id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0804.3234 | Jorge Leandro | J. J. G. Leandro (1), R. M. Cesar Jr (1) and L. da F. Costa (2) ((1)
Institute of Mathematics and Statistics - USP - Brazil, (2) Instituto de
F\'isica de S\~ao Carlos - USP - Brazil) | Technical Report - Automatic Contour Extraction from 2D Neuron Images | 40 pages, 22 figures and 02 tables. Typos corrected, references
added, figures added, new experiments added. Submitted to Elsevier-Journal of
Neuronscience Methods. For associated video demonstration of the system, see
http://www.vision.ime.usp.br/creativision/demos/branch/alfa-bta-bscea-fast.html | null | null | null | cs.CV q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work describes a novel methodology for automatic contour extraction from
2D images of 3D neurons (e.g. camera lucida images and other types of 2D
microscopy). Most contour-based shape analysis methods can not be used to
characterize such cells because of overlaps between neuronal processes. The
proposed framework is specifically aimed at the problem of contour following
even in presence of multiple overlaps. First, the input image is preprocessed
in order to obtain an 8-connected skeleton with one-pixel-wide branches, as
well as a set of critical regions (i.e., bifurcations and crossings). Next, for
each subtree, the tracking stage iteratively labels all valid pixel of
branches, up to a critical region, where it determines the suitable direction
to proceed. Finally, the labeled skeleton segments are followed in order to
yield the parametric contour of the neuronal shape under analysis. The reported
system was successfully tested with respect to several images and the results
from a set of three neuron images are presented here, each pertaining to a
different class, i.e. alpha, delta and epsilon ganglion cells, containing a
total of 34 crossings. The algorithms successfully got across all these
overlaps. The method has also been found to exhibit robustness even for images
with close parallel segments. The proposed method is robust and may be
implemented in an efficient manner. The introduction of this approach should
pave the way for more systematic application of contour-based shape analysis
methods in neuronal morphology.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 04:03:48 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Oct 2008 16:02:03 GMT"
}
] | 2008-10-24T00:00:00 | [
[
"Leandro",
"J. J. G.",
""
],
[
"Cesar",
"R. M.",
"Jr"
],
[
"Costa",
"L. da F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0804.3237 | Chantal Enguehard | Chantal Enguehard (LINA), Jean-Didier Graton | Electronic Voting: the Devil is in the Details | 9 pages | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Observing electronic voting from an international point of view gives some
perspective about its genesis and evolution. An analysis of the voting process
through its cultural, ontological, legal and political dimensions explains the
difficulty to normalize this process. It appears that international
organizations are not capable to properly defend the fundamental rights of the
citizens. The approach that was taken when DRE voting computers appeared seems
to have reoccured with VVAT voting computers and the european e-poll project.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 06:01:54 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Enguehard",
"Chantal",
"",
"LINA"
],
[
"Graton",
"Jean-Didier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.3241 | Sossio Vergara | Sossio Vergara | A Synthesizer Based on Frequency-Phase Analysis and Square Waves | 9 pages. Digital Signal Processing Journal 22 (2012) | null | null | null | cs.SD cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces an effective generalization of the polar flavor of
the Fourier Theorem based on a new method of analysis. Under the premises of
the new theory an ample class of functions become viable as bases, with the
further advantage of using the same basis for analysis and reconstruction. In
fact other tools, like the wavelets, admit specially built nonorthogonal bases
but require different bases for analysis and reconstruction (biorthogonal and
dual bases) and vectorial coordinates; this renders those systems unintuitive
and computing intensive. As an example of the advantages of the new
generalization of the Fourier Theorem, this paper introduces a novel method for
the synthesis that is based on frequency-phase series of square waves (the
equivalent of the polar Fourier Theorem but for nonorthogonal bases). The
resulting synthesizer is very efficient needing only few components, frugal in
terms of computing needs, and viable for many applications.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 06:32:23 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Nov 2013 09:08:26 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Vergara",
"Sossio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.3255 | Alessandro Nordio | A. Nordio, C-F. Chiasserini, and E. Viterbo | Reconstruction of Multidimensional Signals from Irregular Noisy Samples | To appear on IEEE Transactions on Signal Processing, 2008 | null | 10.1109/TSP.2008.925953 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on a multidimensional field with uncorrelated spectrum, and study
the quality of the reconstructed signal when the field samples are irregularly
spaced and affected by independent and identically distributed noise. More
specifically, we apply linear reconstruction techniques and take the mean
square error (MSE) of the field estimate as a metric to evaluate the signal
reconstruction quality. We find that the MSE analysis could be carried out by
using the closed-form expression of the eigenvalue distribution of the matrix
representing the sampling system. Unfortunately, such distribution is still
unknown. Thus, we first derive a closed-form expression of the distribution
moments, and we find that the eigenvalue distribution tends to the
Marcenko-Pastur distribution as the field dimension goes to infinity. Finally,
by using our approach, we derive a tight approximation to the MSE of the
reconstructed field.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 09:55:39 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Nordio",
"A.",
""
],
[
"Chiasserini",
"C-F.",
""
],
[
"Viterbo",
"E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3259 | Rui Zhang | Rui Zhang, Mehdi Mohseni, and John M. Cioffi | On Multiuser Power Region of Fading Multiple-Access Channel with
Multiple Antennas | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with the fading MIMO-MAC with multiple receive
antennas at the base station (BS) and multiple transmit antennas at each mobile
terminal (MT). Two multiple-access techniques are considered for scheduling
transmissions from each MT to the BS at the same frequency, which are
space-division multiple-access (SDMA) and time-division multiple-access (TDMA).
For SDMA, all MTs transmit simultaneously to the BS and their individual
signals are resolved at the BS via multiple receive antennas while for TDMA,
each MT transmits independently to the BS during mutually orthogonal time
slots. It is assumed that the channel-state information (CSI) of the fading
channel from each MT to the BS is unknown at each MT transmitter, but is
perfectly known at the BS receiver. Thereby, the BS can acquire the long-term
channel-distribution information (CDI) for each MT. This paper extends the
well-known transmit-covariance feedback scheme for the point-to-point fading
MIMO channel to the fading MIMO-MAC, whereby the BS jointly optimizes the
transmit signal covariance matrices for all MTs based on their CDI, and then
sends each transmit covariance matrix back to the corresponding MT via a
feedback channel. The main goal of this paper is to characterize the so-called
multiuser power region under the multiuser transmit-covariance feedback scheme
for both SDMA and TDMA. The power region is defined as the constitution of all
user transmit power-tuples that can achieve reliable transmissions for a given
set of user target rates. Simulation results show that SDMA can achieve
substantial power savings over TDMA for the fading MIMO-MAC. Moreover, this
paper demonstrates the usefulness of the multiuser power region for maintaining
proportionally-fair power consumption among the MTs.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 10:13:39 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Mohseni",
"Mehdi",
""
],
[
"Cioffi",
"John M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3261 | Rui Zhang | Rui Zhang | Optimal Dynamic Resource Allocation for Multi-Antenna Broadcasting with
Heterogeneous Delay-Constrained Traffic | null | null | 10.1109/JSTSP.2008.922470 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with dynamic resource allocation in a cellular
wireless network with slow fading for support of data traffic having
heterogeneous transmission delay requirements. The multiple-input single-output
(MISO) fading broadcast channel (BC) is of interest where the base station (BS)
employs multiple transmit antennas to realize simultaneous downlink
transmission at the same frequency to multiple mobile users each having a
single receive antenna. An information-theoretic approach is taken for
characterizing capacity limits of the fading MISO-BC under various transmission
delay considerations. First, this paper studies transmit optimization at the BS
when some users have delay-tolerant ``packet'' data and the others have
delay-sensitive ``circuit'' data for transmission at the same time. Based on
the convex optimization framework, an online resource allocation algorithm is
derived that is amenable to efficient cross-layer implementation of both
physical (PHY) -layer multi-antenna transmission and media-access-control (MAC)
-layer multiuser rate scheduling. Secondly, this paper investigates the
fundamental throughput-delay tradeoff for transmission over the fading MISO-BC.
By comparing the network throughput under completely relaxed versus strictly
zero transmission delay constraint, this paper characterizes the limiting loss
in sum capacity due to the vanishing delay tolerance, termed the delay penalty,
under some prescribed user fairness for transmit rate allocation.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 10:21:27 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Zhang",
"Rui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3266 | Olivier Finkel | Olivier Finkel (LIP) | Wadge Degrees of Infinitary Rational Relations | to appear in the journal Mathematics in Computer Science, in a
Special Issue on Intensional Programming & Semantics, in honour of Bill Wadge
on the occasion of his 60th cycle | Mathematics in Computer Science 1, 2 (2008) 85-102 | 10.1007/s11786-008-0045-7 | null | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that, from the topological point of view, 2-tape B\"uchi automata
have the same accepting power as Turing machines equipped with a B\"uchi
acceptance condition. The Borel and the Wadge hierarchies of the class
RAT_omega of infinitary rational relations accepted by 2-tape B\"uchi automata
are equal to the Borel and the Wadge hierarchies of omega-languages accepted by
real-time B\"uchi 1-counter automata or by B\"uchi Turing machines. In
particular, for every non-null recursive ordinal $\alpha$, there exist some
$\Sigma^0_\alpha$-complete and some $\Pi^0_\alpha$-complete infinitary rational
relations. And the supremum of the set of Borel ranks of infinitary rational
relations is an ordinal $\gamma^1_2$ which is strictly greater than the first
non-recursive ordinal $\omega_1^{CK}$. This very surprising result gives
answers to questions of Simonnet (1992) and of Lescow and Thomas (1988,1994).
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 19:12:44 GMT"
}
] | 2009-01-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0804.3269 | Santiago Fern\'andez | Santiago Fern\'andez, Alex Graves, Juergen Schmidhuber | Phoneme recognition in TIMIT with BLSTM-CTC | 8 pages | null | null | IDSIA-04-08 | cs.CL cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compare the performance of a recurrent neural network with the best
results published so far on phoneme recognition in the TIMIT database. These
published results have been obtained with a combination of classifiers.
However, in this paper we apply a single recurrent neural network to the same
task. Our recurrent neural network attains an error rate of 24.6%. This result
is not significantly different from that obtained by the other best methods,
but they rely on a combination of classifiers for achieving comparable
performance.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 15:38:45 GMT"
}
] | 2008-04-22T00:00:00 | [
[
"Fernández",
"Santiago",
""
],
[
"Graves",
"Alex",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.3271 | Ayfer Ozgur | Ayfer Ozgur, Ramesh Johari, David Tse, Olivier Leveque | Information Theoretic Operating Regimes of Large Wireless Networks | 12 pages, 5 figures, to appear in IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In analyzing the point-to-point wireless channel, insights about two
qualitatively different operating regimes--bandwidth- and power-limited--have
proven indispensable in the design of good communication schemes. In this
paper, we propose a new scaling law formulation for wireless networks that
allows us to develop a theory that is analogous to the point-to-point case. We
identify fundamental operating regimes of wireless networks and derive
architectural guidelines for the design of optimal schemes.
Our analysis shows that in a given wireless network with arbitrary size,
area, power, bandwidth, etc., there are three parameters of importance: the
short-distance SNR, the long-distance SNR, and the power path loss exponent of
the environment. Depending on these parameters we identify four qualitatively
different regimes. One of these regimes is especially interesting since it is
fundamentally a consequence of the heterogeneous nature of links in a network
and does not occur in the point-to-point case; the network capacity is {\em
both} power and bandwidth limited. This regime has thus far remained hidden due
to the limitations of the existing formulation. Existing schemes, either
multihop transmission or hierarchical cooperation, fail to achieve capacity in
this regime; we propose a new hybrid scheme that achieves capacity.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 13:12:50 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 2009 11:33:00 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Ozgur",
"Ayfer",
""
],
[
"Johari",
"Ramesh",
""
],
[
"Tse",
"David",
""
],
[
"Leveque",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3336 | Alban Ponse | Jan A. Bergstra and Alban Ponse | Differential Meadows | 8 pages, 2 tables | null | null | null | math.RA cs.LO math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A meadow is a zero totalised field (0^{-1}=0), and a cancellation meadow is a
meadow without proper zero divisors. In this paper we consider differential
meadows, i.e., meadows equipped with differentiation operators. We give an
equational axiomatization of these operators and thus obtain a finite basis for
differential cancellation meadows. Using the Zariski topology we prove the
existence of a differential cancellation meadow.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 15:29:40 GMT"
}
] | 2009-02-07T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0804.3351 | Cinzia Di Giusto | Cinzia Di Giusto, Maurizio Gabbrielli, Maria Chiara Meo | On the Expressive Power of Multiple Heads in CHR | v.6 Minor changes, new formulation of definitions, changed some
details in the proofs | null | null | null | cs.LO cs.DC | http://creativecommons.org/licenses/by/3.0/ | Constraint Handling Rules (CHR) is a committed-choice declarative language
which has been originally designed for writing constraint solvers and which is
nowadays a general purpose language. CHR programs consist of multi-headed
guarded rules which allow to rewrite constraints into simpler ones until a
solved form is reached. Many empirical evidences suggest that multiple heads
augment the expressive power of the language, however no formal result in this
direction has been proved, so far.
In the first part of this paper we analyze the Turing completeness of CHR
with respect to the underneath constraint theory. We prove that if the
constraint theory is powerful enough then restricting to single head rules does
not affect the Turing completeness of the language. On the other hand,
differently from the case of the multi-headed language, the single head CHR
language is not Turing powerful when the underlying signature (for the
constraint theory) does not contain function symbols.
In the second part we prove that, no matter which constraint theory is
considered, under some reasonable assumptions it is not possible to encode the
CHR language (with multi-headed rules) into a single headed language while
preserving the semantics of the programs. We also show that, under some
stronger assumptions, considering an increasing number of atoms in the head of
a rule augments the expressive power of the language.
