id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0804.4717 | Icius Committee | T. Kubota and T. Yoshimitsu | Intelligent Unmanned Explorer for Deep Space Exploration | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 10 figures, 4 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A004-OP | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | asteroids or comets have received remarkable attention in the world. In small
body explorations, especially, detailed in-situ surface exploration by tiny
rover is one of effective and fruitful means and is expected to make strong
contributions towards scientific studies. JAXA ISAS is promoting MUSES C
mission, which is the worlds first sample and return attempt to or from the
near earth asteroid. Hayabusa spacecraft in MUSES C mission took the tiny
rover, which was expected to perform the in-situ surface exploration by
hopping. This paper describes the system design, mobility and intelligence of
the developed unmanned explorer. This paper also presents the ground
experimental results and the flight results.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 01:18:37 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Kubota",
"T.",
""
],
[
"Yoshimitsu",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4740 | Bart Kuijpers | Sofie Haesevoets and Bart Kuijpers | An Affine-invariant Time-dependent Triangulation of Spatio-temporal Data | 40 pages, 10 figures | null | null | null | cs.CG cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the geometric data model for spatio-temporal data, introduced by Chomicki
and Revesz, spatio-temporal data are modelled as a finite collection of
triangles that are transformed by time-dependent affinities of the plane. To
facilitate querying and animation of spatio-temporal data, we present a normal
form for data in the geometric data model. We propose an algorithm for
constructing this normal form via a spatio-temporal triangulation of geometric
data objects. This triangulation algorithm generates new geometric data objects
that partition the given objects both in space and in time. A particular
property of the proposed partition is that it is invariant under time-dependent
affine transformations, and hence independent of the particular choice of
coordinate system used to describe he spatio-temporal data in. We can show that
our algorithm works correctly and has a polynomial time complexity (of
reasonably low degree in the number of input triangles and the maximal degree
of the polynomial functions that describe the transformation functions). We
also discuss several possible applications of this spatio-temporal
triangulation.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 06:02:56 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Haesevoets",
"Sofie",
""
],
[
"Kuijpers",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0804.4741 | Tshilidzi Marwala | Lesedi Masisi, Fulufhelo V. Nelwamondo and Tshilidzi Marwala | The Effect of Structural Diversity of an Ensemble of Classifiers on
Classification Accuracy | 6 pages,IASTED International Conference on Modelling and Simulation
(Africa-MS), 2008 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper aims to showcase the measure of structural diversity of an
ensemble of 9 classifiers and then map a relationship between this structural
diversity and accuracy. The structural diversity was induced by having
different architectures or structures of the classifiers The Genetical
Algorithms (GA) were used to derive the relationship between diversity and the
classification accuracy by evolving the classifiers and then picking 9
classifiers out on an ensemble of 60 classifiers. It was found that as the
ensemble became diverse the accuracy improved. However at a certain diversity
measure the accuracy began to drop. The Kohavi-Wolpert variance method is used
to measure the diversity of the ensemble. A method of voting is used to
aggregate the results from each classifier. The lowest error was observed at a
diversity measure of 0.16 with a mean square error of 0.274, when taking 0.2024
as maximum diversity measured. The parameters that were varied were: the number
of hidden nodes, learning rate and the activation function.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 06:07:45 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Masisi",
"Lesedi",
""
],
[
"Nelwamondo",
"Fulufhelo V.",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0804.4744 | V. Arvind | V. Arvind and Pushkar S. Joglekar | Lattice Problems, Gauge Functions and Parameterized Algorithms | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a k-dimensional subspace M\subseteq \R^n and a full rank integer
lattice L\subseteq \R^n, the \emph{subspace avoiding problem} SAP is to find a
shortest vector in L\setminus M. Treating k as a parameter, we obtain new
parameterized approximation and exact algorithms for SAP based on the AKS
sieving technique. More precisely, we give a randomized
$(1+\epsilon)$-approximation algorithm for parameterized SAP that runs in time
2^{O(n)}.(1/\epsilon)^k, where the parameter k is the dimension of the subspace
M. Thus, we obtain a 2^{O(n)} time algorithm for \epsilon=2^{-O(n/k)}. We also
give a 2^{O(n+k\log k)} exact algorithm for the parameterized SAP for any
\ell_p norm.
Several of our algorithms work for all gauge functions as metric with some
natural restrictions, in particular for all \ell_p norms. We also prove an
\Omega(2^n) lower bound on the query complexity of AKS sieving based exact
algorithms for SVP that accesses the gauge function as oracle.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 06:39:21 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Arvind",
"V.",
""
],
[
"Joglekar",
"Pushkar S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.4749 | Icius Committee | Wen Yuh Jywe, Shih Shin Chen, Hung-Shu Wang, Chien Hung Liu, Hsin Hung
Jwo, Yun Feng Teng, and Tung Hsien Hsieh | Study of improving nano-contouring performance by employing
cross-coupling controller | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 6 pages, 8 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C002 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the tracking stage path planning, we design a two-axis cross-coupling
control system which uses the PI controller to compensate the contour error
between axes. In this paper, the stage adoptive is designed by our laboratory
(Precision Machine Center of National Formosa University). The cross-coupling
controller calculates the actuating signal of each axis by combining multi-axes
position error. Hence, the cross-coupling controller improves the stage
tracking ability and decreases the contour error. The experiments show
excellent stage motion. This finding confirms that the proposed method is a
powerful and efficient tool for improving stage tracking ability. Also found
were the stages tracking to minimize contour error of two types circular to
approximately 25nm.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 07:57:25 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Jywe",
"Wen Yuh",
""
],
[
"Chen",
"Shih Shin",
""
],
[
"Wang",
"Hung-Shu",
""
],
[
"Liu",
"Chien Hung",
""
],
[
"Jwo",
"Hsin Hung",
""
],
[
"Teng",
"Yun Feng",
""
],
[
"Hsieh",
"Tung Hsien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4750 | Icius Committee | Heru Tjahjana, Iwan Pranoto, Hari Muhammad, J. Naiborhu, and Miswanto | The Numerical Control Design for a Pair of Dubins Vehicles | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 3 pages, 2 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C003 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a model of a pair of Dubins vehicles is considered. The
vehicles move from an initial position and orientation to final position and
orientation. A long the motion, the two vehicles are not allowed to collide
however the two vehicles cant to far each other. The optimal control of the
vehicle is found using the Pontryagins Maximum Principle (PMP). This PMP leads
to a Hamiltonian system consisting of a system of differential equation and its
adjoint. The originally differential equation has initial and final condition
but the adjoint system doesn't have one. The classical difficulty is solved
numerically by the greatest gradient descent method. Some simulation results
are presented in this paper.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:03:05 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Tjahjana",
"Heru",
""
],
[
"Pranoto",
"Iwan",
""
],
[
"Muhammad",
"Hari",
""
],
[
"Naiborhu",
"J.",
""
],
[
"Miswanto",
"",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4752 | Icius Committee | M.A. Moelyadi, and G. Sachs | Simulation of Dynamic Yaw Stability Derivatives of a Bird Using CFD | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 15 figures, tables 3, Proceedings of the International
Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia,
October 24-25, 2007 | null | null | ICIUS2007-B012 | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulation results on dynamic yaw stability derivatives of a gull bird by
means of computational fluid dynamics are presented. Two different kinds of
motions are used for determining the dynamic yaw stability derivatives CNr and
CNbeta . Concerning the first one, simple lateral translation and yaw rotary
motions in yaw are considered. The second one consists of combined motions. To
determine dynamic yaw stability derivatives of the bird, the simulation of an
unsteady flow with a bird model showing a harmonic motion is performed. The
unsteady flow solution for each time step is obtained by solving unsteady Euler
equations based on a finite volume approach for a smaller reduced frequency.
Then, an evaluation of unsteady forces and moments for one cycle is conducted
using harmonic Fourier analysis. The results on the dynamic yaw stability
derivatives for both simulations of the model motion show a good agreement.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:16:33 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Moelyadi",
"M. A.",
""
],
[
"Sachs",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4753 | Icius Committee | C. E. Huang, and J. S. Chen | Wavelet Based Iterative Learning Control with Fuzzy PD Feedback for
Position Tracking of A Pneumatic Servo System | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 9 figures, 1 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-A001 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a wavelet-based iterative learning control (WILC) scheme with
Fuzzy PD feedback is presented for a pneumatic control system with nonsmooth
nonlinearities and uncertain parameters. The wavelet transform is employed to
extract the learnable dynamics from measured output signal before it can be
used to update the control profile. The wavelet transform is adopted to
decompose the original signal into many low-resolution signals that contain the
learnable and unlearnable parts. The desired control profile is then compared
with the learnable part of the transformed signal. Thus, the effects from
unlearnable dynamics on the controlled system can be attenuated by a Fuzzy PD
feedback controller. As for the rules of Fuzzy PD controller in the feedback
loop, a genetic algorithm (GA) is employed to search for the inference rules of
optimization. A proportional-valve controlled pneumatic cylinder actuator
system is used as the control target for simulation. Simulation results have
shown a much-improved positiontracking performance.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:22:19 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Huang",
"C. E.",
""
],
[
"Chen",
"J. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4754 | Icius Committee | Bambang Riyanto, and Imam Arifin | Positive Real Synthesis of Networked Control System An LMI Approach | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 5 pages, 1 figure | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C005 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the positive real analysis and synthesis for Networked
Control Systems (NCS) in discrete time. Based on the definition of passivity,
the sufficient condition of NCS is given by stochastic Lyapunov functional. The
controller via state feedback is designed to guarantee the stability of NCS and
closed-loop positive realness. It is shown that a mode-dependent positive real
controller exists if a set of coupled linear matrix inequalities has solutions.
The controller can be then constructed in terms of the solutions.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:25:46 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Riyanto",
"Bambang",
""
],
[
"Arifin",
"Imam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4757 | Icius Committee | Hardian Reza Dharmayanda, Taesam Kang, Young Jae Lee, and Sangkyung
Sung | Analysis of Stability, Response and LQR Controller Design of a Small
Scale Helicopter Dynamics | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 19 figures, 4 tables | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C006 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents how to use feedback controller with helicopter dynamics
state space model. A simplified analysis is presented for controller design
using LQR of small scale helicopters for axial and forward flights. Our
approach is simple and gives the basic understanding about how to develop
controller for solving the stability of linear helicopter flight dynamics.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:32:27 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Dharmayanda",
"Hardian Reza",
""
],
[
"Kang",
"Taesam",
""
],
[
"Lee",
"Young Jae",
""
],
[
"Sung",
"Sangkyung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4759 | Icius Committee | Rifki Muhida, Riza Muhida, Wilson A. Dino, Hiroshi Nakanishi, Hideaki
Kasai | Design and control of dynamical quantum processes in ortho para H2
conversion on surfaces | Uploaded by ICIUS2007 Conference Organizer on behalf of the
author(s). 8 pages, 7 figures | Proceedings of the International Conference on Intelligent
Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No.
ICIUS2007-C008 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present here a novel, cost-effective method for increasing and controlling
the ortho para H2 (o p H2) conversion yield. First, we invoke two processes
derived from fundamental, surface science insights, based on the effect of
molecular orientation on the hydrogen solid surface reaction, i.e., dynamical
quantum filtering and steering, and apply them to enhance the o p H2 conversion
yield. Second, we find an important factor that can significantly influence the
yield i.e., inhomogeneity of spin density distribution. This factor gives us a
promising possibility to increase the yield and to find the best catalyst e.g.,
design of materials that can function as catalysts for the o p H2 conversion.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 08:38:19 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Muhida",
"Rifki",
""
],
[
"Muhida",
"Riza",
""
],
[
"Dino",
"Wilson A.",
""
],
[
"Nakanishi",
"Hiroshi",
""
],
[
"Kasai",
"Hideaki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0804.4774 | Weidong Xu | Weidong Xu, Jia Wang, Jun Sun | A Projection Method for Derivation of Non-Shannon-Type Information
Inequalities | 5 pages, 1 figure Proceedings of the 2008 IEEE International
Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 1998, Zhang and Yeung found the first unconditional non-Shannon-type
information inequality. Recently, Dougherty, Freiling and Zeger gave six new
unconditional non-Shannon-type information inequalities. This work generalizes
their work and provides a method to systematically derive non-Shannon-type
information inequalities. An application of this method reveals new 4-variable
non-Shannon-type information inequalities.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 09:57:41 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Xu",
"Weidong",
""
],
[
"Wang",
"Jia",
""
],
[
"Sun",
"Jun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4799 | Carl Bracken | Carl Bracken, Eimear Byrne, Nadya Markin and Gary McGuire | A Few More Quadratic APN Functions | 12 pages, submitted to Cryptography and Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two infinite families of APN functions where the degree of the
field is divisible by 3 but not 9. Our families contain two already known
families as special cases. We also discuss the inequivalence proof (by
computation) which shows that these functions are new.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 11:50:58 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Bracken",
"Carl",
""
],
[
"Byrne",
"Eimear",
""
],
[
"Markin",
"Nadya",
""
],
[
"McGuire",
"Gary",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4808 | Pierre Courrieu | Pierre Courrieu (LPC) | Solving Time of Least Square Systems in Sigma-Pi Unit Networks | Nombre de pages: 7 | Neural Information Processing - Letters and Reviews 4, 3 (2004)
39-45 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The solving of least square systems is a useful operation in
neurocomputational modeling of learning, pattern matching, and pattern
recognition. In these last two cases, the solution must be obtained on-line,
thus the time required to solve a system in a plausible neural architecture is
critical. This paper presents a recurrent network of Sigma-Pi neurons, whose
solving time increases at most like the logarithm of the system size, and of
its condition number, which provides plausible computation times for biological
systems.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 12:23:05 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Courrieu",
"Pierre",
"",
"LPC"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.4809 | Pierre Courrieu | Pierre Courrieu (LPC) | Fast Computation of Moore-Penrose Inverse Matrices | Number of pages: 5. Typo page 26 line 3: one must read W=G^+F
(instead of W=G^+W, which does not make sense!) | Neural Information Processing - Letters and Reviews 8, 2 (2005)
25-29 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many neural learning algorithms require to solve large least square systems
in order to obtain synaptic weights. Moore-Penrose inverse matrices allow for
solving such systems, even with rank deficiency, and they provide minimum-norm
vectors of synaptic weights, which contribute to the regularization of the
input-output mapping. It is thus of interest to develop fast and accurate
algorithms for computing Moore-Penrose inverse matrices. In this paper, an
algorithm based on a full rank Cholesky factorization is proposed. The
resulting pseudoinverse matrices are similar to those provided by other
algorithms. However the computation time is substantially shorter, particularly
for large systems.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 12:24:54 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Courrieu",
"Pierre",
"",
"LPC"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0804.4815 | Jukka Suomela | Patrik Flor\'een, Marja Hassinen, Petteri Kaski, Jukka Suomela | Tight local approximation results for max-min linear programs | 16 pages | null | 10.1007/978-3-540-92862-1_2 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a bipartite max-min LP, we are given a bipartite graph $\myG = (V \cup I
\cup K, E)$, where each agent $v \in V$ is adjacent to exactly one constraint
$i \in I$ and exactly one objective $k \in K$. Each agent $v$ controls a
variable $x_v$. For each $i \in I$ we have a nonnegative linear constraint on
the variables of adjacent agents. For each $k \in K$ we have a nonnegative
linear objective function of the variables of adjacent agents. The task is to
maximise the minimum of the objective functions. We study local algorithms
where each agent $v$ must choose $x_v$ based on input within its
constant-radius neighbourhood in $\myG$. We show that for every $\epsilon>0$
there exists a local algorithm achieving the approximation ratio ${\Delta_I (1
- 1/\Delta_K)} + \epsilon$. We also show that this result is the best possible
-- no local algorithm can achieve the approximation ratio ${\Delta_I (1 -
1/\Delta_K)}$. Here $\Delta_I$ is the maximum degree of a vertex $i \in I$, and
$\Delta_K$ is the maximum degree of a vertex $k \in K$. As a methodological
contribution, we introduce the technique of graph unfolding for the design of
local approximation algorithms.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 12:54:34 GMT"
}
] | 2012-05-15T00:00:00 | [
[
"Floréen",
"Patrik",
""
],
[
"Hassinen",
"Marja",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Suomela",
"Jukka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0804.4819 | Jukka Suomela | Michael A. Bender, S\'andor P. Fekete, Alexander Kr\"oller, Vincenzo
Liberatore, Joseph S. B. Mitchell, Valentin Polishchuk, Jukka Suomela | The Minimum Backlog Problem | 1+16 pages, 3 figures | Theoretical Computer Science 605 (2015), 51-61 | 10.1016/j.tcs.2015.08.027 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the minimum backlog problem (MBP). This online problem arises, e.g.,
in the context of sensor networks. We focus on two main variants of MBP.
