id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0804.4717
Icius Committee
T. Kubota and T. Yoshimitsu
Intelligent Unmanned Explorer for Deep Space Exploration
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 10 figures, 4 tables
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-A004-OP
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
asteroids or comets have received remarkable attention in the world. In small body explorations, especially, detailed in-situ surface exploration by tiny rover is one of effective and fruitful means and is expected to make strong contributions towards scientific studies. JAXA ISAS is promoting MUSES C mission, which is the worlds first sample and return attempt to or from the near earth asteroid. Hayabusa spacecraft in MUSES C mission took the tiny rover, which was expected to perform the in-situ surface exploration by hopping. This paper describes the system design, mobility and intelligence of the developed unmanned explorer. This paper also presents the ground experimental results and the flight results.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 01:18:37 GMT" } ]
2008-05-01T00:00:00
[ [ "Kubota", "T.", "" ], [ "Yoshimitsu", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4740
Bart Kuijpers
Sofie Haesevoets and Bart Kuijpers
An Affine-invariant Time-dependent Triangulation of Spatio-temporal Data
40 pages, 10 figures
null
null
null
cs.CG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the geometric data model for spatio-temporal data, introduced by Chomicki and Revesz, spatio-temporal data are modelled as a finite collection of triangles that are transformed by time-dependent affinities of the plane. To facilitate querying and animation of spatio-temporal data, we present a normal form for data in the geometric data model. We propose an algorithm for constructing this normal form via a spatio-temporal triangulation of geometric data objects. This triangulation algorithm generates new geometric data objects that partition the given objects both in space and in time. A particular property of the proposed partition is that it is invariant under time-dependent affine transformations, and hence independent of the particular choice of coordinate system used to describe he spatio-temporal data in. We can show that our algorithm works correctly and has a polynomial time complexity (of reasonably low degree in the number of input triangles and the maximal degree of the polynomial functions that describe the transformation functions). We also discuss several possible applications of this spatio-temporal triangulation.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 06:02:56 GMT" } ]
2008-12-18T00:00:00
[ [ "Haesevoets", "Sofie", "" ], [ "Kuijpers", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0804.4741
Tshilidzi Marwala
Lesedi Masisi, Fulufhelo V. Nelwamondo and Tshilidzi Marwala
The Effect of Structural Diversity of an Ensemble of Classifiers on Classification Accuracy
6 pages,IASTED International Conference on Modelling and Simulation (Africa-MS), 2008
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims to showcase the measure of structural diversity of an ensemble of 9 classifiers and then map a relationship between this structural diversity and accuracy. The structural diversity was induced by having different architectures or structures of the classifiers The Genetical Algorithms (GA) were used to derive the relationship between diversity and the classification accuracy by evolving the classifiers and then picking 9 classifiers out on an ensemble of 60 classifiers. It was found that as the ensemble became diverse the accuracy improved. However at a certain diversity measure the accuracy began to drop. The Kohavi-Wolpert variance method is used to measure the diversity of the ensemble. A method of voting is used to aggregate the results from each classifier. The lowest error was observed at a diversity measure of 0.16 with a mean square error of 0.274, when taking 0.2024 as maximum diversity measured. The parameters that were varied were: the number of hidden nodes, learning rate and the activation function.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 06:07:45 GMT" } ]
2008-05-01T00:00:00
[ [ "Masisi", "Lesedi", "" ], [ "Nelwamondo", "Fulufhelo V.", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0804.4744
V. Arvind
V. Arvind and Pushkar S. Joglekar
Lattice Problems, Gauge Functions and Parameterized Algorithms
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a k-dimensional subspace M\subseteq \R^n and a full rank integer lattice L\subseteq \R^n, the \emph{subspace avoiding problem} SAP is to find a shortest vector in L\setminus M. Treating k as a parameter, we obtain new parameterized approximation and exact algorithms for SAP based on the AKS sieving technique. More precisely, we give a randomized $(1+\epsilon)$-approximation algorithm for parameterized SAP that runs in time 2^{O(n)}.(1/\epsilon)^k, where the parameter k is the dimension of the subspace M. Thus, we obtain a 2^{O(n)} time algorithm for \epsilon=2^{-O(n/k)}. We also give a 2^{O(n+k\log k)} exact algorithm for the parameterized SAP for any \ell_p norm. Several of our algorithms work for all gauge functions as metric with some natural restrictions, in particular for all \ell_p norms. We also prove an \Omega(2^n) lower bound on the query complexity of AKS sieving based exact algorithms for SVP that accesses the gauge function as oracle.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 06:39:21 GMT" } ]
