id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0804.1602
Akisato Kimura
Akisato Kimura and Tomohiko Uyematsu
Multiterminal source coding with complementary delivery
13 pages in double-column format, 1 figure, submitted to IEICE Transactions on Fundamentals
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A coding problem for correlated information sources is investigated. Messages emitted from two correlated sources are jointly encoded, and delivered to two decoders. Each decoder has access to one of the two messages to enable it to reproduce the other message. The rate-distortion function for the coding problem and its interesting properties are clarified.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 03:15:46 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2008 08:19:48 GMT" } ]
2008-04-11T00:00:00
[ [ "Kimura", "Akisato", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1607
Sundhar Ram Srinivasan
S. Sundhar Ram, V. V. Veeravalli, and A. Nedic
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a network of sensors deployed to sense a spatio-temporal field and estimate a parameter of interest. We are interested in the case where the temporal process sensed by each sensor can be modeled as a state-space process that is perturbed by random noise and parametrized by an unknown parameter. To estimate the unknown parameter from the measurements that the sensors sequentially collect, we propose a distributed and recursive estimation algorithm, which we refer to as the incremental recursive prediction error algorithm. This algorithm has the distributed property of incremental gradient algorithms and the on-line property of recursive prediction error algorithms. We study the convergence behavior of the algorithm and provide sufficient conditions for its convergence. Our convergence result is rather general and contains as special cases the known convergence results for the incremental versions of the least-mean square algorithm. Finally, we use the algorithm developed in this paper to identify the source of a gas-leak (diffusing source) in a closed warehouse and also report numerical simulations to verify convergence.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 03:47:05 GMT" }, { "version": "v2", "created": "Sat, 12 Apr 2008 14:45:10 GMT" } ]
2008-04-12T00:00:00
[ [ "Ram", "S. Sundhar", "" ], [ "Veeravalli", "V. V.", "" ], [ "Nedic", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0804.1617
Rui Zhang
Rui Zhang
Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with spectrum sharing cognitive radio networks, where a secondary user (SU) or cognitive radio link communicates simultaneously over the same frequency band with an existing primary user (PU) link. It is assumed that the SU transmitter has the perfect channel state information (CSI) on the fading channels from SU transmitter to both PU and SU receivers (as usually assumed in the literature), as well as the fading channel from PU transmitter to PU receiver (a new assumption). With the additional PU CSI, we study the optimal power control for the SU over different fading states to maximize the SU ergodic capacity subject to a new proposed constraint to protect the PU transmission, which limits the maximum ergodic capacity loss of the PU resulted from the SU transmission. It is shown that the proposed SU power-control policy is superior over the conventional policy under the constraint on the maximum tolerable interference power/interperferecne temperature at the PU receiver, in terms of the achievable ergodic capacities of both PU and SU.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 05:42:18 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2009 02:31:09 GMT" } ]
2009-02-17T00:00:00
[ [ "Zhang", "Rui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1649
David Sevilla
Jaime Gutierrez, David Sevilla
On decomposition of tame polynomials and rational functions
9 pages
Computer algebra in scientific computing, 219--226, Lecture Notes in Comput. Sci., 4194, Springer, Berlin, 2006. MR2279795 (2008d:12001)
null
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present algorithmic considerations and theoretical results about the relation between the orders of certain groups associated to the components of a polynomial and the order of the group that corresponds to the polynomial, proving it for arbitrary tame polynomials, and considering the case of rational functions.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 09:31:04 GMT" } ]
2008-05-15T00:00:00
[ [ "Gutierrez", "Jaime", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0804.1653
Mario Figueiredo
Andre Martins, Pedro Aguiar, Mario Figueiredo
Nonextensive Generalizations of the Jensen-Shannon Divergence
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convexity is a key concept in information theory, namely via the many implications of Jensen's inequality, such as the non-negativity of the Kullback-Leibler divergence (KLD). Jensen's inequality also underlies the concept of Jensen-Shannon divergence (JSD), which is a symmetrized and smoothed version of the KLD. This paper introduces new JSD-type divergences, by extending its two building blocks: convexity and Shannon's entropy. In particular, a new concept of q-convexity is introduced and shown to satisfy a Jensen's q-inequality. Based on this Jensen's q-inequality, the Jensen-Tsallis q-difference is built, which is a nonextensive generalization of the JSD, based on Tsallis entropies. Finally, the Jensen-Tsallis q-difference is charaterized in terms of convexity and extrema.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 09:48:56 GMT" } ]
2008-04-11T00:00:00
[ [ "Martins", "Andre", "" ], [ "Aguiar", "Pedro", "" ], [ "Figueiredo", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0804.1667
James Cheney
Christian Urban, James Cheney and Stefan Berghofer
Mechanizing the Metatheory of LF
Accepted to ACM Transactions on Computational Logic. Preprint.
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as proofs of correctness of decision procedures for LF's judgments. Although detailed informal proofs of these properties have been published, they have not been formally verified in a theorem prover. We have formalized these properties within Isabelle/HOL using the Nominal Datatype Package, closely following a recent article by Harper and Pfenning. In the process, we identified and resolved a gap in one of the proofs and a small number of minor lacunae in others. We also formally derive a version of the type checking algorithm from which Isabelle/HOL can generate executable code. Besides its intrinsic interest, our formalization provides a foundation for studying the adequacy of LF encodings, the correctness of Twelf-style metatheoretic reasoning, and the metatheory of extensions to LF.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 11:10:26 GMT" }, { "version": "v2", "created": "Fri, 23 Oct 2009 14:43:37 GMT" }, { "version": "v3", "created": "Mon, 3 May 2010 10:06:14 GMT" } ]
2010-05-04T00:00:00
[ [ "Urban", "Christian", "" ], [ "Cheney", "James", "" ], [ "Berghofer", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.1669
Sudhir R. Ghorpade
Sudhir R. Ghorpade, Arunkumar R. Patil and Harish K. Pillai
Subclose Families, Threshold Graphs, and the Weight Hierarchy of Grassmann and Schubert Codes
11 pages
Arithmetic, Geometry, Cryptography and Coding Theory, 87-99, Contemp. Math. 487, Amer. Math. Soc., Providence, RI, 2009.
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the problem of determining the complete weight hierarchy of linear error correcting codes associated to Grassmann varieties and, more generally, to Schubert varieties in Grassmannians. The problem is partially solved in the case of Grassmann codes, and one of the solutions uses the combinatorial notion of a closed family. We propose a generalization of this to what is called a subclose family. A number of properties of subclose families are proved, and its connection with the notion of threshold graphs and graphs with maximum sum of squares of vertex degrees is outlined.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 11:07:16 GMT" } ]
2009-11-06T00:00:00
[ [ "Ghorpade", "Sudhir R.", "" ], [ "Patil", "Arunkumar R.", "" ], [ "Pillai", "Harish K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1679
David Sevilla
Jaime Gutierrez, David Sevilla
Computation of unirational fields
28 pages
Computation of unirational fields. J. Symbolic Comput. 41 (2006), no. 11, 1222--1244. MR2267134 (2007g:12003)
null
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the main contributions which Volker Weispfenning made to mathematics is related to Groebner bases theory. In this paper we present an algorithm for computing all algebraic intermediate subfields in a separably generated unirational field extension (which in particular includes the zero characteristic case). One of the main tools is Groebner bases theory. Our algorithm also requires computing primitive elements and factoring over algebraic extensions. Moreover, the method can be extended to finitely generated K-algebras.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 11:59:15 GMT" } ]
2008-05-15T00:00:00
[ [ "Gutierrez", "Jaime", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0804.1687
David Sevilla
Jaime Gutierrez, David Sevilla
Building counterexamples to generalizations for rational functions of Ritt's decomposition theorem
17 pages
J. Algebra 303 (2006), no. 2, 655--667. MR2255128 (2007e:13032)
null
null
math.AC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical Ritt's Theorems state several properties of univariate polynomial decomposition. In this paper we present new counterexamples to Ritt's first theorem, which states the equality of length of decomposition chains of a polynomial, in the case of rational functions. Namely, we provide an explicit example of a rational function with coefficients in Q and two decompositions of different length. Another aspect is the use of some techniques that could allow for other counterexamples, namely, relating groups and decompositions and using the fact that the alternating group A_4 has two subgroup chains of different lengths; and we provide more information about the generalizations of another property of polynomial decomposition: the stability of the base field. We also present an algorithm for computing the fixing group of a rational function providing the complexity over Q.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 12:42:16 GMT" } ]
2008-05-15T00:00:00
[ [ "Gutierrez", "Jaime", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.1696
Freddy Munoz
Freddy Munoz (IRISA), Benoit Baudry (IRISA), Olivier Barais (IRISA)
A classification of invasive patterns in AOP
null
null
null
RR-6501
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aspect-Oriented Programming (AOP) improves modularity by encapsulating crosscutting concerns into aspects. Some mechanisms to compose aspects allow invasiveness as a mean to integrate concerns. Invasiveness means that AOP languages have unrestricted access to program properties. Such kind of languages are interesting because they allow performing complex operations and better introduce functionalities. In this report we present a classification of invasive patterns in AOP. This classification characterizes the aspects invasive behavior and allows developers to abstract about the aspect incidence over the program they crosscut.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 13:21:32 GMT" }, { "version": "v2", "created": "Thu, 24 Apr 2008 15:46:28 GMT" } ]
2009-04-20T00:00:00
[ [ "Munoz", "Freddy", "", "IRISA" ], [ "Baudry", "Benoit", "", "IRISA" ], [ "Barais", "Olivier", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0804.1697
Shrinivas Kudekar Mr.