The discrete MBP is a 2-person game played on a graph $G=(V,E)$. The player
is initially located at a vertex of the graph. In each time step, the adversary
pours a total of one unit of water into cups that are located on the vertices
of the graph, arbitrarily distributing the water among the cups. The player
then moves from her current vertex to an adjacent vertex and empties the cup at
that vertex. The player's objective is to minimize the backlog, i.e., the
maximum amount of water in any cup at any time.
The geometric MBP is a continuous-time version of the MBP: the cups are
points in the two-dimensional plane, the adversary pours water continuously at
a constant rate, and the player moves in the plane with unit speed. Again, the
player's objective is to minimize the backlog.
We show that the competitive ratio of any algorithm for the MBP has a lower
bound of $\Omega(D)$, where $D$ is the diameter of the graph (for the discrete
MBP) or the diameter of the point set (for the geometric MBP). Therefore we
focus on determining a strategy for the player that guarantees a uniform upper
bound on the absolute value of the backlog.
For the absolute value of the backlog there is a trivial lower bound of
$\Omega(D)$, and the deamortization analysis of Dietz and Sleator gives an
upper bound of $O(D\log N)$ for $N$ cups. Our main result is a tight upper
bound for the geometric MBP: we show that there is a strategy for the player
that guarantees a backlog of $O(D)$, independently of the number of cups.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 13:13:12 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Mar 2016 20:54:15 GMT"
}
] | 2016-03-24T00:00:00 | [
[
"Bender",
"Michael A.",
""
],
[
"Fekete",
"Sándor P.",
""
],
[
"Kröller",
"Alexander",
""
],
[
"Liberatore",
"Vincenzo",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Polishchuk",
"Valentin",
""
],
[
"Suomela",
"Jukka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0804.4859 | J\'er\'emie Roland | Julien Degorre, Marc Kaplan, Sophie Laplante and J\'er\'emie Roland | The communication complexity of non-signaling distributions | 23 pages. V2: major modifications, extensions and additions compared
to V1. V3 (21 pages): proofs have been updated and simplified, particularly
Theorem 10 and Theorem 22. V4 (23 pages): Section 3.1 has been rewritten (in
particular Lemma 10 and its proof), and various minor modifications have been
made. V5 (24 pages): various modifications in the presentation | In MFCS'09, LNCS, vol 5734, 270-281 (2009). Quantum Information &
Computation, 11(7&8):649-676 (2011) | 10.1007/978-3-642-03816-7_24 | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a model of communication complexity that encompasses many
well-studied problems, including classical and quantum communication
complexity, the complexity of simulating distributions arising from bipartite
measurements of shared quantum states, and XOR games. In this model, Alice gets
an input x, Bob gets an input y, and their goal is to each produce an output
a,b distributed according to some pre-specified joint distribution p(a,b|x,y).
We introduce a new technique based on affine combinations of lower-complexity
distributions. Specifically, we introduce two complexity measures, one which
gives lower bounds on classical communication, and one for quantum
communication. These measures can be expressed as convex optimization problems.
We show that the dual formulations have a striking interpretation, since they
coincide with maximum violations of Bell and Tsirelson inequalities. The dual
expressions are closely related to the winning probability of XOR games. These
lower bounds subsume many known communication complexity lower bound methods,
most notably the recent lower bounds of Linial and Shraibman for the special
case of Boolean functions.
We show that the gap between the quantum and classical lower bounds is at
most linear in the size of the support of the distribution, and does not depend
on the size of the inputs. This translates into a bound on the gap between
maximal Bell and Tsirelson inequality violations, which was previously known
only for the case of distributions with Boolean outcomes and uniform marginals.
Finally, we give an exponential upper bound on quantum and classical
communication complexity in the simultaneous messages model, for any
non-signaling distribution. One consequence is a simple proof that any quantum
distribution can be approximated with a constant number of bits of
communication.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 16:08:58 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2008 21:29:48 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jan 2009 15:32:28 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Feb 2010 20:40:41 GMT"
},
{
"version": "v5",
"created": "Thu, 7 Jul 2011 15:15:21 GMT"
}
] | 2011-07-08T00:00:00 | [
[
"Degorre",
"Julien",
""
],
[
"Kaplan",
"Marc",
""
],
[
"Laplante",
"Sophie",
""
],
[
"Roland",
"Jérémie",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0804.4865 | Fabricio Benevenuto | Fabricio Benevenuto, Fernando Duarte, Tiago Rodrigues, Virgilio
Almeida, Jussara Almeida, Keith Ross | Characterizing Video Responses in Social Networks | null | null | null | null | cs.MM cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video sharing sites, such as YouTube, use video responses to enhance the
social interactions among their users. The video response feature allows users
to interact and converse through video, by creating a video sequence that
begins with an opening video and followed by video responses from other users.
Our characterization is over 3.4 million videos and 400,000 video responses
collected from YouTube during a 7-day period. We first analyze the
characteristics of the video responses, such as popularity, duration, and
geography. We then examine the social networks that emerge from the video
response interactions.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 16:39:32 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Benevenuto",
"Fabricio",
""
],
[
"Duarte",
"Fernando",
""
],
[
"Rodrigues",
"Tiago",
""
],
[
"Almeida",
"Virgilio",
""
],
[
"Almeida",
"Jussara",
""
],
[
"Ross",
"Keith",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0804.4866 | Lalitha Sankar | Lalitha Sankar, Elza Erkip, and H. Vincent Poor | Sum-Capacity of Ergodic Fading Interference and Compound Multiaccess
Channels | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595485 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of resource allocation is studied for two-sender two-receiver
fading Gaussian interference channels (IFCs) and compound multiaccess channels
(C-MACs). The senders in an IFC communicate with their own receiver (unicast)
while those in a C-MAC communicate with both receivers (multicast). The
instantaneous fading state between every transmit-receive pair in this network
is assumed to be known at all transmitters and receivers. Under an average
power constraint at each source, the sum-capacity of the C-MAC and the power
policy that achieves this capacity is developed. The conditions defining the
classes of strong and very strong ergodic IFCs are presented and the multicast
sum-capacity is shown to be tight for both classes.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 16:51:55 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Erkip",
"Elza",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0804.4881 | Adolfo Piperno | Adolfo Piperno | Search Space Contraction in Canonical Labeling of Graphs | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The individualization-refinement paradigm for computing a canonical labeling
and the automorphism group of a graph is investigated. A new algorithmic design
aimed at reducing the size of the associated search space is introduced, and a
new tool, named "Traces", is presented, together with experimental results and
comparisons with existing software, such as McKay's "nauty". It is shown that
the approach presented here leads to a huge reduction in the search space,
thereby making computation feasible for several classes of graphs which are
hard for all the main canonical labeling tools in the literature.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 18:28:13 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jan 2011 15:52:11 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Piperno",
"Adolfo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0804.4885 | Corey Bohil | C. Owen, F. Biocca, C. Bohil, J. Conley | SimDialog: A visual game dialog editor | null | null | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | SimDialog is a visual editor for dialog in computer games. This paper
presents the design of SimDialog, illustrating how script writers and
non-programmers can easily create dialog for video games with complex branching
structures and dynamic response characteristics. The system creates dialog as a
directed graph. This allows for play using the dialog with a state-based cause
and effect system that controls selection of non-player character responses and
can provide a basic scoring mechanism for games.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 18:44:52 GMT"
}
] | 2008-05-01T00:00:00 | [
[
"Owen",
"C.",
""
],
[
"Biocca",
"F.",
""
],
[
"Bohil",
"C.",
""
],
[
"Conley",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0804.4896 | Sidney Rosario | Anne Bouillard (IRISA), Sidney Rosario (IRISA), Albert Benveniste
(IRISA), Stefan Haar (IRISA) | Monotony in Service Orchestrations | null | null | null | RR-6528 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Web Service orchestrations are compositions of different Web Services to form
a new service. The services called during the orchestration guarantee a given
performance to the orchestrater, usually in the form of contracts. These
contracts can be used by the orchestrater to deduce the contract it can offer
to its own clients, by performing contract composition. An implicit assumption
in contract based QoS management is: "the better the component services
perform, the better the orchestration's performance will be". Thus, contract
based QoS management for Web services orchestrations implicitly assumes
monotony. In some orchestrations, however, monotony can be violated, i.e., the
performance of the orchestration improves when the performance of a component
service degrades. This is highly undesirable since it can render the process of
contract composition inconsistent. In this paper we define monotony for
orchestrations modelled by Colored Occurrence Nets (CO-nets) and we
characterize the classes of monotonic orchestrations. We show that few
orchestrations are indeed monotonic, mostly since latency can be traded for
quality of data. We also propose a sound refinement of monotony, called
conditional monotony, which forbids this kind of cheating and show that
conditional monotony is widely satisfied by orchestrations. This finding leads
to reconsidering the way SLAs should be formulated.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 19:59:01 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2008 08:22:29 GMT"
}
] | 2009-04-20T00:00:00 | [
[
"Bouillard",
"Anne",
"",
"IRISA"
],
[
"Rosario",
"Sidney",
"",
"IRISA"
],
[
"Benveniste",
"Albert",
"",
"IRISA"
],
[
"Haar",
"Stefan",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0804.4898 | Yann Guermeur | Emmanuel Monfrini (LORIA), Yann Guermeur (LORIA) | A Quadratic Loss Multi-Class SVM | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using a support vector machine requires to set two types of hyperparameters:
the soft margin parameter C and the parameters of the kernel. To perform this
model selection task, the method of choice is cross-validation. Its
leave-one-out variant is known to produce an estimator of the generalization
error which is almost unbiased. Its major drawback rests in its time
requirement. To overcome this difficulty, several upper bounds on the
leave-one-out error of the pattern recognition SVM have been derived. Among
those bounds, the most popular one is probably the radius-margin bound. It
applies to the hard margin pattern recognition SVM, and by extension to the
2-norm SVM. In this report, we introduce a quadratic loss M-SVM, the M-SVM^2,
as a direct extension of the 2-norm SVM to the multi-class case. For this
machine, a generalized radius-margin bound is then established.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 19:59:56 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Monfrini",
"Emmanuel",
"",
"LORIA"
],
[
"Guermeur",
"Yann",
"",
"LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.0012 | Makesh Pravin John Wilson | Makesh Pravin Wilson, Krishna Narayanan, Henry Pfister and Alex
Sprintson | Joint Physical Layer Coding and Network Coding for Bi-Directional
Relaying | 24 pages, 6 figures, 1 table, parts of this work appeared in Allerton
2007, to be submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of two transmitters wishing to exchange information
through a relay in the middle. The channels between the transmitters and the
relay are assumed to be synchronized, average power constrained additive white
Gaussian noise channels with a real input with signal-to-noise ratio (SNR) of
snr. An upper bound on the capacity is 1/2 log(1+ snr) bits per transmitter per
use of the medium-access phase and broadcast phase of the bi-directional relay
channel. We show that using lattice codes and lattice decoding, we can obtain a
rate of 1/2 log(0.5 + snr) bits per transmitter, which is essentially optimal
at high SNRs. The main idea is to decode the sum of the codewords modulo a
lattice at the relay followed by a broadcast phase which performs Slepian-Wolf
coding with structured codes. For asymptotically low SNR's, jointly decoding
the two transmissions at the relay (MAC channel) is shown to be optimal. We
also show that if the two transmitters use identical lattices with minimum
angle decoding, we can achieve the same rate of 1/2 log(0.5 + snr). The
proposed scheme can be thought of as a joint physical layer, network layer code
which outperforms other recently proposed analog network coding schemes.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 21:13:43 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2008 21:54:13 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Wilson",
"Makesh Pravin",
""
],
[
"Narayanan",
"Krishna",
""
],
[
"Pfister",
"Henry",
""
],
[
"Sprintson",
"Alex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0022 | David Eppstein | Gill Barequet, David Eppstein, Michael T. Goodrich, and Amir Vaxman | Straight Skeletons of Three-Dimensional Polyhedra | 12 pages, 47 figure files in 8 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the straight skeleton of polyhedra in three dimensions. We
first address voxel-based polyhedra (polycubes), formed as the union of a
collection of cubical (axis-aligned) voxels. We analyze the ways in which the
skeleton may intersect each voxel of the polyhedron, and show that the skeleton
may be constructed by a simple voxel-sweeping algorithm taking constant time
per voxel. In addition, we describe a more complex algorithm for straight
skeletons of voxel-based polyhedra, which takes time proportional to the area
of the surfaces of the straight skeleton rather than the volume of the
polyhedron. We also consider more general polyhedra with axis-parallel edges
and faces, and show that any n-vertex polyhedron of this type has a straight
skeleton with O(n^2) features. We provide algorithms for constructing the
straight skeleton, with running time O(min(n^2 log n, k log^{O(1)} n)) where k
is the output complexity. Next, we discuss the straight skeleton of a general
nonconvex polyhedron. We show that it has an ambiguity issue, and suggest a
consistent method to resolve it. We prove that the straight skeleton of a
general polyhedron has a superquadratic complexity in the worst case. Finally,
we report on an implementation of a simple algorithm for the general case.