2008-05-01T00:00:00
[ [ "Arvind", "V.", "" ], [ "Joglekar", "Pushkar S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0804.4749
Icius Committee
Wen Yuh Jywe, Shih Shin Chen, Hung-Shu Wang, Chien Hung Liu, Hsin Hung Jwo, Yun Feng Teng, and Tung Hsien Hsieh
Study of improving nano-contouring performance by employing cross-coupling controller
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 6 pages, 8 figures
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-C002
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the tracking stage path planning, we design a two-axis cross-coupling control system which uses the PI controller to compensate the contour error between axes. In this paper, the stage adoptive is designed by our laboratory (Precision Machine Center of National Formosa University). The cross-coupling controller calculates the actuating signal of each axis by combining multi-axes position error. Hence, the cross-coupling controller improves the stage tracking ability and decreases the contour error. The experiments show excellent stage motion. This finding confirms that the proposed method is a powerful and efficient tool for improving stage tracking ability. Also found were the stages tracking to minimize contour error of two types circular to approximately 25nm.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 07:57:25 GMT" } ]
2008-05-01T00:00:00
[ [ "Jywe", "Wen Yuh", "" ], [ "Chen", "Shih Shin", "" ], [ "Wang", "Hung-Shu", "" ], [ "Liu", "Chien Hung", "" ], [ "Jwo", "Hsin Hung", "" ], [ "Teng", "Yun Feng", "" ], [ "Hsieh", "Tung Hsien", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4750
Icius Committee
Heru Tjahjana, Iwan Pranoto, Hari Muhammad, J. Naiborhu, and Miswanto
The Numerical Control Design for a Pair of Dubins Vehicles
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 3 pages, 2 figures
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-C003
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a model of a pair of Dubins vehicles is considered. The vehicles move from an initial position and orientation to final position and orientation. A long the motion, the two vehicles are not allowed to collide however the two vehicles cant to far each other. The optimal control of the vehicle is found using the Pontryagins Maximum Principle (PMP). This PMP leads to a Hamiltonian system consisting of a system of differential equation and its adjoint. The originally differential equation has initial and final condition but the adjoint system doesn't have one. The classical difficulty is solved numerically by the greatest gradient descent method. Some simulation results are presented in this paper.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:03:05 GMT" } ]
2008-05-01T00:00:00
[ [ "Tjahjana", "Heru", "" ], [ "Pranoto", "Iwan", "" ], [ "Muhammad", "Hari", "" ], [ "Naiborhu", "J.", "" ], [ "Miswanto", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4752
Icius Committee
M.A. Moelyadi, and G. Sachs
Simulation of Dynamic Yaw Stability Derivatives of a Bird Using CFD
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 15 figures, tables 3, Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007
null
null
ICIUS2007-B012
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulation results on dynamic yaw stability derivatives of a gull bird by means of computational fluid dynamics are presented. Two different kinds of motions are used for determining the dynamic yaw stability derivatives CNr and CNbeta . Concerning the first one, simple lateral translation and yaw rotary motions in yaw are considered. The second one consists of combined motions. To determine dynamic yaw stability derivatives of the bird, the simulation of an unsteady flow with a bird model showing a harmonic motion is performed. The unsteady flow solution for each time step is obtained by solving unsteady Euler equations based on a finite volume approach for a smaller reduced frequency. Then, an evaluation of unsteady forces and moments for one cycle is conducted using harmonic Fourier analysis. The results on the dynamic yaw stability derivatives for both simulations of the model motion show a good agreement.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:16:33 GMT" } ]
2008-05-01T00:00:00
[ [ "Moelyadi", "M. A.", "" ], [ "Sachs", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4753
Icius Committee
C. E. Huang, and J. S. Chen
Wavelet Based Iterative Learning Control with Fuzzy PD Feedback for Position Tracking of A Pneumatic Servo System
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 9 figures, 1 tables
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-A001