These results provide a formal proof for the claim that multiple heads
augment the expressive power of the CHR language.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 16:21:43 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Mar 2009 19:49:25 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Apr 2009 16:29:03 GMT"
},
{
"version": "v4",
"created": "Mon, 8 Feb 2010 18:22:39 GMT"
},
{
"version": "v5",
"created": "Fri, 5 Nov 2010 21:19:52 GMT"
},
{
"version": "v6",
"created": "Tue, 18 Jan 2011 11:03:53 GMT"
}
] | 2011-01-19T00:00:00 | [
[
"Di Giusto",
"Cinzia",
""
],
[
"Gabbrielli",
"Maurizio",
""
],
[
"Meo",
"Maria Chiara",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.3361 | Forrest Bao | Forrest Sheng Bao, Donald Yu-Chun Lie, Yuanlin Zhang | A New Approach to Automated Epileptic Diagnosis Using EEG and
Probabilistic Neural Network | 5 pages, 6 figures, 1 table, submitted to IEEE ICTAI 2008 | null | 10.1109/ICTAI.2008.99 | null | cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Epilepsy is one of the most common neurological disorders that greatly impair
patient' daily lives. Traditional epileptic diagnosis relies on tedious visual
screening by neurologists from lengthy EEG recording that requires the presence
of seizure (ictal) activities. Nowadays, there are many systems helping the
neurologists to quickly find interesting segments of the lengthy signal by
automatic seizure detection. However, we notice that it is very difficult, if
not impossible, to obtain long-term EEG data with seizure activities for
epilepsy patients in areas lack of medical resources and trained neurologists.
Therefore, we propose to study automated epileptic diagnosis using interictal
EEG data that is much easier to collect than ictal data. The authors are not
aware of any report on automated EEG diagnostic system that can accurately
distinguish patients' interictal EEG from the EEG of normal people. The
research presented in this paper, therefore, aims to develop an automated
diagnostic system that can use interictal EEG data to diagnose whether the
person is epileptic. Such a system should also detect seizure activities for
further investigation by doctors and potential patient monitoring. To develop
such a system, we extract four classes of features from the EEG data and build
a Probabilistic Neural Network (PNN) fed with these features. Leave-one-out
cross-validation (LOO-CV) on a widely used epileptic-normal data set reflects
an impressive 99.5% accuracy of our system on distinguishing normal people's
EEG from patient's interictal EEG. We also find our system can be used in
patient monitoring (seizure detection) and seizure focus localization, with
96.7% and 77.5% accuracy respectively on the data set.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 17:07:59 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2008 01:45:56 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Bao",
"Forrest Sheng",
""
],
[
"Lie",
"Donald Yu-Chun",
""
],
[
"Zhang",
"Yuanlin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0804.3417 | Nicholas M. Ball | Nicholas M. Ball (1), Robert J. Brunner (1 and 2), Adam D. Myers (1)
((1) Department of Astronomy, University of Illinois at Urbana-Champaign, (2)
National Center for Supercomputing Applications, Urbana-Champaign) | Robust Machine Learning Applied to Terascale Astronomical Datasets | 11 pages, 2 figures, uses llncs.cls. To appear in the 9th LCI
International Conference on High-Performance Clustered Computing | null | null | Not arXiv:0710.4482 | astro-ph cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present recent results from the LCDM (Laboratory for Cosmological Data
Mining; http://lcdm.astro.uiuc.edu) collaboration between UIUC Astronomy and
NCSA to deploy supercomputing cluster resources and machine learning algorithms
for the mining of terascale astronomical datasets. This is a novel application
in the field of astronomy, because we are using such resources for data mining,
and not just performing simulations. Via a modified implementation of the NCSA
cyberenvironment Data-to-Knowledge, we are able to provide improved
classifications for over 100 million stars and galaxies in the Sloan Digital
Sky Survey, improved distance measures, and a full exploitation of the simple
but powerful k-nearest neighbor algorithm. A driving principle of this work is
that our methods should be extensible from current terascale datasets to
upcoming petascale datasets and beyond. We discuss issues encountered to-date,
and further issues for the transition to petascale. In particular, disk I/O
will become a major limiting factor unless the necessary infrastructure is
implemented.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 21:58:18 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Ball",
"Nicholas M.",
"",
"1 and 2"
],
[
"Brunner",
"Robert J.",
"",
"1 and 2"
],
[
"Myers",
"Adam D.",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.3421 | Suhas Mathur | Suhas Mathur, Lalitha Sankar, Narayan B. Mandayam | Coalitions in Cooperative Wireless Networks | To appear in the IEEE Journal on Selected Areas in Communication,
Special Issue on Game Theory in Communication Systems, 2008 | null | 10.1109/JSAC.2008.080908 | null | cs.GT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperation between rational users in wireless networks is studied using
coalitional game theory. Using the rate achieved by a user as its utility, it
is shown that the stable coalition structure, i.e., set of coalitions from
which users have no incentives to defect, depends on the manner in which the
rate gains are apportioned among the cooperating users. Specifically, the
stability of the grand coalition (GC), i.e., the coalition of all users, is
studied. Transmitter and receiver cooperation in an interference channel (IC)
are studied as illustrative cooperative models to determine the stable
coalitions for both flexible (transferable) and fixed (non-transferable)
apportioning schemes. It is shown that the stable sum-rate optimal coalition
when only receivers cooperate by jointly decoding (transferable) is the GC. The
stability of the GC depends on the detector when receivers cooperate using
linear multiuser detectors (non-transferable). Transmitter cooperation is
studied assuming that all receivers cooperate perfectly and that users outside
a coalition act as jammers. The stability of the GC is studied for both the
case of perfectly cooperating transmitters (transferrable) and under a partial
decode-and-forward strategy (non-transferable). In both cases, the stability is
shown to depend on the channel gains and the transmitter jamming strengths.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2008 23:00:22 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Mathur",
"Suhas",
""
],
[
"Sankar",
"Lalitha",
""
],
[
"Mandayam",
"Narayan B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3430 | Siavash Ekbatani | Siavash Ekbatani and Hamid Jafarkhani | Combining Beamforming and Space-Time Coding Using Noisy Quantized
Feedback | In revision for IEEE Transactions on Communications, April 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of combining beamforming and space-time coding in this work is to
obtain full-diversity order and to provide additional received power (array
gain) compared to conventional space-time codes. In our system, we consider a
quasi-static fading environment and we incorporate both high-rate and low-rate
feedback channels with possible feedback errors. To utilize feedback
information, a class of code constellations is proposed, inspired from
orthogonal designs and precoded space-time block codes, which is called
generalized partly orthogonal designs or generalized PODs. Furthermore, to
model feedback errors, we assume that the feedback bits go through binary
symmetric channels (BSCs). Two cases are studied: first, when the BSC bit error
probability is known a priori to the transmission ends and second, when it is
not known exactly. In the first case, we derive a minimum pairwise error
probability (PEP) design criterion for generalized PODs. Then we design the
quantizer for the erroneous feedback channel and the precoder codebook of PODs
based on this criterion. The quantization scheme in our system is a channel
optimized vector quantizer (COVQ). In the second case, the design of the
quantizer and the precoder codebook is based on similar approaches, however
with a worst-case design strategy. The attractive property of our combining
scheme is that it converges to conventional space-time coding with low-rate and
erroneous feedback and to directional beamforming with high-rate and error-free
feedback. This scheme shows desirable robustness against feedback channel
modeling mismatch.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 01:16:50 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"Ekbatani",
"Siavash",
""
],
[
"Jafarkhani",
"Hamid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3434 | Peter Selinger | Peter Selinger | Lecture notes on the lambda calculus | 120 pages. Added in v2: section on polymorphism | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is a set of lecture notes that developed out of courses on the lambda
calculus that I taught at the University of Ottawa in 2001 and at Dalhousie
University in 2007 and 2013. Topics covered in these notes include the untyped
lambda calculus, the Church-Rosser theorem, combinatory algebras, the
simply-typed lambda calculus, the Curry-Howard isomorphism, weak and strong
normalization, polymorphism, type inference, denotational semantics, complete
partial orders, and the language PCF.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 03:16:03 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Dec 2013 03:58:30 GMT"
}
] | 2013-12-30T00:00:00 | [
[
"Selinger",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.3439 | Shuchin Aeron | Shuchin Aeron, Venkatesh Saligrama and Manqi Zhao | Information theoretic bounds for Compressed Sensing | 30 pages, 2 figures, submitted to IEEE Trans. on IT | IEEE Transactions on Information Theory, 56, Issue:10, Oct. 2010,
5111-5130 | 10.1109/TIT.2010.2059891 | INSPEC accession number 11523421 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we derive information theoretic performance bounds to sensing
and reconstruction of sparse phenomena from noisy projections. We consider two
settings: output noise models where the noise enters after the projection and
input noise models where the noise enters before the projection. We consider
two types of distortion for reconstruction: support errors and mean-squared
errors. Our goal is to relate the number of measurements, $m$, and $\snr$, to
signal sparsity, $k$, distortion level, $d$, and signal dimension, $n$. We
consider support errors in a worst-case setting. We employ different variations
of Fano's inequality to derive necessary conditions on the number of
measurements and $\snr$ required for exact reconstruction. To derive sufficient
conditions we develop new insights on max-likelihood analysis based on a novel
superposition property. In particular this property implies that small support
errors are the dominant error events. Consequently, our ML analysis does not
suffer the conservatism of the union bound and leads to a tighter analysis of
max-likelihood. These results provide order-wise tight bounds. For output noise
models we show that asymptotically an $\snr$ of $\Theta(\log(n))$ together with
$\Theta(k \log(n/k))$ measurements is necessary and sufficient for exact
support recovery. Furthermore, if a small fraction of support errors can be
tolerated, a constant $\snr$ turns out to be sufficient in the linear sparsity
regime. In contrast for input noise models we show that support recovery fails
if the number of measurements scales as $o(n\log(n)/SNR)$ implying poor
compression performance for such cases. We also consider Bayesian set-up and
characterize tradeoffs between mean-squared distortion and the number of
measurements using rate-distortion theory.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 03:25:12 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Feb 2009 20:14:24 GMT"
},
{
"version": "v3",
"created": "Tue, 26 May 2009 14:57:09 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jul 2009 16:39:39 GMT"
},
{
"version": "v5",
"created": "Wed, 28 Apr 2010 18:53:34 GMT"
}
] | 2011-12-22T00:00:00 | [
[
"Aeron",
"Shuchin",
""
],
[
"Saligrama",
"Venkatesh",
""
],
[
"Zhao",
"Manqi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3453 | Lan Zhang | Lan Zhang, Yan Xin, Ying-Chang Liang | Weighted Sum Rate Optimization for Cognitive Radio MIMO Broadcast
Channels | 30 pages, 9 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a cognitive radio (CR) network in which the
unlicensed (secondary) users are allowed to concurrently access the spectrum
allocated to the licensed (primary) users provided that their interference to
the primary users (PUs) satisfies certain constraints. We study a weighted sum
rate maximization problem for the secondary user (SU) multiple input multiple
output (MIMO) broadcast channel (BC), in which the SUs have not only the sum
power constraint but also interference constraints. We first transform this
multi-constraint maximization problem into its equivalent form, which involves
a single constraint with multiple auxiliary variables. Fixing these multiple
auxiliary variables, we propose a duality result for the equivalent problem.
Our duality result can solve the optimization problem for MIMO-BC with multiple
linear constraints, and thus can be viewed as an extension of the conventional
results, which rely crucially on a single sum power constraint. Furthermore, we
develop an efficient sub-gradient based iterative algorithm to solve the
equivalent problem and show that the developed algorithm converges to a
globally optimal solution. Simulation results are further provided to
corroborate the effectiveness of the proposed algorithm.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 06:49:42 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"Zhang",
"Lan",
""
],
[
"Xin",
"Yan",
""
],
[
"Liang",
"Ying-Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3459 | Hector Zenil | Jean-Paul Delahaye, Hector Zenil | Towards a stable definition of Kolmogorov-Chaitin complexity | 15 pages, 4 figures, 2 tables. V2 minor typo corrections. Paper web
page on Experimental Algorithmic Information Theory:
http://http://www.mathrix.org/experimentalAIT/ | null | null | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although information content is invariant up to an additive constant, the
range of possible additive constants applicable to programming languages is so
large that in practice it plays a major role in the actual evaluation of K(s),
the Kolmogorov-Chaitin complexity of a string s. Some attempts have been made
to arrive at a framework stable enough for a concrete definition of K,
independent of any constant under a programming language, by appealing to the
"naturalness" of the language in question. The aim of this paper is to present
an approach to overcome the problem by looking at a set of models of
computation converging in output probability distribution such that that
"naturalness" can be inferred, thereby providing a framework for a stable
definition of K under the set of convergent models of computation.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 07:18:37 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2008 04:30:38 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Jun 2010 20:04:14 GMT"
}
] | 2010-06-03T00:00:00 | [
[
"Delahaye",
"Jean-Paul",
""
],
[
"Zenil",
"Hector",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3486 | Lin Dai | Tony T. Lee and Lin Dai | Stability and Throughput of Buffered Aloha with Backoff | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the buffered Aloha with K-exponential backoff collision
resolution algorithms. The buffered Aloha network is modeled as a multi-queue
single-server system. We adopt a widely used approach in packet switching
systems to decompose the multi-queue system into independent first-in-first-out
(FIFO) queues, which are hinged together by the probability of success of
head-of-line (HOL) packets. A unified method is devised to tackle the stability
and throughput problems of K-exponential backoff with any cutoff phase K. For
networks with a finite number of nodes, we show that the K-exponential backoff
is stable if the retransmission factor is properly chosen from the stable
region. The maximum stable throughput is derived and demonstrated via examples
of geometric retransmission (K=1) and exponential backoff (K=infinity). For
networks with an infinite number of nodes, we show that geometric
retransmission is unstable, and the stable network throughput of exponential
backoff can only be achieved at the cost of potential unbounded delay in each
input queue. Furthermore, we address the stability issue of the systems at the
undesired stable point. All analytical results presented in this paper are
verified and confirmed by simulations.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 09:59:38 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"Lee",
"Tony T.",
""
],
[
"Dai",
"Lin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.3500 | Claudia Landi | M. d'Amico, P. Frosini and C.Landi | Natural pseudo-distance and optimal matching between reduced size
functions | null | null | null | null | cs.CG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the properties of a new lower bound for the natural
pseudo-distance. The natural pseudo-distance is a dissimilarity measure between
shapes, where a shape is viewed as a topological space endowed with a
real-valued continuous function. Measuring dissimilarity amounts to minimizing
the change in the functions due to the application of homeomorphisms between
topological spaces, with respect to the $L_\infty$-norm. In order to obtain the
lower bound, a suitable metric between size functions, called matching
distance, is introduced. It compares size functions by solving an optimal
matching problem between countable point sets. The matching distance is shown
to be resistant to perturbations, implying that it is always smaller than the
natural pseudo-distance. We also prove that the lower bound so obtained is
sharp and cannot be improved by any other distance between size functions.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 11:25:11 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"d'Amico",
"M.",
""
],
[
"Frosini",
"P.",
""
],
[
"Landi",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0804.3507 | Diego Ruano | Fernando Hernando, Diego Ruano | Sixteen New Linear Codes With Plotkin Sum | Submitted to IEEE Trans. Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sixteen new linear codes are presented: three of them improve the lower
bounds on the minimum distance for a linear code and the rest are an explicit
construction of unknown codes attaining the lower bounds on the minimum
distance. They are constructed using the Plotkin sum of two linear codes, also
called $(u|u+v)$ construction. The computations have been achieved using an
exhaustiv search.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 11:51:22 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"Hernando",
"Fernando",
""
],
[
"Ruano",
"Diego",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3575 | S. Charles Brubaker | S. Charles Brubaker and Santosh S. Vempala | Isotropic PCA and Affine-Invariant Clustering | null | null | null | null | cs.LG cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new algorithm for clustering points in R^n. The key property of
the algorithm is that it is affine-invariant, i.e., it produces the same
partition for any affine transformation of the input. It has strong guarantees
when the input is drawn from a mixture model. For a mixture of two arbitrary
Gaussians, the algorithm correctly classifies the sample assuming only that the
two components are separable by a hyperplane, i.e., there exists a halfspace
that contains most of one Gaussian and almost none of the other in probability
mass. This is nearly the best possible, improving known results substantially.