| [
{
"version": "v1",
"created": "Wed, 30 Apr 2008 22:52:34 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Barequet",
"Gill",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Vaxman",
"Amir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0805.0034 | Vaneet Aggarwal | Vaneet Aggarwal, Ashutosh Sabharwal | Diversity Order Gain with Noisy Feedback in Multiple Access Channels | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595017 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the effect of feedback channel noise on the
diversity-multiplexing tradeoff in multiuser MIMO systems using quantized
feedback, where each user has m transmit antennas and the base-station receiver
has n antennas. We derive an achievable tradeoff and use it to show that in
SNR-symmetric channels, a single bit of imperfect feedback is sufficient to
double the maximum diversity order to 2mn compared to when there is no feedback
(maximum is mn at multiplexing gain of zero). Further, additional feedback bits
do not increase this maximum diversity order beyond 2mn. Finally, the above
diversity order gain of mn over non-feedback systems can also be achieved for
higher multiplexing gains, albeit requiring more than one bit of feedback.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 00:36:27 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2008 18:44:40 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0050 | Ali Al-Bashabsheh | Ali Al-Bashabsheh, Abbas Yongacoglu | On the k-pairs problem | ISIT 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider network coding rates for directed and undirected $k$-pairs
networks. For directed networks, meagerness is known to be an upper bound on
network coding rates. We show that network coding rate can be $\Theta(|V|)$
multiplicative factor smaller than meagerness. For the undirected case, we show
some progress in the direction of the $k$-pairs conjecture.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 03:54:37 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Al-Bashabsheh",
"Ali",
""
],
[
"Yongacoglu",
"Abbas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0051 | Aditya Ramamoorthy | Aditya Ramamoorthy | Communicating the sum of sources over a network | 5 pages, Proceedings of the 2008 IEEE International Symposium on
Information Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a network (that is capable of network coding) with a set of
sources and terminals, where each terminal is interested in recovering the sum
of the sources. Considering directed acyclic graphs with unit capacity edges
and independent, unit-entropy sources, we show the rate region when (a) there
are two sources and $n$ terminals, and (b) $n$ sources and two terminals. In
these cases as long as there exists at least one path from each source to each
terminal we demonstrate that there exists a valid assignment of coding vectors
to the edges such that the terminals can recover the sum of the sources.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 04:20:17 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Ramamoorthy",
"Aditya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0053 | Namrata Vaswani | Namrata Vaswani | Particle Filtering for Large Dimensional State Spaces with Multimodal
Observation Likelihoods | To appear in IEEE Trans. Signal Processing | IEEE Trans. Sig. Proc., vol. 56(10-1), pp. 4583-4597, Oct. 2008 | 10.1109/TSP.2008.925969 | null | cs.IT math.IT math.ST stat.ME stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study efficient importance sampling techniques for particle filtering (PF)
when either (a) the observation likelihood (OL) is frequently multimodal or
heavy-tailed, or (b) the state space dimension is large or both. When the OL is
multimodal, but the state transition pdf (STP) is narrow enough, the optimal
importance density is usually unimodal. Under this assumption, many techniques
have been proposed. But when the STP is broad, this assumption does not hold.
We study how existing techniques can be generalized to situations where the
optimal importance density is multimodal, but is unimodal conditioned on a part
of the state vector. Sufficient conditions to test for the unimodality of this
conditional posterior are derived. The number of particles, N, to accurately
track using a PF increases with state space dimension, thus making any regular
PF impractical for large dimensional tracking problems. We propose a solution
that partially addresses this problem. An important class of large dimensional
problems with multimodal OL is tracking spatially varying physical quantities
such as temperature or pressure in a large area using a network of sensors
which may be nonlinear and/or may have non-negligible failure probabilities.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 05:41:09 GMT"
}
] | 2011-04-13T00:00:00 | [
[
"Vaswani",
"Namrata",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0805.0065 | Paul Cuff | Paul Cuff (Stanford University) | Communication Requirements for Generating Correlated Random Variables | ISIT 2008, 5 pages, 4 eps figures, uses IEEEtran.cls | null | null | null | cs.IT cs.GT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two familiar notions of correlation are rediscovered as extreme operating
points for simulating a discrete memoryless channel, in which a channel output
is generated based only on a description of the channel input. Wyner's "common
information" coincides with the minimum description rate needed. However, when
common randomness independent of the input is available, the necessary
description rate reduces to Shannon's mutual information. This work
characterizes the optimal tradeoff between the amount of common randomness used
and the required rate of description.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 07:34:28 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Cuff",
"Paul",
"",
"Stanford University"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0805.0087 | Sebastien Tixeuil | Adnan Vora, Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6), Sylvie
Dela\"et (LRI) | Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks | null | null | null | RR-6529 | cs.DC cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Sybil attack in unknown port networks such as wireless is not considered
tractable. A wireless node is not capable of independently differentiating the
universe of real nodes from the universe of arbitrary non-existent fictitious
nodes created by the attacker. Similar to failure detectors, we propose to use
universe detectors to help nodes determine which universe is real. In this
paper, we (i) define several variants of the neighborhood discovery problem
under Sybil attack (ii) propose a set of matching universe detectors (iii)
demonstrate the necessity of additional topological constraints for the
problems to be solvable: node density and communication range; (iv) present
SAND -- an algorithm that solves these problems with the help of appropriate
universe detectors, this solution demonstrates that the proposed universe
detectors are the weakest detectors possible for each problem.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 11:45:54 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2008 08:34:03 GMT"
}
] | 2009-04-20T00:00:00 | [
[
"Vora",
"Adnan",
"",
"LIP6"
],
[
"Nesterenko",
"Mikhail",
"",
"LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
],
[
"Delaët",
"Sylvie",
"",
"LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.0092 | Oren Somekh | Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai
(Shitz) | Cellular Systems with Full-Duplex Compress-and-Forward Relaying and
Cooperative Base Stations | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595357 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper the advantages provided by multicell processing of signals
transmitted by mobile terminals (MTs) which are received via dedicated relay
terminals (RTs) are studied. It is assumed that each RT is capable of
full-duplex operation and receives the transmission of adjacent relay
terminals. Focusing on intra-cell TDMA and non-fading channels, a simplified
relay-aided uplink cellular model based on a model introduced by Wyner is
considered. Assuming a nomadic application in which the RTs are oblivious to
the MTs' codebooks, a form of distributed compress-and-forward (CF) scheme with
decoder side information is employed. The per-cell sum-rate of the CF scheme is
derived and is given as a solution of a simple fixed point equation. This
achievable rate reveals that the CF scheme is able to completely eliminate the
inter-relay interference, and it approaches a ``cut-set-like'' upper bound for
strong RTs transmission power. The CF rate is also shown to surpass the rate of
an amplify-and-forward scheme via numerical calculations for a wide range of
the system parameters.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 13:22:35 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Simeone",
"Osvaldo",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0108 | Xiaojun Tang | Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor | The Gaussian Wiretap Channel with a Helping Interferer | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the broadcast nature of the wireless medium, wireless communication is
susceptible to adversarial eavesdropping. This paper describes how
eavesdropping can potentially be defeated by exploiting the superposition
nature of the wireless medium. A Gaussian wire-tap channel with a helping
interferer (WTC-HI) is considered in which a transmitter sends confidential
messages to its intended receiver in the presence of a passive eavesdropper and
with the help of an interferer. The interferer, which does not know the
confidential message assists the confidential message transmission by sending a
signal that is independent of the transmitted message. An achievable secrecy
rate and a Sato-type upper bound on the secrecy capacity are given for the
Gaussian WTC-HI. Through numerical analysis, it is found that the upper bound
is close to the achievable secrecy rate when the interference is weak for
symmetric interference channels, and under more general conditions for
asymmetric Gaussian interference channels.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 16:19:13 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Tang",
"Xiaojun",
""
],
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0120 | Stephen Vavasis | Michael Biggs, Ali Ghodsi, Stephen Vavasis | Nonnegative Matrix Factorization via Rank-One Downdate | null | null | null | null | cs.IR cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nonnegative matrix factorization (NMF) was popularized as a tool for data
mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with
nonnegative entries by a product of two low-rank matrices, also with
nonnegative entries. We propose an algorithm called rank-one downdate (R1D) for
computing a NMF that is partly motivated by singular value decomposition. This
algorithm computes the dominant singular values and vectors of adaptively
determined submatrices of a matrix. On each iteration, R1D extracts a rank-one
submatrix from the dataset according to an objective function. We establish a
theoretical result that maximizing this objective function corresponds to
correctly classifying articles in a nearly separable corpus. We also provide
computational experiments showing the success of this method in identifying
features in realistic datasets.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 17:59:44 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Biggs",
"Michael",
""
],
[
"Ghodsi",
"Ali",
""
],
[
"Vavasis",
"Stephen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0805.0129 | Jean-Francois Bercher | Jean-Fran\c{c}ois Bercher (LSS, IGM-LabInfo) | On some entropy functionals derived from R\'enyi information divergence | null | Information Sciences 178, 12 (2008) 2489-2506 | 10.1016/j.ins.2008.02.003 | null | cs.IT cond-mat.other math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the maximum entropy problems associated with R\'enyi $Q$-entropy,
subject to two kinds of constraints on expected values. The constraints
considered are a constraint on the standard expectation, and a constraint on
the generalized expectation as encountered in nonextensive statistics. The
optimum maximum entropy probability distributions, which can exhibit a
power-law behaviour, are derived and characterized. The R\'enyi entropy of the
optimum distributions can be viewed as a function of the constraint. This
defines two families of entropy functionals in the space of possible expected
values. General properties of these functionals, including nonnegativity,
minimum, convexity, are documented. Their relationships as well as numerical
aspects are also discussed. Finally, we work out some specific cases for the
reference measure $Q(x)$ and recover in a limit case some well-known entropies.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 19:09:13 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bercher",
"Jean-François",
"",
"LSS, IGM-LabInfo"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0131 | Pedro Coronel | Pedro Coronel and Markus G\"artner and Helmut B\"olcskei | Diversity-Multiplexing Tradeoff in Selective-Fading Multiple-Access MIMO
Channels | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish the optimal diversity-multiplexing (DM) tradeoff of coherent
selective-fading multiple-access multiple-input multiple-output (MIMO) channels
and provide corresponding code design criteria. As a byproduct, on the
conceptual level, we find an interesting relation between the DM tradeoff
framework and the notion of dominant error event regions which was first
introduced in the AWGN case by Gallager, IEEE Trans. IT, 1985. This relation
allows to accurately characterize the error mechanisms in MIMO fading
multiple-access channels. In particular, we find that, for a given rate tuple,
the maximum achievable diversity order is determined by the error event that
dominates the total error probability exponentially in SNR. Finally, we show
that the distributed space-time code construction proposed recently by Badr and
Belfiore, Int. Zurich Seminar on Commun., 2008, satisfies the code design
criteria derived in this paper.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 19:18:25 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Coronel",
"Pedro",
""
],
[
"Gärtner",
"Markus",
""
],
[
"Bölcskei",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0149 | Guangwu Xu | T. Tony Cai, Guangwu Xu, and Jun Zhang | On Recovery of Sparse Signals via $\ell_1$ Minimization | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article considers constrained $\ell_1$ minimization methods for the
recovery of high dimensional sparse signals in three settings: noiseless,
bounded error and Gaussian noise. A unified and elementary treatment is given
in these noise settings for two $\ell_1$ minimization methods: the Dantzig
selector and $\ell_1$ minimization with an $\ell_2$ constraint. The results of
this paper improve the existing results in the literature by weakening the
conditions and tightening the error bounds. The improvement on the conditions
shows that signals with larger support can be recovered accurately. This paper
also establishes connections between restricted isometry property and the
mutual incoherence property. Some results of Candes, Romberg and Tao (2006) and
Donoho, Elad, and Temlyakov (2006) are extended.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 20:25:27 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Cai",
"T. Tony",
""
],
[
"Xu",
"Guangwu",
""
],
[
"Zhang",
"Jun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.0154 | Kohtaro Tadaki | Kohtaro Tadaki | The Tsallis entropy and the Shannon entropy of a universal probability | 5 pages, to appear in the Proceedings of the 2008 IEEE International
Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008 | 2008 IEEE International Symposium on Information Theory, Toronto,
ON (2008) 2111-2115 | 10.1109/ISIT.2008.4595362 | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the properties of Tsallis entropy and Shannon entropy from the point
of view of algorithmic randomness. In algorithmic information theory, there are
two equivalent ways to define the program-size complexity K(s) of a given
finite binary string s. In the standard way, K(s) is defined as the length of
the shortest input string for the universal self-delimiting Turing machine to
output s. In the other way, the so-called universal probability m is introduced
first, and then K(s) is defined as -log_2 m(s) without reference to the concept
of program-size. In this paper, we investigate the properties of the Shannon
entropy, the power sum, and the Tsallis entropy of a universal probability by
means of the notion of program-size complexity. We determine the convergence or
divergence of each of these three quantities, and evaluate its degree of
randomness if it converges.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 21:32:09 GMT"
}
] | 2019-09-04T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0162 | Stefanie Wuhrer | Stefanie Wuhrer, Prosenjit Bose, Chang Shu, Joseph O'Rourke, Alan
Brunton | Morphing of Triangular Meshes in Shape Space | Improved experimental results | International Journal of Shape Modeling, 16(1-2):195-212, 2010 | 10.1142/S0218654310001341 | null | cs.CG cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach to morph between two isometric poses of the same
non-rigid object given as triangular meshes. We model the morphs as linear
interpolations in a suitable shape space $\mathcal{S}$. For triangulated 3D
polygons, we prove that interpolating linearly in this shape space corresponds
to the most isometric morph in $\mathbb{R}^3$. We then extend this shape space
to arbitrary triangulations in 3D using a heuristic approach and show the
practical use of the approach using experiments. Furthermore, we discuss a
modified shape space that is useful for isometric skeleton morphing. All of the
newly presented approaches solve the morphing problem without the need to solve
a minimization problem.