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a wavelet-based iterative learning control (WILC) scheme with Fuzzy PD feedback is presented for a pneumatic control system with nonsmooth nonlinearities and uncertain parameters. The wavelet transform is employed to extract the learnable dynamics from measured output signal before it can be used to update the control profile. The wavelet transform is adopted to decompose the original signal into many low-resolution signals that contain the learnable and unlearnable parts. The desired control profile is then compared with the learnable part of the transformed signal. Thus, the effects from unlearnable dynamics on the controlled system can be attenuated by a Fuzzy PD feedback controller. As for the rules of Fuzzy PD controller in the feedback loop, a genetic algorithm (GA) is employed to search for the inference rules of optimization. A proportional-valve controlled pneumatic cylinder actuator system is used as the control target for simulation. Simulation results have shown a much-improved positiontracking performance.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:22:19 GMT" } ]
2008-05-01T00:00:00
[ [ "Huang", "C. E.", "" ], [ "Chen", "J. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4754
Icius Committee
Bambang Riyanto, and Imam Arifin
Positive Real Synthesis of Networked Control System An LMI Approach
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 5 pages, 1 figure
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-C005
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the positive real analysis and synthesis for Networked Control Systems (NCS) in discrete time. Based on the definition of passivity, the sufficient condition of NCS is given by stochastic Lyapunov functional. The controller via state feedback is designed to guarantee the stability of NCS and closed-loop positive realness. It is shown that a mode-dependent positive real controller exists if a set of coupled linear matrix inequalities has solutions. The controller can be then constructed in terms of the solutions.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:25:46 GMT" } ]
2008-05-01T00:00:00
[ [ "Riyanto", "Bambang", "" ], [ "Arifin", "Imam", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4757
Icius Committee
Hardian Reza Dharmayanda, Taesam Kang, Young Jae Lee, and Sangkyung Sung
Analysis of Stability, Response and LQR Controller Design of a Small Scale Helicopter Dynamics
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 19 figures, 4 tables
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-C006
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents how to use feedback controller with helicopter dynamics state space model. A simplified analysis is presented for controller design using LQR of small scale helicopters for axial and forward flights. Our approach is simple and gives the basic understanding about how to develop controller for solving the stability of linear helicopter flight dynamics.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:32:27 GMT" } ]
2008-05-01T00:00:00
[ [ "Dharmayanda", "Hardian Reza", "" ], [ "Kang", "Taesam", "" ], [ "Lee", "Young Jae", "" ], [ "Sung", "Sangkyung", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4759
Icius Committee
Rifki Muhida, Riza Muhida, Wilson A. Dino, Hiroshi Nakanishi, Hideaki Kasai
Design and control of dynamical quantum processes in ortho para H2 conversion on surfaces
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 8 pages, 7 figures
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-C008
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here a novel, cost-effective method for increasing and controlling the ortho para H2 (o p H2) conversion yield. First, we invoke two processes derived from fundamental, surface science insights, based on the effect of molecular orientation on the hydrogen solid surface reaction, i.e., dynamical quantum filtering and steering, and apply them to enhance the o p H2 conversion yield. Second, we find an important factor that can significantly influence the yield i.e., inhomogeneity of spin density distribution. This factor gives us a promising possibility to increase the yield and to find the best catalyst e.g., design of materials that can function as catalysts for the o p H2 conversion.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 08:38:19 GMT" } ]
2008-05-01T00:00:00
[ [ "Muhida", "Rifki", "" ], [ "Muhida", "Riza", "" ], [ "Dino", "Wilson A.", "" ], [ "Nakanishi", "Hiroshi", "" ], [ "Kasai", "Hideaki", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0804.4774
Weidong Xu
Weidong Xu, Jia Wang, Jun Sun
A Projection Method for Derivation of Non-Shannon-Type Information Inequalities
5 pages, 1 figure Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1998, Zhang and Yeung found the first unconditional non-Shannon-type information inequality. Recently, Dougherty, Freiling and Zeger gave six new unconditional non-Shannon-type information inequalities. This work generalizes their work and provides a method to systematically derive non-Shannon-type information inequalities. An application of this method reveals new 4-variable non-Shannon-type information inequalities.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 09:57:41 GMT" } ]