Shrinivas Kudekar and Ruediger Urbanke
Lower Bounds on the Rate-Distortion Function of Individual LDGM Codes
6 Pages, 5 Figures. Submitted to the 5th International Symposium on Turbo Codes & Related Topics
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider lossy compression of a binary symmetric source by means of a low-density generator-matrix code. We derive two lower bounds on the rate distortion function which are valid for any low-density generator-matrix code with a given node degree distribution L(x) on the set of generators and for any encoding algorithm. These bounds show that, due to the sparseness of the code, the performance is strictly bounded away from the Shannon rate-distortion function. In this sense, our bounds represent a natural generalization of Gallager's bound on the maximum rate at which low-density parity-check codes can be used for reliable transmission. Our bounds are similar in spirit to the technique recently developed by Dimakis, Wainwright, and Ramchandran, but they apply to individual codes.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 13:12:12 GMT" } ]
2008-04-11T00:00:00
[ [ "Kudekar", "Shrinivas", "" ], [ "Urbanke", "Ruediger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1707
David Sevilla
Jaime Gutierrez, David Sevilla
Computation of unirational fields (extended abstract)
6 pages, 2 images (pictures of authors)
Proceedings of the 2005 Algorithmic Algebra and Logic (A3L), p. 129--134, BOD Norderstedt, Germany, 2005. ISBN 3-8334-2669-1
null
null
cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an algorithm for computing all algebraic intermediate subfields in a separably generated unirational field extension (which in particular includes the zero characteristic case). One of the main tools is Groebner bases theory. Our algorithm also requires computing computing primitive elements and factoring over algebraic extensions. Moreover, the method can be extended to finitely generated K-algebras.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 14:00:10 GMT" } ]
2008-05-15T00:00:00
[ [ "Gutierrez", "Jaime", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0804.1724
Sudipto Guha
Sudipto Guha and Kamesh Munagala and Saswati Sarkar
Information Acquisition and Exploitation in Multichannel Wireless Networks
29 pages
null
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by transmitting a control packet in it. Since probing all channels consumes significant energy and time, a user needs to determine what and how much information it needs to acquire about the instantaneous states of the available channels so that it can maximize its transmission rate. This motivates the study of the trade-off between the cost of information acquisition and its value towards improving the transmission rate. A simple model is presented for studying this information acquisition and exploitation trade-off when the channels are multi-state, with different distributions and information acquisition costs. The objective is to maximize a utility function which depends on both the cost and value of information. Solution techniques are presented for computing near-optimal policies with succinct representation in polynomial time. These policies provably achieve at least a fixed constant factor of the optimal utility on any problem instance, and in addition, have natural characterizations. The techniques are based on exploiting the structure of the optimal policy, and use of Lagrangean relaxations which simplify the space of approximately optimal solutions.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 14:53:30 GMT" } ]
2008-04-11T00:00:00
[ [ "Guha", "Sudipto", "" ], [ "Munagala", "Kamesh", "" ], [ "Sarkar", "Saswati", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.1728
Maciej Dziemianczuk
A. K. Kwasniewski, M. Dziemianczuk
On cobweb posets most relevant codings
26 pages, 15 figures, Presented at Gian-Carlo Polish Seminar: http://ii.uwb.edu.pl/akk/sem/sem_rota.htm
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One considers here orderable acyclic digraphs named KoDAGs which represent the outmost general chains of dibicliques denoting thus the outmost general chains of binary relations. Because of this fact KoDAGs start to become an outstanding concept of nowadays investigation. We propose here examples of codings of KoDAGs looked upon as infinite hyper-boxes as well as chains of rectangular hyper-boxes in N^\infty. Neither of KoDAGs codings considered here is a poset isomorphism with Pi = <P, \leq>. Nevertheless every example of coding supplies a new view on possible investigation of KoDAGs properties. The codes proposed here down are by now recognized as most relevant codes for practical purposes including visualization. More than that. Employing quite arbitrary sequences F=\{n_F\}_{n\geq 0} infinitely many new representations of natural numbers called base of F number system representations are introduced. These constitute mixed radix-type numeral systems. F base nonstandard positional numeral systems in which the numerical base varies from position to position have picturesque interpretation due to KoDAGs graphs and their correspondent posets which in turn are endowed on their own with combinatorial interpretation of uniquely assigned to KoDAGs F-nomial coefficients. The base of F number systems are used for KoDAGs coding and are interpreted as chain coordinatization in KoDAGs pictures as well as systems of infinite number of boxes sequences of F-varying containers capacity of subsequent boxes. Needless to say how crucial is this base of F number system for KoDAGs hence consequently for arbitrary chains of binary relations. New F based numeral systems are umbral base of F number systems in a sense to be explained in what follows.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 15:09:26 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2009 18:05:33 GMT" } ]
2009-02-27T00:00:00
[ [ "Kwasniewski", "A. K.", "" ], [ "Dziemianczuk", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.1729
Roberto Amadio
Roberto Amadio (PPS), Mehdi Dogguy (PPS)
On affine usages in signal-based communication
null
Programming Languages and Systems, 6th Asian Symposium, APLAS 2008, France (2008)
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a type system for a synchronous pi-calculus formalising the notion of affine usage in signal-based communication. In particular, we identify a limited number of usages that preserve affinity and that can be composed. As a main application of the resulting system, we show that typable programs are deterministic.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 15:16:06 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2008 10:06:36 GMT" }, { "version": "v3", "created": "Wed, 3 Sep 2008 11:13:12 GMT" } ]
2010-07-01T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Dogguy", "Mehdi", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.1740
Carl Bracken
Carl Bracken
Pseudo Quasi-3 Designs and their Applications to Coding Theory
9 pages, submitted to the European Journal of Comniatorics
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a pseudo quasi-3 design as a symmetric design with the property that the derived and residual designs with respect to at least one block are quasi-symmetric. Quasi-symmetric designs can be used to construct optimal self complementary codes. In this article we give a construction of an infinite family of pseudo quasi-3 designs whose residual designs allow us to construct a family of codes with a new parameter set that meet the Grey Rankin bound.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 15:57:38 GMT" } ]
2008-04-11T00:00:00
[ [ "Bracken", "Carl", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1748
Giuseppe Durisi
Giuseppe Durisi, Ulrich G. Schuster, Helmut B\"olcskei, Shlomo Shamai (Shitz)
Noncoherent Capacity of Underspread Fading Channels
Submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2034807
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive bounds on the noncoherent capacity of wide-sense stationary uncorrelated scattering (WSSUS) channels that are selective both in time and frequency, and are underspread, i.e., the product of the channel's delay spread and Doppler spread is small. For input signals that are peak constrained in time and frequency, we obtain upper and lower bounds on capacity that are explicit in the channel's scattering function, are accurate for a large range of bandwidth and allow to coarsely identify the capacity-optimal bandwidth as a function of the peak power and the channel's scattering function. We also obtain a closed-form expression for the first-order Taylor series expansion of capacity in the limit of large bandwidth, and show that our bounds are tight in the wideband regime. For input signals that are peak constrained in time only (and, hence, allowed to be peaky in frequency), we provide upper and lower bounds on the infinite-bandwidth capacity and find cases when the bounds coincide and the infinite-bandwidth capacity is characterized exactly. Our lower bound is closely related to a result by Viterbi (1967). The analysis in this paper is based on a discrete-time discrete-frequency approximation of WSSUS time- and frequency-selective channels. This discretization explicitly takes into account the underspread property, which is satisfied by virtually all wireless communication channels.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 16:34:47 GMT" } ]
2016-11-15T00:00:00
[ [ "Durisi", "Giuseppe", "", "Shitz" ], [ "Schuster", "Ulrich G.", "", "Shitz" ], [ "Bölcskei", "Helmut", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1758
Michel Grabisch
Dieter Denneberg, Michel Grabisch (LIP6)
Measure and integral with purely ordinal scales
null
Journal of Mathematical Psychology 48 (2004) 15-27
null
null
cs.DM math.PR math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a purely ordinal model for aggregation functionals for lattice valued functions, comprising as special cases quantiles, the Ky Fan metric and the Sugeno integral. For modeling findings of psychological experiments like the reflection effect in decision behaviour under risk or uncertainty, we introduce reflection lattices. These are complete linear lattices endowed with an order reversing bijection like the reflection at 0 on the real interval $[-1,1]$. Mathematically we investigate the lattice of non-void intervals in a complete linear lattice, then the class of monotone interval-valued functions and their inner product.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 16:59:59 GMT" } ]
2008-12-18T00:00:00
[ [ "Denneberg", "Dieter", "", "LIP6" ], [ "Grabisch", "Michel", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0804.1760
Michel Grabisch
Michel Grabisch (LIP6)
The Symmetric Sugeno Integral
null
Fuzzy Sets and Systems 139 (2003) 473-490
null
null
cs.DM math.PR math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an extension of the Sugeno integral for negative numbers, in the spirit of the symmetric extension of Choquet integral, also called \Sipos\ integral. Our framework is purely ordinal, since the Sugeno integral has its interest when the underlying structure is ordinal. We begin by defining negative numbers on a linearly ordered set, and we endow this new structure with a suitable algebra, very close to the ring of real numbers. In a second step, we introduce the M\"obius transform on this new structure. Lastly, we define the symmetric Sugeno integral, and show its similarity with the symmetric Choquet integral.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 17:00:36 GMT" } ]
2008-12-18T00:00:00
[ [ "Grabisch", "Michel", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0804.1762
Michel Grabisch
Christophe Labreuche (TRT), Michel Grabisch (LIP6)
The Choquet integral for the aggregation of interval scales in multicriteria decision making
null
Fuzzy Sets and Systems 137 (2003) 11-26
null
null
cs.DM cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the question of which models fit with information concerning the preferences of the decision maker over each attribute, and his preferences about aggregation of criteria (interacting criteria). We show that the conditions induced by these information plus some intuitive conditions lead to a unique possible aggregation operator: the Choquet integral.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 17:01:11 GMT" } ]
2008-12-18T00:00:00
[ [ "Labreuche", "Christophe", "", "TRT" ], [ "Grabisch", "Michel", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0804.1777
Dariusz Dereniowski
Dariusz Dereniowski
Phutball is PSPACE-hard
13 pages, 7 figures
Theoretical Computer Science 411 (2010) 3971-3978
10.1016/j.tcs.2010.08.019
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the $n\times n$ game of Phutball. It is shown that, given an arbitrary position of stones on the board, it is a PSPACE-hard problem to determine whether the specified player can win the game, regardless of the opponent's choices made during the game.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 18:22:47 GMT" }, { "version": "v2", "created": "Fri, 20 Mar 2009 19:27:23 GMT" } ]
2021-03-05T00:00:00
[ [ "Dereniowski", "Dariusz", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.1788
David Sevilla
Domingo Gomez-Perez, Jaime Gutierrez, Alvar Ibeas, David Sevilla
Prediciendo el generador cuadratico (in Spanish)
11 pages, in Spanish
Proceedings of the VIII Reunion Espanola sobre Criptologia y Seguridad de la Informacion (RECSI), p. 185-195, Diaz de Santos, 2004. ISBN 84-7978-650-7
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let p be a prime and a, c be integers such that a<>0 mod p. The quadratic generator is a sequence (u_n) of pseudorandom numbers defined by u_{n+1}=a*(u_n)^2+c mod p. In this article we probe that if we know sufficiently many of the most significant bits of two consecutive values u_n, u_{n+1}, then we can compute the seed u_0 except for a small number of exceptional values. ----- Sean p un primo, a y c enteros tales que a<>0 mod p. El generador cuadratico es una sucesion (u_n) de numeros pseudoaleatorios definidos por la relacion u_{n+1}=a*(u_n)^2+c mod p. En este trabajo demostramos que si conocemos un numero suficientemente grande de los bits mas significativos para dos valores consecutivos u_n, u_{n+1}, entonces podemos descubrir en tiempo polinomial la semilla u_0, excepto para un conjunto pequeno de valores excepcionales.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 19:59:29 GMT" } ]
2008-04-11T00:00:00
[ [ "Gomez-Perez", "Domingo", "" ], [ "Gutierrez", "Jaime", "" ], [ "Ibeas", "Alvar", "" ], [ "Sevilla", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0804.1811
K. Raj Kumar
K. Raj Kumar and Giuseppe Caire
Space-Time Codes from Structured Lattices
25 pages, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present constructions of Space-Time (ST) codes based on lattice coset coding. First, we focus on ST code constructions for the short block-length case, i.e., when the block-length is equal to or slightly larger than the number of transmit antennas. We present constructions based on dense lattice packings and nested lattice (Voronoi) shaping. Our codes achieve the optimal diversity-multiplexing tradeoff of quasi-static MIMO fading channels for any fading statistics, and perform very well also at practical, moderate values of signal to noise ratios (SNR). Then, we extend the construction to the case of large block lengths, by using trellis coset coding. We provide constructions of trellis coded modulation (TCM) schemes that are endowed with good packing and shaping properties. Both short-block and trellis constructions allow for a reduced complexity decoding algorithm based on minimum mean squared error generalized decision feedback equalizer (MMSE-GDFE) lattice decoding and a combination of this with a Viterbi TCM decoder for the TCM case. Beyond the interesting algebraic structure, we exhibit codes whose performance is among the state-of-the art considering codes with similar encoding/decoding complexity.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 21:43:49 GMT" } ]
2008-04-14T00:00:00
[ [ "Kumar", "K. Raj", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1839
Alyson Fletcher
Alyson K. Fletcher, Sundeep Rangan, and Vivek K. Goyal
Necessary and Sufficient Conditions on Sparsity Pattern Recovery
Submitted to IEEE Transactions on Information Theory
IEEE Trans. on Information Theory, vol. 55, no. 12, pp. 5758-5772, December 2009
10.1109/TIT.2009.2032726
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of detecting the sparsity pattern of a k-sparse vector in R^n from m random noisy measurements is of interest in many areas such as system identification, denoising, pattern recognition, and compressed sensing. This paper addresses the scaling of the number of measurements m, with signal dimension n and sparsity-level nonzeros k, for asymptotically-reliable detection. We show a necessary condition for perfect recovery at any given SNR for all algorithms, regardless of complexity, is m = Omega(k log(n-k)) measurements. Conversely, it is shown that this scaling of Omega(k log(n-k)) measurements is sufficient for a remarkably simple ``maximum correlation'' estimator. Hence this scaling is optimal and does not require more sophisticated techniques such as lasso or matching pursuit. The constants for both the necessary and sufficient conditions are precisely defined in terms of the minimum-to-average ratio of the nonzero components and the SNR. The necessary condition improves upon previous results for maximum likelihood estimation. For lasso, it also provides a necessary condition at any SNR and for low SNR improves upon previous work. The sufficient condition provides the first asymptotically-reliable detection guarantee at finite SNR.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 07:16:32 GMT" } ]
2010-09-03T00:00:00
[ [ "Fletcher", "Alyson K.", "" ], [ "Rangan", "Sundeep", "" ], [ "Goyal", "Vivek K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1840
Sudhir Singh
Aditya Ramamoorthy, Vwani Roychowdhury, Sudhir Kumar Singh
Selfish Distributed Compression over Networks: Correlation Induces Anarchy
replaced with revised version, 32 pages, 2 figures
null
null
null
