPC) erasure correcting
codes, under maximum likelihood (ML) decoding, are capable of tightly
approaching the performance of an ideal maximum-distance-separable code on the
binary erasure channel. Such result is achievable down to low error rates, even
for small and moderate block sizes, while keeping the decoding complexity low,
thanks to a class of decoding algorithms which exploits the sparseness of the
parity-check matrix to reduce the complexity of Gaussian elimination (GE). In
this paper the main concepts underlying ML decoding of LDPC codes are recalled.
A performance analysis among various LDPC code classes is then carried out,
including a comparison with fixed-rate Raptor codes. The results show that LDPC
and Raptor codes provide almost identical performance in terms of decoding
failure probability vs. overhead.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 10:49:44 GMT"
}
] | 2008-04-21T00:00:00 | [
[
"Paolini",
"Enrico",
""
],
[
"Liva",
"Gianluigi",
""
],
[
"Varrella",
"Michela",
""
],
[
"Matuz",
"Balazs",
""
],
[
"Chiani",
"Marco",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.2992 | Eberhard H.-A. Gerbracht | Eberhard H.-A. Gerbracht | "E pluribus unum" or How to Derive Single-equation Descriptions for
Output-quantities in Nonlinear Circuits using Differential Algebra | V1: documentclass IEEEtran, 7 pages, 10 figures. Re-release of the
printed version, with some minor typographical errors corrected | Proceedings of the 7th International Workshop on Symbolic Methods
and Applications to Circuit Design, SMACD 2002, Sinaia, Romania, October
10-11, 2002; pp. 65-70; ISBN 973-85072-5-1 | null | null | cs.SC math.CA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe by a number of examples how to deduce one single
characterizing higher order differential equation for output quantities of an
analog circuit.
In the linear case, we apply basic "symbolic" methods from linear algebra to
the system of differential equations which is used to model the analog circuit.
For nonlinear circuits and their corresponding nonlinear differential
equations, we show how to employ computer algebra tools implemented in Maple,
which are based on differential algebra.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 19:55:58 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gerbracht",
"Eberhard H. -A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
0804.2998 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | OFDM based Distributed Space Time Coding for Asynchronous Relay Networks | 5 pages, 2 figures, to appear in IEEE International Conference on
Communications, Beijing, China, May 19-23, 2008 | null | 10.1109/ICC.2008.218 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently Li and Xia have proposed a transmission scheme for wireless relay
networks based on the Alamouti space time code and orthogonal frequency
division multiplexing to combat the effect of timing errors at the relay nodes.
This transmission scheme is amazingly simple and achieves a diversity order of
two for any number of relays. Motivated by its simplicity, this scheme is
extended to a more general transmission scheme that can achieve full
cooperative diversity for any number of relays. The conditions on the
distributed space time block code (DSTBC) structure that admit its application
in the proposed transmission scheme are identified and it is pointed out that
the recently proposed full diversity four group decodable DSTBCs from precoded
co-ordinate interleaved orthogonal designs and extended Clifford algebras
satisfy these conditions. It is then shown how differential encoding at the
source can be combined with the proposed transmission scheme to arrive at a new
transmission scheme that can achieve full cooperative diversity in asynchronous
wireless relay networks with no channel information and also no timing error
knowledge at the destination node. Finally, four group decodable distributed
differential space time block codes applicable in this new transmission scheme
for power of two number of relays are also provided.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 11:17:50 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2008 09:19:49 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3023 | Abdessamad Imine | Hanifa Boucheneb (VeriForm), Abdessamad Imine (INRIA Lorraine - LORIA
/ LIFC) | Experiments in Model-Checking Optimistic Replication Algorithms | null | null | null | RR-6510 | cs.LO cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a series of model-checking experiments to verify
optimistic replication algorithms based on Operational Transformation (OT)
approach used for supporting collaborative edition. We formally define, using
tool UPPAAL, the behavior and the main consistency requirement (i.e.
convergence property) of the collaborative editing systems, as well as the
abstract behavior of the environment where these systems are supposed to
operate. Due to data replication and the unpredictable nature of user
interactions, such systems have infinitely many states. So, we show how to
exploit some features of the UPPAAL specification language to attenuate the
severe state explosion problem. Two models are proposed. The first one, called
concrete model, is very close to the system implementation but runs up against
a severe explosion of states. The second model, called symbolic model, aims to
overcome the limitation of the concrete model by delaying the effective
selection and execution of editing operations until the construction of
symbolic execution traces of all sites is completed. Experimental results have
shown that the symbolic model allows a significant gain in both space and time.