For k > 2 components, the algorithm requires only that there be some
(k-1)-dimensional subspace in which the emoverlap in every direction is small.
Here we define overlap to be the ratio of the following two quantities: 1) the
average squared distance between a point and the mean of its component, and 2)
the average squared distance between a point and the mean of the mixture. The
main result may also be stated in the language of linear discriminant analysis:
if the standard Fisher discriminant is small enough, labels are not needed to
estimate the optimal subspace for projection. Our main tools are isotropic
transformation, spectral projection and a simple reweighting technique. We call
this combination isotropic PCA.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 17:59:03 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Aug 2008 19:28:46 GMT"
}
] | 2008-08-04T00:00:00 | [
[
"Brubaker",
"S. Charles",
""
],
[
"Vempala",
"Santosh S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.3583 | Rico Zenklusen | Rico Zenklusen | Matching Interdiction | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the matching interdiction problem, we are given an undirected graph with
weights and interdiction costs on the edges and seek to remove a subset of the
edges constrained to some budget, such that the weight of a maximum weight
matching in the remaining graph is minimized. In this work we introduce the
matching interdiction problem and show that it is strongly NP-complete even
when the input is restricted to simple, bipartite graphs with unit edge weights
and unit interdiction costs. Furthermore, we present a pseudo-polynomial
algorithm for solving the matching interdiction problem on graphs with bounded
treewidth. The proposed algorithm extends the approach that is typically used
for the creation of efficient algorithms on graphs with bounded treewidth to
interdiction problems.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 18:44:46 GMT"
}
] | 2008-04-23T00:00:00 | [
[
"Zenklusen",
"Rico",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.3599 | Lillian Lee | Oren Kurland, Lillian Lee | Respect My Authority! HITS Without Hyperlinks, Utilizing Cluster-Based
Language Models | null | Proceedings of SIGIR 2006, pp 83--90 | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an approach to improving the precision of an initial document
ranking wherein we utilize cluster information within a graph-based framework.
The main idea is to perform re-ranking based on centrality within bipartite
graphs of documents (on one side) and clusters (on the other side), on the
premise that these are mutually reinforcing entities. Links between entities
are created via consideration of language models induced from them.
We find that our cluster-document graphs give rise to much better retrieval
performance than previously proposed document-only graphs do. For example,
authority-based re-ranking of documents via a HITS-style cluster-based approach
outperforms a previously-proposed PageRank-inspired algorithm applied to
solely-document graphs. Moreover, we also show that computing authority scores
for clusters constitutes an effective method for identifying clusters
containing a large percentage of relevant documents.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 20:02:14 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Kurland",
"Oren",
""
],
[
"Lee",
"Lillian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0804.3615 | Jarek Duda | Jarek Duda | Combinatorial invariants for graph isomorphism problem | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Presented approach in polynomial time calculates large number of invariants
for each vertex, which won't change with graph isomorphism and should fully
determine the graph. For example numbers of closed paths of length k for given
starting vertex, what can be though as the diagonal terms of k-th power of the
adjacency matrix. For k=2 we would get degree of verities invariant, higher
describes local topology deeper. Now if two graphs are isomorphic, they have
the same set of such vectors of invariants - we can sort theses vectors
lexicographically and compare them. If they agree, permutations from sorting
allow to reconstruct the isomorphism. I'm presenting arguments that these
invariants should fully determine the graph, but unfortunately I can't prove it
in this moment. This approach can give hope, that maybe P=NP - instead of
checking all instances, we should make arithmetics on these large numbers.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2008 22:16:46 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Apr 2008 21:54:08 GMT"
},
{
"version": "v3",
"created": "Fri, 9 May 2008 07:09:06 GMT"
},
{
"version": "v4",
"created": "Mon, 19 May 2008 14:20:36 GMT"
}
] | 2008-05-19T00:00:00 | [
[
"Duda",
"Jarek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.3650 | Sossio Vergara | Sossio Vergara | On generic frequency decomposition. Part 1: vectorial decomposition | 15 pages, no figures | Digital Signal Processing Journal, Vol. 17 March 2007 | null | null | cs.NA math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The famous Fourier theorem states that, under some restrictions, any periodic
function (or real world signal) can be obtained as a sum of sinusoids, and
hence, a technique exists for decomposing a signal into its sinusoidal
components. From this theory an entire branch of research has flourished: from
the Short-Time or Windowed Fourier Transform to the Wavelets, the Frames, and
lately the Generic Frequency Analysis. The aim of this paper is to take the
Frequency Analysis a step further. It will be shown that keeping the same
reconstruction algorithm as the Fourier Theorem but changing to a new computing
method for the analysis phase allows the generalization of the Fourier Theorem
to a large class of nonorthogonal bases. New methods and algorithms can be
employed in function decomposition on such generic bases. It will be shown that
these algorithms are a generalization of the Fourier analysis, i.e. they are
reduced to the familiar Fourier tools when using orthogonal bases. The
differences between this tool and the wavelets and frames theories will be
discussed. Examples of analysis and reconstruction of functions using the given
algorithms and nonorthogonal bases will be given. In this first part the focus
will be on vectorial decomposition, while the second part will be on phased
decomposition. The phased decomposition thanks to a single function basis has
many interesting consequences and applications.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 07:30:38 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Vergara",
"Sossio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0804.3671 | Julien Fayolle | Frederique Bassino, Julien Clement, Julien Fayolle, Pierre Nicodeme | Constructions for Clumps Statistics | 12 p., 2 figs | null | null | null | cs.DM cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a component of the word statistics known as clump; starting from
a finite set of words, clumps are maximal overlapping sets of these
occurrences. This parameter has first been studied by Schbath with the aim of
counting the number of occurrences of words in random texts. Later work with
similar probabilistic approach used the Chen-Stein approximation for a compound
Poisson distribution, where the number of clumps follows a law close to
Poisson. Presently there is no combinatorial counterpart to this approach, and
we fill the gap here. We emphasize the fact that, in contrast with the
probabilistic approach which only provides asymptotic results, the
combinatorial approach provides exact results that are useful when considering
short sequences.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 10:38:15 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Bassino",
"Frederique",
""
],
[
"Clement",
"Julien",
""
],
[
"Fayolle",
"Julien",
""
],
[
"Nicodeme",
"Pierre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0804.3678 | Dominik Janzing | Dominik Janzing and Bernhard Schoelkopf | Causal inference using the algorithmic Markov condition | 16 figures | null | null | null | math.ST cs.IT math.IT stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inferring the causal structure that links n observables is usually based upon
detecting statistical dependences and choosing simple graphs that make the
joint measure Markovian. Here we argue why causal inference is also possible
when only single observations are present.
We develop a theory how to generate causal graphs explaining similarities
between single objects. To this end, we replace the notion of conditional
stochastic independence in the causal Markov condition with the vanishing of
conditional algorithmic mutual information and describe the corresponding
causal inference rules.
We explain why a consistent reformulation of causal inference in terms of
algorithmic complexity implies a new inference principle that takes into
account also the complexity of conditional probability densities, making it
possible to select among Markov equivalent causal graphs. This insight provides
a theoretical foundation of a heuristic principle proposed in earlier work.
We also discuss how to replace Kolmogorov complexity with decidable
complexity criteria. This can be seen as an algorithmic analog of replacing the
empirically undecidable question of statistical independence with practical
independence tests that are based on implicit or explicit assumptions on the
underlying distribution.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 10:39:41 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Janzing",
"Dominik",
""
],
[
"Schoelkopf",
"Bernhard",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0804.3680 | Jan Plato\v{s} | Jan Platos, Jiri Dvorsky | Word-Based Text Compression | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today there are many universal compression algorithms, but in most cases is
for specific data better using specific algorithm - JPEG for images, MPEG for
movies, etc. For textual documents there are special methods based on PPM
algorithm or methods with non-character access, e.g. word-based compression. In
the past, several papers describing variants of word-based compression using
Huffman encoding or LZW method were published. The subject of this paper is the
description of a word-based compression variant based on the LZ77 algorithm.
The LZ77 algorithm and its modifications are described in this paper. Moreover,
various ways of sliding window implementation and various possibilities of
output encoding are described, as well. This paper also includes the
implementation of an experimental application, testing of its efficiency and
finding the best combination of all parts of the LZ77 coder. This is done to
achieve the best compression ratio. In conclusion there is comparison of this
implemented application with other word-based compression programs and with
other commonly used compression programs.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 10:30:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Platos",
"Jan",
""
],
[
"Dvorsky",
"Jiri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3752 | Vassilis Kostakos | Vassilis Kostakos | The privacy implications of Bluetooth | 10 pages, 2 tables | null | null | null | cs.CR cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A substantial amount of research, as well as media hype, has surrounded RFID
technology and its privacy implications. Currently, researchers and the media
focus on the privacy threats posed by RFID, while consumer groups choose to
boycott products bearing RFID tags. At the same, however, a very similar
technology has quietly become part of our everyday lives: Bluetooth. In this
paper we highlight the fact that Bluetooth is a widespread technology that has
real privacy implications. Furthermore, we explore the applicability of
RFID-based solutions to address these privacy implications.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 16:00:55 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Kostakos",
"Vassilis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0804.3762 | Frederic Blanqui | Fr\'ed\'eric Blanqui (INRIA Lorraine - LORIA), Jean-Pierre Jouannaud
(LIX, INRIA Saclay Ile de France), Pierre-Yves Strub (LIX, INRIA Saclay Ile
de France) | From formal proofs to mathematical proofs: a safe, incremental way for
building in first-order decision procedures | null | Dans TCS 2008 5th IFIP International Conference on Theoretical
Computer Science (2008) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate here a new version of the Calculus of Inductive Constructions
(CIC) on which the proof assistant Coq is based: the Calculus of Congruent
Inductive Constructions, which truly extends CIC by building in arbitrary
first-order decision procedures: deduction is still in charge of the CIC
kernel, while computation is outsourced to dedicated first-order decision
procedures that can be taken from the shelves provided they deliver a proof
certificate. The soundness of the whole system becomes an incremental property
following from the soundness of the certificate checkers and that of the
kernel. A detailed example shows that the resulting style of proofs becomes
closer to that of the working mathematician.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 16:56:46 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Jouannaud",
"Jean-Pierre",
"",
"LIX, INRIA Saclay Ile de France"
],
[
"Strub",
"Pierre-Yves",
"",
"LIX, INRIA Saclay Ile\n de France"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.3784 | Amitabha Bagchi | Amitabha Bagchi, Sohit Bansal | On the metric distortion of nearest-neighbour graphs on random point
sets | This work is now subsumed by arXiv:0805.4060v4 [cs.NI] | null | null | null | cs.NI cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the graph constructed on a Poisson point process in $d$ dimensions
by connecting each point to the $k$ points nearest to it. This graph a.s. has
an infinite cluster if $k > k_c(d)$ where $k_c(d)$, known as the critical
value, depends only on the dimension $d$. This paper presents an improved upper
bound of 188 on the value of $k_c(2)$. We also show that if $k \geq 188$ the
infinite cluster of $\NN(2,k)$ has an infinite subset of points with the
property that the distance along the edges of the graphs between these points
is at most a constant multiplicative factor larger than their Euclidean
distance. Finally we discuss in detail the relevance of our results to the
study of multi-hop wireless sensor networks.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 19:04:18 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jul 2008 08:54:53 GMT"
}
] | 2008-07-18T00:00:00 | [
[
"Bagchi",
"Amitabha",
""
],
[
"Bansal",
"Sohit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.3791 | Johan Bollen | Johan Bollen, Herbert Van de Sompel and Marko A. Rodriguez | Towards Usage-based Impact Metrics: - First Results from the MESUR
Project | Published in Proceedings of the Joint Conference on Digital Libraries
2008 (JCDL08), June 16, 2008, Pittsburgh, Pennsylvania, USA | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scholarly usage data holds the potential to be used as a tool to study the
dynamics of scholarship in real time, and to form the basis for the definition
of novel metrics of scholarly impact. However, the formal groundwork to
reliably and validly exploit usage data is lacking, and the exact nature,
meaning and applicability of usage-based metrics is poorly understood. The
MESUR project funded by the Andrew W. Mellon Foundation constitutes a
systematic effort to define, validate and cross-validate a range of usage-based
metrics of scholarly impact. MESUR has collected nearly 1 billion usage events
as well as all associated bibliographic and citation data from significant
publishers, aggregators and institutional consortia to construct a large-scale
usage data reference set. This paper describes some major challenges related to
aggregating and processing usage data, and discusses preliminary results
obtained from analyzing the MESUR reference data set. The results confirm the
intrinsic value of scholarly usage data, and support the feasibility of
reliable and valid usage-based metrics of scholarly impact.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 19:23:44 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Rodriguez",
"Marko A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0804.3796 | Arun Kumar S P | Arun Kumar S P | Service Cloaking and Authentication at Data Link Layer | null | null | null | null | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses that there is significant benefit in providing stronger
security at lower layers of the network stack for hosts connected to a network.