cs.GT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the min-cost multicast problem (under network coding) with multiple correlated sources where each terminal wants to losslessly reconstruct all the sources. We study the inefficiency brought forth by the selfish behavior of the terminals in this scenario by modeling it as a noncooperative game among the terminals. The degradation in performance due to the lack of regulation is measured by the {\it Price of Anarchy} (POA), which is defined as the ratio between the cost of the worst possible \textit{Wardrop equilibrium} and the socially optimum cost. Our main result is that in contrast with the case of independent sources, the presence of source correlations can significantly increase the price of anarchy. Towards establishing this result, we first characterize the socially optimal flow and rate allocation in terms of four intuitive conditions. Next, we show that the Wardrop equilibrium is a socially optimal solution for a different set of (related) cost functions. Using this, we construct explicit examples that demonstrate that the POA $> 1$ and determine near-tight upper bounds on the POA as well. The main techniques in our analysis are Lagrangian duality theory and the usage of the supermodularity of conditional entropy.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 07:22:39 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2009 21:23:31 GMT" } ]
2009-03-01T00:00:00
[ [ "Ramamoorthy", "Aditya", "" ], [ "Roychowdhury", "Vwani", "" ], [ "Singh", "Sudhir Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.1845
Ely Porat
Ely Porat
An Optimal Bloom Filter Replacement Based on Matrix Solving
A lectureon this paper will be available in Google video
null
null
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We suggest a method for holding a dictionary data structure, which maps keys to values, in the spirit of Bloom Filters. The space requirements of the dictionary we suggest are much smaller than those of a hashtable. We allow storing n keys, each mapped to value which is a string of k bits. Our suggested method requires nk + o(n) bits space to store the dictionary, and O(n) time to produce the data structure, and allows answering a membership query in O(1) memory probes. The dictionary size does not depend on the size of the keys. However, reducing the space requirements of the data structure comes at a certain cost. Our dictionary has a small probability of a one sided error. When attempting to obtain the value for a key that is stored in the dictionary we always get the correct answer. However, when testing for membership of an element that is not stored in the dictionary, we may get an incorrect answer, and when requesting the value of such an element we may get a certain random value. Our method is based on solving equations in GF(2^k) and using several hash functions. Another significant advantage of our suggested method is that we do not require using sophisticated hash functions. We only require pairwise independent hash functions. We also suggest a data structure that requires only nk bits space, has O(n2) preprocessing time, and has a O(log n) query time. However, this data structures requires a uniform hash functions. In order replace a Bloom Filter of n elements with an error proability of 2^{-k}, we require nk + o(n) memory bits, O(1) query time, O(n) preprocessing time, and only pairwise independent hash function. Even the most advanced previously known Bloom Filter would require nk+O(n) space, and a uniform hash functions, so our method is significantly less space consuming especially when k is small.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 11:24:04 GMT" } ]
2008-04-14T00:00:00
[ [ "Porat", "Ely", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0804.1879
Robin Adams
Robin Adams
Lambda-Free Logical Frameworks
v2: Mistakes were found in several proofs in v1. Several results have been weakened. v3: Minor mistakes corrected and line lengths fixed. This version submitted to APAL
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the definition of the logical framework TF, the Type Framework. TF is a lambda-free logical framework; it does not include lambda-abstraction or product kinds. We give formal proofs of several results in the metatheory of TF, and show how it can be conservatively embedded in the logical framework LF: its judgements can be seen as the judgements of LF that are in beta-normal, eta-long normal form. We show how several properties, such as adequacy theorems for object theories and the injectivity of constants, can be proven more easily in TF, and then `lifted' to LF.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 11:32:51 GMT" }, { "version": "v2", "created": "Tue, 18 Nov 2008 15:55:56 GMT" } ]
2008-11-18T00:00:00
[ [ "Adams", "Robin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.1888
Latorre
Frank Verstraete, J. Ignacio Cirac, Jose I. Latorre
Quantum circuits for strongly correlated quantum systems
null
null
10.1103/PhysRevA.79.032316
null
quant-ph cond-mat.str-el cs.DS hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, we have witnessed an explosion of experimental tools by which quantum systems can be manipulated in a controlled and coherent way. One of the most important goals now is to build quantum simulators, which would open up the possibility of exciting experiments probing various theories in regimes that are not achievable under normal lab circumstances. Here we present a novel approach to gain detailed control on the quantum simulation of strongly correlated quantum many-body systems by constructing the explicit quantum circuits that diagonalize their dynamics. We show that the exact quantum circuits underlying some of the most relevant many-body Hamiltonians only need a finite amount of local gates. As a particularly simple instance, the full dynamics of a one-dimensional Quantum Ising model in a transverse field with four spins is shown to be reproduced using a quantum circuit of only six local gates. This opens up the possibility of experimentally producing strongly correlated states, their time evolution at zero time and even thermal superpositions at zero temperature. Our method also allows to uncover the exact circuits corresponding to models that exhibit topological order and to stabilizer states.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 12:52:44 GMT" } ]
2009-11-13T00:00:00
[ [ "Verstraete", "Frank", "" ], [ "Cirac", "J. Ignacio", "" ], [ "Latorre", "Jose I.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.str-el", "description": "Quantum magnetism, non-Fermi liquids, spin liquids, quantum criticality, charge density waves, metal-insulator transitions", "span": "(Strongly Correlated Electrons)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" } ]
0804.1893
Tobias Kretz
Tobias Kretz and Michael Schreckenberg
The F.A.S.T.-Model
Extended version of proceedings contriution
Cellular Automata -- 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, pages 712--715, Springer 2006, Proceedings
10.1007/11861201_85
null
cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A discrete model of pedestrian motion is presented that is implemented in the Floor field- and Agentbased Simulation Tool (F.A.S.T.) which has already been applicated to a variety of real life scenarios.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 13:33:42 GMT" } ]
2008-08-19T00:00:00
[ [ "Kretz", "Tobias", "" ], [ "Schreckenberg", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0804.1894
Marcello Caleffi
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura
A Reliability-based Framework for Multi-path Routing Analysis in Mobile Ad-Hoc Networks
To appear on IJCNDS: International Journal of Communication Networks and Distributed Systems
International Journal of Communication Networks and Distributed Systems, Vol.1 No.4/5/6, 2008
10.1504/IJCNDS.2008.021079
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unlike traditional routing procedures that, at the best, single out a unique route, multi-path routing protocols discover proactively several alternative routes. It has been recognized that multi-path routing can be more efficient than traditional one mainly for mobile ad hoc networks, where route failure events are frequent. Most studies in the area of multi-path routing focus on heuristic methods, and the performances of these strategies are commonly evaluated by numerical simulations. The need of a theoretical analysis motivates such a paper, which proposes to resort to the terminal-pair routing reliability as performance metric. This metric allows one to assess the performance gain due to the availability of route diversity. By resorting to graph theory, we propose an analytical framework to evaluate the tolerance of multi-path route discovery processes against route failures for mobile ad hoc networks. Moreover, we derive a useful bound to easily estimate the performance improvements achieved by multi-path routing with respect to any traditional routing protocol. Finally, numerical simulation results show the effectiveness of this performance analysis.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 13:37:49 GMT" } ]
2020-05-12T00:00:00
[ [ "Caleffi", "Marcello", "" ], [ "Ferraiuolo", "Giancarlo", "" ], [ "Paura", "Luigi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.1921
Michel Grabisch
Michel Grabisch (LIP6), Christophe Labreuche (TRT), Jean-Claude Vansnick
On the Extension of Pseudo-Boolean Functions for the Aggregation of Interacting Criteria
null
European Journal of Operational Research (2003) 28-47
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents an analysis on the use of integrals defined for non-additive measures (or capacities) as the Choquet and the \Sipos{} integral, and the multilinear model, all seen as extensions of pseudo-Boolean functions, and used as a means to model interaction between criteria in a multicriteria decision making problem. The emphasis is put on the use, besides classical comparative information, of information about difference of attractiveness between acts, and on the existence, for each point of view, of a ``neutral level'', allowing to introduce the absolute notion of attractive or repulsive act. It is shown that in this case, the Sipos integral is a suitable solution, although not unique. Properties of the Sipos integral as a new way of aggregating criteria are shown, with emphasis on the interaction among criteria.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 15:49:45 GMT" } ]
2008-12-18T00:00:00
[ [ "Grabisch", "Michel", "", "LIP6" ], [ "Labreuche", "Christophe", "", "TRT" ], [ "Vansnick", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.1928
Pietro Michiardi Dr.
Chi-Anh La, Pietro Michiardi
Characterizing User Mobility in Second Life
null
null
null
rr08212
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using a crawler that we built. Tempted by the question whether our methodology could provide similar results to those obtained in real-world experiments, we study the statistical distribution of user contacts and show that from a qualitative point of view user mobility in Second Life presents similar traits to those of real humans. We further push our analysis to line of sight networks that emerge from user interaction and show that they are highly clustered. Lastly, we focus on the spatial properties of user movements and observe that users in Second Life revolve around several point of interests traveling in general short distances. Besides our findings, the traces collected in this work can be very useful for trace-driven simulations of communication schemes in delay tolerant networks and their performance evaluation.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 16:32:44 GMT" }, { "version": "v2", "created": "Sat, 12 Apr 2008 00:12:03 GMT" } ]
2009-09-29T00:00:00
[ [ "La", "Chi-Anh", "" ], [ "Michiardi", "Pietro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0804.1932
Martin Grohe
Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, Marc Thurley
A complexity dichotomy for partition functions with mixed signs
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Partition functions, also known as homomorphism functions, form a rich family of graph invariants that contain combinatorial invariants such as the number of k-colourings or the number of independent sets of a graph and also the partition functions of certain "spin glass" models of statistical physics such as the Ising model. Building on earlier work by Dyer, Greenhill and Bulatov, Grohe, we completely classify the computational complexity of partition functions. Our main result is a dichotomy theorem stating that every partition function is either computable in polynomial time or #P-complete. Partition functions are described by symmetric matrices with real entries, and we prove that it is decidable in polynomial time in terms of the matrix whether a given partition function is in polynomial time or #P-complete. While in general it is very complicated to give an explicit algebraic or combinatorial description of the tractable cases, for partition functions described by a Hadamard matrices -- these turn out to be central in our proofs -- we obtain a simple algebraic tractability criterion, which says that the tractable cases are those "representable" by a quadratic polynomial over the field GF(2).
[ { "version": "v1", "created": "Fri, 11 Apr 2008 18:36:01 GMT" }, { "version": "v2", "created": "Thu, 10 Jul 2008 15:24:13 GMT" }, { "version": "v3", "created": "Tue, 5 May 2009 16:47:49 GMT" } ]
2009-05-05T00:00:00
[ [ "Goldberg", "Leslie Ann", "" ], [ "Grohe", "Martin", "" ], [ "Jerrum", "Mark", "" ], [ "Thurley", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.1970
Srikanth Chava
Srikanth Chava
A Security Protocol for Multi-User Authentication
6 pages, 3 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we propose an encryption communication protocol which also provides database security. For the encryption of the data communication we use a transformation similar to the Cubic Public-key transformation. This method represents a many-to-one mapping which increases the complexity for any brute force attack. Some interesting properties of the transformation are also included which are basic in the authentication protocol.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 21:57:01 GMT" } ]
2008-04-15T00:00:00
[ [ "Chava", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0804.1974
Nitin Saxena
G\'abor Ivanyos, Marek Karpinski, Nitin Saxena
Schemes for Deterministic Polynomial Factoring
14 pages, preliminary version
null
null
null
cs.CC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects we call m-schemes. We extend the known conditional deterministic subexponential time polynomial factoring algorithm for finite fields to get an underlying m-scheme. We demonstrate how the properties of m-schemes relate to improvements in the deterministic complexity of factoring polynomials over finite fields assuming the generalized Riemann Hypothesis (GRH). In particular, we give the first deterministic polynomial time algorithm (assuming GRH) to find a nontrivial factor of a polynomial of prime degree n where (n-1) is a smooth number.
[ { "version": "v1", "created": "Fri, 11 Apr 2008 23:04:17 GMT" } ]
2008-04-15T00:00:00
[ [ "Ivanyos", "Gábor", "" ], [ "Karpinski", "Marek", "" ], [ "Saxena", "Nitin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.1982
Li Chen
Li Chen, Yongwu Rong
Linear Time Recognition Algorithms for Topological Invariants in 3D
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design linear time algorithms to recognize and determine topological invariants such as the genus and homology groups in 3D. These properties can be used to identify patterns in 3D image recognition. This has tremendous amount of applications in 3D medical image analysis. Our method is based on cubical images with direct adjacency, also called (6,26)-connectivity images in discrete geometry. According to the fact that there are only six types of local surface points in 3D and a discrete version of the well-known Gauss-Bonnett Theorem in differential geometry, we first determine the genus of a closed 2D-connected component (a closed digital surface). Then, we use Alexander duality to obtain the homology groups of a 3D object in 3D space.
[ { "version": "v1", "created": "Sat, 12 Apr 2008 03:13:33 GMT" }, { "version": "v2", "created": "Mon, 4 Aug 2008 05:06:51 GMT" } ]
2008-08-04T00:00:00
[ [ "Chen", "Li", "" ], [ "Rong", "Yongwu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0804.2032
Frederic Dorn Harald
Paul Bonsma and Frederic Dorn
Tight Bounds and Faster Algorithms for Directed Max-Leaf Problems
17 pages, 6 figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An out-tree $T$ of a directed graph $D$ is a rooted tree subgraph with all arcs directed outwards from the root. An out-branching is a spanning out-tree. By $l(D)$ and $l_s(D)$ we denote the maximum number of leaves over all out-trees and out-branchings of $D$, respectively. We give fixed parameter tractable algorithms for deciding whether $l_s(D)\geq k$ and whether $l(D)\geq k$ for a digraph $D$ on $n$ vertices, both with time complexity $2^{O(k\log k)} \cdot n^{O(1)}$. This improves on previous algorithms with complexity $2^{O(k^3\log k)} \cdot n^{O(1)}$ and $2^{O(k\log^2 k)} \cdot n^{O(1)}$, respectively. To obtain the complexity bound in the case of out-branchings, we prove that when all arcs of $D$ are part of at least one out-branching, $l_s(D)\geq l(D)/3$. The second bound we prove in this paper states that for strongly connected digraphs $D$ with minimum in-degree 3, $l_s(D)\geq \Theta(\sqrt{n})$, where previously $l_s(D)\geq \Theta(\sqrt[3]{n})$ was the best known bound. This bound is tight, and also holds for the larger class of digraphs with minimum in-degree 3 in which every arc is part of at least one out-branching.
[ { "version": "v1", "created": "Sat, 12 Apr 2008 20:50:59 GMT" } ]
2008-12-18T00:00:00
[ [ "Bonsma", "Paul", "" ], [ "Dorn", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.2035
Serban Vlad E.
Serban E. Vlad
The non-anticipation of the asynchronous systems
the 6-th Congress of the Romanian mathematicians, Bucharest, June 28 - July 4, 2007
null
null
null
cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering and non-anticipation is one of the most important properties in systems theory. Our present purpose is to introduce several concepts of non-anticipation of the asynchronous systems.