Using the symbolic model, we have been able to show that if the number of sites
exceeds 2 then the convergence property is not satisfied for all OT algorithms
considered here. A counterexample is provided for every algorithm.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 14:04:38 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2008 08:51:52 GMT"
}
] | 2009-04-20T00:00:00 | [
[
"Boucheneb",
"Hanifa",
"",
"VeriForm"
],
[
"Imine",
"Abdessamad",
"",
"INRIA Lorraine - LORIA\n / LIFC"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.3028 | Saket Saurabh | Michael Fellows, Fedor Fomin, Daniel Lokshtanov, Elena Losievskaja,
Frances A. Rosamond and Saket Saurabh | Parameterized Low-distortion Embeddings - Graph metrics into lines and
trees | 19 pages, 1 Figure | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit the issue of low-distortion embedding of metric spaces into the
line, and more generally, into the shortest path metric of trees, from the
parameterized complexity perspective.Let $M=M(G)$ be the shortest path metric
of an edge weighted graph $G=(V,E)$ on $n$ vertices. We describe algorithms for
the problem of finding a low distortion non-contracting embedding of $M$ into
line and tree metrics.
We give an $O(nd^4(2d+1)^{2d})$ time algorithm that for an unweighted graph
metric $M$ and integer $d$ either constructs an embedding of $M$ into the line
with distortion at most $d$, or concludes that no such embedding exists. We
find the result surprising, because the considered problem bears a strong
resemblance to the notoriously hard Bandwidth Minimization problem which does
not admit any FPT algorithm unless an unlikely collapse of parameterized
complexity classes occurs.
We show that our algorithm can also be applied to construct small distortion
embeddings of weighted graph metrics. The running time of our algorithm is
$O(n(dW)^4(2d+1)^{2dW})$ where $W$ is the largest edge weight of the input
graph. We also show that deciding whether a weighted graph metric $M(G)$ with
maximum weight $W < |V(G)|$ can be embedded into the line with distortion at
most $d$ is NP-Complete for every fixed rational $d \geq 2$. This rules out any
possibility of an algorithm with running time $O((nW)^{h(d)})$ where $h$ is a
function of $d$ alone.
We generalize the result on embedding into the line by proving that for any
tree $T$ with maximum degree $\Delta$, embedding of $M$ into a shortest path
metric of $T$ is FPT, parameterized by $(\Delta,d)$.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 14:39:41 GMT"
}
] | 2008-04-21T00:00:00 | [
[
"Fellows",
"Michael",
""
],
[
"Fomin",
"Fedor",
""
],
[
"Lokshtanov",
"Daniel",
""
],
[
"Losievskaja",
"Elena",
""
],
[
"Rosamond",
"Frances A.",
""
],
[
"Saurabh",
"Saket",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.3064 | Vassilis Kostakos | Vassilis Kostakos, Panos A. Kostakos | Intelligence gathering by capturing the social processes within prisons | 21 pages, 7 Figures, 1 table | International Journal of Pervasive Computing and Communications,
6(4):423-431, 2010 | 10.1108/17427371011097622 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a prototype system that can be used to capture longitudinal
socialising processes by recording people's encounters in space. We argue that
such a system can usefully be deployed in prisons and other detention
facilities in order help intelligence analysts assess the behaviour or
terrorist and organised crime groups, and their potential relationships. Here
we present the results of a longitudinal study, carried out with civilians,
which demonstrates the capabilities of our system.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 16:27:19 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Jun 2008 22:45:50 GMT"
}
] | 2013-06-06T00:00:00 | [
[
"Kostakos",
"Vassilis",
""
],
[
"Kostakos",
"Panos A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.3065 | Florent Jacquemard | Hubert Comon-Lundh, Florent Jacquemard, Nicolas Perrin | Visibly Tree Automata with Memory and Constraints | 36 pages including an appendix | Logical Methods in Computer Science, Volume 4, Issue 2 (June 18,
2008) lmcs:827 | 10.2168/LMCS-4(2:8)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tree automata with one memory have been introduced in 2001. They generalize
both pushdown (word) automata and the tree automata with constraints of
equality between brothers of Bogaert and Tison. Though it has a decidable
emptiness problem, the main weakness of this model is its lack of good closure
properties.