It claims to reduce the attack vulnerability of a networked host by providing
security mechanisms in a programmable Network Interface Card (NIC). Dynamic
access control mechanisms are implemented in hardware to restrict access to the
services provided, only to authenticated hosts. This reduces server
vulnerability to various layer 2 attacks. Also the services will be immune to
zero-day vulnerabilities due to the minimal code execution paths. To this end,
it presents architecture and implementation details of a programmable network
interface card equipped with these measures. It works alongside, and augments,
existing security protocols making deployment practical.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 20:01:01 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"P",
"Arun Kumar S",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.3814 | Arun Kumar S P | Arun Kumar S P, Diganta Baishya, Amrendra Kumar | Link Enhancer for Vehicular Wireless ATM Communications | null | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Majority of the applications used in defense are voice, video and data
oriented and has strict QoS requirements. One of the technologies that enabled
this is Asynchronous Transfer Mode (ATM) networking. Traditional ATM networks
are wired networks. But Tactical networks are meant to be mobile and this
necessitates the use of radio relays for Vehicle-to-Infrastructure (V2I) and
Vehicle-to-Vehicle (V2V) communications. ATM networks assume a physical link
layer BER of 10^-9 or better because of the availability of reliable media like
optical fiber links. But this assumption is no longer valid when ATM switches
are connected through radio relay where error rates are in the rage of 10^-3.
This paper presents the architecture of a Link Enhancer meant to improve the
Bit Error Rate of the Wireless links used for V2I and V2V communications from 1
in 10^4 to 1 in 10^8
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 18:54:11 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"P",
"Arun Kumar S",
""
],
[
"Baishya",
"Diganta",
""
],
[
"Kumar",
"Amrendra",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0804.3817 | Jan Arpe | Jan Arpe and Elchanan Mossel | Multiple Random Oracles Are Better Than One | 17 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of learning k-juntas given access to examples drawn from
a number of different product distributions. Thus we wish to learn a function f
: {-1,1}^n -> {-1,1} that depends on k (unknown) coordinates. While the best
known algorithms for the general problem of learning a k-junta require running
time of n^k * poly(n,2^k), we show that given access to k different product
distributions with biases separated by \gamma>0, the functions may be learned
in time poly(n,2^k,\gamma^{-k}). More generally, given access to t <= k
different product distributions, the functions may be learned in time n^{k/t} *
poly(n,2^k,\gamma^{-k}). Our techniques involve novel results in Fourier
analysis relating Fourier expansions with respect to different biases and a
generalization of Russo's formula.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2008 23:18:00 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Arpe",
"Jan",
""
],
[
"Mossel",
"Elchanan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0804.3825 | Chandra Nair | Chandra Nair and Vincent Wang Zizhou | On the inner and outer bounds for 2-receiver discrete memoryless
broadcast channels | 4 pages, 2 figures, ITA Workshop San Diego 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the best known general inner bound[MAR '79] and outer bound[N-EG'07]
for the capacity region of the two user discrete memory less channel. We prove
that a seemingly stronger outer bound is identical to a weaker form of the
outer bound that was also presented in [N-EG'07]. We are able to further
express the best outer bound in a form that is computable, i.e. there are
bounds on the cardinalities of the auxiliary random variables.
The inner and outer bounds coincide for all channels for which the capacity
region is known and it is not known whether the regions described by these
bounds are same or different. We present a channel, where assuming a certain
conjecture backed by simulations and partial theoretical results, one can show
that the bounds are different.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 01:45:50 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Nair",
"Chandra",
""
],
[
"Zizhou",
"Vincent Wang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.3860 | Hsiao-Fei Liu | Hsiao-Fei Liu and Kun-Mao Chao | An $\tilde{O}(n^{2.5})$-Time Algorithm for Online Topological Ordering | Better results have been proposed in the following paper: Haeupler,
Kavitha, Mathew, Sen, Tarjan: Faster Algorithms for Incremental Topological
Ordering. ICALP (1) 2008: 421-433 | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an $\tilde{O}(n^{2.5})$-time algorithm for maintaining the
topological order of a directed acyclic graph with $n$ vertices while inserting
$m$ edges.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 09:40:20 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Aug 2008 07:10:20 GMT"
}
] | 2008-08-23T00:00:00 | [
[
"Liu",
"Hsiao-Fei",
""
],
[
"Chao",
"Kun-Mao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.3862 | Icius Committee | Ding Meng, Cao Yun-feng, Wu Qing-xian and Zhang Zhen | Image Processing in Optical Guidance for Autonomous Landing of Lunar
Probe | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 5 pages, 8 figures | Proceedings of International Conference on Intelligent Unmanned
System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, ICIUS2007-A001 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Because of the communication delay between earth and moon, the GNC technology
of lunar probe is becoming more important than ever. Current navigation
technology is not able to provide precise motion estimation for probe landing
control system Computer vision offers a new approach to solve this problem. In
this paper, author introduces an image process algorithm of computer vision
navigation for autonomous landing of lunar probe. The purpose of the algorithm
is to detect and track feature points which are factors of navigation. Firstly,
fixation areas are detected as sub-images and matched. Secondly, feature points
are extracted from sub-images and tracked. Computer simulation demonstrates the
result of algorithm takes less computation and fulfils requests of navigation
algorithm.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 08:22:00 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Meng",
"Ding",
""
],
[
"Yun-feng",
"Cao",
""
],
[
"Qing-xian",
"Wu",
""
],
[
"Zhen",
"Zhang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3868 | Tobias Kretz | Tobias Kretz, Cornelia B\"onisch, and Peter Vortisch | Comparison of Various Methods for the Calculation of the Distance
Potential Field | Extended version of proceedings contriution to be published in
"Pedestrian and Evacuation Dynamics 2008", Springer; conference held in
February 2008 at Wuppertal University | Pedestrian and Evacuation Dynamics 2008 (2010), Part 2, 335-346 | 10.1007/978-3-642-04504-2_29 | null | physics.comp-ph cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The distance from a given position toward one or more destinations, exits,
and way points is a more or less important input variable in most models of
pedestrian dynamics. Except for the special case when there are no obstacles in
a concave scenario -- i.e. each position is visible from any other -- the
calculation of these distances is a non-trivial task. This isn't that big a
problem, as long as the model only demands the distances to be stored in a
Static Floor Field also called Potential Field, which never changes throughout
the whole simulation. In this case a pre-calculation once before the simulation
starts is sufficient. But if one wants to allow changes of the geometry during
a simulation run -- imagine doors or the blocking of a corridor due to some
hazard -- in the Distance Potential Field, calculation time matters strongly.
This contribution gives an overview over existing and new exact and approximate
methods to calculate a potential field, analytical investigations for their
exactness, and tests of their computation speed. The advantages and drawbacks
of the methods are discussed.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 09:13:08 GMT"
}
] | 2011-01-04T00:00:00 | [
[
"Kretz",
"Tobias",
""
],
[
"Bönisch",
"Cornelia",
""
],
[
"Vortisch",
"Peter",
""
]
] | [
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0804.3874 | Icius Committee | Widyawardana Adiprawita, Adang Suwandi Ahmad, and Jaka Semibiring | Hardware In The Loop Simulator in UAV Rapid Development Life Cycle | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 6 pages, 13 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A006 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Field trial is very critical and high risk in autonomous UAV development life
cycle. Hardware in the loop (HIL) simulation is a computer simulation that has
the ability to simulate UAV flight characteristic, sensor modeling and actuator
modeling while communicating in real time with the UAV autopilot hardware. HIL
simulation can be used to test the UAV autopilot hardware reliability, test the
closed loop performance of the overall system and tuning the control parameter.
By rigorous testing in the HIL simulator, the risk in the field trial can be
minimized.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 09:35:55 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Adiprawita",
"Widyawardana",
""
],
[
"Ahmad",
"Adang Suwandi",
""
],
[
"Semibiring",
"Jaka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3879 | Icius Committee | H.P.Thien, M.A.Moelyadi, and H. Muhammad | Effects of Leaders Position and Shape on Aerodynamic Performances of V
Flight Formation | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 7 pages, 15 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A008 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The influences of the leader in a group of V flight formation are dealt with.
The investigation is focused on the effect of its position and shape on
aerodynamics performances of a given V flight formation. Vortices generated the
wing tip of the leader moves downstream forming a pair of opposite rotating
line vortices. These vortices are generally undesirable because they create a
downwash that increases the induced drag on leaders wing. However, this
downwash is also accompanied by an upwash that can beneficial to the followers
wing flying behind the leaders one, namely a favorable lift for the followers
wing. How much contributions of the leaders wing to the followers wing in the V
formation flight is determined by the strength of tip vortices generated by the
leaders wing which is influenced by its position and shape including incidence
angle, dihedral angle, aspect ratio and taper ratio. The prediction of
aerodynamic performances of the V flight formation including lift, drag and
moment coefficients is numerically performed by solving Navier Stokes equations
with k e turbulence model. The computational domain is defined with multiblock
topology to capture the complex geometry arrangement of the V flight formation.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:01:29 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Thien",
"H. P.",
""
],
[
"Moelyadi",
"M. A.",
""
],
[
"Muhammad",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3881 | Icius Committee | Widyawardana Adiprawita, Adang Suwandi Ahmad, and Jaka Semibiring | Automated Flight Test and System Identification for Rotary Wing Small
Aerial Platform using Frequency Responses Analysis | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 7 pages, 15 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A009 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an autopilot system that can be used to control the small
scale rotorcraft during the flight test for linear-frequency-domain system
identification. The input frequency swept is generated automatically as part of
the autopilot control command. Therefore the bandwidth coverage and consistency
of the frequency swept is guaranteed to produce high quality data for system
identification. Beside that we can set the safety parameter during the flight
test (maximum roll or pitch value, minimum altitude, etc) so the safety of the
whole flight test is guaranteed. This autopilot for automated flight test will
be tested using hardware in the loop simulator for hover flight condition.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:07:34 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Adiprawita",
"Widyawardana",
""
],
[
"Ahmad",
"Adang Suwandi",
""
],
[
"Semibiring",
"Jaka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3882 | Icius Committee | Joga D. Setiawan, Mochamad Subchan, and Agus Budiyono | Virtual Reality Simulation of Fire Fighting Robot Dynamic and Motion | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 7 pages, 16 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A010 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents one approach in designing a Fire Fighting Robot which has
been contested annually in a robotic student competition in many countries
following the rules initiated at the Trinity College. The approach makes use of
computer simulation and animation in a virtual reality environment. In the
simulation, the amount of time, starting from home until the flame is
destroyed, can be confirmed. The efficacy of algorithms and parameter values
employed can be easily evaluated. Rather than spending time building the real
robot in a trial and error fashion, now students can explore more variation of
algorithm, parameter and sensor-actuator configuration in the early stage of
design. Besides providing additional excitement during learning process and
enhancing students understanding to the engineering aspects of the design, this
approach could become a useful tool to increase the chance of winning the
contest.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:13:53 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Setiawan",
"Joga D.",
""
],
[
"Subchan",
"Mochamad",
""
],
[
"Budiyono",
"Agus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3885 | Icius Committee | K. Muljowidodo, and N. Sapto Adi | Heading Lock Maneuver Testing of Autonomous Underwater Vehicle | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 7 pages, 11 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A014 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, Autonomous Underwater Vehicle (UAV) research and development
at Bandung Institute of Technology in Indonesia has achieved the testing stage
in the field. This testing was still being classified as the early testing,
since some of the preliminary tests were carried out in the scale of the
laboratory. The paper would discuss the laboratory test and several tests that
were done in the field. Discussions were stressed in the procedure and the aim
that will be achieved, along with several early results. The testing was
carried out in the lake with the area around 8300 Ha and the maximum depth of
50 meters. The location of the testing was chosen with consideration of
minimizing the effect of the current and the wave, as well as the location that
was not too far from the Laboratory. The type of testing that will be discussed
in paper was Heading Lock Maneuver Testing. The vehicle was tested to move with
a certain cruising speed, afterwards it was commanded by an arbitrarily
selected heading direction. The response and the behavior of the vehicle were
recorded as the data produced by the testing.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:25:41 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Muljowidodo",
"K.",
""
],
[
"Adi",
"N. Sapto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3891 | Icius Committee | Riyanto Bambang | Development of Architectures for Internet Telerobotics Systems | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 6 pages, 8 figures, 1 table | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-B004 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents our experience in developing and implementing Internet
telerobotics system. Internet telerobotics system refers to a robot system
controlled and monitored remotely through the Internet. A robot manipulator
with five degrees of freedom, called Mentor, is employed. Client-server
architecture is chosen as a platform for our Internet telerobotics system.