2008-05-01T00:00:00
[ [ "Xu", "Weidong", "" ], [ "Wang", "Jia", "" ], [ "Sun", "Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.4799
Carl Bracken
Carl Bracken, Eimear Byrne, Nadya Markin and Gary McGuire
A Few More Quadratic APN Functions
12 pages, submitted to Cryptography and Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two infinite families of APN functions where the degree of the field is divisible by 3 but not 9. Our families contain two already known families as special cases. We also discuss the inequivalence proof (by computation) which shows that these functions are new.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 11:50:58 GMT" } ]
2008-05-01T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Byrne", "Eimear", "" ], [ "Markin", "Nadya", "" ], [ "McGuire", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.4808
Pierre Courrieu
Pierre Courrieu (LPC)
Solving Time of Least Square Systems in Sigma-Pi Unit Networks
Nombre de pages: 7
Neural Information Processing - Letters and Reviews 4, 3 (2004) 39-45
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The solving of least square systems is a useful operation in neurocomputational modeling of learning, pattern matching, and pattern recognition. In these last two cases, the solution must be obtained on-line, thus the time required to solve a system in a plausible neural architecture is critical. This paper presents a recurrent network of Sigma-Pi neurons, whose solving time increases at most like the logarithm of the system size, and of its condition number, which provides plausible computation times for biological systems.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 12:23:05 GMT" } ]
2008-12-18T00:00:00
[ [ "Courrieu", "Pierre", "", "LPC" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0804.4809
Pierre Courrieu
Pierre Courrieu (LPC)
Fast Computation of Moore-Penrose Inverse Matrices
Number of pages: 5. Typo page 26 line 3: one must read W=G^+F (instead of W=G^+W, which does not make sense!)
Neural Information Processing - Letters and Reviews 8, 2 (2005) 25-29
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many neural learning algorithms require to solve large least square systems in order to obtain synaptic weights. Moore-Penrose inverse matrices allow for solving such systems, even with rank deficiency, and they provide minimum-norm vectors of synaptic weights, which contribute to the regularization of the input-output mapping. It is thus of interest to develop fast and accurate algorithms for computing Moore-Penrose inverse matrices. In this paper, an algorithm based on a full rank Cholesky factorization is proposed. The resulting pseudoinverse matrices are similar to those provided by other algorithms. However the computation time is substantially shorter, particularly for large systems.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 12:24:54 GMT" } ]
2008-12-18T00:00:00
[ [ "Courrieu", "Pierre", "", "LPC" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0804.4815
Jukka Suomela
Patrik Flor\'een, Marja Hassinen, Petteri Kaski, Jukka Suomela
Tight local approximation results for max-min linear programs
16 pages
null
10.1007/978-3-540-92862-1_2
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a bipartite max-min LP, we are given a bipartite graph $\myG = (V \cup I \cup K, E)$, where each agent $v \in V$ is adjacent to exactly one constraint $i \in I$ and exactly one objective $k \in K$. Each agent $v$ controls a variable $x_v$. For each $i \in I$ we have a nonnegative linear constraint on the variables of adjacent agents. For each $k \in K$ we have a nonnegative linear objective function of the variables of adjacent agents. The task is to maximise the minimum of the objective functions. We study local algorithms where each agent $v$ must choose $x_v$ based on input within its constant-radius neighbourhood in $\myG$. We show that for every $\epsilon>0$ there exists a local algorithm achieving the approximation ratio ${\Delta_I (1 - 1/\Delta_K)} + \epsilon$. We also show that this result is the best possible -- no local algorithm can achieve the approximation ratio ${\Delta_I (1 - 1/\Delta_K)}$. Here $\Delta_I$ is the maximum degree of a vertex $i \in I$, and $\Delta_K$ is the maximum degree of a vertex $k \in K$. As a methodological contribution, we introduce the technique of graph unfolding for the design of local approximation algorithms.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 12:54:34 GMT" } ]
2012-05-15T00:00:00
[ [ "Floréen", "Patrik", "" ], [ "Hassinen", "Marja", "" ], [ "Kaski", "Petteri", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0804.4819
Jukka Suomela
Michael A. Bender, S\'andor P. Fekete, Alexander Kr\"oller, Vincenzo Liberatore, Joseph S. B. Mitchell, Valentin Polishchuk, Jukka Suomela
The Minimum Backlog Problem
1+16 pages, 3 figures
Theoretical Computer Science 605 (2015), 51-61
10.1016/j.tcs.2015.08.027