We propose a generalization of the visibly pushdown automata of Alur and
Madhusudan to a family of tree recognizers which carry along their (bottom-up)
computation an auxiliary unbounded memory with a tree structure (instead of a
symbol stack). In other words, these recognizers, called Visibly Tree Automata
with Memory (VTAM) define a subclass of tree automata with one memory enjoying
Boolean closure properties. We show in particular that they can be determinized
and the problems like emptiness, membership, inclusion and universality are
decidable for VTAM. Moreover, we propose several extensions of VTAM whose
transitions may be constrained by different kinds of tests between memories and
also constraints a la Bogaert and Tison comparing brother subtrees in the tree
in input. We show that some of these classes of constrained VTAM keep the good
closure and decidability properties, and we demonstrate their expressiveness
with relevant examples of tree languages.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 16:27:34 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jun 2008 23:32:44 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Comon-Lundh",
"Hubert",
""
],
[
"Jacquemard",
"Florent",
""
],
[
"Perrin",
"Nicolas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.3103 | Vassilis Kostakos | Vassilis Kostakos, Eamonn O'Neill | Size matters: performance declines if your pixels are too big or too
small | 10 pages, 13 figures, 7 tables | null | null | null | cs.GR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a conceptual model that describes the effect of pixel size on
target acquisition. We demonstrate the use of our conceptual model by applying
it to predict and explain the results of an experiment to evaluate users'
performance in a target acquisition task involving three distinct display
sizes: standard desktop, small and large displays. The results indicate that
users are fastest on standard desktop displays, undershoots are the most common
error on small displays and overshoots are the most common error on large
displays. We propose heuristics to maintain usability when changing displays.
Finally, we contribute to the growing body of evidence that amplitude does
affect performance in a display-based pointing task.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 21:02:19 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Kostakos",
"Vassilis",
""
],
[
"O'Neill",
"Eamonn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0804.3105 | Igor Walukiewicz | Anca Muscholl, Igor Walukiewicz | A lower bound on web services composition | null | Logical Methods in Computer Science, Volume 4, Issue 2 (May 15,
2008) lmcs:824 | 10.2168/LMCS-4(2:5)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A web service is modeled here as a finite state machine. A composition
problem for web services is to decide if a given web service can be constructed
from a given set of web services; where the construction is understood as a
simulation of the specification by a fully asynchronous product of the given
services. We show an EXPTIME-lower bound for this problem, thus matching the
known upper bound. Our result also applies to richer models of web services,
such as the Roman model.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 21:15:47 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2008 13:14:57 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Muscholl",
"Anca",
""
],
[
"Walukiewicz",
"Igor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.3109 | Sandeep Chalasani | Sandeep Chalasani | Partial Cross-Correlation of D-Sequences based CDMA System | 6 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Like other pseudorandom sequences, decimal sequences may be used in designing
a Code Division Multiple Access (CDMA) system. They appear to be ideally suited
for this since the cross-correlation of d-sequences taken over the LCM of their
periods is zero. But a practical system will not, in most likelihood, satisfy
the condition that the number of chips per bit is equal to the LCM for all
sequences that are assigned to different users. It is essential, therefore, to
determine the partial cross-correlation properties of d-sequences. This paper
has performed experiments on d-sequences and found that the partial
cross-correlation is less than for PN sequences, indicating that d-sequences
can be effective for use in CDMA.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2008 21:48:43 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Chalasani",
"Sandeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3120 | Zhang Shengli | Zhang Shengli, Soung Chang Liew | The Capacity Of Two Way Relay Channel | 6 pages, submitted to Globecom 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the capacity of a wireless two way relay channel in
which two end nodes exchange information via a relay node. The capacity is
defined in the information-theoretic sense as the maximum information exchange
rate between the two end nodes. We give an upper bound of the capacity by
applying the cut-set theorem. We prove that this upper bound can be approached
in low SNR region using "separated" multiple access for uplinks from the end
nodes to the relay in which the data from the end nodes are individually
decoded at the relay; and network-coding broadcast for downlinks from the relay
to the end nodes in which the relay mixes the information from end nodes before
forwarding. We further prove that the capacity is approachable in high SNR
region using physical-layer network coding (PNC) multiple access for uplinks,
and network-coding broadcast for downlinks. From our proof and observations, we
conjecture that the upper bound may be achieved with PNC in all SNR regions.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2008 01:59:17 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Shengli",
"Zhang",
""
],
[
"Liew",
"Soung Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3155 | G.Susinder Rajan | G. Susinder Rajan and B. Sundar Rajan | Leveraging Coherent Distributed Space-Time Codes for Noncoherent
Communication in Relay Networks via Training | 14 pages, 5 figures, to appear in IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For point to point multiple input multiple output systems,
Dayal-Brehler-Varanasi have proved that training codes achieve the same
diversity order as that of the underlying coherent space time block code (STBC)
if a simple minimum mean squared error estimate of the channel formed using the
training part is employed for coherent detection of the underlying STBC. In
this letter, a similar strategy involving a combination of training, channel
estimation and detection in conjunction with existing coherent distributed
STBCs is proposed for noncoherent communication in AF relay networks.