Three generations of telerobotics systems have evolved in this research. The
first generation was based on CGI and two tiered architecture, where a client
presents a Graphical User Interface to the user, and utilizes the user's data
entry and actions to perform requests to robot server running on a different
machine. The second generation was developed using Java. We also employ Java 3D
for creating and manipulating 3D geometry of manipulator links and for
constructing the structures used in rendering that geometry, resulting in 3D
robot movement simulation presented to the users(clients) through their web
browser. Recent development in our Internet telerobotics includes object
recognition through image captured by a camera, which poses challenging
problem, given the undeterministic latency of the Internet. The third
generation is centered around the use of CORBA for development platform of
distributed internet telerobotics system, aimed at distributing task of
telerobotics system.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:43:46 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Bambang",
"Riyanto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3894 | Icius Committee | Widyawardana Adiprawita, Adang Suwandi Ahmad, and Jaka Semibiring | Unmanned Aerial Vehicle Instrumentation for Rapid Aerial Photo System | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 9 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A020-P | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This research will proposed a new kind of relatively low cost autonomous UAV
that will enable farmers to make just in time mosaics of aerial photo of their
crop. These mosaics of aerial photo should be able to be produced with
relatively low cost and within the 24 hours of acquisition constraint. The
autonomous UAV will be equipped with payload management system specifically
developed for rapid aerial mapping. As mentioned before turn around time is the
key factor, so accuracy is not the main focus (not orthorectified aerial
mapping). This system will also be equipped with special software to post
process the aerial photos to produce the mosaic aerial photo map
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:48:13 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Adiprawita",
"Widyawardana",
""
],
[
"Ahmad",
"Adang Suwandi",
""
],
[
"Semibiring",
"Jaka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3895 | Icius Committee | A. Budiyono, T. Sudiyanto, and H. Lesmana | First Principle Approach to Modeling of Small Scale Helicopter | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 11 pages, 22 figures, 16 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A019-P | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The establishment of global helicopter linear model is very precious and
useful for the design of the linear control laws, since it is never afforded in
the published literatures. In the first principle approach, the mathematical
model was developed using basic helicopter theory accounting for particular
characteristic of the miniature helicopter. No formal system identification
procedures are required for the proposed model structure. The relevant
published literatures however did not present the linear models required for
the design of linear control laws. The paper presents a step by step
development of linear model for small scale helicopter based on first-principle
approach. Beyond the previous work in literatures, the calculation of the
stability derivatives is presented in detail. A computer program is used to
solve the equilibrium conditions and then calculate the change in aerodynamics
forces and moments due to the change in each degree of freedom and control
input. The detail derivation allows the comprehensive analysis of relative
dominance of vehicle states and input variables to force and moment components.
Hence it facilitates the development of minimum complexity small scale
helicopter dynamics model.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:52:30 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Budiyono",
"A.",
""
],
[
"Sudiyanto",
"T.",
""
],
[
"Lesmana",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3897 | Icius Committee | Agus Budiyono, and Singgih S. Wibowo | Optimal Tracking Controller Design for a Small Scale Helicopter | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 9 pages, 12 figures, 3 tables, 1 appendix | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A018-P | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A model helicopter is more difficult to control than its full scale
counterparts. This is due to its greater sensitivity to control inputs and
disturbances as well as higher bandwidth of dynamics. This works is focused on
designing practical tracking controller for a small scale helicopter following
predefined trajectories. A tracking controller based on optimal control theory
is synthesized as part of the development of an autonomous helicopter. Some
issues in regards to control constraints are addressed. The weighting between
state tracking performance and control power expenditure is analyzed. Overall
performance of the control design is evaluated based on its time domain
histories of trajectories as well as control inputs.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 10:58:35 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Budiyono",
"Agus",
""
],
[
"Wibowo",
"Singgih S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.3902 | Tiziana Calamoneri | Tiziana Calamoneri, Andrea E.F. Clementi, Angelo Monti, Gianluca
Rossi, Riccardo Silvestri | Minimum-energy broadcast in random-grid ad-hoc networks: approximation
and distributed algorithms | 13 pages, 3 figures, 1 table | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Min Energy broadcast problem consists in assigning transmission ranges to
the nodes of an ad-hoc network in order to guarantee a directed spanning tree
from a given source node and, at the same time, to minimize the energy
consumption (i.e. the energy cost) yielded by the range assignment. Min energy
broadcast is known to be NP-hard.
We consider random-grid networks where nodes are chosen independently at
random from the $n$ points of a $\sqrt n \times \sqrt n$ square grid in the
plane. The probability of the existence of a node at a given point of the grid
does depend on that point, that is, the probability distribution can be
non-uniform.
By using information-theoretic arguments, we prove a lower bound
$(1-\epsilon) \frac n{\pi}$ on the energy cost of any feasible solution for
this problem. Then, we provide an efficient solution of energy cost not larger
than $1.1204 \frac n{\pi}$.
Finally, we present a fully-distributed protocol that constructs a broadcast
range assignment of energy cost not larger than $8n$,thus still yielding
constant approximation. The energy load is well balanced and, at the same time,
the work complexity (i.e. the energy due to all message transmissions of the
protocol) is asymptotically optimal. The completion time of the protocol is
only an $O(\log n)$ factor slower than the optimum. The approximation quality
of our distributed solution is also experimentally evaluated.
All bounds hold with probability at least $1-1/n^{\Theta(1)}$.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 11:17:57 GMT"
}
] | 2008-04-25T00:00:00 | [
[
"Calamoneri",
"Tiziana",
""
],
[
"Clementi",
"Andrea E. F.",
""
],
[
"Monti",
"Angelo",
""
],
[
"Rossi",
"Gianluca",
""
],
[
"Silvestri",
"Riccardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.3914 | Andrew Gacek | Andrew Gacek, Dale Miller, Gopalan Nadathur | Reasoning in Abella about Structural Operational Semantics
Specifications | 15 pages. To appear in LFMTP'08 | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The approach to reasoning about structural operational semantics style
specifications supported by the Abella system is discussed. This approach uses
lambda tree syntax to treat object language binding and encodes binding related
properties in generic judgments. Further, object language specifications are
embedded directly into the reasoning framework through recursive definitions.
The treatment of binding via generic judgments implicitly enforces distinctness
and atomicity in the names used for bound variables. These properties must,
however, be made explicit in reasoning tasks. This objective can be achieved by
allowing recursive definitions to also specify generic properties of atomic
predicates. The utility of these various logical features in the Abella system
is demonstrated through actual reasoning tasks. Brief comparisons with a few
other logic based approaches are also made.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 15:22:02 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Jun 2008 01:09:16 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Gacek",
"Andrew",
""
],
[
"Miller",
"Dale",
""
],
[
"Nadathur",
"Gopalan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.3947 | Peter Sanders | Peter Sanders | Time Dependent Contraction Hierarchies -- Basic Algorithmic Ideas | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contraction hierarchies are a simple hierarchical routing technique that has
proved extremely efficient for static road networks. We explain how to
generalize them to networks with time-dependent edge weights. This is the first
hierarchical speedup technique for time-dependent routing that allows
bidirectional query algorithms.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2008 15:24:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sanders",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.4039 | Ioannis Chatzigiannakis | Ioannis Chatzigiannakis, Georgios Giannoulis and Paul G. Spirakis | Energy and Time Efficient Scheduling of Tasks with Dependencies on
Asymmetric Multiprocessors | null | null | null | RACTI-RU1-2008-10 | cs.DC cs.DS cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we study the problem of scheduling tasks with dependencies in
multiprocessor architectures where processors have different speeds. We present
the preemptive algorithm "Save-Energy" that given a schedule of tasks it post
processes it to improve the energy efficiency without any deterioration of the
makespan. In terms of time efficiency, we show that preemptive scheduling in an
asymmetric system can achieve the same or better optimal makespan than in a
symmetric system. Motivited by real multiprocessor systems, we investigate
architectures that exhibit limited asymmetry: there are two essentially
different speeds. Interestingly, this special case has not been studied in the
field of parallel computing and scheduling theory; only the general case was
studied where processors have $K$ essentially different speeds. We present the
non-preemptive algorithm ``Remnants'' that achieves almost optimal makespan. We
provide a refined analysis of a recent scheduling method. Based on this
analysis, we specialize the scheduling policy and provide an algorithm of $(3 +
o(1))$ expected approximation factor. Note that this improves the previous best
factor (6 for two speeds). We believe that our work will convince researchers
to revisit this well studied scheduling problem for these simple, yet
realistic, asymmetric multiprocessor architectures.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 03:16:21 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Jun 2008 14:21:18 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Chatzigiannakis",
"Ioannis",
""
],
[
"Giannoulis",
"Georgios",
""
],
[
"Spirakis",
"Paul G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0804.4042 | Kenji Yasunaga | Kenji Yasunaga, Toru Fujiwara | Uncorrectable Errors of Weight Half the Minimum Distance for Binary
Linear Codes | 5 pages, to appear in ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lower bound on the number of uncorrectable errors of weight half the
minimum distance is derived for binary linear codes satisfying some condition.
The condition is satisfied by some primitive BCH codes, extended primitive BCH
codes, Reed-Muller codes, and random linear codes. The bound asymptotically
coincides with the corresponding upper bound for Reed-Muller codes and random
linear codes. By generalizing the idea of the lower bound, a lower bound on the
number of uncorrectable errors for weights larger than half the minimum
distance is also obtained, but the generalized lower bound is weak for large
weights. The monotone error structure and its related notion larger half and
trial set, which are introduced by Helleseth, Kl{\o}ve, and Levenshtein, are
mainly used to derive the bounds.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 04:32:32 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Apr 2008 08:25:57 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Yasunaga",
"Kenji",
""
],
[
"Fujiwara",
"Toru",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4071 | Wan Ahmad Tajuddin Wan Abdullah | Saratha Sathasivam (USM), Wan Ahmad Tajuddin Wan Abdullah (Univ
Malaya) | Logic Mining Using Neural Networks | Proceedings of the International Conference on Intelligent Systems
2005 (ICIS 2005), Kuala Lumpur, 1-3 December 2005 | null | null | null | cs.LO cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge could be gained from experts, specialists in the area of interest,
or it can be gained by induction from sets of data. Automatic induction of
knowledge from data sets, usually stored in large databases, is called data
mining. Data mining methods are important in the management of complex systems.
There are many technologies available to data mining practitioners, including
Artificial Neural Networks, Regression, and Decision Trees. Neural networks
have been successfully applied in wide range of supervised and unsupervised
learning applications. Neural network methods are not commonly used for data
mining tasks, because they often produce incomprehensible models, and require
long training times. One way in which the collective properties of a neural
network may be used to implement a computational task is by way of the concept
of energy minimization. The Hopfield network is well-known example of such an
approach. The Hopfield network is useful as content addressable memory or an
analog computer for solving combinatorial-type optimization problems. Wan
Abdullah [1] proposed a method of doing logic programming on a Hopfield neural
network. Optimization of logical inconsistency is carried out by the network
after the connection strengths are defined from the logic program; the network
relaxes to neural states corresponding to a valid interpretation. In this
article, we describe how Hopfield network is able to induce logical rules from
large database by using reverse analysis method: given the values of the
connections of a network, we can hope to know what logical rules are entrenched
in the database.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 09:30:28 GMT"
}
] | 2008-04-28T00:00:00 | [
[
"Sathasivam",
"Saratha",
"",
"USM"
],
[
"Abdullah",
"Wan Ahmad Tajuddin Wan",
"",
"Univ\n Malaya"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.4073 | Gilles Champenois | Gilles Champenois | Grainy Numbers | null | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Grainy numbers are defined as tuples of bits. They form a lattice where the
meet and the join operations are an addition and a multiplication. They may be
substituted for the real numbers in the definition of fuzzy sets. The aim is to
propose an alternative negation for the complement that we'll call supplement.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 09:36:17 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2008 09:07:18 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jun 2008 22:10:31 GMT"
},
{
"version": "v4",
"created": "Wed, 9 Jul 2008 11:01:54 GMT"
},
{
"version": "v5",
"created": "Thu, 10 Jul 2008 09:23:47 GMT"
},
{
"version": "v6",
"created": "Sun, 17 May 2009 13:45:46 GMT"
}
] | 2009-05-17T00:00:00 | [
[
"Champenois",
"Gilles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.4075 | Wan Ahmad Tajuddin Wan Abdullah | Saratha Sathasivam (USM), Wan Ahmad Tajuddin Wan Abdullah (Univ
Malaya) | Logic Learning in Hopfield Networks | To appear in Mod. Appl. Sci | null | null | null | cs.LO cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synaptic weights for neurons in logic programming can be calculated either by
using Hebbian learning or by Wan Abdullah's method. In other words, Hebbian
learning for governing events corresponding to some respective program clauses
is equivalent with learning using Wan Abdullah's method for the same respective
program clauses. In this paper we will evaluate experimentally the equivalence
between these two types of learning through computer simulations.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 09:46:46 GMT"
}
] | 2008-04-28T00:00:00 | [
[
"Sathasivam",
"Saratha",
"",
"USM"
],
[
"Abdullah",
"Wan Ahmad Tajuddin Wan",
"",
"Univ\n Malaya"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.4116 | Mireille Ducasse | Ludovic Langevine and Mireille Ducasse | Design and Implementation of a Tracer Driver: Easy and Efficient Dynamic
Analyses of Constraint Logic Programs | To appear in Theory and Practice of Logic Programming (TPLP),
Cambridge University Press. 30 pages, | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tracers provide users with useful information about program executions. In
this article, we propose a ``tracer driver''. From a single tracer, it provides
a powerful front-end enabling multiple dynamic analysis tools to be easily
implemented, while limiting the overhead of the trace generation. The relevant
execution events are specified by flexible event patterns and a large variety
of trace data can be given either systematically or ``on demand''. The proposed
tracer driver has been designed in the context of constraint logic programming;
experiments have been made within GNU-Prolog. Execution views provided by
existing tools have been easily emulated with a negligible overhead.