| [
{
"version": "v1",
"created": "Thu, 1 May 2008 23:08:30 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2008 20:01:32 GMT"
}
] | 2011-08-24T00:00:00 | [
[
"Wuhrer",
"Stefanie",
""
],
[
"Bose",
"Prosenjit",
""
],
[
"Shu",
"Chang",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Brunton",
"Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0805.0173 | Martin Dowd | Martin Dowd | A Computer Search for N1L-Configurations | submitted to IEEE Trans. Information Theory. 5 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an earlier paper the author defined N1L configurations, and stated a
conjecture concerning them which would lead to an improvement by a constant
factor to the sphere-packing bound for linear double error correcting codes.
Here a computer search is presented, in an effort to gather evidence on the
conjecture.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 03:27:23 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Dowd",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0184 | Youngchul Sung | Youngchul Sung, H. Vincent Poor and Heejung Yu | Information, Energy and Density for Ad Hoc Sensor Networks over
Correlated Random Fields: Large Deviations Analysis | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595256 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using large deviations results that characterize the amount of information
per node on a two-dimensional (2-D) lattice, asymptotic behavior of a sensor
network deployed over a correlated random field for statistical inference is
investigated. Under a 2-D hidden Gauss-Markov random field model with symmetric
first order conditional autoregression, the behavior of the total information
[nats] and energy efficiency [nats/J] defined as the ratio of total gathered
information to the required energy is obtained as the coverage area, node
density and energy vary.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 07:36:28 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Sung",
"Youngchul",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Yu",
"Heejung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0192 | Xavier Gonze J | X. Gonze (1,2), C.-O. Almbladh (1,3), A. Cucca (1,4), D. Caliste
(1,2,5), C. Freysoldt (1,6), M. A. L. Marques (1,7,8), V. Olevano (1,4,9), Y.
Pouillon (1,2,10), M.J. Verstraete (1,11) ((1) European Theoretical
Spectroscopy Facility, (2) Universit\'e Catholique de Louvain,
Louvain-la-Neuve, Belgium (3) University of Lund, Lund, Sweden (4) LSI,
CNRS-CEA, Ecole Polytechnique, Palaiseau, France, (5) C.E.A. Grenoble,
Grenoble, France, (6) Fritz-Haber-Institut, Berlin, Germany, (7) U. Lyon 1,
Villeurbanne, France, (8) U. Coimbra, Coimbra, Portugal, (9) Institut NEEL,
CNRS and U. Joseph Fourier, Grenoble, France, (10) Universidad del Pais Vasco
UPV/EHU, Donostia-San Sebasti\`an, Spain, (11) U. York, York, United Kingdom) | Specification of an extensible and portable file format for electronic
structure and crystallographic data | null | null | null | null | cs.DL cond-mat.mtrl-sci cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to allow different software applications, in constant evolution, to
interact and exchange data, flexible file formats are needed. A file format
specification for different types of content has been elaborated to allow
communication of data for the software developed within the European Network of
Excellence "NANOQUANTA", focusing on first-principles calculations of materials
and nanosystems. It might be used by other software as well, and is described
here in detail. The format relies on the NetCDF binary input/output library,
already used in many different scientific communities, that provides
flexibility as well as portability accross languages and platforms. Thanks to
NetCDF, the content can be accessed by keywords, ensuring the file format is
extensible and backward compatible.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 08:48:26 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Gonze",
"X.",
""
],
[
"Almbladh",
"C. -O.",
""
],
[
"Cucca",
"A.",
""
],
[
"Caliste",
"D.",
""
],
[
"Freysoldt",
"C.",
""
],
[
"Marques",
"M. A. L.",
""
],
[
"Olevano",
"V.",
""
],
[
"Pouillon",
"Y.",
""
],
[
"Verstraete",
"M. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "cond-mat.mtrl-sci",
"description": "Techniques, synthesis, characterization, structure. Structural phase transitions, mechanical properties, phonons. Defects, adsorbates, interfaces",
"span": "(Materials Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0805.0197 | Wan Ahmad Tajuddin Wan Abdullah | Saratha Sathasivam (USM), Wan Ahmad Tajuddin Wan Abdullah (Univ.
Malaya) | Flatness of the Energy Landscape for Horn Clauses | null | Matematika 23 (2007) 147-156 | null | null | cond-mat.dis-nn cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Little-Hopfield neural network programmed with Horn clauses is studied.
We argue that the energy landscape of the system, corresponding to the
inconsistency function for logical interpretations of the sets of Horn clauses,
has minimal ruggedness. This is supported by computer simulations.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 09:20:11 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Sathasivam",
"Saratha",
"",
"USM"
],
[
"Abdullah",
"Wan Ahmad Tajuddin Wan",
"",
"Univ.\n Malaya"
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.0200 | Joel Goossens | Jo\"el Goossens | (m,k)-firm constraints and DBP scheduling: impact of the initial
k-sequence and exact schedulability test | null | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the scheduling of (m,k)-firm synchronous periodic task
systems using the Distance Based Priority (DBP) scheduler. We first show three
phenomena: (i) choosing, for each task, the initial k-sequence 1^k is not
optimal, (ii) we can even start the scheduling from a (fictive) error state (in
regard to the initial k-sequence) and (iii) the period of feasible
DBP-schedules is not necessarily the task hyper-period. We then show that any
feasible DBP-schedule is periodic and we upper-bound the length of that period.
Lastly, based on our periodicity result we provide an exact schedulability
test.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 09:32:03 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2008 09:22:24 GMT"
}
] | 2008-09-08T00:00:00 | [
[
"Goossens",
"Joël",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0805.0202 | Joao Marques-Silva | Antonio Morgado, Joao Marques-Silva | A Pseudo-Boolean Solution to the Maximum Quartet Consistency Problem | null | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Determining the evolutionary history of a given biological data is an
important task in biological sciences. Given a set of quartet topologies over a
set of taxa, the Maximum Quartet Consistency (MQC) problem consists of
computing a global phylogeny that satisfies the maximum number of quartets. A
number of solutions have been proposed for the MQC problem, including Dynamic
Programming, Constraint Programming, and more recently Answer Set Programming
(ASP). ASP is currently the most efficient approach for optimally solving the
MQC problem. This paper proposes encoding the MQC problem with pseudo-Boolean
(PB) constraints. The use of PB allows solving the MQC problem with efficient
PB solvers, and also allows considering different modeling approaches for the
MQC problem. Initial results are promising, and suggest that PB can be an
effective alternative for solving the MQC problem.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 10:06:27 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Morgado",
"Antonio",
""
],
[
"Marques-Silva",
"Joao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.0231 | Nikolaus Hansen | Nikolaus Hansen (INRIA Futurs) | CMA-ES with Two-Point Step-Size Adaptation | null | null | null | RR-6527 | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We combine a refined version of two-point step-size adaptation with the
covariance matrix adaptation evolution strategy (CMA-ES). Additionally, we
suggest polished formulae for the learning rate of the covariance matrix and
the recombination weights. In contrast to cumulative step-size adaptation or to
the 1/5-th success rule, the refined two-point adaptation (TPA) does not rely
on any internal model of optimality. In contrast to conventional
self-adaptation, the TPA will achieve a better target step-size in particular
with large populations. The disadvantage of TPA is that it relies on two
additional objective function
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 13:55:37 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2008 06:16:04 GMT"
},
{
"version": "v3",
"created": "Tue, 13 May 2008 08:17:14 GMT"
},
{
"version": "v4",
"created": "Sun, 18 May 2008 06:38:04 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Hansen",
"Nikolaus",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.0241 | David G. M. Mitchell | David G. M. Mitchell, Ali E. Pusane, Kamil Sh. Zigangirov, and Daniel
J. Costello, Jr | Asymptotically Good LDPC Convolutional Codes Based on Protographs | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595143 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LDPC convolutional codes have been shown to be capable of achieving the same
capacity-approaching performance as LDPC block codes with iterative
message-passing decoding. In this paper, asymptotic methods are used to
calculate a lower bound on the free distance for several ensembles of
asymptotically good protograph-based LDPC convolutional codes. Further, we show
that the free distance to constraint length ratio of the LDPC convolutional
codes exceeds the minimum distance to block length ratio of corresponding LDPC
block codes.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 16:13:16 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Mitchell",
"David G. M.",
""
],
[
"Pusane",
"Ali E.",
""
],
[
"Zigangirov",
"Kamil Sh.",
""
],
[
"Costello,",
"Daniel J.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0268 | Yucel Altug | Yucel Altug and M. Kivanc Mihcak | Towards Exploring Fundamental Limits of System-Specific Cryptanalysis
Within Limited Attack Classes: Application to ABSG | 30 pages, Submitted to IEEE Transactions on Information Theory | null | null | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new approach on cryptanalysis is proposed where the goal is to explore the
fundamental limits of a specific class of attacks against a particular
cryptosystem. As a first step, the approach is applied on ABSG, which is an
LFSR-based stream cipher where irregular decimation techniques are utilized.
Consequently, under some mild assumptions, which are common in cryptanalysis,
the tight lower bounds on the algorithmic complexity of successful Query-Based
Key-Recovery attacks are derived for two different setups of practical
interest. The proofs rely on the concept of ``typicality'' of information
theory.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 17:25:58 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Altug",
"Yucel",
""
],
[
"Mihcak",
"M. Kivanc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0272 | Zouheir Rezki Mr. | Z. Rezki and David Haccoun and Fran\c{c}ois Gagnon | Capacity of The Discrete-Time Non-Coherent Memoryless Gaussian Channels
at Low SNR | 5 pages and 4 figures. To appear in Proceeding of International
Symposium on Information Theory (ISIT 2008) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the capacity of a discrete-time memoryless Gaussian channel, where
the channel state information (CSI) is neither available at the transmitter nor
at the receiver. The optimal capacity-achieving input distribution at low
signal-to-noise ratio (SNR) is precisely characterized, and the exact capacity
of a non-coherent channel is derived. The derived relations allow to better
understanding the capacity of non-coherent channels at low SNR. Then, we
compute the non-coherence penalty and give a more precise characterization of
the sub-linear term in SNR. Finally, in order to get more insight on how the
optimal input varies with SNR, upper and lower bounds on the non-zero mass
point location of the capacity-achieving input are given.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 17:40:03 GMT"
}
] | 2008-05-05T00:00:00 | [
[
"Rezki",
"Z.",
""
],
[
"Haccoun",
"David",
""
],
[
"Gagnon",
"François",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0307 | J\"org P. Dietrich | J. P. Dietrich | Disentangling Visibility and Self-Promotion Bias in the arXiv:astro-ph
Positional Citation Effect | Accepted for publication in PASP, minor language corrections to match
published version | null | 10.1086/589836 | null | astro-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We established in an earlier study that articles listed at or near the top of
the daily arXiv:astro-ph mailings receive on average significantly more
citations than articles further down the list. In our earlier work we were not
able to decide whether this positional citation effect was due to author
self-promotion of intrinsically more citable papers or whether papers are cited
more often simply because they are at the top of the astro-ph listing. Using
new data we can now disentangle both effects. Based on their submission times
we separate articles into a self-promoted sample and a sample of articles that
achieved a high rank on astro-ph by chance and compare their citation
distributions with those of articles on lower astro-ph positions. We find that
the positional citation effect is a superposition of self-promotion and
visibility bias.
| [
{
"version": "v1",
"created": "Fri, 2 May 2008 20:00:06 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jun 2008 15:42:41 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Dietrich",
"J. P.",
""
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0805.0330 | Ranko Lazic | Marcin Jurdzinski and Ranko Lazic | Alternating Automata on Data Trees and XPath Satisfiability | 23 pages | null | null | null | cs.LO cs.DB cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A data tree is an unranked ordered tree whose every node is labelled by a
letter from a finite alphabet and an element ("datum") from an infinite set,
where the latter can only be compared for equality. The article considers
alternating automata on data trees that can move downward and rightward, and
have one register for storing data. The main results are that nonemptiness over
finite data trees is decidable but not primitive recursive, and that
nonemptiness of safety automata is decidable but not elementary. The proofs use
nondeterministic tree automata with faulty counters. Allowing upward moves,
leftward moves, or two registers, each causes undecidability. As corollaries,
decidability is obtained for two data-sensitive fragments of the XPath query
language.
| [
{
"version": "v1",
"created": "Sat, 3 May 2008 00:12:15 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 13:21:17 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Mar 2010 15:20:58 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Jun 2010 14:13:49 GMT"
}
] | 2010-06-15T00:00:00 | [
[
"Jurdzinski",
"Marcin",
""
],
[
"Lazic",
"Ranko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0805.0337 | Sudeep Kamath | Sudeep Kamath and D. Manjunath | On Distributed Function Computation in Structure-Free Random Networks | 13 pages, 1 figure. Accepted at IEEE International Symposium on
Information Theory 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider in-network computation of MAX in a structure-free random multihop
wireless network. Nodes do not know their relative or absolute locations and
use the Aloha MAC protocol. For one-shot computation, we describe a protocol in
which the MAX value becomes available at the origin in $O(\sqrt{n/\log n})$
slots with high probability. This is within a constant factor of that required
by the best coordinated protocol. A minimal structure (knowledge of
hop-distance from the sink) is imposed on the network and with this structure,
we describe a protocol for pipelined computation of MAX that achieves a rate of
$\Omega(1/(\log^2 n)).$
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 19:15:21 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Kamath",
"Sudeep",
""
],
[
"Manjunath",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0360 | Peter Harding Mr | Peter J. Harding, Martyn Amos and Steve Gwynne | Prediction and Mitigation of Crush Conditions in Emergency Evacuations | null | null | null | null | cs.CE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several simulation environments exist for the simulation of large-scale
evacuations of buildings, ships, or other enclosed spaces. These offer
sophisticated tools for the study of human behaviour, the recreation of
environmental factors such as fire or smoke, and the inclusion of architectural
or structural features, such as elevators, pillars and exits. Although such
simulation environments can provide insights into crowd behaviour, they lack
the ability to examine potentially dangerous forces building up within a crowd.