Simulation results show that the proposed simple strategy outperforms
distributed differential space-time coding for AF relay networks. Finally, the
proposed strategy is extended to asynchronous relay networks using orthogonal
frequency division multiplexing.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2008 16:05:44 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Sep 2008 07:02:49 GMT"
}
] | 2008-09-03T00:00:00 | [
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3160 | Giorgos Christodoulou | George Christodoulou, Elias Koutsoupias and Paul Spirakis | On the performance of approximate equilibria in congestion games | null | null | null | null | cs.GT cs.AI cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the performance of approximate Nash equilibria for linear congestion
games. We consider how much the price of anarchy worsens and how much the price
of stability improves as a function of the approximation factor $\epsilon$. We
give (almost) tight upper and lower bounds for both the price of anarchy and
the price of stability for atomic and non-atomic congestion games. Our results
not only encompass and generalize the existing results of exact equilibria to
$\epsilon$-Nash equilibria, but they also provide a unified approach which
reveals the common threads of the atomic and non-atomic price of anarchy
results. By expanding the spectrum, we also cast the existing results in a new
light. For example, the Pigou network, which gives tight results for exact Nash
equilibria of selfish routing, remains tight for the price of stability of
$\epsilon$-Nash equilibria but not for the price of anarchy.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 12:45:08 GMT"
},
{
"version": "v2",
"created": "Sat, 10 May 2008 15:45:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Christodoulou",
"George",
""
],
[
"Koutsoupias",
"Elias",
""
],
[
"Spirakis",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.3171 | Prashanth Alluvada | Prashanth Alluvada | Optimization Approach for Detecting the Critical Data on a Database | 6 pages, 1 figure, 3 tables. corrected typos, added remarks | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Through purposeful introduction of malicious transactions (tracking
transactions) into randomly select nodes of a (database) graph, soiled and
clean segments are identified. Soiled and clean measures corresponding those
segments are then computed. These measures are used to repose the problem of
critical database elements detection as an optimization problem over the graph.
This method is universally applicable over a large class of graphs (including
directed, weighted, disconnected, cyclic) that occur in several contexts of
databases. A generalization argument is presented which extends the critical
data problem to abstract settings.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2008 03:23:38 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Apr 2008 19:32:31 GMT"
}
] | 2008-04-27T00:00:00 | [
[
"Alluvada",
"Prashanth",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0804.3193 | Diego Conti | Diego Conti | Symbolic computations in differential geometry | 14 pages, 1 figure | null | null | null | math.DG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the C++ library Wedge, based on GiNaC, for symbolic computations
in differential geometry. We show how Wedge makes it possible to use the
language C++ to perform such computations, and illustrate some advantages of
this approach with explicit examples. In particular, we describe a short
program to determine whether a given linear exterior differential system is
involutive.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2008 14:55:56 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Conti",
"Diego",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0804.3215 | Martin Reisslein | Matthias an der Heiden, Michel Sortais, Michael Scheutzow, Martin
Reisslein, and Martin Maier | Multicast Capacity of Optical WDM Packet Ring for Hotspot Traffic | null | null | 10.1016/j.osn.2011.05.002 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Packet-switching WDM ring networks with a hotspot transporting unicast,
multicast, and broadcast traffic are important components of high-speed
metropolitan area networks. For an arbitrary multicast fanout traffic model
with uniform, hotspot destination, and hotspot source packet traffic, we
analyze the maximum achievable long-run average packet throughput, which we
refer to as \textit{multicast capacity}, of bi-directional shortest-path routed
WDM rings. We identify three segments that can experience the maximum
utilization, and thus, limit the multicast capacity. We characterize the
segment utilization probabilities through bounds and approximations, which we
verify through simulations. We discover that shortest-path routing can lead to
utilization probabilities above one half for moderate to large portions of
hotspot source multi- and broadcast traffic, and consequently multicast
capacities of less than two simultaneous packet transmissions. We outline a
one-copy routing strategy that guarantees a multicast capacity of at least two
simultaneous packet transmissions for arbitrary hotspot source traffic.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2008 20:52:11 GMT"
}
] | 2013-11-04T00:00:00 | [
[
"der Heiden",
"Matthias an",
""
],
[
"Sortais",
"Michel",
""
],
[
"Scheutzow",
"Michael",
""
],
[
"Reisslein",
"Martin",
""
],
[
"Maier",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.