Experimental measures show that the flexibility and power of the described
architecture lead to good performance. The tracer driver overhead is inversely
proportional to the average time between two traced events. Whereas the
principles of the tracer driver are independent of the traced programming
language, it is best suited for high-level languages, such as constraint logic
programming, where each traced execution event encompasses numerous low-level
execution steps. Furthermore, constraint logic programming is especially hard
to debug. The current environments do not provide all the useful dynamic
analysis tools. They can significantly benefit from our tracer driver which
enables dynamic analyses to be integrated at a very low cost.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 14:05:36 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Langevine",
"Ludovic",
""
],
[
"Ducasse",
"Mireille",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0804.4138 | Jelani Nelson | Nicholas J. A. Harvey, Jelani Nelson, Krzysztof Onak | Sketching and Streaming Entropy via Approximation Theory | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We conclude a sequence of work by giving near-optimal sketching and streaming
algorithms for estimating Shannon entropy in the most general streaming model,
with arbitrary insertions and deletions. This improves on prior results that
obtain suboptimal space bounds in the general model, and near-optimal bounds in
the insertion-only model without sketching. Our high-level approach is simple:
we give algorithms to estimate Renyi and Tsallis entropy, and use them to
extrapolate an estimate of Shannon entropy. The accuracy of our estimates is
proven using approximation theory arguments and extremal properties of
Chebyshev polynomials, a technique which may be useful for other problems. Our
work also yields the best-known and near-optimal additive approximations for
entropy, and hence also for conditional entropy and mutual information.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 16:04:20 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Harvey",
"Nicholas J. A.",
""
],
[
"Nelson",
"Jelani",
""
],
[
"Onak",
"Krzysztof",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.4150 | Hans Raj Tiwary | Hans Raj Tiwary | On Computing the Shadows and Slices of Polytopes | null | null | null | null | cs.CC cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the complexity of computing the projection of an arbitrary
$d$-polytope along $k$ orthogonal vectors for various input and output forms.
We show that if $d$ and $k$ are part of the input (i.e. not a constant) and we
are interested in output-sensitive algorithms, then in most forms the problem
is equivalent to enumerating vertices of polytopes, except in two where it is
NP-hard. In two other forms the problem is trivial. We also review the
complexity of computing projections when the projection directions are in some
sense non-degenerate. For full-dimensional polytopes containing origin in the
interior, projection is an operation dual to intersecting the polytope with a
suitable linear subspace and so the results in this paper can be dualized by
interchanging vertices with facets and projection with intersection. To compare
the complexity of projection and vertex enumeration, we define new complexity
classes based on the complexity of Vertex Enumeration.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2008 17:05:16 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Nov 2012 14:31:56 GMT"
}
] | 2012-11-26T00:00:00 | [
[
"Tiwary",
"Hans Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.4187 | Hazer Inaltekin | Hazer Inaltekin, Mung Chiang, Harold Vincent Poor and Stephen B.
Wicker | On the Asymptotic Behavior of Selfish Transmitters Sharing a Common
Channel | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595345 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper analyzes the asymptotic behavior of a multiple-access network
comprising a large number of selfish transmitters competing for access to a
common wireless communication channel, and having different utility functions
for determining their strategies. A necessary and sufficient condition is given
for the total number of packet arrivals from selfish transmitters to converge
in distribution. The asymptotic packet arrival distribution at Nash equilibrium
is shown to be a mixture of a Poisson distribution and finitely many Bernoulli
distributions.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 18:31:59 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Inaltekin",
"Hazer",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"Harold Vincent",
""
],
[
"Wicker",
"Stephen B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4194 | Yang Ding | Yang Ding | Asymptotic Bound on Binary Self-Orthogonal Codes | 4 pages 1 figure | null | 10.1007/s11425-008-0133-9 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two constructions for binary self-orthogonal codes. It turns out
that our constructions yield a constructive bound on binary self-orthogonal
codes. In particular, when the information rate R=1/2, by our constructive
lower bound, the relative minimum distance \delta\approx 0.0595 (for GV bound,
\delta\approx 0.110). Moreover, we have proved that the binary self-orthogonal
codes asymptotically achieve the Gilbert-Varshamov bound.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 01:45:27 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Ding",
"Yang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4195 | Ruoheng Liu | Ruoheng Liu and H. Vincent Poor | Multi-Antenna Gaussian Broadcast Channels with Confidential Messages | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6-11, 2008 | null | null | null | cs.IT cs.CR math.IT | http://creativecommons.org/licenses/by/3.0/ | In wireless data networks, communication is particularly susceptible to
eavesdropping due to its broadcast nature. Security and privacy systems have
become critical for wireless providers and enterprise networks. This paper
considers the problem of secret communication over a Gaussian broadcast
channel, where a multi-antenna transmitter sends independent confidential
messages to two users with \emph{information-theoretic secrecy}. That is, each
user would like to obtain its own confidential message in a reliable and safe
manner. This communication model is referred to as the multi-antenna Gaussian
broadcast channel with confidential messages (MGBC-CM). Under this
communication scenario, a secret dirty-paper coding scheme and the
corresponding achievable secrecy rate region are first developed based on
Gaussian codebooks. Next, a computable Sato-type outer bound on the secrecy
capacity region is provided for the MGBC-CM. Furthermore, the Sato-type outer
bound proves to be consistent with the boundary of the secret dirty-paper
coding achievable rate region, and hence, the secrecy capacity region of the
MGBC-CM is established. Finally, a numerical example demonstrates that both
users can achieve positive rates simultaneously under the information-theoretic
secrecy requirement.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 01:52:09 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Liu",
"Ruoheng",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4204 | Sunil Srinivasa | Sunil Srinivasa and Martin Haenggi | Distance Distributions in Finite Uniformly Random Networks: Theory and
Applications | Published in IEEE Transactions on Vehicular Technology | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless networks, the knowledge of nodal distances is essential for
several areas such as system configuration, performance analysis and protocol
design. In order to evaluate distance distributions in random networks, the
underlying nodal arrangement is almost universally taken to be an infinite
Poisson point process. While this assumption is valid in some cases, there are
also certain impracticalities to this model. For example, practical networks
are non-stationary, and the number of nodes in disjoint areas are not
independent. This paper considers a more realistic network model where a finite
number of nodes are uniformly randomly distributed in a general d-dimensional
ball of radius R and characterizes the distribution of Euclidean distances in
the system. The key result is that the probability density function of the
distance from the center of the network to its nth nearest neighbor follows a
generalized beta distribution. This finding is applied to study network
characteristics such as energy consumption, interference, outage and
connectivity.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 04:59:38 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2008 07:51:22 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Jan 2012 01:47:09 GMT"
}
] | 2012-01-24T00:00:00 | [
[
"Srinivasa",
"Sunil",
""
],
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4237 | Robert Burger PhD | John Robert Burger | Explaining the Logical Nature of Electrical Solitons in Neural Circuits | 13 pages, 16 figures | null | null | null | cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neurons are modeled electrically based on ferroelectric membranes thin enough
to permit charge transfer, conjectured to be the tunneling result of thermally
energetic ions and random electrons. These membranes can be triggered to
produce electrical solitons, the main signals for brain associative memory and
logical processing. Dendritic circuits are modeled, and electrical solitons are
simulated to demonstrate the nature of soliton propagation, soliton reflection,
the collision of solitons, as well as soliton OR gates, AND gates, XOR gates
and NOT gates.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 16:55:59 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Burger",
"John Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0804.4239 | Yifan Liang | Michelle Effros, Andrea Goldsmith, Yifan Liang | Capacity Definitions for General Channels with Receiver Side Information | Submitted to IEEE Trans. Inform. Theory, April 2008 | null | 10.1109/ISIT.2007.4557342 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider three capacity definitions for general channels with channel side
information at the receiver, where the channel is modeled as a sequence of
finite dimensional conditional distributions not necessarily stationary,
ergodic, or information stable. The {\em Shannon capacity} is the highest rate
asymptotically achievable with arbitrarily small error probability. The {\em
capacity versus outage} is the highest rate asymptotically achievable with a
given probability of decoder-recognized outage. The {\em expected capacity} is
the highest average rate asymptotically achievable with a single encoder and
multiple decoders, where the channel side information determines the decoder in
use. As a special case of channel codes for expected rate, the code for
capacity versus outage has two decoders: one operates in the non-outage states
and decodes all transmitted information, and the other operates in the outage
states and decodes nothing. Expected capacity equals Shannon capacity for
channels governed by a stationary ergodic random process but is typically
greater for general channels. These alternative capacity definitions
essentially relax the constraint that all transmitted information must be
decoded at the receiver. We derive capacity theorems for these capacity
definitions through information density. Numerical examples are provided to
demonstrate their connections and differences. We also discuss the implication
of these alternative capacity definitions for end-to-end distortion,
source-channel coding and separation.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 17:11:09 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Effros",
"Michelle",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Liang",
"Yifan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4255 | Hazer Inaltekin | Hazer Inaltekin, Mung Chiang and Harold Vincent Poor | Expected Message Delivery Time for Small-world Networks in the Continuum
Limit | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595070 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Small-world networks are networks in which the graphical diameter of the
network is as small as the diameter of random graphs but whose nodes are highly
clustered when compared with the ones in a random graph. Examples of
small-world networks abound in sociology, biology, neuroscience and physics as
well as in human-made networks. This paper analyzes the average delivery time
of messages in dense small-world networks constructed on a plane. Iterative
equations for the average message delivery time in these networks are provided
for the situation in which nodes employ a simple greedy geographic routing
algorithm. It is shown that two network nodes communicate with each other only
through their short-range contacts, and that the average message delivery time
rises linearly if the separation between them is small. On the other hand, if
their separation increases, the average message delivery time rapidly saturates
to a constant value and stays almost the same for all large values of their
separation.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2008 21:27:37 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Inaltekin",
"Hazer",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"Harold Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4284 | Salah A. Aly | Zhenning Kong, Salah A. Aly, Emina Soljanin, Edmund M. Yeh, Andreas
Klappenecker | Network Coding Capacity of Random Wireless Networks under a SINR Model | null | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous work on network coding capacity for random wired and wireless
networks have focused on the case where the capacities of links in the network
are independent. In this paper, we consider a more realistic model, where
wireless networks are modelled by random geometric graphs with interference and
noise. In this model, the capacities of links are not independent. By employing
coupling and martingale methods, we show that, under mild conditions, the
network coding capacity for random wireless networks still exhibits a
concentration behavior around the mean value of the minimum cut.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2008 15:17:43 GMT"
}
] | 2008-11-11T00:00:00 | [
[
"Kong",
"Zhenning",
""
],
[
"Aly",
"Salah A.",
""
],
[
"Soljanin",
"Emina",
""
],
[
"Yeh",
"Edmund M.",
""
],
[
"Klappenecker",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4298 | Brian Smith | Brian Smith, Babak Hassibi | Wireless Erasure Networks with Feedback | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a lossy packet network of queues, communicating over a wireless
medium. This paper presents a throughput-optimal transmission strategy for a
unicast network when feedback is available, which has the following advantages:
It requires a very limited form of acknowledgment feedback. It is completely
distributed, and independent of the network topology. Finally, communication at
the information theoretic cut-set rate requires no network coding and no
rateless coding on the packets. This simple strategy consists of each node
randomly choosing a packet from its buffer to transmit at each opportunity.
However, the packet is only deleted from a node's buffer once it has been
successfully received by the final destination
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2008 21:07:08 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Smith",
"Brian",
""
],
[
"Hassibi",
"Babak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4305 | \'Alvaro Francisco Huertas-Rosero | Alvaro Francisco Huertas-Rosero | An Algorigtm for Singular Value Decomposition of Matrices in Blocks | 14 pages, 8 figures. Technical Report Replacement with updated
reference of publication | DCS Technical Report Series, TR-2008-269 | null | TR-2008-269 | math.NA cs.IR math.AC | http://creativecommons.org/licenses/by/3.0/ | Two methods to decompose block matrices analogous to Singular Matrix
Decomposition are proposed, one yielding the so called economy decomposition,
and other yielding the full decomposition. This method is devised to avoid
handling matrices bigger than the biggest blocks, so it is particularly
appropriate when a limitation on the size of matrices exists. The method is
tested on a document-term matrix (17780x3204) divided in 4 blocks, the
upper-left corner being 215x215.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2008 23:29:07 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Jun 2008 18:00:47 GMT"
}
] | 2008-06-07T00:00:00 | [
[
"Huertas-Rosero",
"Alvaro Francisco",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0804.4316 | Martin Roetteler | Pradeep Kiran Sarvepalli, Martin Roetteler, Andreas Klappenecker | Asymmetric Quantum LDPC Codes | 5 pages, 1 figure, 1 table, to appear in the Proceedings of the 2008
IEEE International Symposium on Information Theory | Proceedings 2008 IEEE International Symposium on Information
Theory (ISIT 2008), Toronto, Canada, pp. 305-309, 2008 | 10.1109/ISIT.2008.4594997 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, quantum error-correcting codes were proposed that capitalize on the
fact that many physical error models lead to a significant asymmetry between
the probabilities for bit flip and phase flip errors. An example for a channel
which exhibits such asymmetry is the combined amplitude damping and dephasing
channel, where the probabilities of bit flips and phase flips can be related to
relaxation and dephasing time, respectively. We give systematic constructions
of asymmetric quantum stabilizer codes that exploit this asymmetry. Our
approach is based on a CSS construction that combines BCH and finite geometry
LDPC codes.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 03:33:08 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Sarvepalli",
"Pradeep Kiran",
""
],
[
"Roetteler",
"Martin",
""
],
[
"Klappenecker",
"Andreas",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4324 | Frederic Butin | Fr\'ed\'eric Butin | Hochschild Homology and Cohomology of Klein Surfaces | This is a contribution to the Special Issue on Deformation
Quantization, published in SIGMA (Symmetry, Integrability and Geometry:
Methods and Applications) at http://www.emis.de/journals/SIGMA/ | SIGMA 4 (2008), 064, 26 pages | 10.3842/SIGMA.2008.064 | null | math-ph cs.SC math.AC math.MP math.QA math.RA | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Within the framework of deformation quantization, a first step towards the
study of star-products is the calculation of Hochschild cohomology. The aim of
this article is precisely to determine the Hochschild homology and cohomology
in two cases of algebraic varieties. On the one hand, we consider singular
curves of the plane; here we recover, in a different way, a result proved by
Fronsdal and make it more precise. On the other hand, we are interested in
Klein surfaces. The use of a complex suggested by Kontsevich and the help of
Groebner bases allow us to solve the problem.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 06:06:07 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 06:07:07 GMT"
}
] | 2008-09-17T00:00:00 | [
[
"Butin",
"Frédéric",
""
]
] | [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0804.4336 | Tobias Kretz | Tobias Kretz and Maike Kaufman and Michael Schreckenberg | Counterflow Extension for the F.A.S.T.-Model | Contribution to Crowds and Cellular Automata Workshop 2008. Accepted
for publication in "Cellular Automata -- 8th International Conference on
Cellular Automata for Research and Industry, ACRI 2008, Yokohama, Japan,
September 23-26, Springer 2008, Proceedings" | Cellular Automata Lecture Notes in Computer Science, 2008, Volume
5191/2008, 555-558 | 10.1007/978-3-540-79992-4_75 | null | cs.MA physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The F.A.S.T. (Floor field and Agent based Simulation Tool) model is a
microscopic model of pedestrian dynamics, which is discrete in space and time.