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the minimum backlog problem (MBP). This online problem arises, e.g., in the context of sensor networks. We focus on two main variants of MBP. The discrete MBP is a 2-person game played on a graph $G=(V,E)$. The player is initially located at a vertex of the graph. In each time step, the adversary pours a total of one unit of water into cups that are located on the vertices of the graph, arbitrarily distributing the water among the cups. The player then moves from her current vertex to an adjacent vertex and empties the cup at that vertex. The player's objective is to minimize the backlog, i.e., the maximum amount of water in any cup at any time. The geometric MBP is a continuous-time version of the MBP: the cups are points in the two-dimensional plane, the adversary pours water continuously at a constant rate, and the player moves in the plane with unit speed. Again, the player's objective is to minimize the backlog. We show that the competitive ratio of any algorithm for the MBP has a lower bound of $\Omega(D)$, where $D$ is the diameter of the graph (for the discrete MBP) or the diameter of the point set (for the geometric MBP). Therefore we focus on determining a strategy for the player that guarantees a uniform upper bound on the absolute value of the backlog. For the absolute value of the backlog there is a trivial lower bound of $\Omega(D)$, and the deamortization analysis of Dietz and Sleator gives an upper bound of $O(D\log N)$ for $N$ cups. Our main result is a tight upper bound for the geometric MBP: we show that there is a strategy for the player that guarantees a backlog of $O(D)$, independently of the number of cups.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 13:13:12 GMT" }, { "version": "v2", "created": "Tue, 22 Mar 2016 20:54:15 GMT" } ]
2016-03-24T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Fekete", "Sándor P.", "" ], [ "Kröller", "Alexander", "" ], [ "Liberatore", "Vincenzo", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Polishchuk", "Valentin", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0804.4859
J\'er\'emie Roland
Julien Degorre, Marc Kaplan, Sophie Laplante and J\'er\'emie Roland
The communication complexity of non-signaling distributions
23 pages. V2: major modifications, extensions and additions compared to V1. V3 (21 pages): proofs have been updated and simplified, particularly Theorem 10 and Theorem 22. V4 (23 pages): Section 3.1 has been rewritten (in particular Lemma 10 and its proof), and various minor modifications have been made. V5 (24 pages): various modifications in the presentation
In MFCS'09, LNCS, vol 5734, 270-281 (2009). Quantum Information & Computation, 11(7&8):649-676 (2011)
10.1007/978-3-642-03816-7_24
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a model of communication complexity that encompasses many well-studied problems, including classical and quantum communication complexity, the complexity of simulating distributions arising from bipartite measurements of shared quantum states, and XOR games. In this model, Alice gets an input x, Bob gets an input y, and their goal is to each produce an output a,b distributed according to some pre-specified joint distribution p(a,b|x,y). We introduce a new technique based on affine combinations of lower-complexity distributions. Specifically, we introduce two complexity measures, one which gives lower bounds on classical communication, and one for quantum communication. These measures can be expressed as convex optimization problems. We show that the dual formulations have a striking interpretation, since they coincide with maximum violations of Bell and Tsirelson inequalities. The dual expressions are closely related to the winning probability of XOR games. These lower bounds subsume many known communication complexity lower bound methods, most notably the recent lower bounds of Linial and Shraibman for the special case of Boolean functions. We show that the gap between the quantum and classical lower bounds is at most linear in the size of the support of the distribution, and does not depend on the size of the inputs. This translates into a bound on the gap between maximal Bell and Tsirelson inequality violations, which was previously known only for the case of distributions with Boolean outcomes and uniform marginals. Finally, we give an exponential upper bound on quantum and classical communication complexity in the simultaneous messages model, for any non-signaling distribution. One consequence is a simple proof that any quantum distribution can be approximated with a constant number of bits of communication.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 16:08:58 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 21:29:48 GMT" }, { "version": "v3", "created": "Mon, 19 Jan 2009 15:32:28 GMT" }, { "version": "v4", "created": "Wed, 17 Feb 2010 20:40:41 GMT" }, { "version": "v5", "created": "Thu, 7 Jul 2011 15:15:21 GMT" } ]
2011-07-08T00:00:00
[ [ "Degorre", "Julien", "" ], [ "Kaplan", "Marc", "" ], [ "Laplante", "Sophie", "" ], [ "Roland", "Jérémie", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0804.4865