These are commonly referred to as crush conditions, and are a common cause of
death in emergency evacuations.
In this paper, we describe a methodology for the prediction and mitigation of
crush conditions. The paper is organised as follows. We first establish the
need for such a model, defining the main factors that lead to crush conditions,
and describing several exemplar case studies. We then examine current methods
for studying crush, and describe their limitations. From this, we develop a
three-stage hybrid approach, using a combination of techniques. We conclude
with a brief discussion of the potential benefits of our approach.
| [
{
"version": "v1",
"created": "Sat, 3 May 2008 13:00:42 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Harding",
"Peter J.",
""
],
[
"Amos",
"Martyn",
""
],
[
"Gwynne",
"Steve",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0805.0375 | Petar Popovski | Petar Popovski and Osvaldo Simeone | Wireless Secrecy in Cellular Systems with Infrastructure--Aided
Cooperation | submitted to IEEE Transactions on Information Forensics and Security | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cellular systems, confidentiality of uplink transmission with respect to
eavesdropping terminals can be ensured by creating intentional inteference via
scheduling of concurrent downlink transmissions. In this paper, this basic idea
is explored from an information-theoretic standpoint by focusing on a two-cell
scenario where the involved base stations are connected via a finite-capacity
backbone link. A number of transmission strategies are considered that aim at
improving uplink confidentiality under constraints on the downlink rate that
acts as an interfering signal. The strategies differ mainly in the way the
backbone link is exploited by the cooperating downlink- to the uplink-operated
base stations. Achievable rates are derived for both the Gaussian (unfaded) and
the fading cases, under different assumptions on the channel state information
available at different nodes. Numerical results are also provided to
corroborate the analysis. Overall, the analysis reveals that a combination of
scheduling and base station cooperation is a promising means to improve
transmission confidentiality in cellular systems.
| [
{
"version": "v1",
"created": "Sat, 3 May 2008 17:56:21 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Popovski",
"Petar",
""
],
[
"Simeone",
"Osvaldo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0389 | Chaitanya Swamy | Chaitanya Swamy | Algorithms for Probabilistically-Constrained Models of Risk-Averse
Stochastic Optimization with Black-Box Distributions | null | null | null | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider various stochastic models that incorporate the notion of
risk-averseness into the standard 2-stage recourse model, and develop novel
techniques for solving the algorithmic problems arising in these models. A key
notable feature of our work that distinguishes it from work in some other
related models, such as the (standard) budget model and the (demand-) robust
model, is that we obtain results in the black-box setting, that is, where one
is given only sampling access to the underlying distribution. Our first model,
which we call the risk-averse budget model, incorporates the notion of
risk-averseness via a probabilistic constraint that restricts the probability
(according to the underlying distribution) with which the second-stage cost may
exceed a given budget B to at most a given input threshold \rho. We also a
consider a closely-related model that we call the risk-averse robust model,
where we seek to minimize the first-stage cost and the (1-\rho)-quantile of the
second-stage cost.
We obtain approximation algorithms for a variety of combinatorial
optimization problems including the set cover, vertex cover, multicut on trees,
min cut, and facility location problems, in the risk-averse budget and robust
models with black-box distributions. We obtain near-optimal solutions that
preserve the budget approximately and incur a small blow-up of the probability
threshold (both of which are unavoidable). To the best of our knowledge, these
are the first approximation results for problems involving probabilistic
constraints and black-box distributions. A major component of our results is a
fully polynomial approximation scheme for solving the LP-relaxation of the
risk-averse problem.
| [
{
"version": "v1",
"created": "Sun, 4 May 2008 03:57:52 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Swamy",
"Chaitanya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0805.0438 | Martin Wainwright | Ram Rajagopal, Martin J. Wainwright | Network-based consensus averaging with general noisy channels | Presented in part at the Allerton Conference on Control, Computing,
and Communication (September 2007). Appeared as Dept. of Statistics,
Technical Report, UC Berkeley | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the consensus averaging problem on graphs under general
noisy channels. We study a particular class of distributed consensus algorithms
based on damped updates, and using the ordinary differential equation method,
we prove that the updates converge almost surely to exact consensus for finite
variance noise. Our analysis applies to various types of stochastic
disturbances, including errors in parameters, transmission noise, and
quantization noise. Under a suitable stability condition, we prove that the
error is asymptotically Gaussian, and we show how the asymptotic covariance is
specified by the graph Laplacian. For additive parameter noise, we show how the
scaling of the asymptotic MSE is controlled by the spectral gap of the
Laplacian.
| [
{
"version": "v1",
"created": "Sun, 4 May 2008 19:13:55 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Rajagopal",
"Ram",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0444 | David Eisenstat | David Eisenstat | Two-enqueuer queue in Common2 | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The question of whether all shared objects with consensus number 2 belong to
Common2, the set of objects that can be implemented in a wait-free manner by
any type of consensus number 2, was first posed by Herlihy. In the absence of
general results, several researchers have obtained implementations for
restricted-concurrency versions of FIFO queues. We present the first Common2
algorithm for a queue with two enqueuers and any number of dequeuers.
| [
{
"version": "v1",
"created": "Sun, 4 May 2008 21:08:50 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Apr 2009 16:54:19 GMT"
}
] | 2009-04-07T00:00:00 | [
[
"Eisenstat",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.0455 | Leonid Andreev V | Leonid Andreev | From a set of parts to an indivisible whole. Part II: Operations in an
open comparative mode | 20 pages, 10 figures | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a new method, HGV2C, for pattern analysis. The HGV2C
method involves the construction of a computer ego (CE) based on an individual
object that can be either a part of the system under analysis or a newly
created object based on a certain hypothesis. The CE provides a capability to
analyze data from a specific standpoint, e.g. from a viewpoint of a certain
object. The CE is constructed from two identical copies of a query object, and
its functioning mechanism involves: a hypothesis-parameter (HP) and
infothyristor (IT). HP is a parameter that is introduced into an existing set
of parameters. The HP value for one of the clones of a query object is set to
equal 1, whereas for another clone it is greater than 1. The IT is based on the
previously described algorithm of iterative averaging and performs three
functions: 1) computation of a similarity matrix for the group of three objects
including two clones of a query object and a target object; 2) division of the
group into two alternative subgroups; and 3) a successive increase of the HP
weight in the totality of all the parameters. Initially, both clones of the
query object appear together in one of the subgroups as all of their parameter
values, except the HP, are identical. At a certain point of the HP
multiplication, one of the clones moves to the group of the target object. A
respective number of the HP multiplications represents the dissimilarity (D)
between the query and target objects. The product of D multiplied by the
difference in HP values of the clones is strictly constant and linearly
increases as the difference in HP values of the clones decreases. This new
approach to knowledge representation is demonstrated on the example of
population pyramids of 220 countries.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 02:55:38 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Andreev",
"Leonid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0459 | \^Hamed \"Owladeghaffari | Hamed Owladeghaffari | Phase transition in SONFIS&SORST | submitted to :The Sixth International Conference on Rough Sets and
Current Trends in Computing; Akron, Ohio, USA,2008 | null | 10.1007/978-3-540-88425-5_35 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, we introduce general frame of MAny Connected Intelligent
Particles Systems (MACIPS). Connections and interconnections between particles
get a complex behavior of such merely simple system (system in
system).Contribution of natural computing, under information granulation
theory, are the main topics of this spacious skeleton. Upon this clue, we
organize two algorithms involved a few prominent intelligent computing and
approximate reasoning methods: self organizing feature map (SOM), Neuro- Fuzzy
Inference System and Rough Set Theory (RST). Over this, we show how our
algorithms can be taken as a linkage of government-society interaction, where
government catches various fashions of behavior: solid (absolute) or flexible.
So, transition of such society, by changing of connectivity parameters (noise)
from order to disorder is inferred. Add to this, one may find an indirect
mapping among financial systems and eventual market fluctuations with MACIPS.
Keywords: phase transition, SONFIS, SORST, many connected intelligent particles
system, society-government interaction
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 04:19:50 GMT"
}
] | 2014-07-29T00:00:00 | [
[
"Owladeghaffari",
"Hamed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.0498 | Martin Mundhenk | Michael Bauland (Knipp GmbH, Germany), Martin Mundhenk (Univ. Jena,
Germany), Thomas Schneider (Univ. of Manchester, UK), Henning Schnoor (Univ.
Kiel, Germany), Ilka Schnoor (Univ. Luebeck, Germany), Heribert Vollmer
(Univ. Hannover, Germany) | The Tractability of Model-Checking for LTL: The Good, the Bad, and the
Ugly Fragments | 27 pages, 7 figures | null | null | ECCC Report TR08-028 | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a seminal paper from 1985, Sistla and Clarke showed that the
model-checking problem for Linear Temporal Logic (LTL) is either NP-complete or
PSPACE-complete, depending on the set of temporal operators used. If, in
contrast, the set of propositional operators is restricted, the complexity may
decrease. This paper systematically studies the model-checking problem for LTL
formulae over restricted sets of propositional and temporal operators. For
almost all combinations of temporal and propositional operators, we determine
whether the model-checking problem is tractable (in P) or intractable
(NP-hard). We then focus on the tractable cases, showing that they all are
NL-complete or even logspace solvable. This leads to a surprising gap in
complexity between tractable and intractable cases. It is worth noting that our
analysis covers an infinite set of problems, since there are infinitely many
sets of propositional operators.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 09:48:23 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Bauland",
"Michael",
"",
"Knipp GmbH, Germany"
],
[
"Mundhenk",
"Martin",
"",
"Univ. Jena,\n Germany"
],
[
"Schneider",
"Thomas",
"",
"Univ. of Manchester, UK"
],
[
"Schnoor",
"Henning",
"",
"Univ.\n Kiel, Germany"
],
[
"Schnoor",
"Ilka",
"",
"Univ. Luebeck, Germany"
],
[
"Vollmer",
"Heribert",
"",
"Univ. Hannover, Germany"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.0501 | Christian Senger | Christian Senger, Vladimir Sidorenko, Martin Bossert, Victor Zyablov | Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon
Codes | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008. 5 pages, 2 figures | null | 10.1109/ISIT.2008.4595300 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generalized Concatenated codes are a code construction consisting of a number
of outer codes whose code symbols are protected by an inner code. As outer
codes, we assume the most frequently used Reed-Solomon codes; as inner code, we
assume some linear block code which can be decoded up to half its minimum
distance. Decoding up to half the minimum distance of Generalized Concatenated
codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which
iteratively decodes by first using the inner decoder to get an estimate of the
outer code words and then using an outer error/erasure decoder with a varying
number of erasures determined by a set of pre-calculated thresholds. In this
paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed,
which exploits the fact that a number of outer Reed-Solomon codes with average
minimum distance d can be grouped into one single Interleaved Reed-Solomon code
which can be decoded beyond d/2. This allows to skip a number of decoding
iterations on the one hand and to reduce the complexity of each decoding
iteration significantly - while maintaining the decoding performance - on the
other.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 10:12:13 GMT"
}
] | 2010-04-29T00:00:00 | [
[
"Senger",
"Christian",
""
],
[
"Sidorenko",
"Vladimir",
""
],
[
"Bossert",
"Martin",
""
],
[
"Zyablov",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0507 | Felice Manganiello | Felice Manganiello, Elisa Gorla and Joachim Rosenthal | Spread Codes and Spread Decoding in Network Coding | null | Proceedings of the 2008 IEEE International Symposium on
Information Theory, Toronto, ON, Canada, July 6 - 11, 2008 | 10.1109/ISIT.2008.4595113 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce the class of Spread Codes for the use in random
network coding. Spread Codes are based on the construction of spreads in finite
projective geometry. The major contribution of the paper is an efficient
decoding algorithm of spread codes up to half the minimum distance.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 10:48:26 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2008 13:49:45 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Manganiello",
"Felice",
""
],
[
"Gorla",
"Elisa",
""
],
[
"Rosenthal",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0510 | Thomas Blumensath | Thomas Blumensath and Mike E. Davies | Iterative Hard Thresholding for Compressed Sensing | null | null | null | null | cs.IT cs.NA math.IT math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed sensing is a technique to sample compressible signals below the
Nyquist rate, whilst still allowing near optimal reconstruction of the signal.
In this paper we present a theoretical analysis of the iterative hard
thresholding algorithm when applied to the compressed sensing recovery problem.
We show that the algorithm has the following properties (made more precise in
the main text of the paper)
- It gives near-optimal error guarantees.