It was developed in a number of more or less consecutive steps from a simple CA
model. This contribution is a summary of a study on an extension of the
F.A.S.T-model for counterflow situations. The extensions will be explained and
it will be shown that the extended F.A.S.T.-model is capable of handling
various counterflow situations and to reproduce the well known lane formation
effect.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 07:26:31 GMT"
}
] | 2011-01-04T00:00:00 | [
[
"Kretz",
"Tobias",
""
],
[
"Kaufman",
"Maike",
""
],
[
"Schreckenberg",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0804.4347 | Sossio Vergara | Sossio Vergara | Nonorthogonal Bases and Phase Decomposition: Properties and Applications | 11 pages | Published in : Digital Signal Processing (2014), pp. 223-230 | null | null | cs.NA cs.SD math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a previous paper [1] it was discussed the viability of functional analysis
using as a basis a couple of generic functions, and hence vectorial
decomposition. Here we complete the paradigm exploiting one of the analysis
methodologies developed there, but applied to phase coordinates, so needing
only one function as a basis. It will be shown that, thanks to the novel
iterative analysis, any function satisfying a rather loose requisite is
ontologically a basis. This in turn generalizes the polar version of the
Fourier theorem to an ample class of nonorthogonal bases. The main advantage of
this generalization is that it inherits some of the properties of the original
Fourier theorem. As a result the new transform has a wide range of applications
and some remarkable consequences. The new tool will be compared with wavelets
and frames. Examples of analysis and reconstruction of functions using the
developed algorithms and generic bases will be given. Some of the properties,
and applications that can promptly benefit from the theory, will be discussed.
The implementation of a matched filter for noise suppression will be used as an
example of the potential of the theory.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 08:59:52 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Nov 2013 08:32:29 GMT"
}
] | 2013-11-26T00:00:00 | [
[
"Vergara",
"Sossio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0804.4383 | Carlo Alberto Furia | Carlo A. Furia, Matteo Pradella, Matteo Rossi | Practical Automated Partial Verification of Multi-Paradigm Real-Time
Models | 33 pages; fixed a few typos and added data to Table 2 | Proceedings of the 10th International Conference on Formal
Engineering Methods (ICFEM'08). Lecture Notes in Computer Science,
5256:298--317, Springer-Verlag, October 2008 | 10.1007/978-3-540-88194-0_19 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a fully automated verification technique that permits
to analyze real-time systems described using a continuous notion of time and a
mixture of operational (i.e., automata-based) and descriptive (i.e.,
logic-based) formalisms. The technique relies on the reduction, under
reasonable assumptions, of the continuous-time verification problem to its
discrete-time counterpart. This reconciles in a viable and effective way the
dense/discrete and operational/descriptive dichotomies that are often
encountered in practice when it comes to specifying and analyzing complex
critical systems. The article investigates the applicability of the technique
through a significant example centered on a communication protocol. More
precisely, concurrent runs of the protocol are formalized by parallel instances
of a Timed Automaton, while the synchronization rules between these instances
are specified through Metric Temporal Logic formulas, thus creating a
multi-paradigm model. Verification tests run on this model using a bounded
validity checker implementing the technique show consistent results and
interesting performances.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 12:04:12 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jul 2008 14:42:17 GMT"
}
] | 2013-08-14T00:00:00 | [
[
"Furia",
"Carlo A.",
""
],
[
"Pradella",
"Matteo",
""
],
[
"Rossi",
"Matteo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.4384 | Vitaly Skachek | Mark F. Flanagan, Vitaly Skachek, Eimear Byrne, Marcus Greferath | Linear-Programming Decoding of Nonbinary Linear Codes | To appear in the IEEE Transactions on Information Theory. 54 pages, 5
figures | null | 10.1109/TIT.2009.2025571 | CSI-01-01 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A framework for linear-programming (LP) decoding of nonbinary linear codes
over rings is developed. This framework facilitates linear-programming based
reception for coded modulation systems which use direct modulation mapping of
coded symbols. It is proved that the resulting LP decoder has the
'maximum-likelihood certificate' property. It is also shown that the decoder
output is the lowest cost pseudocodeword. Equivalence between pseudocodewords
of the linear program and pseudocodewords of graph covers is proved. It is also
proved that if the modulator-channel combination satisfies a particular
symmetry condition, the codeword error rate performance is independent of the
transmitted codeword. Two alternative polytopes for use with linear-programming
decoding are studied, and it is shown that for many classes of codes these
polytopes yield a complexity advantage for decoding. These polytope
representations lead to polynomial-time decoders for a wide variety of
classical nonbinary linear codes. LP decoding performance is illustrated for
the [11,6] ternary Golay code with ternary PSK modulation over AWGN, and in
this case it is shown that the performance of the LP decoder is comparable to
codeword-error-rate-optimum hard-decision based decoding. LP decoding is also
simulated for medium-length ternary and quaternary LDPC codes with
corresponding PSK modulations over AWGN.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 12:05:35 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 19:45:12 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Jun 2009 21:39:00 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
],
[
"Skachek",
"Vitaly",
""
],
[
"Byrne",
"Eimear",
""
],
[
"Greferath",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4391 | Zvika Ben-Haim | Zvika Ben-Haim and Yonina C. Eldar | A Lower Bound on the Bayesian MSE Based on the Optimal Bias Function | 18 pages, 3 figures. Accepted for publication in IEEE Transactions on
Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lower bound on the minimum mean-squared error (MSE) in a Bayesian
estimation problem is proposed in this paper. This bound utilizes a well-known
connection to the deterministic estimation setting. Using the prior
distribution, the bias function which minimizes the Cramer-Rao bound can be
determined, resulting in a lower bound on the Bayesian MSE. The bound is
developed for the general case of a vector parameter with an arbitrary
probability distribution, and is shown to be asymptotically tight in both the
high and low signal-to-noise ratio regimes. A numerical study demonstrates
several cases in which the proposed technique is both simpler to compute and
tighter than alternative methods.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 14:24:44 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2009 11:27:07 GMT"
}
] | 2009-05-27T00:00:00 | [
[
"Ben-Haim",
"Zvika",
""
],
[
"Eldar",
"Yonina C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4395 | Icius Committee | My Pham, Thanh Tung Nguyen, Nam Seo Goo | Development of a peristaltic micropump for bio-medical applications
based on mini LIPCA | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 6 pages, 9 figures, 1 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-B002 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the design, fabrication, and experimental
characterization of a peristaltic micropump. The micropump is composed of two
layers fabricated from polydimethylsiloxane (PDMS) material. The first layer
has a rectangular channel and two valve seals. Three rectangular mini
lightweight piezo-composite actuators are integrated in the second layer, and
used as actuation parts. Two layers are bonded, and covered by two polymethyl
methacrylate (PMMA) plates, which help increase the stiffness of the micropump.
A maximum flow rate of 900 mokroliter per min and a maximum backpressure of 1.8
kPa are recorded when water is used as pump liquid. We measured the power
consumption of the micropump. The micropump is found to be a promising
candidate for bio-medical application due to its bio-compatibility,
portability, bidirectionality, and simple effective design.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 12:59:55 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Pham",
"My",
""
],
[
"Nguyen",
"Thanh Tung",
""
],
[
"Goo",
"Nam Seo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4415 | Gabriel Nivasch | Gabriel Nivasch and Micha Sharir | Eppstein's bound on intersecting triangles revisited | Minor revision following referee's suggestions. To appear in Journal
of Combinatorial Theory, Series A. 5 pages, 1 figure | Journal of Combinatorial Theory, Series A, 116:494-497, 2009 | 10.1016/j.jcta.2008.07.003 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let S be a set of n points in the plane, and let T be a set of m triangles
with vertices in S. Then there exists a point in the plane contained in
Omega(m^3 / (n^6 log^2 n)) triangles of T. Eppstein (1993) gave a proof of this
claim, but there is a problem with his proof. Here we provide a correct proof
by slightly modifying Eppstein's argument.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 14:09:41 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Jul 2008 12:15:13 GMT"
}
] | 2013-03-25T00:00:00 | [
[
"Nivasch",
"Gabriel",
""
],
[
"Sharir",
"Micha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.4451 | Jian Ma | Jian Ma and Zengqi Sun | Dependence Structure Estimation via Copula | null | null | null | null | cs.LG cs.IR stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dependence strucuture estimation is one of the important problems in machine
learning domain and has many applications in different scientific areas. In
this paper, a theoretical framework for such estimation based on copula and
copula entropy -- the probabilistic theory of representation and measurement of
statistical dependence, is proposed. Graphical models are considered as a
special case of the copula framework. A method of the framework for estimating
maximum spanning copula is proposed. Due to copula, the method is irrelevant to
the properties of individual variables, insensitive to outlier and able to deal
with non-Gaussianity. Experiments on both simulated data and real dataset
demonstrated the effectiveness of the proposed method.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 17:14:53 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Sep 2019 00:29:28 GMT"
}
] | 2019-09-11T00:00:00 | [
[
"Ma",
"Jian",
""
],
[
"Sun",
"Zengqi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
] |
0804.4455 | Ali Al-Bashabsheh | Ali Al-Bashabsheh, Abbas Yongacoglu | On the Capacity Bounds of Undirected Networks | 5 pages, 5 figures, ISIT 2007 conference | IEEE International Symposium on Information Theory (ISIT), Nice,
France, June 2007 | 10.1109/ISIT.2007.4557081 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we improve on the bounds presented by Li&Li for network coding
gain in the undirected case. A tightened bound for the undirected multicast
problem with three terminals is derived. An interesting result shows that with
fractional routing, routing throughput can achieve at least 75% of the coding
throughput. A tighter bound for the general multicast problem with any number
of terminals shows that coding gain is strictly less than 2. Our derived bound
depends on the number of terminals in the multicast network and approaches 2
for arbitrarily large number of terminals.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 17:53:51 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Al-Bashabsheh",
"Ali",
""
],
[
"Yongacoglu",
"Abbas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4464 | Boris Bukh | Boris Bukh, Ji\v{r}\'i Matou\v{s}ek, Gabriel Nivasch | Stabbing simplices by points and flats | 18 pages, 5 figures | Discrete and Computational Geometry, 43:321--338, 2010 | 10.1007/s00454-008-9124-4 | null | math.CO cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The following result was proved by Barany in 1982: For every d >= 1 there
exists c_d > 0 such that for every n-point set S in R^d there is a point p in
R^d contained in at least c_d n^{d+1} - O(n^d) of the simplices spanned by S.
We investigate the largest possible value of c_d. It was known that c_d <=
1/(2^d(d+1)!) (this estimate actually holds for every point set S). We
construct sets showing that c_d <= (d+1)^{-(d+1)}, and we conjecture this
estimate to be tight. The best known lower bound, due to Wagner, is c_d >=
gamma_d := (d^2+1)/((d+1)!(d+1)^{d+1}); in his method, p can be chosen as any
centerpoint of S. We construct n-point sets with a centerpoint that is
contained in no more than gamma_d n^{d+1}+O(n^d) simplices spanned by S, thus
showing that the approach using an arbitrary centerpoint cannot be further
improved.
We also prove that for every n-point set S in R^d there exists a (d-2)-flat
that stabs at least c_{d,d-2} n^3 - O(n^2) of the triangles spanned by S, with
c_{d,d-2}>=(1/24)(1- 1/(2d-1)^2). To this end, we establish an equipartition
result of independent interest (generalizing planar results of Buck and Buck
and of Ceder): Every mass distribution in R^d can be divided into 4d-2 equal
parts by 2d-1 hyperplanes intersecting in a common (d-2)-flat.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 19:58:04 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 17:40:20 GMT"
}
] | 2013-03-25T00:00:00 | [
[
"Bukh",
"Boris",
""
],
[
"Matoušek",
"Jiří",
""
],
[
"Nivasch",
"Gabriel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0804.4466 | Ali Pusane | David G. M. Mitchell, Ali E. Pusane, Norbert Goertz, Daniel J.
Costello Jr | Free Distance Bounds for Protograph-Based Regular LDPC Convolutional
Codes | 6 pages, 4 figures, 1 table | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper asymptotic methods are used to form lower bounds on the free
distance to constraint length ratio of several ensembles of regular,
asymptotically good, protograph-based LDPC convolutional codes. In particular,
we show that the free distance to constraint length ratio of the regular LDPC
convolutional codes exceeds that of the minimum distance to block length ratio
of the corresponding LDPC block codes.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 19:57:25 GMT"
}
] | 2008-04-29T00:00:00 | [
[
"Mitchell",
"David G. M.",
""
],
[
"Pusane",
"Ali E.",
""
],
[
"Goertz",
"Norbert",
""
],
[
"Costello",
"Daniel J.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4489 | Syed Jafar | Syed A. Jafar, Sriram Vishwanath | Generalized Degrees of Freedom of the Symmetric Gaussian $K$ User
Interference Channel | 12 pages | IEEE Transactions on Information Theory, July 2010, Vol. 56,
Issue: 7, Pages: 3297-3303 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We characterize the generalized degrees of freedom of the $K$ user symmetric
Gaussian interference channel where all desired links have the same
signal-to-noise ratio (SNR) and all undesired links carrying interference have
the same interference-to-noise ratio, ${INR}={SNR}^\alpha$. We find that the
number of generalized degrees of freedom per user, $d(\alpha)$, does not depend
on the number of users, so that the characterization is identical to the 2 user
interference channel with the exception of a singularity at $\alpha=1$ where
$d(1)=\frac{1}{K}$. The achievable schemes use multilevel coding with a nested
lattice structure that opens the possibility that the sum of interfering
signals can be decoded at a receiver even though the messages carried by the
interfering signals are not decodable.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2008 21:07:15 GMT"
}
] | 2012-04-03T00:00:00 | [
[
"Jafar",
"Syed A.",
""
],
[
"Vishwanath",
"Sriram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4517 | Miquel Payar\'o | M. Payar\'o, D. P. Palomar | A multivariate generalization of Costa's entropy power inequality | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A simple multivariate version of Costa's entropy power inequality is proved.