Fabricio Benevenuto
Fabricio Benevenuto, Fernando Duarte, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, Keith Ross
Characterizing Video Responses in Social Networks
null
null
null
null
cs.MM cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video sharing sites, such as YouTube, use video responses to enhance the social interactions among their users. The video response feature allows users to interact and converse through video, by creating a video sequence that begins with an opening video and followed by video responses from other users. Our characterization is over 3.4 million videos and 400,000 video responses collected from YouTube during a 7-day period. We first analyze the characteristics of the video responses, such as popularity, duration, and geography. We then examine the social networks that emerge from the video response interactions.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 16:39:32 GMT" } ]
2008-12-18T00:00:00
[ [ "Benevenuto", "Fabricio", "" ], [ "Duarte", "Fernando", "" ], [ "Rodrigues", "Tiago", "" ], [ "Almeida", "Virgilio", "" ], [ "Almeida", "Jussara", "" ], [ "Ross", "Keith", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0804.4866
Lalitha Sankar
Lalitha Sankar, Elza Erkip, and H. Vincent Poor
Sum-Capacity of Ergodic Fading Interference and Compound Multiaccess Channels
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595485
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of resource allocation is studied for two-sender two-receiver fading Gaussian interference channels (IFCs) and compound multiaccess channels (C-MACs). The senders in an IFC communicate with their own receiver (unicast) while those in a C-MAC communicate with both receivers (multicast). The instantaneous fading state between every transmit-receive pair in this network is assumed to be known at all transmitters and receivers. Under an average power constraint at each source, the sum-capacity of the C-MAC and the power policy that achieves this capacity is developed. The conditions defining the classes of strong and very strong ergodic IFCs are presented and the multicast sum-capacity is shown to be tight for both classes.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 16:51:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Sankar", "Lalitha", "" ], [ "Erkip", "Elza", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0804.4881
Adolfo Piperno
Adolfo Piperno
Search Space Contraction in Canonical Labeling of Graphs
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The individualization-refinement paradigm for computing a canonical labeling and the automorphism group of a graph is investigated. A new algorithmic design aimed at reducing the size of the associated search space is introduced, and a new tool, named "Traces", is presented, together with experimental results and comparisons with existing software, such as McKay's "nauty". It is shown that the approach presented here leads to a huge reduction in the search space, thereby making computation feasible for several classes of graphs which are hard for all the main canonical labeling tools in the literature.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 18:28:13 GMT" }, { "version": "v2", "created": "Wed, 26 Jan 2011 15:52:11 GMT" } ]
2015-03-13T00:00:00
[ [ "Piperno", "Adolfo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0804.4885
Corey Bohil
C. Owen, F. Biocca, C. Bohil, J. Conley
SimDialog: A visual game dialog editor
null
null
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SimDialog is a visual editor for dialog in computer games. This paper presents the design of SimDialog, illustrating how script writers and non-programmers can easily create dialog for video games with complex branching structures and dynamic response characteristics. The system creates dialog as a directed graph. This allows for play using the dialog with a state-based cause and effect system that controls selection of non-player character responses and can provide a basic scoring mechanism for games.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 18:44:52 GMT" } ]
2008-05-01T00:00:00
[ [ "Owen", "C.", "" ], [ "Biocca", "F.", "" ], [ "Bohil", "C.", "" ], [ "Conley", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0804.4896
Sidney Rosario
Anne Bouillard (IRISA), Sidney Rosario (IRISA), Albert Benveniste (IRISA), Stefan Haar (IRISA)
Monotony in Service Orchestrations
null
null
null
RR-6528