- It is robust to observation noise.
- It succeeds with a minimum number of observations.
- It can be used with any sampling operator for which the operator and its
adjoint can be computed.
- The memory requirement is linear in the problem size.
- Its computational complexity per iteration is of the same order as the
application of the measurement operator or its adjoint.
- It requires a fixed number of iterations depending only on the logarithm of
a form of signal to noise ratio of the signal.
- Its performance guarantees are uniform in that they only depend on
properties of the sampling operator and signal sparsity.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 12:33:43 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Blumensath",
"Thomas",
""
],
[
"Davies",
"Mike E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0805.0514 | Jens Zumbr\"agel | Jens Zumbragel, Gerard Maze, Joachim Rosenthal | Efficient recovering of operation tables of black box groups and rings | 5 pages | null | null | null | cs.IT cs.DM math.GR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | People have been studying the following problem: Given a finite set S with a
hidden (black box) binary operation * on S which might come from a group law,
and suppose you have access to an oracle that you can ask for the operation x*y
of single pairs (x,y) you choose. What is the minimal number of queries to the
oracle until the whole binary operation is recovered, i.e. you know x*y for all
x,y in S?
This problem can trivially be solved by using |S|^2 queries to the oracle, so
the question arises under which circumstances you can succeed with a
significantly smaller number of queries.
In this presentation we give a lower bound on the number of queries needed
for general binary operations. On the other hand, we present algorithms solving
this problem by using |S| queries, provided that * is an abelian group
operation. We also investigate black box rings and give lower and upper bounds
for the number of queries needed to solve product recovering in this case.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 12:17:04 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Zumbragel",
"Jens",
""
],
[
"Maze",
"Gerard",
""
],
[
"Rosenthal",
"Joachim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0516 | Mich\`ele Wigger | Shraga I. Bross, Amos Lapidoth, Michele A. Wigger | The Gaussian MAC with Conferencing Encoders | 5 pages, To be presented at ISIT 2008 in Toronto | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive the capacity region of the Gaussian version of Willems's two-user
MAC with conferencing encoders. This setting differs from the classical MAC in
that, prior to each transmission block, the two transmitters can communicate
with each other over noise-free bit-pipes of given capacities. The derivation
requires a new technique for proving the optimality of Gaussian input
distributions in certain mutual information maximizations under a Markov
constraint. We also consider a Costa-type extension of the Gaussian MAC with
conferencing encoders. In this extension, the channel can be described as a
two-user MAC with Gaussian noise and Gaussian interference where the
interference is known non-causally to the encoders but not to the decoder. We
show that as in Costa's setting the interference sequence can be perfectly
canceled, i.e., that the capacity region without interference can be achieved.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 12:20:34 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Bross",
"Shraga I.",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Wigger",
"Michele A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0517 | Jerrald Meek | Jerrald Meek | Analysis of the Deterministic Polynomial Time Solvability of the
0-1-Knapsack Problem | 14 Pages; The author is delaying submission for publication so that
counter arguments may be proposed.
ftp://ftp%40micrognu%2ecom:anon%[email protected]/pnenp/knapsack.pdf | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previously the author has demonstrated that a representative polynomial
search partition is required to solve a NP-complete problem in deterministic
polynomial time. It has also been demonstrated that finding such a partition
can only be done in deterministic polynomial time if the form of the problem
provides a simple method for producing the partition. It is the purpose of this
article to demonstrate that no deterministic polynomial time method exists to
produce a representative polynomial search partition for the Knapsack problem.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 12:34:27 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2008 18:03:10 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Aug 2008 15:11:52 GMT"
},
{
"version": "v4",
"created": "Fri, 5 Sep 2008 18:51:28 GMT"
},
{
"version": "v5",
"created": "Sat, 6 Sep 2008 23:13:44 GMT"
}
] | 2008-09-07T00:00:00 | [
[
"Meek",
"Jerrald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.0521 | Mich\`ele Wigger | Amos Lapidoth, Stefan M. Moser, Michele A. Wigger | On the Capacity of Free-Space Optical Intensity Channels | To be presented at ISIT 2008 in Toronto | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New upper and lower bounds are presented on the capacity of the free-space
optical intensity channel. This channel is characterized by inputs that are
nonnegative (representing the transmitted optical intensity) and by outputs
that are corrupted by additive white Gaussian noise (because in free space the
disturbances arise from many independent sources). Due to battery and safety
reasons the inputs are simultaneously constrained in both their average and
peak power. For a fixed ratio of the average power to the peak power the
difference between the upper and the lower bounds tends to zero as the average
power tends to infinity, and the ratio of the upper and lower bounds tends to
one as the average power tends to zero. The case where only an average-power
constraint is imposed on the input is treated separately. In this case, the
difference of the upper and lower bound tends to 0 as the average power tends
to infinity, and their ratio tends to a constant as the power tends to zero.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 13:04:23 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Moser",
"Stefan M.",
""
],
[
"Wigger",
"Michele A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0541 | Liang Wang | Wang Liang | Climate modification directed by control theory | 9 piges,8 figures | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Climate modification measures to counteract global warming receive some more
new attentions in these years. Most current researches only discuss the impact
of these measures to climate, but how to design such a climate regulator is
still unknown. This paper shows the control theory could give the systematic
direction for climate modification. But the control analyzing also reveals that
climate modifications should only be regarded as a last-ditch measure.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 14:18:37 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2008 07:59:02 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Liang",
"Wang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0560 | Tom Adam Frederic Anderson | Tom Adam Frederic Anderson, Yean-Fu Wen | An Approach to Learning Research with a Wireless Sensor Network in an
Outdoor Setting | 4 pages, 2 figures | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated collection of environmental data may be accomplished with wireless
sensor networks (WSNs). In this paper, a general discussion of WSNs is given
for the gathering of data for educational research. WSNs have the capability to
enhance the scope of a researcher to include multiple streams of data:
environmental, location, cyberdata, video, and RFID. The location of data
stored in a database can allow reconstruction of the learning activity for the
evaluation of significance at a later time. A brief overview of the technology
forms the basis of an exploration of a setting used for outdoor learning.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 17:04:56 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Anderson",
"Tom Adam Frederic",
""
],
[
"Wen",
"Yean-Fu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0805.0577 | Dominik Seethaler | Dominik Seethaler and Helmut B\"olcskei | Infinity-Norm Sphere-Decoding | Submitted to IEEE Transactions on Information Theory, Nov. 2008
(paper was presented in part at IEEE ISIT 2008, Toronto, ON, Canada, July
2008) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The most promising approaches for efficient detection in multiple-input
multiple-output (MIMO) wireless systems are based on sphere-decoding (SD). The
conventional (and optimum) norm that is used to conduct the tree traversal step
in SD is the l-2 norm. It was, however, recently observed that using the
l-infinity norm instead reduces the hardware complexity of SD considerably at
only a marginal performance loss. These savings result from a reduction in the
length of the critical path in the circuit and the silicon area required for
metric computation, but are also, as observed previously through simulation
results, a consequence of a reduction in the computational (i.e., algorithmic)
complexity. The aim of this paper is an analytical performance and
computational complexity analysis of l-infinity norm SD. For i.i.d. Rayleigh
fading MIMO channels, we show that l-infinity norm SD achieves full diversity
order with an asymptotic SNR gap, compared to l-2 norm SD, that increases at
most linearly in the number of receive antennas. Moreover, we provide a
closed-form expression for the computational complexity of l-infinity norm SD
based on which we establish that its complexity scales exponentially in the
system size. Finally, we characterize the tree pruning behavior of l-infinity
norm SD and show that it behaves fundamentally different from that of l-2 norm
SD.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 17:48:39 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 20:12:27 GMT"
}
] | 2008-11-18T00:00:00 | [
[
"Seethaler",
"Dominik",
""
],
[
"Bölcskei",
"Helmut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0585 | Jean Gallier | Jean Gallier | Discrete Mathematics for Computer Science, Some Notes | 255 pages | null | null | null | cs.DM cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | These are notes on discrete mathematics for computer scientists. The
presentation is somewhat unconventional. Indeed I begin with a discussion of
the basic rules of mathematical reasoning and of the notion of proof formalized
in a natural deduction system ``a la Prawitz''. The rest of the material is
more or less traditional but I emphasize partial functions more than usual
(after all, programs may not terminate for all input) and I provide a fairly
complete account of the basic concepts of graph theory.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 18:52:00 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Gallier",
"Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.0589 | Rahul Vaze | Rahul Vaze and Robert W. Heath Jr | Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay
Networks | A part of this paper appears in the proceedings of the IEEE
International Symposium on Information Theory 2008, Toronto, Canada 6-11 July
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed space-time block coding is a diversity technique to mitigate the
effects of fading in multi-hop wireless networks, where multiple relay stages
are used by a source to communicate with its destination. This paper proposes a
new distributed space-time block code called the cascaded orthogonal space-time
block code (COSTBC) for the case where the source and destination are equipped
with multiple antennas and each relay stage has one or more single antenna
relays. Each relay stage is assumed to have receive channel state information
(CSI) for all the channels from the source to itself, while the destination is
assumed to have receive CSI for all the channels. To construct the COSTBC,
multiple orthogonal space-time block codes are used in cascade by the source
and each relay stage. In the COSTBC, each relay stage separates the
constellation symbols of the orthogonal space-time block code sent by the
preceding relay stage using its CSI, and then transmits another orthogonal
space-time block code to the next relay stage. COSTBCs are shown to achieve the
maximum diversity gain in a multi-hop wireless network with flat Rayleigh
fading channels. Several explicit constructions of COSTBCs are also provided
for two-hop wireless networks with two and four source antennas and relay
nodes. It is also shown that COSTBCs require minimum decoding complexity thanks
to the connection to orthogonal space-time block codes.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 19:10:21 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Vaze",
"Rahul",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0612 | Andrei Gagarin | Andrei Gagarin, Anush Poghosyan, and Vadim E. Zverovich | Upper bounds for alpha-domination parameters | 7 pages; Presented at the 4th East Coast Combinatorial Conference,
Antigonish (Nova Scotia, Canada), May 1-2, 2008 | Graphs Combin. 25 (2009), no. 4, pp. 513-520 | 10.1007/s00373-009-0864-6 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we provide a new upper bound for the alpha-domination number.
This result generalises the well-known Caro-Roditty bound for the domination
number of a graph. The same probabilistic construction is used to generalise
another well-known upper bound for the classical domination in graphs. We also
prove similar upper bounds for the alpha-rate domination number, which combines
the concepts of alpha-domination and k-tuple domination.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 22:20:55 GMT"
}
] | 2010-12-24T00:00:00 | [
[
"Gagarin",
"Andrei",
""
],
[
"Poghosyan",
"Anush",
""
],
[
"Zverovich",
"Vadim E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0805.0615 | Yingquan Wu | Yingquan Wu | On Expanded Cyclic Codes | 23 pages. Submitted for publication in IEEE Trans. Inform. Theory | null | null | null | cs.IT cs.CC math.IT math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper has a threefold purpose. The first purpose is to present an
explicit description of expanded cyclic codes defined in $\GF(q^m)$. The
proposed explicit construction of expanded generator matrix and expanded parity
check matrix maintains the symbol-wise algebraic structure and thus keeps many
important original characteristics. The second purpose of this paper is to
identify a class of constant-weight cyclic codes. Specifically, we show that a
well-known class of $q$-ary BCH codes excluding the all-zero codeword are
constant-weight cyclic codes. Moreover, we show this class of codes achieve the
Plotkin bound. The last purpose of the paper is to characterize expanded cyclic
codes utilizing the proposed expanded generator matrix and parity check matrix.
We characterize the properties of component codewords of a codeword and
particularly identify the precise conditions under which a codeword can be
represented by a subbasis. Our developments reveal an alternative while more
general view on the subspace subcodes of Reed-Solomon codes. With the new
insights, we present an improved lower bound on the minimum distance of an
expanded cyclic code by exploiting the generalized concatenated structure. We
also show that the fixed-rate binary expanded Reed-Solomon codes are
asymptotically "bad", in the sense that the ratio of minimum distance over code
length diminishes with code length going to infinity. It overturns the
prevalent conjecture that they are "good" codes and deviates from the ensemble
of generalized Reed-Solomon codes which asymptotically achieves the
Gilbert-Varshamov bound.
| [
{
"version": "v1",
"created": "Mon, 5 May 2008 22:51:12 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2008 16:53:04 GMT"
}
] | 2008-07-08T00:00:00 | [
[
"Wu",
"Yingquan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0805.0642 | \^Hamed \"Owladeghaffari | Hamed Owladeghaffari | Order to Disorder Transitions in Hybrid Intelligent Systems: a Hatch to
the Interactions of Nations -Governments | submitted to:The 2008 IEEE International Conference on Granular
Computing (GrC 2008) | null | null | null | cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, under general frame of MAny Connected Intelligent Particles
Systems (MACIPS), we reproduce two new simple subsets of such intelligent
complex network, namely hybrid intelligent systems, involved a few prominent
intelligent computing and approximate reasoning methods: self organizing
feature map (SOM), Neuro-Fuzzy Inference System and Rough Set Theory (RST).
Over this, we show how our algorithms can be construed as a linkage of
government-society interaction, where government catches various fashions of
behavior: solid (absolute) or flexible. So, transition of such society, by
changing of connectivity parameters (noise) from order to disorder is inferred.