[ { "version": "v1", "created": "Sat, 12 Apr 2008 23:58:30 GMT" } ]
2008-12-18T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0804.2036
Andrew Adamatzky
Andrew Adamatzky
Towards Physarum robots: computing and manipulating on water surface
Submitted to Int J Intelligent and Robotic Systems, February 2008
Journal of Bionic Engineering Volume 5, Issue 4, December 2008, Pages 348-357
10.1016/S1672-6529(08)60180-8
null
cs.RO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plasmodium of Physarym polycephalum is an ideal biological substrate for implementing concurrent and parallel computation, including combinatorial geometry and optimization on graphs. We report results of scoping experiments on Physarum computing in conditions of minimal friction, on the water surface. We show that plasmodium of Physarum is capable for computing a basic spanning trees and manipulating of light-weight objects. We speculate that our results pave the pathways towards design and implementation of amorphous biological robots.
[ { "version": "v1", "created": "Sun, 13 Apr 2008 00:42:28 GMT" } ]
2010-11-23T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0804.2037
Serban Vlad E.
Serban E. Vlad
Some properties of the regular asynchronous systems
International Conference on Computers, Communications & Control 2008, May 15-17, Baile Felix, Romania
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering. An asynchronous system f is a multi-valued function that assigns to each admissible input u a set f(u) of possible states x in f(u). A special case of asynchronous system consists in the existence of a Boolean function \Upsilon such that for any u and any x in f(u), a certain equation involving \Upsilon is fulfilled. Then \Upsilon is called the generator function of f (Moisil used the terminology of network function) and we say that f is generated by \Upsilon. The systems that have a generator function are called regular. Our purpose is to continue the study of the generation of the asynchronous systems that was started in [2], [3].
[ { "version": "v1", "created": "Sun, 13 Apr 2008 01:11:43 GMT" } ]
2008-12-18T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0804.2043
Tingrong Lu
Tingrong Lu
Analytical correlation of routing table length index and routing path length index in hierarchical routing model
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Kleinrock and Kamoun's paper, the inverse relation of routing table length index and routing path length index in hierarchical routing model is illustrated. In this paper we give the analytical correlation of routing table length index and routing path length index in hierarchical routing model.
[ { "version": "v1", "created": "Sun, 13 Apr 2008 06:04:26 GMT" } ]
2008-04-15T00:00:00
[ [ "Lu", "Tingrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.2057
Jos\'e R. P\'erez-Ag\"uera Phd.
Jos\'e R. P\'erez-Ag\"uera and Lourdes Araujo
Comparing and Combining Methods for Automatic Query Expansion
12 pages
Advances in Natural Language Processing and Applications. Research in Computing Science 33, 2008, pp. 177-188
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Query expansion is a well known method to improve the performance of information retrieval systems. In this work we have tested different approaches to extract the candidate query terms from the top ranked documents returned by the first-pass retrieval. One of them is the cooccurrence approach, based on measures of cooccurrence of the candidate and the query terms in the retrieved documents. The other one, the probabilistic approach, is based on the probability distribution of terms in the collection and in the top ranked set. We compare the retrieval improvement achieved by expanding the query with terms obtained with different methods belonging to both approaches. Besides, we have developed a na\"ive combination of both kinds of method, with which we have obtained results that improve those obtained with any of them separately. This result confirms that the information provided by each approach is of a different nature and, therefore, can be used in a combined manner.
[ { "version": "v1", "created": "Sun, 13 Apr 2008 11:38:28 GMT" } ]
2008-12-18T00:00:00
[ [ "Pérez-Agüera", "José R.", "" ], [ "Araujo", "Lourdes", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0804.2058
Zhang Shengli
Zhang Shengli, Soung chang Liew and Lu Lu
Physical Layer Network Coding Over Finite And Infinite Fields
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Direct application of network coding at the physical layer - physical layer network coding (PNC) - is a promising technique for two-way relay wireless networks. In a two-way relay network, relay nodes are used to relay two-way information flows between pairs of end nodes. This paper proposes a precise definition for PNC. Specifically, in PNC, a relay node does not decode the source information from the two ends separately, but rather directly maps the combined signals received simultaneously to a signal to be relayed. Based on this definition, PNC can be further sub-classed into two categories - PNCF (PNC over finite field) and PNCI (PNC over infinite field) - according to whether the network-code field (or groups, rings) adopted is finite or infinite. For each of PNCF and PNCI, we consider two specific estimation techniques for dealing with noise in the mapping process. The performance of the four schemes is investigated by means of analysis and simulation, assuming symbol-level synchronization only.
[ { "version": "v1", "created": "Sun, 13 Apr 2008 11:43:24 GMT" } ]
2008-04-15T00:00:00
[ [ "Shengli", "Zhang", "" ], [ "Liew", "Soung chang", "" ], [ "Lu", "Lu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.2095
Paul Tarau
Paul Tarau and Brenda Luderman
A Logic Programming Framework for Combinational Circuit Synthesis
null
23rd International Conference on Logic Programming (ICLP), LNCS 4670, 2007, pages 180-194
null
null
cs.LO cs.CE cs.DM cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic Programming languages and combinational circuit synthesis tools share a common "combinatorial search over logic formulae" background. This paper attempts to reconnect the two fields with a fresh look at Prolog encodings for the combinatorial objects involved in circuit synthesis. While benefiting from Prolog's fast unification algorithm and built-in backtracking mechanism, efficiency of our search algorithm is ensured by using parallel bitstring operations together with logic variable equality propagation, as a mapping mechanism from primary inputs to the leaves of candidate Leaf-DAGs implementing a combinational circuit specification. After an exhaustive expressiveness comparison of various minimal libraries, a surprising first-runner, Strict Boolean Inequality "<" together with constant function "1" also turns out to have small transistor-count implementations, competitive to NAND-only or NOR-only libraries. As a practical outcome, a more realistic circuit synthesizer is implemented that combines rewriting-based simplification of (<,1) circuits with exhaustive Leaf-DAG circuit search. Keywords: logic programming and circuit design, combinatorial object generation, exact combinational circuit synthesis, universal boolean logic libraries, symbolic rewriting, minimal transistor-count circuit synthesis
[ { "version": "v1", "created": "Mon, 14 Apr 2008 02:40:31 GMT" } ]
2008-12-18T00:00:00
[ [ "Tarau", "Paul", "" ], [ "Luderman", "Brenda", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0804.2097
Tim Roughgarden
Jason D. Hartline and Tim Roughgarden
Optimal Mechansim Design and Money Burning
23 pages, 1 figure
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mechanism design is now a standard tool in computer science for aligning the incentives of self-interested agents with the objectives of a system designer. There is, however, a fundamental disconnect between the traditional application domains of mechanism design (such as auctions) and those arising in computer science (such as networks): while monetary transfers (i.e., payments) are essential for most of the known positive results in mechanism design, they are undesirable or even technologically infeasible in many computer systems. Classical impossibility results imply that the reach of mechanisms without transfers is severely limited. Computer systems typically do have the ability to reduce service quality--routing systems can drop or delay traffic, scheduling protocols can delay the release of jobs, and computational payment schemes can require computational payments from users (e.g., in spam-fighting systems). Service degradation is tantamount to requiring that users burn money}, and such ``payments'' can be used to influence the preferences of the agents at a cost of degrading the social surplus. We develop a framework for the design and analysis of money-burning mechanisms to maximize the residual surplus--the total value of the chosen outcome minus the payments required.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 04:32:45 GMT" } ]
2008-04-15T00:00:00
[ [ "Hartline", "Jason D.", "" ], [ "Roughgarden", "Tim", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0804.2112
Shai Gutner
Yossi Azar, Iftah Gamzu and Shai Gutner
Truthful Unsplittable Flow for Large Capacity Networks
null
Proc. of 19th SPAA (2007), 320-329
null
null
cs.DS cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we focus our attention on the large capacities unsplittable flow problem in a game theoretic setting. In this setting, there are selfish agents, which control some of the requests characteristics, and may be dishonest about them. It is worth noting that in game theoretic settings many standard techniques, such as randomized rounding, violate certain monotonicity properties, which are imperative for truthfulness, and therefore cannot be employed. In light of this state of affairs, we design a monotone deterministic algorithm, which is based on a primal-dual machinery, which attains an approximation ratio of $\frac{e}{e-1}$, up to a disparity of $\epsilon$ away. This implies an improvement on the current best truthful mechanism, as well as an improvement on the current best combinatorial algorithm for the problem under consideration. Surprisingly, we demonstrate that any algorithm in the family of reasonable iterative path minimizing algorithms, cannot yield a better approximation ratio. Consequently, it follows that in order to achieve a monotone PTAS, if exists, one would have to exert different techniques. We also consider the large capacities \textit{single-minded multi-unit combinatorial auction problem}. This problem is closely related to the unsplittable flow problem since one can formulate it as a special case of the integer linear program of the unsplittable flow problem. Accordingly, we obtain a comparable performance guarantee by refining the algorithm suggested for the unsplittable flow problem.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 08:03:30 GMT" } ]
2008-12-18T00:00:00
[ [ "Azar", "Yossi", "" ], [ "Gamzu", "Iftah", "" ], [ "Gutner", "Shai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0804.2138
Alexey Koloydenko
J. Lember, A. Koloydenko
A constructive proof of the existence of Viterbi processes
Submitted to the IEEE Transactions on Information Theory, focuses on the proofs of the results presented in arXiv:0709.2317, and arXiv:0803.2394
IEEE Transactions on Information Theory, volume 56, issue 4, 2010, pages 2017 - 2033
10.1109/TIT.2010.2040897
null
math.ST cs.IT math.IT math.PR stat.CO stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the early days of digital communication, hidden Markov models (HMMs) have now been also routinely used in speech recognition, processing of natural languages, images, and in bioinformatics. In an HMM $(X_i,Y_i)_{i\ge 1}$, observations $X_1,X_2,...$ are assumed to be conditionally independent given an ``explanatory'' Markov process $Y_1,Y_2,...$, which itself is not observed; moreover, the conditional distribution of $X_i$ depends solely on $Y_i$. Central to the theory and applications of HMM is the Viterbi algorithm to find {\em a maximum a posteriori} (MAP) estimate $q_{1:n}=(q_1,q_2,...,q_n)$ of $Y_{1:n}$ given observed data $x_{1:n}$. Maximum {\em a posteriori} paths are also known as Viterbi paths or alignments. Recently, attempts have been made to study the behavior of Viterbi alignments when $n\to \infty$. Thus, it has been shown that in some special cases a well-defined limiting Viterbi alignment exists. While innovative, these attempts have relied on rather strong assumptions and involved proofs which are existential. This work proves the existence of infinite Viterbi alignments in a more constructive manner and for a very general class of HMMs.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 18:31:18 GMT" } ]
2012-07-24T00:00:00
[ [ "Lember", "J.", "" ], [ "Koloydenko", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0804.2155
Joseph Y. Halpern
Joseph Y. Halpern
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
null
null
null
null
cs.CR cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A first-order conditional logic is considered, with semantics given by a variant of epsilon-semantics, where p -> q means that Pr(q | p) approaches 1 super-polynomially --faster than any inverse polynomial. This type of convergence is needed for reasoning about security protocols. A complete axiomatization is provided for this semantics, and it is shown how a qualitative proof of the correctness of a security protocol can be automatically converted to a quantitative proof appropriate for reasoning about concrete security.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 12:06:04 GMT" } ]
2008-12-18T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.2181
Frederic Chyzak
Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA Rocquencourt), Nicolas Le Roux (INRIA Rocquencourt)
Products of Ordinary Differential Operators by Evaluation and Interpolation
null
Dans ISSAC'08 (2008)
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that multiplication of linear differential operators over ground fields of characteristic zero can be reduced to a constant number of matrix products. We give a new algorithm by evaluation and interpolation which is faster than the previously-known one by a constant factor, and prove that in characteristic zero, multiplication of differential operators and of matrices are computationally equivalent problems. In positive characteristic, we show that differential operators can be multiplied in nearly optimal time. Theoretical results are validated by intensive experiments.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 13:37:14 GMT" } ]
2008-12-18T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Chyzak", "Frédéric", "", "INRIA\n Rocquencourt" ], [ "Roux", "Nicolas Le", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.2189
Zouheir Rezki Mr.