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web Service orchestrations are compositions of different Web Services to form a new service. The services called during the orchestration guarantee a given performance to the orchestrater, usually in the form of contracts. These contracts can be used by the orchestrater to deduce the contract it can offer to its own clients, by performing contract composition. An implicit assumption in contract based QoS management is: "the better the component services perform, the better the orchestration's performance will be". Thus, contract based QoS management for Web services orchestrations implicitly assumes monotony. In some orchestrations, however, monotony can be violated, i.e., the performance of the orchestration improves when the performance of a component service degrades. This is highly undesirable since it can render the process of contract composition inconsistent. In this paper we define monotony for orchestrations modelled by Colored Occurrence Nets (CO-nets) and we characterize the classes of monotonic orchestrations. We show that few orchestrations are indeed monotonic, mostly since latency can be traded for quality of data. We also propose a sound refinement of monotony, called conditional monotony, which forbids this kind of cheating and show that conditional monotony is widely satisfied by orchestrations. This finding leads to reconsidering the way SLAs should be formulated.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 19:59:01 GMT" }, { "version": "v2", "created": "Tue, 13 May 2008 08:22:29 GMT" } ]
2009-04-20T00:00:00
[ [ "Bouillard", "Anne", "", "IRISA" ], [ "Rosario", "Sidney", "", "IRISA" ], [ "Benveniste", "Albert", "", "IRISA" ], [ "Haar", "Stefan", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0804.4898
Yann Guermeur
Emmanuel Monfrini (LORIA), Yann Guermeur (LORIA)
A Quadratic Loss Multi-Class SVM
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using a support vector machine requires to set two types of hyperparameters: the soft margin parameter C and the parameters of the kernel. To perform this model selection task, the method of choice is cross-validation. Its leave-one-out variant is known to produce an estimator of the generalization error which is almost unbiased. Its major drawback rests in its time requirement. To overcome this difficulty, several upper bounds on the leave-one-out error of the pattern recognition SVM have been derived. Among those bounds, the most popular one is probably the radius-margin bound. It applies to the hard margin pattern recognition SVM, and by extension to the 2-norm SVM. In this report, we introduce a quadratic loss M-SVM, the M-SVM^2, as a direct extension of the 2-norm SVM to the multi-class case. For this machine, a generalized radius-margin bound is then established.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 19:59:56 GMT" } ]
2008-12-18T00:00:00
[ [ "Monfrini", "Emmanuel", "", "LORIA" ], [ "Guermeur", "Yann", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0805.0012
Makesh Pravin John Wilson
Makesh Pravin Wilson, Krishna Narayanan, Henry Pfister and Alex Sprintson
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying
24 pages, 6 figures, 1 table, parts of this work appeared in Allerton 2007, to be submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of two transmitters wishing to exchange information through a relay in the middle. The channels between the transmitters and the relay are assumed to be synchronized, average power constrained additive white Gaussian noise channels with a real input with signal-to-noise ratio (SNR) of snr. An upper bound on the capacity is 1/2 log(1+ snr) bits per transmitter per use of the medium-access phase and broadcast phase of the bi-directional relay channel. We show that using lattice codes and lattice decoding, we can obtain a rate of 1/2 log(0.5 + snr) bits per transmitter, which is essentially optimal at high SNRs. The main idea is to decode the sum of the codewords modulo a lattice at the relay followed by a broadcast phase which performs Slepian-Wolf coding with structured codes. For asymptotically low SNR's, jointly decoding the two transmissions at the relay (MAC channel) is shown to be optimal. We also show that if the two transmitters use identical lattices with minimum angle decoding, we can achieve the same rate of 1/2 log(0.5 + snr). The proposed scheme can be thought of as a joint physical layer, network layer code which outperforms other recently proposed analog network coding schemes.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 21:13:43 GMT" }, { "version": "v2", "created": "Thu, 1 May 2008 21:54:13 GMT" } ]
2016-09-08T00:00:00
[ [ "Wilson", "Makesh Pravin", "" ], [ "Narayanan", "Krishna", "" ], [ "Pfister", "Henry", "" ], [ "Sprintson", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0022
David Eppstein
Gill Barequet, David Eppstein, Michael T. Goodrich, and Amir Vaxman
Straight Skeletons of Three-Dimensional Polyhedra
12 pages, 47 figure files in 8 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the straight skeleton of polyhedra in three dimensions. We first address voxel-based polyhedra (polycubes), formed as the union of a collection of cubical (axis-aligned) voxels. We analyze the ways in which the skeleton may intersect each voxel of the polyhedron, and show that the skeleton may be constructed by a simple voxel-sweeping algorithm taking constant time per voxel. In addition, we describe a more complex algorithm for straight skeletons of voxel-based polyhedra, which takes time proportional to the area of the surfaces of the straight skeleton rather than the volume of the polyhedron. We also consider more general polyhedra with axis-parallel edges and faces, and show that any n-vertex polyhedron of this type has a straight skeleton with O(n^2) features. We provide algorithms for constructing the straight skeleton, with running time O(min(n^2 log n, k log^{O(1)} n)) where k is the output complexity. Next, we discuss the straight skeleton of a general nonconvex polyhedron. We show that it has an ambiguity issue, and suggest a consistent method to resolve it. We prove that the straight skeleton of a general polyhedron has a superquadratic complexity in the worst case. Finally, we report on an implementation of a simple algorithm for the general case.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 22:52:34 GMT" } ]