In particular, it is shown that if independent white Gaussian noise is added to
an arbitrary multivariate signal, the entropy power of the resulting random
variable is a multidimensional concave function of the individual variances of
the components of the signal. As a side result, we also give an expression for
the Hessian matrix of the entropy and entropy power functions with respect to
the variances of the signal components, which is an interesting result in its
own right.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 02:41:40 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Payaró",
"M.",
""
],
[
"Palomar",
"D. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4523 | Lluis Masanes | Lluis Masanes, Andreas Winter | A non-distillability criterion for secret correlations | 5 pages | Quantum Information and Computation, Vol.10, No.1&2, pp0152 (2009) | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within entanglement theory there are criteria which certify that some quantum
states cannot be distilled into pure entanglement. An example is the positive
partial transposition criterion. Here we present, for the first time, the
analogous thing for secret correlations. We introduce a computable criterion
which certifies that a probability distribution between two honest parties and
an eavesdropper cannot be (asymptotically) distilled into a secret key. The
existence of non-distillable correlations with positive secrecy cost, also
known as bound information, is an open question. This criterion may be the key
for finding bound information. However, if it turns out that this criterion
does not detect bound information, then, a very interesting consequence
follows: any distribution with positive secrecy cost can increase the secrecy
content of another distribution. In other words, all correlations with positive
secrecy cost constitute a useful resource.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 03:48:12 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Oct 2008 11:16:39 GMT"
}
] | 2010-01-07T00:00:00 | [
[
"Masanes",
"Lluis",
""
],
[
"Winter",
"Andreas",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.4524 | Heiko Roeglin | Patrick Briest, Paul W. Goldberg, Heiko Roeglin | Approximate Equilibria in Games with Few Players | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of computing approximate Nash equilibria (epsilon-Nash
equilibria) in normal form games, where the number of players is a small
constant. We consider the approach of looking for solutions with constant
support size. It is known from recent work that in the 2-player case, a
1/2-Nash equilibrium can be easily found, but in general one cannot achieve a
smaller value of epsilon than 1/2. In this paper we extend those results to the
k-player case, and find that epsilon = 1-1/k is feasible, but cannot be
improved upon. We show how stronger results for the 2-player case may be used
in order to slightly improve upon the epsilon = 1-1/k obtained in the k-player
case.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 03:56:29 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Briest",
"Patrick",
""
],
[
"Goldberg",
"Paul W.",
""
],
[
"Roeglin",
"Heiko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0804.4525 | Krishnendu Chatterjee | Krishnendu Chatterjee, Luca de Alfaro and Rupak Majumdar | The Complexity of Coverage | 15 Pages, 1 Figure | null | null | null | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of generating a test sequence that achieves maximal
coverage for a reactive system under test. We formulate the problem as a
repeated game between the tester and the system, where the system state space
is partitioned according to some coverage criterion and the objective of the
tester is to maximize the set of partitions (or coverage goals) visited during
the game. We show the complexity of the maximal coverage problem for
non-deterministic systems is PSPACE-complete, but is NP-complete for
deterministic systems. For the special case of non-deterministic systems with a
re-initializing ``reset'' action, which represent running a new test input on a
re-initialized system, we show that the complexity is again co-NP-complete. Our
proof technique for reset games uses randomized testing strategies that
circumvent the exponentially large memory requirement in the deterministic
case.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 04:26:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"de Alfaro",
"Luca",
""
],
[
"Majumdar",
"Rupak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0804.4530 | Krishnendu Chatterjee | Krishnendu Chatterjee, Luca de Alfaro and Thomas A. Henzinger | Strategy Improvement for Concurrent Safety Games | 19 pages, 1 figure | null | null | null | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider concurrent games played on graphs. At every round of the game,
each player simultaneously and independently selects a move; the moves jointly
determine the transition to a successor state. Two basic objectives are the
safety objective: ``stay forever in a set F of states'', and its dual, the
reachability objective, ``reach a set R of states''. We present in this paper a
strategy improvement algorithm for computing the value of a concurrent safety
game, that is, the maximal probability with which player 1 can enforce the
safety objective. The algorithm yields a sequence of player-1 strategies which
ensure probabilities of winning that converge monotonically to the value of the
safety game.
The significance of the result is twofold. First, while strategy improvement
algorithms were known for Markov decision processes and turn-based games, as
well as for concurrent reachability games, this is the first strategy
improvement algorithm for concurrent safety games. Second, and most
importantly, the improvement algorithm provides a way to approximate the value
of a concurrent safety game from below (the known value-iteration algorithms
approximate the value from above). Thus, when used together with
value-iteration algorithms, or with strategy improvement algorithms for
reachability games, our algorithm leads to the first practical algorithm for
computing converging upper and lower bounds for the value of reachability and
safety games.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 05:09:45 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"de Alfaro",
"Luca",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.4565 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Data linkage algebra, data linkage dynamics, and priority rewriting | 48 pages, typos corrected, phrasing improved, definition of services
replaced; presentation improved; presentation improved and appendix added | Fundamenta Informaticae, 128(4):367--412, 2013 | 10.3233/FI-2013-950 | PRG0806 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an algebra of data linkages. Data linkages are intended for
modelling the states of computations in which dynamic data structures are
involved. We present a simple model of computation in which states of
computations are modelled as data linkages and state changes take place by
means of certain actions. We describe the state changes and replies that result
from performing those actions by means of a term rewriting system with rule
priorities. The model in question is an upgrade of molecular dynamics. The
upgrading is mainly concerned with the features to deal with values and the
features to reclaim garbage.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 09:55:33 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jun 2008 05:48:10 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Oct 2012 11:31:42 GMT"
},
{
"version": "v4",
"created": "Wed, 5 Jun 2013 09:46:25 GMT"
}
] | 2013-11-18T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0804.4584 | Sylvain Schmitz | Sylvain Schmitz and Joseph Le Roux | Feature Unification in TAG Derivation Trees | 12 pages, 4 figures In TAG+9, Ninth International Workshop on Tree
Adjoining Grammars and Related Formalisms, 2008 | In TAG+9, Ninth International Workshop on Tree Adjoining Grammars
and Related Formalisms, 2008 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The derivation trees of a tree adjoining grammar provide a first insight into
the sentence semantics, and are thus prime targets for generation systems. We
define a formalism, feature-based regular tree grammars, and a translation from
feature based tree adjoining grammars into this new formalism. The translation
preserves the derivation structures of the original grammar, and accounts for
feature unification.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 11:39:18 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Schmitz",
"Sylvain",
""
],
[
"Roux",
"Joseph Le",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0804.4590 | Jean-Christophe Dubacq | Heithem Abbes (LIPN, UTIC), Christophe C\'erin (LIPN), Jean-Christophe
Dubacq (LIPN), Mohamed Jemni (UTIC) | \'Etude de performance des syst\`emes de d\'ecouverte de ressources | Publication on CDROM only | Dans Actes de Fribourg'2008 : Renpar'18 / SympA'2008 / CFSE'6 -
Renpar'18, Fribourg : Suisse (2008) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Desktop Grid offers solutions to overcome several challenges and to
answer increasingly needs of scientific computing. This technology consists
mainly in exploiting PC resources, geographically dispersed, to treat time
consuming applications and/or important storage capacity requiring
applications. However, as resources number increases, the need for scalability,
self-organisation, dynamic reconfiguration, decentralization and performance
becomes more and more essential. In this context, this paper evaluates the
scalability and performance of P2P tools for registering and discovering
services (Publish/Subscribe systems). Three protocols are used in this purpose:
Bonjour, Avahi and Pastry. We have studied the behaviour of these protocols
related to two criteria: the elapsed time for registrations services and the
needed time to discover new services.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 11:51:19 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Abbes",
"Heithem",
"",
"LIPN, UTIC"
],
[
"Cérin",
"Christophe",
"",
"LIPN"
],
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN"
],
[
"Jemni",
"Mohamed",
"",
"UTIC"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.4622 | Pierre Courrieu | Pierre Courrieu (LPC) | Fast Density Codes for Image Data | nombre de pages: 9 | Neural Information Processing - Letters and Reviews 11, 12 (2007)
247-255 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, a new method for encoding data sets in the form of "Density Codes"
was proposed in the literature (Courrieu, 2006). This method allows to compare
sets of points belonging to every multidimensional space, and to build shape
spaces invariant to a wide variety of affine and non-affine transformations.
However, this general method does not take advantage of the special properties
of image data, resulting in a quite slow encoding process that makes this tool
practically unusable for processing large image databases with conventional
computers. This paper proposes a very simple variant of the density code method
that directly works on the image function, which is thousands times faster than
the original Parzen window based method, without loss of its useful properties.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 14:25:30 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jun 2008 08:57:27 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Jun 2008 09:38:45 GMT"
}
] | 2008-06-25T00:00:00 | [
[
"Courrieu",
"Pierre",
"",
"LPC"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.4628 | Manik Lal Das | Manik Lal Das | Comment - Practical Data Protection | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Rawat and Saxena proposed a method for protecting data using
``Disclaimer Statement''. This paper presents some issues and several flaws in
their proposal.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 15:06:02 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Das",
"Manik Lal",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0804.4662 | Yijia Fan | Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor | Rateless Coding for MIMO Block Fading Channels | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | In this paper the performance limits and design principles of rateless codes
over fading channels are studied. The diversity-multiplexing tradeoff (DMT) is
used to analyze the system performance for all possible transmission rates. It
is revealed from the analysis that the design of such rateless codes follows
the design principle of approximately universal codes for parallel
multiple-input multiple-output (MIMO) channels, in which each sub-channel is a
MIMO channel. More specifically, it is shown that for a single-input
single-output (SISO) channel, the previously developed permutation codes of
unit length for parallel channels having rate LR can be transformed directly
into rateless codes of length L having multiple rate levels (R, 2R, . . ., LR),
to achieve the DMT performance limit.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 17:45:53 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Fan",
"Yijia",
""
],
[
"Lai",
"Lifeng",
""
],
[
"Erkip",
"Elza",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4666 | Anna Gilbert | R. Berinde, A. C. Gilbert, P. Indyk, H. Karloff, M. J. Strauss | Combining geometry and combinatorics: A unified approach to sparse
signal recovery | null | null | null | null | cs.DM cs.DS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are two main algorithmic approaches to sparse signal recovery:
geometric and combinatorial. The geometric approach starts with a geometric
constraint on the measurement matrix and then uses linear programming to decode
information about the signal from its measurements. The combinatorial approach
constructs the measurement matrix and a combinatorial decoding algorithm to
match. We present a unified approach to these two classes of sparse signal
recovery algorithms.
The unifying elements are the adjacency matrices of high-quality unbalanced
expanders. We generalize the notion of Restricted Isometry Property (RIP),
crucial to compressed sensing results for signal recovery, from the Euclidean
norm to the l_p norm for p about 1, and then show that unbalanced expanders are
essentially equivalent to RIP-p matrices.
From known deterministic constructions for such matrices, we obtain new
deterministic measurement matrix constructions and algorithms for signal
recovery which, compared to previous deterministic algorithms, are superior in
either the number of measurements or in noise tolerance.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 18:24:14 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Berinde",
"R.",
""
],
[
"Gilbert",
"A. C.",
""
],
[
"Indyk",
"P.",
""
],
[
"Karloff",
"H.",
""
],
[
"Strauss",
"M. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0804.4682 | Tshilidzi Marwala | Vukosi Marivate and Tshilidzi Marwala | Introduction to Relational Networks for Classification | 5 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of computational intelligence techniques for classification has been
used in numerous applications. This paper compares the use of a Multi Layer
Perceptron Neural Network and a new Relational Network on classifying the HIV
status of women at ante-natal clinics. The paper discusses the architecture of
the relational network and its merits compared to a neural network and most
other computational intelligence classifiers. Results gathered from the study
indicate comparable classification accuracies as well as revealed relationships
between data features in the classification data. Much higher classification
accuracies are recommended for future research in the area of HIV
classification as well as missing data estimation.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 19:25:07 GMT"
}
] | 2008-04-30T00:00:00 | [
[
"Marivate",
"Vukosi",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0804.4701 | Chao Wang | Chao Wang, Yijia Fan, Ioannis Krikidis, John S. Thompson, and H.
Vincent Poor | Superposition-Coded Concurrent Decode-and-Forward Relaying | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | In this paper, a superposition-coded concurrent decode-and-forward (DF)
relaying protocol is presented. A specific scenario, where the inter-relay
channel is sufficiently strong, is considered. Assuming perfect source-relay
transmissions, the proposed scheme further improves the diversity performance
of previously proposed repetition-coded concurrent DF relaying, in which the
advantage of the inter-relay interference is not fully extracted.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2008 22:15:43 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Wang",
"Chao",
""
],
[
"Fan",
"Yijia",
""
],
[
"Krikidis",
"Ioannis",
""
],
[
"Thompson",
"John S.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4714 | Thimo Rohlf | Thimo Rohlf and Chris Winkler | Network Structure and Dynamics, and Emergence of Robustness by
Stabilizing Selection in an Artificial Genome | 7 pages, 7 figures. Submitted to the "8th German Workshop on
Artificial Life (GWAL 8)" | null | null | null | q-bio.MN cond-mat.dis-nn cs.NE q-bio.GN q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Genetic regulation is a key component in development, but a clear
understanding of the structure and dynamics of genetic networks is not yet at
hand. In this work we investigate these properties within an artificial genome
model originally introduced by Reil. We analyze statistical properties of
randomly generated genomes both on the sequence- and network level, and show
that this model correctly predicts the frequency of genes in genomes as found
in experimental data. Using an evolutionary algorithm based on stabilizing
selection for a phenotype, we show that robustness against single base
mutations, as well as against random changes in initial network states that
mimic stochastic fluctuations in environmental conditions, can emerge in
parallel. Evolved genomes exhibit characteristic patterns on both sequence and
network level.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 01:05:33 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Rohlf",
"Thimo",
""
],
[
"Winkler",
"Chris",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.