Z. Rezki, David Haccoun, Fran\c{c}ois Gagnon and Wessam Ajib
Impact of Spatial Correlation on the Finite-SNR Diversity-Multiplexing Tradeoff
Accepted for publication to IEEE Transaction on Wireless Communication on June 4th 2007
null
10.1109/TWC.2008.060984
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The impact of spatial correlation on the performance limits of multielement antenna (MEA) channels is analyzed in terms of the diversity-multiplexing tradeoff (DMT) at finite signal-to-noise ratio (SNR) values. A lower bound on the outage probability is first derived. Using this bound accurate finite-SNR estimate of the DMT is then derived. This estimate allows to gain insight on the impact of spatial correlation on the DMT at finite SNR. As expected, the DMT is severely degraded as the spatial correlation increases. Moreover, using asymptotic analysis, we show that our framework encompasses well-known results concerning the asymptotic behavior of the DMT.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 19:26:24 GMT" } ]
2008-04-15T00:00:00
[ [ "Rezki", "Z.", "" ], [ "Haccoun", "David", "" ], [ "Gagnon", "François", "" ], [ "Ajib", "Wessam", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2191
Novella Bartolini
N. Bartolini, T. Calamoneri, E. G. Fusco, A. Massini, S. Silvestri
Push & Pull: autonomous deployment of mobile sensors for a complete coverage
Technical Report. This paper has been published on Wireless Networks, Springer. Animations and the complete code of the proposed algorithm are available for download at the address: http://www.dsi.uniroma1.it/~novella/mobile_sensors/
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile sensor networks are important for several strategic applications devoted to monitoring critical areas. In such hostile scenarios, sensors cannot be deployed manually and are either sent from a safe location or dropped from an aircraft. Mobile devices permit a dynamic deployment reconfiguration that improves the coverage in terms of completeness and uniformity. In this paper we propose a distributed algorithm for the autonomous deployment of mobile sensors called Push&Pull. According to our proposal, movement decisions are made by each sensor on the basis of locally available information and do not require any prior knowledge of the operating conditions or any manual tuning of key parameters. We formally prove that, when a sufficient number of sensors are available, our approach guarantees a complete and uniform coverage. Furthermore, we demonstrate that the algorithm execution always terminates preventing movement oscillations. Numerous simulations show that our algorithm reaches a complete coverage within reasonable time with moderate energy consumption, even when the target area has irregular shapes. Performance comparisons between Push&Pull and one of the most acknowledged algorithms show how the former one can efficiently reach a more uniform and complete coverage under a wide range of working scenarios.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 14:38:52 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2008 15:23:54 GMT" }, { "version": "v3", "created": "Tue, 29 Jul 2008 13:43:10 GMT" }, { "version": "v4", "created": "Thu, 29 Jan 2009 14:58:50 GMT" } ]
2009-01-29T00:00:00
[ [ "Bartolini", "N.", "" ], [ "Calamoneri", "T.", "" ], [ "Fusco", "E. G.", "" ], [ "Massini", "A.", "" ], [ "Silvestri", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0804.2249
Martin Haenggi
Martin Haenggi
The Secrecy Graph and Some of its Properties
5 pages. Accepted at 2008 IEEE Symposium on Information Theory (ISIT'08)
null
10.1109/ISIT.2008.4595044
null
cs.IT cs.DM math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure communication in the presence of eavesdroppers is possible. The underlying point process models considered are lattices and Poisson point processes. In the lattice case, analogies to standard bond and site percolation can be exploited to determine percolation thresholds. In the Poisson case, the node degrees are determined and percolation is studied using analytical bounds and simulations. It turns out that a small density of eavesdroppers already has a drastic impact on the connectivity of the secrecy graph.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 19:40:08 GMT" } ]
2016-11-15T00:00:00
[ [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0804.2273
Carl Lagoze
Carl Lagoze, Herbert Van de Sompel, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston
Object Re-Use & Exchange: A Resource-Centric Approach
null
null
null
null
cs.DL cs.NI
http://creativecommons.org/licenses/by/3.0/
The OAI Object Reuse and Exchange (OAI-ORE) framework recasts the repository-centric notion of digital object to a bounded aggregation of Web resources. In this manner, digital library content is more integrated with the Web architecture, and thereby more accessible to Web applications and clients. This generalized notion of an aggregation that is independent of repository containment conforms more closely with notions in eScience and eScholarship, where content is distributed across multiple services and databases. We provide a motivation for the OAI-ORE project, review previous interoperability efforts, describe draft ORE specifications and report on promising results from early experimentation that illustrate improved interoperability and reuse of digital objects.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 21:02:00 GMT" } ]
2008-04-16T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Van de Sompel", "Herbert", "" ], [ "Nelson", "Michael L.", "" ], [ "Warner", "Simeon", "" ], [ "Sanderson", "Robert", "" ], [ "Johnston", "Pete", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.2288
Shipra Agrawal
Shipra Agrawal, Zizhuo Wang, Yinyu Ye
Parimutuel Betting on Permutations
null
null
null
null
cs.GT cs.CC cs.DS cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on a permutation betting market under parimutuel call auction model where traders bet on the final ranking of n candidates. We present a Proportional Betting mechanism for this market. Our mechanism allows the traders to bet on any subset of the n x n 'candidate-rank' pairs, and rewards them proportionally to the number of pairs that appear in the final outcome. We show that market organizer's decision problem for this mechanism can be formulated as a convex program of polynomial size. More importantly, the formulation yields a set of n x n unique marginal prices that are sufficient to price the bets in this mechanism, and are computable in polynomial-time. The marginal prices reflect the traders' beliefs about the marginal distributions over outcomes. We also propose techniques to compute the joint distribution over n! permutations from these marginal distributions. We show that using a maximum entropy criterion, we can obtain a concise parametric form (with only n x n parameters) for the joint distribution which is defined over an exponentially large state space. We then present an approximation algorithm for computing the parameters of this distribution. In fact, the algorithm addresses the generic problem of finding the maximum entropy distribution over permutations that has a given mean, and may be of independent interest.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 00:20:17 GMT" } ]
2008-12-18T00:00:00
[ [ "Agrawal", "Shipra", "" ], [ "Wang", "Zizhuo", "" ], [ "Ye", "Yinyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0804.2337
Bruno Salvy
Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), \'Eric Schost
Power Series Composition and Change of Basis
null
null
10.1145/1390768.1390806
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient algorithms are known for many operations on truncated power series (multiplication, powering, exponential, ...). Composition is a more complex task. We isolate a large class of power series for which composition can be performed efficiently. We deduce fast algorithms for converting polynomials between various bases, including Euler, Bernoulli, Fibonacci, and the orthogonal Laguerre, Hermite, Jacobi, Krawtchouk, Meixner and Meixner-Pollaczek.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 09:43:27 GMT" } ]
2013-06-19T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Schost", "Éric", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.2343
Charilaos Efthymiou
Charilaos Efthymiou (1,2) and Paul G. Spirakis (1,2) ((1) Research Academic Computer Technology Institute (2) Computer Engineering and Informatics Department of the University of Patras, Greece)
Random sampling of colourings of sparse random graphs with a constant number of colours
30 pages 0 figures, uses fullpage.sty
null
10.1016/j.tcs.2008.05.008
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present a simple and efficient algorithm which, with high probability, provides an almost uniform sample from the set of proper k-colourings on an instance of a sparse random graph G(n,d/n), where k=k(d) is a sufficiently large constant. Our algorithm is not based on the Markov Chain Monte Carlo method (M.C.M.C.). Instead, we provide a novel proof of correctness of our Algorithm that is based on interesting "spatial mixing" properties of colourings of G(n,d/n). Our result improves upon previous results (based on M.C.M.C.) that required a number of colours growing unboundedly with n.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 09:58:28 GMT" } ]
2008-06-26T00:00:00
[ [ "Efthymiou", "Charilaos", "" ], [ "Spirakis", "Paul G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.2346
Sudhakar Sahoo
Pabitra Pal Choudhury, Birendra Kumar Nayak, Sudhakar Sahoo, Sunil Pankaj Rath
Theory and Applications of Two-dimensional, Null-boundary, Nine-Neighborhood, Cellular Automata Linear rules
17 pages, 41 figures, a portion of this paper is accepted in the journal as well as proceedings at WSEAS,2006
null
null
Tech.Report No. ASD/2005/4, 13 May 2005
cs.DM cs.CC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the theory and application of 2-Dimensional, nine-neighborhood, null- boundary, uniform as well as hybrid Cellular Automata (2D CA) linear rules in image processing. These rules are classified into nine groups depending upon the number of neighboring cells influences the cell under consideration. All the Uniform rules have been found to be rendering multiple copies of a given image depending on the groups to which they belong where as Hybrid rules are also shown to be characterizing the phenomena of zooming in, zooming out, thickening and thinning of a given image. Further, using hybrid CA rules a new searching algorithm is developed called Sweepers algorithm which is found to be applicable to simulate many inter disciplinary research areas like migration of organisms towards a single point destination, Single Attractor and Multiple Attractor Cellular Automata Theory, Pattern Classification and Clustering Problem, Image compression, Encryption and Decryption problems, Density Classification problem etc.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 10:17:35 GMT" } ]
2008-04-16T00:00:00
[ [ "Choudhury", "Pabitra Pal", "" ], [ "Nayak", "Birendra Kumar", "" ], [ "Sahoo", "Sudhakar", "" ], [ "Rath", "Sunil Pankaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0804.2349
Lukasz Nitschke
Lukasz Nitschke
Secure Remote Voting Using Paper Ballots
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet voting will probably be one of the most significant achievements of the future information society. It will have an enormous impact on the election process making it fast, reliable and inexpensive. Nonetheless, so far remote voting is considered to be very difficult, as one has to take into account susceptibility of the voter's PC to various cyber-attacks. As a result, most the research effort is put into developing protocols and machines for poll-site electronic voting. Although these solutions yield promising results, they cannot be directly adopted to Internet voting because of secure platform problem. However, the cryptographic components they utilize may be very useful. This paper presents a scheme based on combination of mixnets and homomorphic encryption borrowed from robust poll-site voting, along with techniques recommended for remote voting -- code sheets and test ballots. The protocol tries to minimize the trust put in voter's PC by making the voter responsible for manual encryption of his vote. To achieve this, the voter obtains a paper ballot that allows him to scramble the vote by performing simple operations (lookup in a table). Creation of paper ballots, as well as decryption of votes, is performed by a group of cooperating trusted servers. As a result, the scheme is characterized by strong asymmetry -- all computations are carried out on the server side. In consequence it does not require any additional hardware on the voter's side, and offers distributed trust, receipt-freeness and verifiability.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 10:26:40 GMT" } ]
2008-04-16T00:00:00
[ [ "Nitschke", "Lukasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0804.2354
Andrew Krizhanovsky A
A. V. Smirnov, A. A. Krizhanovsky
Information filtering based on wiki index database
9 pages, 1 table, 2 figures, 8th International FLINS Conference on Computational Intelligence in Decision and Control, Madrid, Spain, September 21-24, 2008; v2: typo
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a profile-based approach to information filtering by an analysis of the content of text documents. The Wikipedia index database is created and used to automatically generate the user profile from the user document collection. The problem-oriented Wikipedia subcorpora are created (using knowledge extracted from the user profile) for each topic of user interests. The index databases of these subcorpora are applied to filtering information flow (e.g., mails, news). Thus, the analyzed texts are classified into several topics explicitly presented in the user profile. The paper concentrates on the indexing part of the approach. The architecture of an application implementing the Wikipedia indexing is described. The indexing method is evaluated using the Russian and Simple English Wikipedia.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 11:05:59 GMT" }, { "version": "v2", "created": "Thu, 8 May 2008 12:35:01 GMT" } ]
2008-05-08T00:00:00
[ [ "Smirnov", "A. V.", "" ], [ "Krizhanovsky", "A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0804.2373
Alin Bostan
Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), \'Eric Schost
Fast Conversion Algorithms for Orthogonal Polynomials
null
null
10.1016/j.laa.2009.08.002
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss efficient conversion algorithms for orthogonal polynomials. We describe a known conversion algorithm from an arbitrary orthogonal basis to the monomial basis, and deduce a new algorithm of the same complexity for the converse operation.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 12:47:14 GMT" } ]
2013-06-19T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Schost", "Éric", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.2401
Sanjiang Li
Sanjiang Li
Causal models have no complete axiomatic characterization
7 pages, 1 figure
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Markov networks and Bayesian networks are effective graphic representations of the dependencies embedded in probabilistic models. It is well known that independencies captured by Markov networks (called graph-isomorphs) have a finite axiomatic characterization. This paper, however, shows that independencies captured by Bayesian networks (called causal models) have no axiomatization by using even countably many Horn or disjunctive clauses. This is because a sub-independency model of a causal model may be not causal, while graph-isomorphs are closed under sub-models.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 14:28:34 GMT" } ]
2008-04-16T00:00:00
[ [ "Li", "Sanjiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.2429
Debajyoti Bera
Debajyoti Bera, Stephen Fenner, Frederic Green and Steve Homer
Universal Quantum Circuits
13 pages
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define and construct efficient depth-universal and almost-size-universal quantum circuits. Such circuits can be viewed as general-purpose simulators for central classes of quantum circuits and can be used to capture the computational power of the circuit class being simulated. For depth we construct universal circuits whose depth is the same order as the circuits being simulated. For size, there is a log factor blow-up in the universal circuits constructed here. We prove that this construction is nearly optimal.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 16:44:23 GMT" } ]
2008-04-16T00:00:00
[ [ "Bera", "Debajyoti", "" ], [ "Fenner", "Stephen", "" ], [ "Green", "Frederic", "" ], [ "Homer", "Steve", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0804.2435
Nicolas Markey
Francois Laroussinie, Nicolas Markey, and Ghassan Oreiby
On the Expressiveness and Complexity of ATL
25 pages
Logical Methods in Computer Science, Volume 4, Issue 2 (May 15, 2008) lmcs:826
10.2168/LMCS-4(2:7)2008
null
cs.LO cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ATL is a temporal logic geared towards the specification and verification of properties in multi-agents systems. It allows to reason on the existence of strategies for coalitions of agents in order to enforce a given property. In this paper, we first precisely characterize the complexity of ATL model-checking over Alternating Transition Systems and Concurrent Game Structures when the number of agents is not fixed. We prove that it is \Delta^P_2 - and \Delta^P_?_3-complete, depending on the underlying multi-agent model (ATS and CGS resp.). We also consider the same problems for some extensions of ATL. We then consider expressiveness issues. We show how ATS and CGS are related and provide translations between these models w.r.t. alternating bisimulation. We also prove that the standard definition of ATL (built on modalities "Next", "Always" and "Until") cannot express the duals of its modalities: it is necessary to explicitely add the modality "Release".