Add to this, one may find an indirect mapping among financial systems and
eventual market fluctuations with MACIPS.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 04:22:36 GMT"
}
] | 2010-01-10T00:00:00 | [
[
"Owladeghaffari",
"Hamed",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0648 | Mathieu Bredif | Mathieu Br\'edif, Dider Boldo, Marc Pierrot-Deseilligny, Henri
Ma\^itre | 3D Building Model Fitting Using A New Kinetic Framework | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new approach to fit the polyhedron describing a 3D building
model to the point cloud of a Digital Elevation Model (DEM). We introduce a new
kinetic framework that hides to its user the combinatorial complexity of
determining or maintaining the polyhedron topology, allowing the design of a
simple variational optimization. This new kinetic framework allows the
manipulation of a bounded polyhedron with simple faces by specifying the target
plane equations of each of its faces. It proceeds by evolving continuously from
the polyhedron defined by its initial topology and its initial plane equations
to a polyhedron that is as topologically close as possible to the initial
polyhedron but with the new plane equations. This kinetic framework handles
internally the necessary topological changes that may be required to keep the
faces simple and the polyhedron bounded. For each intermediate configurations
where the polyhedron looses the simplicity of its faces or its boundedness, the
simplest topological modification that is able to reestablish the simplicity
and the boundedness is performed.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 06:34:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Brédif",
"Mathieu",
""
],
[
"Boldo",
"Dider",
""
],
[
"Pierrot-Deseilligny",
"Marc",
""
],
[
"Maître",
"Henri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0805.0650 | Gesine Milde | Lutz Prechelt | Plat_Forms -- a contest: The web development platform comparison | 9 pages | null | null | Technical Report TR-B-06-11 | cs.SE | http://creativecommons.org/licenses/by/3.0/ | "Plat_Forms" is a competition in which top-class teams of three programmers
compete to implement the same requirements for a web-based system within 30
hours, each team using a different technology platform (Java EE, .NET, PHP,
Perl, Python, or Ruby on Rails). The results will provide new insights into the
real (rather than purported) pros, cons, and emergent properties of each
platform. The evaluation will analyze many aspects of each solution, both
external (usability, functionality, reliability, performance, etc.) and
internal (structure, understandability, flexibility, etc.).
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 06:53:01 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Prechelt",
"Lutz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0805.0697 | Tshilidzi Marwala | Meir Perez and Tshilidzi Marwala | Stochastic Optimization Approaches for Solving Sudoku | 13 pages | null | 10.1016/j.eswa.2012.04.019 | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper the Sudoku problem is solved using stochastic search techniques
and these are: Cultural Genetic Algorithm (CGA), Repulsive Particle Swarm
Optimization (RPSO), Quantum Simulated Annealing (QSA) and the Hybrid method
that combines Genetic Algorithm with Simulated Annealing (HGASA). The results
obtained show that the CGA, QSA and HGASA are able to solve the Sudoku puzzle
with CGA finding a solution in 28 seconds, while QSA finding a solution in 65
seconds and HGASA in 1.447 seconds. This is mainly because HGASA combines the
parallel searching of GA with the flexibility of SA. The RPSO was found to be
unable to solve the puzzle.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 11:06:49 GMT"
}
] | 2012-04-25T00:00:00 | [
[
"Perez",
"Meir",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0805.0730 | Amy Glen | Amy Glen, Florence Lev\'e, Gw\'ena\"el Richomme | Quasiperiodic and Lyndon episturmian words | 33 pages; minor changes | Theoretical Computer Science 409 (2008) 578-600 | 10.1016/j.tcs.2008.09.056 | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently the second two authors characterized quasiperiodic Sturmian words,
proving that a Sturmian word is non-quasiperiodic if and only if it is an
infinite Lyndon word. Here we extend this study to episturmian words (a natural
generalization of Sturmian words) by describing all the quasiperiods of an
episturmian word, which yields a characterization of quasiperiodic episturmian
words in terms of their "directive words". Even further, we establish a
complete characterization of all episturmian words that are Lyndon words. Our
main results show that, unlike the Sturmian case, there is a much wider class
of episturmian words that are non-quasiperiodic, besides those that are
infinite Lyndon words. Our key tools are morphisms and directive words, in
particular "normalized" directive words, which we introduced in an earlier
paper. Also of importance is the use of "return words" to characterize
quasiperiodic episturmian words, since such a method could be useful in other
contexts.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 14:22:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Sep 2008 12:44:33 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Glen",
"Amy",
""
],
[
"Levé",
"Florence",
""
],
[
"Richomme",
"Gwénaël",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0805.0740 | Luca Venturino | Antonio De Maio, Marco Lops, Luca Venturino | Diversity-Integration Trade-offs in MIMO Detection | null | IEEE Transactions on Signal Processing, Vol. 56, no. 10, pp.
5051-5061, October 2008 | 10.1109/TSP.2008.928693 | null | cs.OH cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, a MIMO detection problem is considered. At first, we derive the
Generalized Likelihood Ratio Test (GLRT) for arbitrary transmitted signals and
arbitrary time-correlation of the disturbance. Then, we investigate design
criteria for the transmitted waveforms in both power-unlimited and
power-limited systems and we study the interplay among the rank of the
optimized code matrix, the number of transmit diversity paths and the amount of
energy integrated along each path. The results show that increasing the rank of
the code matrix allows generating a larger number of diversity paths at the
price of reducing the average signal-to-clutter level along each path.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 10:26:43 GMT"
}
] | 2022-03-09T00:00:00 | [
[
"De Maio",
"Antonio",
""
],
[
"Lops",
"Marco",
""
],
[
"Venturino",
"Luca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0747 | Daniel Lemire | Hazel Webb, Owen Kaser, Daniel Lemire | Pruning Attribute Values From Data Cubes with Diamond Dicing | null | null | null | TR-08-011 (UNB Saint John) | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data stored in a data warehouse are inherently multidimensional, but most
data-pruning techniques (such as iceberg and top-k queries) are unidimensional.
However, analysts need to issue multidimensional queries. For example, an
analyst may need to select not just the most profitable stores
or--separately--the most profitable products, but simultaneous sets of stores
and products fulfilling some profitability constraints. To fill this need, we
propose a new operator, the diamond dice. Because of the interaction between
dimensions, the computation of diamonds is challenging. We present the first
diamond-dicing experiments on large data sets. Experiments show that we can
compute diamond cubes over fact tables containing 100 million facts in less
than 35 minutes using a standard PC.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 15:45:15 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Webb",
"Hazel",
""
],
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.0766 | Jon Feldman | Gagan Aggarwal, Jon Feldman, S. Muthukrishnan and Martin Pal | Sponsored Search Auctions with Markovian Users | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sponsored search involves running an auction among advertisers who bid in
order to have their ad shown next to search results for specific keywords.
Currently, the most popular auction for sponsored search is the "Generalized
Second Price" (GSP) auction in which advertisers are assigned to slots in the
decreasing order of their "score," which is defined as the product of their bid
and click-through rate. In the past few years, there has been significant
research on the game-theoretic issues that arise in an advertiser's interaction
with the mechanism as well as possible redesigns of the mechanism, but this
ranking order has remained standard.
From a search engine's perspective, the fundamental question is: what is the
best assignment of advertisers to slots? Here "best" could mean "maximizing
user satisfaction," "most efficient," "revenue-maximizing," "simplest to
interact with," or a combination of these. To answer this question we need to
understand the behavior of a search engine user when she sees the displayed
ads, since that defines the commodity the advertisers are bidding on, and its
value. Most prior work has assumed that the probability of a user clicking on
an ad is independent of the other ads shown on the page.
We propose a simple Markovian user model that does not make this assumption.
We then present an algorithm to determine the most efficient assignment under
this model, which turns out to be different than that of GSP. A truthful
auction then follows from an application of the Vickrey-Clarke-Groves (VCG)
mechanism. Further, we show that our assignment has many of the desirable
properties of GSP that makes bidding intuitive. At the technical core of our
result are a number of insights about the structure of the optimal assignment.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 18:05:23 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Aggarwal",
"Gagan",
""
],
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Pal",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.0782 | Michael Hilker | Michael Hilker and Christoph Schommer | A new queueing strategy for the Adversarial Queueing Theory | 8 pages, 1 figure, ps-trix | Proceedings, IPSI-2005, December 2005, Bled, Slovenia | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the today's Internet and TCP/IP-networks, the queueing of packets is
commonly implemented using the protocol FIFO (First In First Out).
Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other
queueing strategies are researched in this model and better results are
performed by alternative queueing strategies, e.g. LIS (Longest In System).
This article introduces a new queueing protocol called interval-strategy that
is concerned with the reduction from dynamic to static routing. We discuss the
maximum system time for a packet and estimate with up-to-date results how this
can be achieved. We figure out the maximum amount of time where a packet can
spend in the network (i.e. worst case system time), and argue that the
universal instability of the presented interval-strategy can be reached through
these results. When a large group of queueing strategies is used for queueing,
we prove that the interval-strategy will be universally unstable. Finally, we
calculate the maximum time of the static routing to reach an universal stable
and polynomial - in detail linear - bounded interval-strategy. Afterwards we
close - in order to check this upper bound - with up-to-date results about the
delivery times in static routing.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 19:25:41 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2008 15:37:23 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Hilker",
"Michael",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.0783 | Lars Birkedal | Lars Birkedal and Hongseok Yang | Relational Parametricity and Separation Logic | null | Logical Methods in Computer Science, Volume 4, Issue 2 (May 15,
2008) lmcs:825 | 10.2168/LMCS-4(2:6)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Separation logic is a recent extension of Hoare logic for reasoning about
programs with references to shared mutable data structures. In this paper, we
provide a new interpretation of the logic for a programming language with
higher types. Our interpretation is based on Reynolds's relational
parametricity, and it provides a formal connection between separation logic and
data abstraction.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 19:27:14 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2008 12:44:50 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Birkedal",
"Lars",
""
],
[
"Yang",
"Hongseok",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.0785 | Michael Hilker | Michael Hilker and Christoph Schommer | AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies | 5 pages, 2 figures | Proceedings of the 6th International Conference on Recent Advances
in Soft Computing (RASC2006), July 2006, Canterbury, United Kingdom | null | null | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If a computer node is infected by a virus, worm or a backdoor, then this is a
security risk for the complete network structure where the node is associated.
Existing Network Intrusion Detection Systems (NIDS) provide a certain amount of
support for the identification of such infected nodes but suffer from the need
of plenty of communication and computational power. In this article, we present
a novel approach called AGNOSCO to support the identification of infected nodes
through the usage of artificial ant colonies. It is shown that AGNOSCO
overcomes the communication and computational power problem while identifying
infected nodes properly.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 19:47:11 GMT"
},
{
"version": "v2",
"created": "Wed, 7 May 2008 15:33:35 GMT"
}
] | 2008-05-07T00:00:00 | [
[
"Hilker",
"Michael",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0805.0802 | Zesheng Chen | Zesheng Chen and Chuanyi Ji | An Information-Theoretical View of Network-Aware Malware Attacks | 14 pages, extension from a preliminary version appeared in IEEE
INFOCOM 2007 | null | null | null | cs.CR cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work investigates three aspects: (a) a network vulnerability as the
non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent
malwares that exploit such a vulnerability, and (c) defense, i.e., challenges
for fighting the threats. We first study five large data sets and observe
consistent clustered vulnerable-host distributions. We then present a new
metric, referred to as the non-uniformity factor, which quantifies the
unevenness of a vulnerable-host distribution. This metric is essentially the
Renyi information entropy and better characterizes the non-uniformity of a
distribution than the Shannon entropy. Next, we analyze the propagation speed
of network-aware malwares in view of information theory. In particular, we draw
a relationship between Renyi entropies and randomized epidemic malware-scanning
algorithms. We find that the infection rates of malware-scanning methods are
characterized by the Renyi entropies that relate to the information bits in a
non-unform vulnerable-host distribution extracted by a randomized scanning
algorithm. Meanwhile, we show that a representative network-aware malware can
increase the spreading speed by exactly or nearly a non-uniformity factor when
compared to a random-scanning malware at an early stage of malware propagation.
This quantifies that how much more rapidly the Internet can be infected at the
early stage when a malware exploits an uneven vulnerable-host distribution as a
network-wide vulnerability. Furthermore, we analyze the effectiveness of
defense strategies on the spread of network-aware malwares. Our results
demonstrate that counteracting network-aware malwares is a significant
challenge for the strategies that include host-based defense and IPv6.
| [
{
"version": "v1",
"created": "Tue, 6 May 2008 20:37:10 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2008 15:17:34 GMT"
}
] | 2008-09-08T00:00:00 | [
[
"Chen",
"Zesheng",
""
],
[
"Ji",
"Chuanyi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.0845 | Samuel Mimram | Samuel Mimram (PPS) | Presentation of a Game Semantics for First-Order Propositional Logic | null | null | null | null | cs.LO math.CT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Game semantics aim at describing the interactive behaviour of proofs by
interpreting formulas as games on which proofs induce strategies. In this
article, we introduce a game semantics for a fragment of first order
propositional logic. One of the main difficulties that has to be faced when
constructing such semantics is to make them precise by characterizing definable
strategies - that is strategies which actually behave like a proof. This
characterization is usually done by restricting to the model to strategies
satisfying subtle combinatory conditions such as innocence, whose preservation
under composition is often difficult to show. Here, we present an original
methodology to achieve this task which requires to combine tools from game
semantics, rewriting theory and categorical algebra. We introduce a
diagrammatic presentation of definable strategies by the means of generators
and relations: those strategies can be generated from a finite set of
``atomic'' strategies and that the equality between strategies generated in
such a way admits a finite axiomatization. These generators satisfy laws which
are a variation of bialgebras laws, thus bridging algebra and denotational
semantics in a clean and unexpected way.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 06:53:47 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Mimram",
"Samuel",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0805.0849 | Michael Hilker | Michael Hilker and Christoph Schommer | SANA - Network Protection through artificial Immunity | 5 pages | Proceedings of the 2nd International Workshop on Theory of
Computer Viruses (TCV 2007), May 2007, Nancy, France | null | null | cs.CR cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current network protection systems use a collection of intelligent components
- e.g. classifiers or rule-based firewall systems to detect intrusions and
anomalies and to secure a network against viruses, worms, or trojans. However,
these network systems rely on individuality and support an architecture with
less collaborative work of the protection components. They give less
administration support for maintenance, but offer a large number of individual
single points of failures - an ideal situation for network attacks to succeed.