[ { "version": "v1", "created": "Tue, 15 Apr 2008 17:18:46 GMT" }, { "version": "v2", "created": "Thu, 15 May 2008 13:13:15 GMT" }, { "version": "v3", "created": "Fri, 16 May 2008 12:50:23 GMT" } ]
2015-07-01T00:00:00
[ [ "Laroussinie", "Francois", "" ], [ "Markey", "Nicolas", "" ], [ "Oreiby", "Ghassan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0804.2469
Alexander Sch\"onhuth
Alexander Sch\"onhuth
On analytic properties of entropy rate
IEEE Transactions on Information Theory, to appear
IEEE Transactions on Information Theory, 55(5), 2119-2127, 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Entropy rate is a real valued functional on the space of discrete random sources which lacks a closed formula even for subclasses of sources which have intuitive parameterizations. A good way to overcome this problem is to examine its analytic properties relative to some reasonable topology. A canonical choice of a topology is that of the norm of total variation as it immediately arises with the idea of a discrete random source as a probability measure on sequence space. It is shown that entropy rate is Lipschitzian relative to this topology, which, by well known facts, is close to differentiability. An application of this theorem leads to a simple and elementary proof of the existence of entropy rate of random sources with finite evolution dimension. This class of sources encompasses arbitrary hidden Markov sources and quantum random walks.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 19:35:43 GMT" }, { "version": "v2", "created": "Tue, 15 Apr 2008 20:35:05 GMT" }, { "version": "v3", "created": "Tue, 10 Feb 2009 17:33:10 GMT" } ]
2015-01-14T00:00:00
[ [ "Schönhuth", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2473
Michael Botros Shenouda
Michael Botros Shenouda and Timothy Davidson
A Design Framework for Limited Feedback MIMO Systems with Zero-Forcing DFE
Submitted to JSAC: Manuscript submitted 4 November 2007; revised 15 April 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the design of multiple-input multiple-output communication systems with a linear precoder at the transmitter, zero-forcing decision feedback equalization (ZF-DFE) at the receiver, and a low-rate feedback channel that enables communication from the receiver to the transmitter. The channel state information (CSI) available at the receiver is assumed to be perfect, and based on this information the receiver selects a suitable precoder from a codebook and feeds back the index of this precoder to the transmitter. Our approach to the design of the components of this limited feedback scheme is based on the development, herein, of a unified framework for the joint design of the precoder and the ZF-DFE under the assumption that perfect CSI is available at both the transmitter and the receiver. The framework is general and embraces a wide range of design criteria. This framework enables us to characterize the statistical distribution of the optimal precoder in a standard Rayleigh fading environment. Using this distribution, we show that codebooks constructed from Grassmann packings minimize an upper bound on an average distortion measure, and hence are natural candidates for the codebook in limited feedback systems. We also show that for any given codebook the performance of the proposed limited feedback schemes is an upper bound on the corresponding schemes with linear zero-forcing receivers. Our simulation studies show that the proposed limited feedback scheme can provide significantly better performance at a lower feedback rate than existing schemes in which the detection order is fed back to the transmitter.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 19:55:21 GMT" }, { "version": "v2", "created": "Tue, 15 Apr 2008 20:08:09 GMT" } ]
2008-04-16T00:00:00
[ [ "Shenouda", "Michael Botros", "" ], [ "Davidson", "Timothy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2487
Alexander Sch\"onhuth
Alexander Schoenhuth
The ergodic decomposition of asymptotically mean stationary random sources
Submitted to IEEE Transactions on Information Theory, Apr. 2008
null
null
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is demonstrated how to represent asymptotically mean stationary (AMS) random sources with values in standard spaces as mixtures of ergodic AMS sources. This an extension of the well known decomposition of stationary sources which has facilitated the generalization of prominent source coding theorems to arbitrary, not necessarily ergodic, stationary sources. Asymptotic mean stationarity generalizes the definition of stationarity and covers a much larger variety of real-world examples of random sources of practical interest. It is sketched how to obtain source coding and related theorems for arbitrary, not necessarily ergodic, AMS sources, based on the presented ergodic decomposition.
[ { "version": "v1", "created": "Tue, 15 Apr 2008 20:25:21 GMT" } ]
2008-04-17T00:00:00
[ [ "Schoenhuth", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0804.2535
Aleksander Wojdyga
Aleksander Wojdyga
Short proofs of strong normalization
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents simple, syntactic strong normalization proofs for the simply-typed lambda-calculus and the polymorphic lambda-calculus (system F) with the full set of logical connectives, and all the permutative reductions. The normalization proofs use translations of terms and types to systems, for which strong normalization property is known.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 07:09:59 GMT" } ]
2008-04-17T00:00:00
[ [ "Wojdyga", "Aleksander", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.2576
Lars Eirik Danielsen
Lars Eirik Danielsen, Matthew G. Parker
Interlace Polynomials: Enumeration, Unimodality, and Connections to Codes
19 pages, 17 figures
Discrete Appl. Math. 158(6), pp. 636-648, 2010.
10.1016/j.dam.2009.11.011
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The interlace polynomial q was introduced by Arratia, Bollobas, and Sorkin. It encodes many properties of the orbit of a graph under edge local complementation (ELC). The interlace polynomial Q, introduced by Aigner and van der Holst, similarly contains information about the orbit of a graph under local complementation (LC). We have previously classified LC and ELC orbits, and now give an enumeration of the corresponding interlace polynomials of all graphs of order up to 12. An enumeration of all circle graphs of order up to 12 is also given. We show that there exist graphs of all orders greater than 9 with interlace polynomials q whose coefficient sequences are non-unimodal, thereby disproving a conjecture by Arratia et al. We have verified that for graphs of order up to 12, all polynomials Q have unimodal coefficients. It has been shown that LC and ELC orbits of graphs correspond to equivalence classes of certain error-correcting codes and quantum states. We show that the properties of these codes and quantum states are related to properties of the associated interlace polynomials.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 11:36:09 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 12:02:05 GMT" } ]
2010-02-18T00:00:00
[ [ "Danielsen", "Lars Eirik", "" ], [ "Parker", "Matthew G.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2614
Laura Anna Ripamonti
Laura Anna Ripamonti, Ines Di Loreto, Dario Maggiorini
Augmenting Actual Life Through MUVEs
null
null
null
null
cs.HC cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
The necessity of supporting more and more social interaction (and not only the mere information sharing) in online environments is the disruptive force upon which phenomena ascribed to the Web2.0 paradigm continuously bud. People interacting in online socio-technical environments mould technology on their needs, seamlessly integrating it into their everyday life. MUVEs (Multi User Virtual Environments) are no exception and, in several cases, represent the new frontier in this field. In this work we analyze if and how MUVEs can be considered a mean for augmenting communities (and more in general people) life. We trace a framework of analysis based on four main observations, and through these lenses we look at Second Life and at several projects we are currently developing in that synthetic world.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 14:43:31 GMT" } ]
2008-04-17T00:00:00
[ [ "Ripamonti", "Laura Anna", "" ], [ "Di Loreto", "Ines", "" ], [ "Maggiorini", "Dario", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0804.2621
Christoph Schommer
Christoph Schommer
Design and Implementation of a Master of Science in Information and Computer Sciences - An Inventory and retrospect for the last four years
27 pages, 4 Figures
null
null
null
cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This Master of Science in Computer and Information Sciences (MICS) is an international accredited master program that has been initiated in 2004 and started in September 2005. MICS is a research-oriented academic study of 4 semesters and a continuation of the Bachelor towards the PhD. It is completely taught in English, supported by lecturers coming from more than ten different countries. This report compass a description of its underlying architecture, describes some implementation details and gives a presentation of diverse experiences and results. As the program has been designed and implemented right after the creation of the University, the significance of the program is moreover a self-discovery of the computer science department, which has finally led to the creation of the today's research institutes and research axes.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 15:43:27 GMT" } ]
2008-12-18T00:00:00
[ [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0804.2642
Michel Grabisch
Pedro Miranda, Michel Grabisch (LIP6), Pedro Gil
p-Symmetric fuzzy measures
null
International Journal of Uncertainty Fuzziness and Knowledge-Based Systems (2002) 105-123
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a generalization of the concept of symmetric fuzzy measure based in a decomposition of the universal set in what we have called subsets of indifference. Some properties of these measures are studied, as well as their Choquet integral. Finally, a degree of interaction between the subsets of indifference is defined.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 16:47:45 GMT" } ]
2008-12-18T00:00:00
[ [ "Miranda", "Pedro", "", "LIP6" ], [ "Grabisch", "Michel", "", "LIP6" ], [ "Gil", "Pedro", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.2699
Dennis Huo
Ian Christopher, Dennis Huo, and Bryan Jacobs
A Critique of a Polynomial-time SAT Solver Devised by Sergey Gubin
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper refutes the validity of the polynomial-time algorithm for solving satisfiability proposed by Sergey Gubin. Gubin introduces the algorithm using 3-SAT and eventually expands it to accept a broad range of forms of the Boolean satisfiability problem. Because 3-SAT is NP-complete, the algorithm would have implied P = NP, had it been correct. Additionally, this paper refutes the correctness of his polynomial-time reduction of SAT to 2-SAT.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 23:00:51 GMT" } ]
2008-04-18T00:00:00
[ [ "Christopher", "Ian", "" ], [ "Huo", "Dennis", "" ], [ "Jacobs", "Bryan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0804.2701
Travis C. Brooks
Anne Gentil-Beccot, Salvatore Mele, Annette Holtkamp, Heath B. O'Connell, Travis C. Brooks
Information Resources in High-Energy Physics: Surveying the Present Landscape and Charting the Future Course
Removed internal pdf links broken on some pdf viewers
J.Am.Soc.Inf.Sci.60:150-160,2009
10.1002/asi.20944
CERN-OPEN-2008-010,DESY-08-040,FERMILAB-PUB-08-077-BSS,SLAC-PUB-13199
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access to previous results is of paramount importance in the scientific process. Recent progress in information management focuses on building e-infrastructures for the optimization of the research workflow, through both policy-driven and user-pulled dynamics. For decades, High-Energy Physics (HEP) has pioneered innovative solutions in the field of information management and dissemination. In light of a transforming information environment, it is important to assess the current usage of information resources by researchers and HEP provides a unique test-bed for this assessment. A survey of about 10% of practitioners in the field reveals usage trends and information needs. Community-based services, such as the pioneering arXiv and SPIRES systems, largely answer the need of the scientists, with a limited but increasing fraction of younger users relying on Google. Commercial services offered by publishers or database vendors are essentially unused in the field. The survey offers an insight into the most important features that users require to optimize their research workflow. These results inform the future evolution of information management in HEP and, as these researchers are traditionally ``early adopters'' of innovation in scholarly communication, can inspire developments of disciplinary repositories serving other communities.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 23:01:51 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2008 16:35:02 GMT" } ]
2009-01-08T00:00:00
[ [ "Gentil-Beccot", "Anne", "" ], [ "Mele", "Salvatore", "" ], [ "Holtkamp", "Annette", "" ], [ "O'Connell", "Heath B.", "" ], [ "Brooks", "Travis C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0804.2729
Henning Schnoor
Edith Hemaspaandra, Henning Schnoor, Ilka Schnoor
Generalized Modal Satisfiability
32 pages, 3 figures. Some of the results appeared in STACS 2006
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that modal satisfiability is PSPACE-complete (Ladner 1977). However, the complexity may decrease if we restrict the set of propositional operators used. Note that there exist an infinite number of propositional operators, since a propositional operator is simply a Boolean function. We completely classify the complexity of modal satisfiability for every finite set of propositional operators, i.e., in contrast to previous work, we classify an infinite number of problems. We show that, depending on the set of propositional operators, modal satisfiability is PSPACE-complete, coNP-complete, or in P. We obtain this trichotomy not only for modal formulas, but also for their more succinct representation using modal circuits. We consider both the uni-modal and the multi-modal case, and study the dual problem of validity as well.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 06:57:50 GMT" } ]
2008-12-18T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Schnoor", "Henning", "" ], [ "Schnoor", "Ilka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.2808
Ananthanarayanan Chockalingam
P. Ubaidulla and A. Chockalingam
Robust Precoder for Multiuser MISO Downlink with SINR Constraints
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider linear precoding with SINR constraints for the downlink of a multiuser MISO (multiple-input single-output) communication system in the presence of imperfect channel state information (CSI). The base station is equipped with multiple transmit antennas and each user terminal is equipped with a single receive antenna. We propose a robust design of linear precoder which transmits minimum power to provide the required SINR at the user terminals when the true channel state lies in a region of a given size around the channel state available at the transmitter. We show that this design problem can be formulated as a Second Order Cone Program (SOCP) which can be solved efficiently. We compare the performance of the proposed design with some of the robust designs reported in the literature. Simulation results show that the proposed robust design provides better performance with reduced complexity.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 13:47:30 GMT" } ]
2008-04-18T00:00:00
[ [ "Ubaidulla", "P.", "" ], [ "Chockalingam", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2819
Michel Grabisch
Michel Grabisch (CES), Christophe Labreuche (TRT)
Bipolarization of posets and natural interpolation
null
Journal of Mathematical Analysis and applications (2008) 1080-1097
10.1016/j.jmaa.2008.02.008
null
cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Choquet integral w.r.t. a capacity can be seen in the finite case as a parsimonious linear interpolator between vertices of $[0,1]^n$. We take this basic fact as a starting point to define the Choquet integral in a very general way, using the geometric realization of lattices and their natural triangulation, as in the work of Koshevoy. A second aim of the paper is to define a general mechanism for the bipolarization of ordered structures. Bisets (or signed sets), as well as bisubmodular functions, bicapacities, bicooperative games, as well as the Choquet integral defined for them can be seen as particular instances of this scheme. Lastly, an application to multicriteria aggregation with multiple reference levels illustrates all the results presented in the paper.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 14:05:41 GMT" } ]
2015-05-13T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ], [ "Labreuche", "Christophe", "", "TRT" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0804.2831
Yi Su
Yi Su and Mihaela van der Schaar
Decentralized Knowledge and Learning in Strategic Multi-user Communication
32 pages, 15 figures
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Please see the content of this report.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 14:47:48 GMT" } ]
2008-04-18T00:00:00
[ [ "Su", "Yi", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.2844
Chris Kimble
Isabelle Bourdon and Chris Kimble
An Analysis of Key Factors for the Success of the Communal Management of Knowledge
in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth, UK
null
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores the links between Knowledge Management and new community-based models of the organization from both a theoretical and an empirical perspective. From a theoretical standpoint, we look at Communities of Practice (CoPs) and Knowledge Management (KM) and explore the links between the two as they relate to the use of information systems to manage knowledge. We begin by reviewing technologically supported approaches to KM and introduce the idea of "Systemes d'Aide a la Gestion des Connaissances" SAGC (Systems to aid the Management of Knowledge). Following this we examine the contribution that communal structures such as CoPs can make to intraorganizational KM and highlight some of 'success factors' for this approach to KM that are found in the literature. From an empirical standpoint, we present the results of a survey involving the Chief Knowledge Officers (CKOs) of twelve large French businesses; the objective of this study was to identify the factors that might influence the success of such approaches. The survey was analysed using thematic content analysis and the results are presented here with some short illustrative quotes from the CKOs. Finally, the paper concludes with some brief reflections on what can be learnt from looking at this problem from these two perspectives.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 16:00:47 GMT" } ]
2008-04-18T00:00:00
[ [ "Bourdon", "Isabelle", "" ], [ "Kimble", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0804.2847
Chris Kimble
Pamela Baillette and Chris Kimble
The Concept of Appropriation as a Heuristic for Conceptualising the Relationship between Technology, People and Organisations
in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth, UK
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stated aim of this conference is to debate the continuing evolution of IS in businesses and other organisations. This paper seeks to contribute to this debate by exploring the concept of appropriation from a number of different epistemological, cultural and linguistic viewpoints to allow us to explore 'the black box' of appropriation and to gain a fuller understanding of the term. At the conceptual level, it will examine some of the different ways in which people have attempted to explain the relationship between the objective and concrete features of technology and the subjective and shifting nature of the people and organisation within which that technology is deployed. At the cultural and linguistic level the paper will examine the notion as it is found in the Francophone literature, where the term has a long and rich history, and the Anglophone literature where appropriation is seen as a rather more specialist term. The paper will conclude with some observations on the ongoing nature of the debate, the value of reading beyond the literature with which one is familiar and the rewards that come from exploring different historical (and linguistic) viewpoints.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 16:13:49 GMT" } ]
2008-04-18T00:00:00
[ [ "Baillette", "Pamela", "" ], [ "Kimble", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0804.2851
Chris Kimble
Richard Ribeiro and Chris Kimble
Identifying 'Hidden' Communities of Practice within Electronic Networks: Some Preliminary Premises
in Proceedings of 13th UKAIS Conference, (April 2008), Bournemouth, UK
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the possibility of discovering 'hidden' (potential) Communities of Practice (CoPs) inside electronic networks, and then using this knowledge to nurture them into a fully developed Virtual Community of Practice (VCoP). Starting from the standpoint of the need to manage knowledge, it discusses several questions related to this subject: the characteristics of 'hidden' communities; the relation between CoPs, Virtual Communities (VCs), Distributed Communities of Practice (DCoPs) and Virtual Communities of Practice (VCoPs); the methods used to search for 'hidden' CoPs; and the possible ways of changing 'hidden' CoPs into fully developed VCoPs. The paper also presents some preliminary findings from a semi-structured interview conducted in The Higher Education Academy Psychology Network (UK). These findings are contrasted against the theory discussed and some additional proposals are suggested at the end.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 16:33:53 GMT" } ]
2008-04-18T00:00:00
[ [ "Ribeiro", "Richard", "" ], [ "Kimble", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0804.2852
Chris Kimble
David King and Chris Kimble
Philosophical Smoke Signals: Theory and Practice in Information Systems Design
in Proceedings of 10th UKAIS Conference, (May 2005), Northumbria University, UK
null
null
null
cs.SE cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the gulf between the theory and practice in Information Systems is much lamented, few researchers have offered a way forward except through a number of (failed) attempts to develop a single systematic theory for Information Systems. In this paper, we encourage researchers to re-examine the practical consequences of their theoretical arguments. By examining these arguments we may be able to form a number of more rigorous theories of Information Systems, allowing us to draw theory and practice together without undertaking yet another attempt at the holy grail of a single unified systematic theory of Information Systems.
[ { "version": "v1", "created": "Thu, 17 Apr 2008 16:46:55 GMT" } ]
2008-04-18T00:00:00
[ [ "King", "David", "" ], [ "Kimble", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0804.2940
Shun Watanabe
Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko Uyematsu
Secret Key Agreement by Soft-decision of Signals in Gaussian Maurer's Model
10 pages, 4 figures, to be appear in Proc. of 2008 IEEE International Symposium on Information Theory in Toronto, Canada
IEICE Trans. Fundamentals, vol. 92, no. 2, pp. 525-534, February 2009
10.1587/transfun.E92.A.525
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 04:57:52 GMT" } ]
2009-03-12T00:00:00
[ [ "Naito", "Masashi", "" ], [ "Watanabe", "Shun", "" ], [ "Matsumoto", "Ryutaroh", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2950
Tomaz Korosec
Tomaz Korosec and Saso Tomazic (Faculty of Electrical Engineering, University of Ljubljana, Ljubljana, Slovenia)
An Adaptive-Parity Error-Resilient LZ'77 Compression Algorithm
8 pages, 7 figures, 1 table; submitted to IEEE Transactions on Information Theory, April 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes an improved error-resilient Lempel-Ziv'77 (LZ'77) algorithm employing an adaptive amount of parity bits for error protection. It is a modified version of error resilient algorithm LZRS'77, proposed recently, which uses a constant amount of parity over all of the encoded blocks of data. The constant amount of parity is bounded by the lowest-redundancy part of the encoded string, whereas the adaptive parity more efficiently utilizes the available redundancy of the encoded string, and can be on average much higher. The proposed algorithm thus provides better error protection of encoded data. The performance of both algorithms was measured. The comparison showed a noticeable improvement by use of adaptive parity. The proposed algorithm is capable of correcting up to a few times as many errors as the original algorithm, while the compression performance remains practically unchanged.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 07:11:43 GMT" } ]
2008-04-21T00:00:00
[ [ "Korosec", "Tomaz", "", "Faculty of Electrical Engineering,\n University of Ljubljana, Ljubljana, Slovenia" ], [ "Tomazic", "Saso", "", "Faculty of Electrical Engineering,\n University of Ljubljana, Ljubljana, Slovenia" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2960
Yonghong Zeng
Yonghong Zeng and Ying-Chang Liang
Eigenvalue based Spectrum Sensing Algorithms for Cognitive Radio
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is a fundamental component is a cognitive radio. In this paper, we propose new sensing methods based on the eigenvalues of the covariance matrix of signals received at the secondary users. In particular, two sensing algorithms are suggested, one is based on the ratio of the maximum eigenvalue to minimum eigenvalue; the other is based on the ratio of the average eigenvalue to minimum eigenvalue. Using some latest random matrix theories (RMT), we quantify the distributions of these ratios and derive the probabilities of false alarm and probabilities of detection for the proposed algorithms. We also find the thresholds of the methods for a given probability of false alarm. The proposed methods overcome the noise uncertainty problem, and can even perform better than the ideal energy detection when the signals to be detected are highly correlated. The methods can be used for various signal detection applications without requiring the knowledge of signal, channel and noise power. Simulations based on randomly generated signals, wireless microphone signals and captured ATSC DTV signals are presented to verify the effectiveness of the proposed methods.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 07:56:14 GMT" } ]
2016-09-08T00:00:00
[ [ "Zeng", "Yonghong", "" ], [ "Liang", "Ying-Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2991
Enrico Paolini
Enrico Paolini, Gianluigi Liva, Michela Varrella, Balazs Matuz, Marco Chiani
Low-Complexity LDPC Codes with Near-Optimum Performance over the BEC
2008 Advanced Satellite Mobile Systems Conference. 9 pages, 12 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent works showed how low-density parity-check (LDPC) erasure correcting codes, under maximum likelihood (ML) decoding, are capable of tightly approaching the performance of an ideal maximum-distance-separable code on the binary erasure channel. Such result is achievable down to low error rates, even for small and moderate block sizes, while keeping the decoding complexity low, thanks to a class of decoding algorithms which exploits the sparseness of the parity-check matrix to reduce the complexity of Gaussian elimination (GE). In this paper the main concepts underlying ML decoding of LDPC codes are recalled. A performance analysis among various LDPC code classes is then carried out, including a comparison with fixed-rate Raptor codes. The results show that LDPC and Raptor codes provide almost identical performance in terms of decoding failure probability vs. overhead.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 10:49:44 GMT" } ]
2008-04-21T00:00:00
[ [ "Paolini", "Enrico", "" ], [ "Liva", "Gianluigi", "" ], [ "Varrella", "Michela", "" ], [ "Matuz", "Balazs", "" ], [ "Chiani", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.2992
Eberhard H.-A. Gerbracht
Eberhard H.-A. Gerbracht
"E pluribus unum" or How to Derive Single-equation Descriptions for Output-quantities in Nonlinear Circuits using Differential Algebra
V1: documentclass IEEEtran, 7 pages, 10 figures. Re-release of the printed version, with some minor typographical errors corrected
Proceedings of the 7th International Workshop on Symbolic Methods and Applications to Circuit Design, SMACD 2002, Sinaia, Romania, October 10-11, 2002; pp. 65-70; ISBN 973-85072-5-1
null
null
cs.SC math.CA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe by a number of examples how to deduce one single characterizing higher order differential equation for output quantities of an analog circuit. In the linear case, we apply basic "symbolic" methods from linear algebra to the system of differential equations which is used to model the analog circuit. For nonlinear circuits and their corresponding nonlinear differential equations, we show how to employ computer algebra tools implemented in Maple, which are based on differential algebra.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 19:55:58 GMT" } ]
2008-12-18T00:00:00
[ [ "Gerbracht", "Eberhard H. -A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
0804.2998
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
OFDM based Distributed Space Time Coding for Asynchronous Relay Networks
5 pages, 2 figures, to appear in IEEE International Conference on Communications, Beijing, China, May 19-23, 2008
null
10.1109/ICC.2008.218
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently Li and Xia have proposed a transmission scheme for wireless relay networks based on the Alamouti space time code and orthogonal frequency division multiplexing to combat the effect of timing errors at the relay nodes. This transmission scheme is amazingly simple and achieves a diversity order of two for any number of relays. Motivated by its simplicity, this scheme is extended to a more general transmission scheme that can achieve full cooperative diversity for any number of relays. The conditions on the distributed space time block code (DSTBC) structure that admit its application in the proposed transmission scheme are identified and it is pointed out that the recently proposed full diversity four group decodable DSTBCs from precoded co-ordinate interleaved orthogonal designs and extended Clifford algebras satisfy these conditions. It is then shown how differential encoding at the source can be combined with the proposed transmission scheme to arrive at a new transmission scheme that can achieve full cooperative diversity in asynchronous wireless relay networks with no channel information and also no timing error knowledge at the destination node. Finally, four group decodable distributed differential space time block codes applicable in this new transmission scheme for power of two number of relays are also provided.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 11:17:50 GMT" }, { "version": "v2", "created": "Sat, 19 Apr 2008 09:19:49 GMT" } ]
2016-11-15T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.3023
Abdessamad Imine
Hanifa Boucheneb (VeriForm), Abdessamad Imine (INRIA Lorraine - LORIA / LIFC)
Experiments in Model-Checking Optimistic Replication Algorithms
null
null
null
RR-6510
cs.LO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a series of model-checking experiments to verify optimistic replication algorithms based on Operational Transformation (OT) approach used for supporting collaborative edition. We formally define, using tool UPPAAL, the behavior and the main consistency requirement (i.e. convergence property) of the collaborative editing systems, as well as the abstract behavior of the environment where these systems are supposed to operate. Due to data replication and the unpredictable nature of user interactions, such systems have infinitely many states. So, we show how to exploit some features of the UPPAAL specification language to attenuate the severe state explosion problem. Two models are proposed. The first one, called concrete model, is very close to the system implementation but runs up against a severe explosion of states. The second model, called symbolic model, aims to overcome the limitation of the concrete model by delaying the effective selection and execution of editing operations until the construction of symbolic execution traces of all sites is completed. Experimental results have shown that the symbolic model allows a significant gain in both space and time. Using the symbolic model, we have been able to show that if the number of sites exceeds 2 then the convergence property is not satisfied for all OT algorithms considered here. A counterexample is provided for every algorithm.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 14:04:38 GMT" }, { "version": "v2", "created": "Mon, 21 Apr 2008 08:51:52 GMT" } ]