In this work, we discuss the required features, the performance, and the
problems of a distributed protection system called SANA. It consists of a
cooperative architecture, it is motivated by the human immune system, where the
components correspond to artificial immune cells that are connected for their
collaborative work. SANA promises a better protection against intruders than
common known protection systems through an adaptive self-management while
keeping the resources efficiently by an intelligent reduction of redundant
tasks. We introduce a library of several novel and common used protection
components and evaluate the performance of SANA by a proof-of-concept
implementation.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 07:13:32 GMT"
}
] | 2008-05-08T00:00:00 | [
[
"Hilker",
"Michael",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0805.0850 | Michael Hilker | Michael Hilker and Christoph Schommer | Service Oriented Architecture in Network Security - a novel Organisation
in Security Systems | 4 pages | Proceedings of the 3rd International Workshop on Theory of
Computer Viruses (TCV 2008), May 2008, Nancy, France | null | null | cs.CR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current network security systems are a collection of various security
components, which are directly installed in the operating system. These check
the whole node for suspicious behaviour. Armouring intrusions e.g. have the
ability to hide themselves from being checked. We present in this paper an
alternative organisation of security systems. The node is completely
virtualized with current virtualization systems so that the operating system
with applications and the security system is distinguished. The security system
then checks the node from outside and the right security components are
provided through a service oriented architecture. Due to the running in a
virtual machine, the infected nodes can be halted, duplicated, and moved to
other nodes for further analysis and legal aspects. This organisation is in
this article analysed and a preliminary implementation showing promising
results are discussed.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 14:13:32 GMT"
}
] | 2008-05-08T00:00:00 | [
[
"Hilker",
"Michael",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.0851 | Sebastien Tixeuil | Samuel Bernard (LIP6), St\'ephane Devismes (LRI), Maria Gradinariu
Potop-Butucaru (LIP6, INRIA Rocquencourt), S\'ebastien Tixeuil (LIP6) | Bounds for self-stabilization in unidirectional networks | null | null | null | RR-6524 | cs.DS cs.CC cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A distributed algorithm is self-stabilizing if after faults and attacks hit
the system and place it in some arbitrary global state, the systems recovers
from this catastrophic situation without external intervention in finite time.
Unidirectional networks preclude many common techniques in self-stabilization
from being used, such as preserving local predicates. In this paper, we
investigate the intrinsic complexity of achieving self-stabilization in
unidirectional networks, and focus on the classical vertex coloring problem.
When deterministic solutions are considered, we prove a lower bound of $n$
states per process (where $n$ is the network size) and a recovery time of at
least $n(n-1)/2$ actions in total. We present a deterministic algorithm with
matching upper bounds that performs in arbitrary graphs. When probabilistic
solutions are considered, we observe that at least $\Delta + 1$ states per
process and a recovery time of $\Omega(n)$ actions in total are required (where
$\Delta$ denotes the maximal degree of the underlying simple undirected graph).
We present a probabilistically self-stabilizing algorithm that uses
$\mathtt{k}$ states per process, where $\mathtt{k}$ is a parameter of the
algorithm. When $\mathtt{k}=\Delta+1$, the algorithm recovers in expected
$O(\Delta n)$ actions. When $\mathtt{k}$ may grow arbitrarily, the algorithm
recovers in expected O(n) actions in total. Thus, our algorithm can be made
optimal with respect to space or time complexity.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 07:39:14 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2008 08:06:10 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Bernard",
"Samuel",
"",
"LIP6"
],
[
"Devismes",
"Stéphane",
"",
"LRI"
],
[
"Potop-Butucaru",
"Maria Gradinariu",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.0854 | EDA Publishing Association | M. Worgull, M. Heckele, T. Mappes, B. Matthis, G. Tosello, T. Metz, J.
Gavillet (LETI), P. Koltay, H. N. Hansen | Sub-$\mu$ structured Lotus Surfaces Manufacturing | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sub-micro structured surfaces allow modifying the behavior of polymer films
or components. Especially in micro fluidics a lotus-like characteristic is
requested for many applications. Structure details with a high aspect ratio are
necessary to decouple the bottom and the top of the functional layer. Unlike to
stochastic methods, patterning with a LIGA-mold insert it is possible to
structure surfaces very uniformly or even with controlled variations (e.g. with
gradients). In this paper we present the process chain to realize polymer
sub-micro structures with minimum lateral feature size of 400 nm and up to 4
micrometers high.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:39:11 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Worgull",
"M.",
"",
"LETI"
],
[
"Heckele",
"M.",
"",
"LETI"
],
[
"Mappes",
"T.",
"",
"LETI"
],
[
"Matthis",
"B.",
"",
"LETI"
],
[
"Tosello",
"G.",
"",
"LETI"
],
[
"Metz",
"T.",
"",
"LETI"
],
[
"Gavillet",
"J.",
"",
"LETI"
],
[
"Koltay",
"P.",
""
],
[
"Hansen",
"H. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0855 | EDA Publishing Association | C. Serre, A. P\'erez-Rodrigueza, N. Fondevilla, E. Martincic (IEF),
J.R. Morante, J. Montserrat, J. Esteve | Linear and Non Linear Behaviour of Mechanical Resonators for Optimized
Inertial Electromagnetic Microgenerators | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The need for wearable or abandoned microsystems, as well as the trend to a
lower power consumption of electronic devices, make miniaturized renewable
energy generators a viable alternative to batteries. Among the different
alternatives, an interesting option is the use of inertial microgenerators for
energy scavenging from vibrations present in the environment. These devices
constitute perpetual energy sources without the need for refilling, thus being
well suited for abandoned sensors, wireless systems or microsystems which must
be embedded within the structure, without outside physical connections.
Different electromagnetic energy scavenging devices have been described in the
literature [1,2,3], based on the use of a velocity damped resonator, which is
well suited for harvesting of vibrational energy induced by the operation of
machines. These vibrations are characterized by a well defined frequency (in
the range between few Hz's and few kHz's) and low displacement amplitudes.
Adjusting the resonant frequency of the system to that of the vibrations allows
amplification of these low amplitude displacements. Moreover, for these
applications, the use of an electromagnetic device has the potential advantages
of a good level of compatibility with Si Microsystem technology, as well as the
possibility of relatively high electromechanical coupling with simple designs.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:39:55 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Serre",
"C.",
"",
"IEF"
],
[
"Pérez-Rodrigueza",
"A.",
"",
"IEF"
],
[
"Fondevilla",
"N.",
"",
"IEF"
],
[
"Martincic",
"E.",
"",
"IEF"
],
[
"Morante",
"J. R.",
""
],
[
"Montserrat",
"J.",
""
],
[
"Esteve",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0856 | EDA Publishing Association | Zhen-Zhun Shu, Ming-Li Ke, Guan-Wei Chen, Ray Hua Horng, Chao-Chih
Chang, Jean-Yih Tsai, Chung-Ching Lai, Ji-Liang Chen | Design And Fabrication of Condenser Microphone Using Wafer Transfer And
Micro-electroplating Technique | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel fabrication process, which uses wafer transfer and
micro-electroplating technique, has been proposed and tested. In this paper,
the effects of the diaphragm thickness and stress, the air-gap thickness, and
the area ratio of acoustic holes to backplate on the sensitivity of the
condenser microphone have been demonstrated since the performance of the
microphone depends on these parameters. The microphone diaphragm has been
designed with a diameter and thickness of 1.9 mm and 0.6 $\mu$m, respectively,
an air-gap thickness of 10 $\mu$m, and a 24% area ratio of acoustic holes to
backplate. To obtain a lower initial stress, the material used for the
diaphragm is polyimide. The measured sensitivities of the microphone at the
bias voltages of 24 V and 12 V are -45.3 and -50.2 dB/Pa (at 1 kHz),
respectively. The fabricated microphone shows a flat frequency response
extending to 20 kHz.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:41:02 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Shu",
"Zhen-Zhun",
""
],
[
"Ke",
"Ming-Li",
""
],
[
"Chen",
"Guan-Wei",
""
],
[
"Horng",
"Ray Hua",
""
],
[
"Chang",
"Chao-Chih",
""
],
[
"Tsai",
"Jean-Yih",
""
],
[
"Lai",
"Chung-Ching",
""
],
[
"Chen",
"Ji-Liang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0857 | EDA Publishing Association | L. Juhasz, A. Vass-Varnai, Veronika Timar-Horvath, Marc Desmulliez,
Resh Dhariwal | Porous Alumina Based Capacitive MEMS RH Sensor | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of a joint research and development project at the BME and HWU is to
produce a cheap, reliable, low-power and CMOS-MEMS process compatible
capacitive type relative humidity (RH) sensor that can be incorporated into a
state-of-the-art, wireless sensor network. In this paper we discuss the
preparation of our new capacitive structure based on post-CMOS MEMS processes
and the methods which were used to characterize the thin film porous alumina
sensing layer. The average sensitivity is approx. 15 pF/RH% which is more than
a magnitude higher than the values found in the literature. The sensor is
equipped with integrated resistive heating, which can be used for maintenance
to reduce drift, or for keeping the sensing layer at elevated temperature, as
an alternative method for temperature-dependence cancellation.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:41:41 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Juhasz",
"L.",
""
],
[
"Vass-Varnai",
"A.",
""
],
[
"Timar-Horvath",
"Veronika",
""
],
[
"Desmulliez",
"Marc",
""
],
[
"Dhariwal",
"Resh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0858 | EDA Publishing Association | R. R. Mansour, S. Fouladi, M. Bakeri-Kassem | Integrated RF MEMS/CMOS Devices | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A maskless post-processing technique for CMOS chips is developed that enables
the fabrication of RF MEMS parallel-plate capacitors with a high quality factor
and a very compact size. Simulations and measured results are presented for
several MEMS/CMOS capacitors. A 2-pole coupled line tunable bandpass filter
with a center frequency of 9.5 GHz is designed, fabricated and tested. A tuning
range of 17% is achieved using integrated variable MEMS/CMOS capacitors with a
quality factor exceeding 20. The tunable filter occupies a chip area of 1.2 x
2.1 mm2.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:42:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Mansour",
"R. R.",
""
],
[
"Fouladi",
"S.",
""
],
[
"Bakeri-Kassem",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0859 | EDA Publishing Association | D. Flynn, Marc Desmulliez | Design Methodology and Manufacture of a Microinductor | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Potential core materials to supersede ferrite in the 0.5-10 MHz frequency
range are investigated. The performance of electrodeposited nickel-iron,
cobalt-iron-copper alloys and the commercial alloy Vitrovac 6025 have been
assessed through their inclusion within a custom-made solenoid microinductor.
Although the present inductor, at 500 KHz, achieves 77% power efficiency for
24.7W/cm3 power density, an optimized process predicts a power efficiency of
97% for 30.83W/cm3 power density. The principle issues regarding microinductor
design and performance are discussed.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:43:13 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Flynn",
"D.",
""
],
[
"Desmulliez",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0860 | EDA Publishing Association | Jens Georg Kaufmann, Marc Desmulliez, D. Price | Megasonic Enhanced Electrodeposition | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel way of filling high aspect ratio vertical interconnection (microvias)
with an aspect ratio of >2:1 is presented. High frequency acoustic streaming at
megasonic frequencies enables the decrease of the Nernst-diffusion layer down
to the sub-micron range, allowing thereby conformal electrodeposition in deep
grooves. Higher throughput and better control over the deposition properties
are possible for the manufacturing of interconnections and metal-based MEMS.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:43:40 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Kaufmann",
"Jens Georg",
""
],
[
"Desmulliez",
"Marc",
""
],
[
"Price",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0861 | EDA Publishing Association | Jack Hoyd-Gigg Ng, Marc Desmulliez, Aongus Mccarthy, Himanshu Suyal,
Kevin Prior, Duncan P. Hand | UV Direct-Writing of Metals on Polyimide | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conductive micro-patterned copper tracks were fabricated by UV direct-writing
of a nanoparticle silver seed layer followed by selective electroless copper
deposition. Silver ions were first incorporated into a hydrolyzed polyimide
surface layer by wet chemical treatment. A photoreactive polymer coating,
methoxy poly(ethylene glycol) (MPEG) was coated on top of the substrate prior
to UV irradiation. Electrons released through the interaction between the MPEG
molecules and UV photons allowed the reduction of the silver ions across the
MPEG/doped polyimide interface. The resultant silver seed layer has a cluster
morphology which is suitable for the initiation of electroless plating. Initial
results showed that the deposited copper tracks were in good agreement with the
track width on the photomask and laser direct-writing can also fabricate
smaller line width metal tracks with good accuracy. The facile fabrication
presented here can be carried out in air, at atmospheric pressure, and on
contoured surfaces.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:44:24 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Ng",
"Jack Hoyd-Gigg",
""
],
[
"Desmulliez",
"Marc",
""
],
[
"Mccarthy",
"Aongus",
""
],
[
"Suyal",
"Himanshu",
""
],
[
"Prior",
"Kevin",
""
],
[
"Hand",
"Duncan P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.0862 | EDA Publishing Association | X.-C. Shan, S.H. Ling, H. P. Maw, C. W. Lu, Y. C. Lam | Micro Embossing of Ceramic Green Substrates for Micro Devices | Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multilayered ceramic substrates with embedded micro patterns are becoming
increasingly important, for example, in harsh environment electronics and
microfluidic devices. Fabrication of these embedded micro patterns, such as
micro channels, cavities and vias, is a challenge. This study focuses on the
process of patterning micro features on ceramic green substrates using micro
embossing. A ceramic green tape that possessed near-zero shrinkage in the x-y
plane was used, six layers of which were laminated as the embossing substrate.
The process parameters that impact on the pattern fidelity were investigated
and optimized in this study. Micro features with line-width as small as several
micrometers were formed on the ceramic green substrates. The dynamic
thermo-mechanical analysis indicated that extending the holding time at certain
temperature range would harden the green substrates with little effect on
improving the embossing fidelity. Ceramic substrates with embossed micro
patterns were obtain d after co-firing. The embedded micro channels were also
obtained by laminating the green tapes on the embossed substrates.
| [
{
"version": "v1",
"created": "Wed, 7 May 2008 08:45:07 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Shan",
"X. -C.",
""
],
[
"Ling",
"S. H.",
""
],
[
"Maw",
"H. P.",
""
],
[
"Lu",
"C. W.",
""
],
[
"Lam",
"Y. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.