2009-04-20T00:00:00
[ [ "Boucheneb", "Hanifa", "", "VeriForm" ], [ "Imine", "Abdessamad", "", "INRIA Lorraine - LORIA\n / LIFC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.3028
Saket Saurabh
Michael Fellows, Fedor Fomin, Daniel Lokshtanov, Elena Losievskaja, Frances A. Rosamond and Saket Saurabh
Parameterized Low-distortion Embeddings - Graph metrics into lines and trees
19 pages, 1 Figure
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit the issue of low-distortion embedding of metric spaces into the line, and more generally, into the shortest path metric of trees, from the parameterized complexity perspective.Let $M=M(G)$ be the shortest path metric of an edge weighted graph $G=(V,E)$ on $n$ vertices. We describe algorithms for the problem of finding a low distortion non-contracting embedding of $M$ into line and tree metrics. We give an $O(nd^4(2d+1)^{2d})$ time algorithm that for an unweighted graph metric $M$ and integer $d$ either constructs an embedding of $M$ into the line with distortion at most $d$, or concludes that no such embedding exists. We find the result surprising, because the considered problem bears a strong resemblance to the notoriously hard Bandwidth Minimization problem which does not admit any FPT algorithm unless an unlikely collapse of parameterized complexity classes occurs. We show that our algorithm can also be applied to construct small distortion embeddings of weighted graph metrics. The running time of our algorithm is $O(n(dW)^4(2d+1)^{2dW})$ where $W$ is the largest edge weight of the input graph. We also show that deciding whether a weighted graph metric $M(G)$ with maximum weight $W < |V(G)|$ can be embedded into the line with distortion at most $d$ is NP-Complete for every fixed rational $d \geq 2$. This rules out any possibility of an algorithm with running time $O((nW)^{h(d)})$ where $h$ is a function of $d$ alone. We generalize the result on embedding into the line by proving that for any tree $T$ with maximum degree $\Delta$, embedding of $M$ into a shortest path metric of $T$ is FPT, parameterized by $(\Delta,d)$.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 14:39:41 GMT" } ]
2008-04-21T00:00:00
[ [ "Fellows", "Michael", "" ], [ "Fomin", "Fedor", "" ], [ "Lokshtanov", "Daniel", "" ], [ "Losievskaja", "Elena", "" ], [ "Rosamond", "Frances A.", "" ], [ "Saurabh", "Saket", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0804.3064
Vassilis Kostakos
Vassilis Kostakos, Panos A. Kostakos
Intelligence gathering by capturing the social processes within prisons
21 pages, 7 Figures, 1 table
International Journal of Pervasive Computing and Communications, 6(4):423-431, 2010
10.1108/17427371011097622
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a prototype system that can be used to capture longitudinal socialising processes by recording people's encounters in space. We argue that such a system can usefully be deployed in prisons and other detention facilities in order help intelligence analysts assess the behaviour or terrorist and organised crime groups, and their potential relationships. Here we present the results of a longitudinal study, carried out with civilians, which demonstrates the capabilities of our system.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 16:27:19 GMT" }, { "version": "v2", "created": "Wed, 4 Jun 2008 22:45:50 GMT" } ]
2013-06-06T00:00:00
[ [ "Kostakos", "Vassilis", "" ], [ "Kostakos", "Panos A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0804.3065
Florent Jacquemard
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Perrin
Visibly Tree Automata with Memory and Constraints
36 pages including an appendix
Logical Methods in Computer Science, Volume 4, Issue 2 (June 18, 2008) lmcs:827
10.2168/LMCS-4(2:8)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tree automata with one memory have been introduced in 2001. They generalize both pushdown (word) automata and the tree automata with constraints of equality between brothers of Bogaert and Tison. Though it has a decidable emptiness problem, the main weakness of this model is its lack of good closure properties. We propose a generalization of the visibly pushdown automata of Alur and Madhusudan to a family of tree recognizers which carry along their (bottom-up) computation an auxiliary unbounded memory with a tree structure (instead of a symbol stack). In other words, these recognizers, called Visibly Tree Automata with Memory (VTAM) define a subclass of tree automata with one memory enjoying Boolean closure properties. We show in particular that they can be determinized and the problems like emptiness, membership, inclusion and universality are decidable for VTAM. Moreover, we propose several extensions of VTAM whose transitions may be constrained by different kinds of tests between memories and also constraints a la Bogaert and Tison comparing brother subtrees in the tree in input. We show that some of these classes of constrained VTAM keep the good closure and decidability properties, and we demonstrate their expressiveness with relevant examples of tree languages.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 16:27:34 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2008 23:32:44 GMT" } ]
2015-07-01T00:00:00
[ [ "Comon-Lundh", "Hubert", "" ], [ "Jacquemard", "Florent", "" ], [ "Perrin", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.3103
Vassilis Kostakos
Vassilis Kostakos, Eamonn O'Neill
Size matters: performance declines if your pixels are too big or too small
10 pages, 13 figures, 7 tables
null
null
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a conceptual model that describes the effect of pixel size on target acquisition. We demonstrate the use of our conceptual model by applying it to predict and explain the results of an experiment to evaluate users' performance in a target acquisition task involving three distinct display sizes: standard desktop, small and large displays. The results indicate that users are fastest on standard desktop displays, undershoots are the most common error on small displays and overshoots are the most common error on large displays. We propose heuristics to maintain usability when changing displays. Finally, we contribute to the growing body of evidence that amplitude does affect performance in a display-based pointing task.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 21:02:19 GMT" } ]
2008-04-22T00:00:00
[ [ "Kostakos", "Vassilis", "" ], [ "O'Neill", "Eamonn", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0804.3105
Igor Walukiewicz
Anca Muscholl, Igor Walukiewicz
A lower bound on web services composition
null
Logical Methods in Computer Science, Volume 4, Issue 2 (May 15, 2008) lmcs:824
10.2168/LMCS-4(2:5)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A web service is modeled here as a finite state machine. A composition problem for web services is to decide if a given web service can be constructed from a given set of web services; where the construction is understood as a simulation of the specification by a fully asynchronous product of the given services. We show an EXPTIME-lower bound for this problem, thus matching the known upper bound. Our result also applies to richer models of web services, such as the Roman model.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 21:15:47 GMT" }, { "version": "v2", "created": "Thu, 15 May 2008 13:14:57 GMT" } ]
2015-07-01T00:00:00
[ [ "Muscholl", "Anca", "" ], [ "Walukiewicz", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0804.3109
Sandeep Chalasani
Sandeep Chalasani
Partial Cross-Correlation of D-Sequences based CDMA System
6 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Like other pseudorandom sequences, decimal sequences may be used in designing a Code Division Multiple Access (CDMA) system. They appear to be ideally suited for this since the cross-correlation of d-sequences taken over the LCM of their periods is zero. But a practical system will not, in most likelihood, satisfy the condition that the number of chips per bit is equal to the LCM for all sequences that are assigned to different users. It is essential, therefore, to determine the partial cross-correlation properties of d-sequences. This paper has performed experiments on d-sequences and found that the partial cross-correlation is less than for PN sequences, indicating that d-sequences can be effective for use in CDMA.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 21:48:43 GMT" } ]
2008-04-22T00:00:00
[ [ "Chalasani", "Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.3120
Zhang Shengli
Zhang Shengli, Soung Chang Liew
The Capacity Of Two Way Relay Channel
6 pages, submitted to Globecom 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the capacity of a wireless two way relay channel in which two end nodes exchange information via a relay node. The capacity is defined in the information-theoretic sense as the maximum information exchange rate between the two end nodes. We give an upper bound of the capacity by applying the cut-set theorem. We prove that this upper bound can be approached in low SNR region using "separated" multiple access for uplinks from the end nodes to the relay in which the data from the end nodes are individually decoded at the relay; and network-coding broadcast for downlinks from the relay to the end nodes in which the relay mixes the information from end nodes before forwarding. We further prove that the capacity is approachable in high SNR region using physical-layer network coding (PNC) multiple access for uplinks, and network-coding broadcast for downlinks. From our proof and observations, we conjecture that the upper bound may be achieved with PNC in all SNR regions.
[ { "version": "v1", "created": "Sat, 19 Apr 2008 01:59:17 GMT" } ]
2008-04-22T00:00:00
[ [ "Shengli", "Zhang", "" ], [ "Liew", "Soung Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.3155
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Leveraging Coherent Distributed Space-Time Codes for Noncoherent Communication in Relay Networks via Training
14 pages, 5 figures, to appear in IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For point to point multiple input multiple output systems, Dayal-Brehler-Varanasi have proved that training codes achieve the same diversity order as that of the underlying coherent space time block code (STBC) if a simple minimum mean squared error estimate of the channel formed using the training part is employed for coherent detection of the underlying STBC. In this letter, a similar strategy involving a combination of training, channel estimation and detection in conjunction with existing coherent distributed STBCs is proposed for noncoherent communication in AF relay networks. Simulation results show that the proposed simple strategy outperforms distributed differential space-time coding for AF relay networks. Finally, the proposed strategy is extended to asynchronous relay networks using orthogonal frequency division multiplexing.
[ { "version": "v1", "created": "Sat, 19 Apr 2008 16:05:44 GMT" }, { "version": "v2", "created": "Wed, 3 Sep 2008 07:02:49 GMT" } ]
2008-09-03T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.3160
Giorgos Christodoulou
George Christodoulou, Elias Koutsoupias and Paul Spirakis
On the performance of approximate equilibria in congestion games
null
null
null
null
cs.GT cs.AI cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the performance of approximate Nash equilibria for linear congestion games. We consider how much the price of anarchy worsens and how much the price of stability improves as a function of the approximation factor $\epsilon$. We give (almost) tight upper and lower bounds for both the price of anarchy and the price of stability for atomic and non-atomic congestion games. Our results not only encompass and generalize the existing results of exact equilibria to $\epsilon$-Nash equilibria, but they also provide a unified approach which reveals the common threads of the atomic and non-atomic price of anarchy results. By expanding the spectrum, we also cast the existing results in a new light. For example, the Pigou network, which gives tight results for exact Nash equilibria of selfish routing, remains tight for the price of stability of $\epsilon$-Nash equilibria but not for the price of anarchy.
[ { "version": "v1", "created": "Mon, 21 Apr 2008 12:45:08 GMT" }, { "version": "v2", "created": "Sat, 10 May 2008 15:45:44 GMT" } ]
2008-12-18T00:00:00
[ [ "Christodoulou", "George", "" ], [ "Koutsoupias", "Elias", "" ], [ "Spirakis", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.3171
Prashanth Alluvada
Prashanth Alluvada
Optimization Approach for Detecting the Critical Data on a Database
6 pages, 1 figure, 3 tables. corrected typos, added remarks
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Through purposeful introduction of malicious transactions (tracking transactions) into randomly select nodes of a (database) graph, soiled and clean segments are identified. Soiled and clean measures corresponding those segments are then computed. These measures are used to repose the problem of critical database elements detection as an optimization problem over the graph. This method is universally applicable over a large class of graphs (including directed, weighted, disconnected, cyclic) that occur in several contexts of databases. A generalization argument is presented which extends the critical data problem to abstract settings.
[ { "version": "v1", "created": "Sun, 20 Apr 2008 03:23:38 GMT" }, { "version": "v2", "created": "Sun, 27 Apr 2008 19:32:31 GMT" } ]
2008-04-27T00:00:00
[ [ "Alluvada", "Prashanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0804.3193
Diego Conti
Diego Conti
Symbolic computations in differential geometry
14 pages, 1 figure
null
null
null
math.DG cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the C++ library Wedge, based on GiNaC, for symbolic computations in differential geometry. We show how Wedge makes it possible to use the language C++ to perform such computations, and illustrate some advantages of this approach with explicit examples. In particular, we describe a short program to determine whether a given linear exterior differential system is involutive.
[ { "version": "v1", "created": "Sun, 20 Apr 2008 14:55:56 GMT" } ]
2008-04-22T00:00:00
[ [ "Conti", "Diego", "" ] ]
[ { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0804.3215
Martin Reisslein
Matthias an der Heiden, Michel Sortais, Michael Scheutzow, Martin Reisslein, and Martin Maier
Multicast Capacity of Optical WDM Packet Ring for Hotspot Traffic
null
null
10.1016/j.osn.2011.05.002
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Packet-switching WDM ring networks with a hotspot transporting unicast, multicast, and broadcast traffic are important components of high-speed metropolitan area networks. For an arbitrary multicast fanout traffic model with uniform, hotspot destination, and hotspot source packet traffic, we analyze the maximum achievable long-run average packet throughput, which we refer to as \textit{multicast capacity}, of bi-directional shortest-path routed WDM rings. We identify three segments that can experience the maximum utilization, and thus, limit the multicast capacity. We characterize the segment utilization probabilities through bounds and approximations, which we verify through simulations. We discover that shortest-path routing can lead to utilization probabilities above one half for moderate to large portions of hotspot source multi- and broadcast traffic, and consequently multicast capacities of less than two simultaneous packet transmissions. We outline a one-copy routing strategy that guarantees a multicast capacity of at least two simultaneous packet transmissions for arbitrary hotspot source traffic.
[ { "version": "v1", "created": "Sun, 20 Apr 2008 20:52:11 GMT" } ]
2013-11-04T00:00:00
[ [ "der Heiden", "Matthias an", "" ], [ "Sortais", "Michel", "" ], [ "Scheutzow", "Michael", "" ], [ "Reisslein", "Martin", "" ], [ "Maier", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]