2008-05-02T00:00:00
[ [ "Barequet", "Gill", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Vaxman", "Amir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0805.0034
Vaneet Aggarwal
Vaneet Aggarwal, Ashutosh Sabharwal
Diversity Order Gain with Noisy Feedback in Multiple Access Channels
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595017
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the effect of feedback channel noise on the diversity-multiplexing tradeoff in multiuser MIMO systems using quantized feedback, where each user has m transmit antennas and the base-station receiver has n antennas. We derive an achievable tradeoff and use it to show that in SNR-symmetric channels, a single bit of imperfect feedback is sufficient to double the maximum diversity order to 2mn compared to when there is no feedback (maximum is mn at multiplexing gain of zero). Further, additional feedback bits do not increase this maximum diversity order beyond 2mn. Finally, the above diversity order gain of mn over non-feedback systems can also be achieved for higher multiplexing gains, albeit requiring more than one bit of feedback.
[ { "version": "v1", "created": "Thu, 1 May 2008 00:36:27 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2008 18:44:40 GMT" } ]
2009-04-14T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0050
Ali Al-Bashabsheh
Ali Al-Bashabsheh, Abbas Yongacoglu
On the k-pairs problem
ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider network coding rates for directed and undirected $k$-pairs networks. For directed networks, meagerness is known to be an upper bound on network coding rates. We show that network coding rate can be $\Theta(|V|)$ multiplicative factor smaller than meagerness. For the undirected case, we show some progress in the direction of the $k$-pairs conjecture.
[ { "version": "v1", "created": "Thu, 1 May 2008 03:54:37 GMT" } ]
2008-05-02T00:00:00
[ [ "Al-Bashabsheh", "Ali", "" ], [ "Yongacoglu", "Abbas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0051
Aditya Ramamoorthy
Aditya Ramamoorthy
Communicating the sum of sources over a network
5 pages, Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a network (that is capable of network coding) with a set of sources and terminals, where each terminal is interested in recovering the sum of the sources. Considering directed acyclic graphs with unit capacity edges and independent, unit-entropy sources, we show the rate region when (a) there are two sources and $n$ terminals, and (b) $n$ sources and two terminals. In these cases as long as there exists at least one path from each source to each terminal we demonstrate that there exists a valid assignment of coding vectors to the edges such that the terminals can recover the sum of the sources.
[ { "version": "v1", "created": "Thu, 1 May 2008 04:20:17 GMT" } ]
2008-05-02T00:00:00
[ [ "Ramamoorthy", "Aditya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0053
Namrata Vaswani
Namrata Vaswani
Particle Filtering for Large Dimensional State Spaces with Multimodal Observation Likelihoods
To appear in IEEE Trans. Signal Processing
IEEE Trans. Sig. Proc., vol. 56(10-1), pp. 4583-4597, Oct. 2008
10.1109/TSP.2008.925969
null
cs.IT math.IT math.ST stat.ME stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study efficient importance sampling techniques for particle filtering (PF) when either (a) the observation likelihood (OL) is frequently multimodal or heavy-tailed, or (b) the state space dimension is large or both. When the OL is multimodal, but the state transition pdf (STP) is narrow enough, the optimal importance density is usually unimodal. Under this assumption, many techniques have been proposed. But when the STP is broad, this assumption does not hold. We study how existing techniques can be generalized to situations where the optimal importance density is multimodal, but is unimodal conditioned on a part of the state vector. Sufficient conditions to test for the unimodality of this conditional posterior are derived. The number of particles, N, to accurately track using a PF increases with state space dimension, thus making any regular PF impractical for large dimensional tracking problems. We propose a solution that partially addresses this problem. An important class of large dimensional problems with multimodal OL is tracking spatially varying physical quantities such as temperature or pressure in a large area using a network of sensors which may be nonlinear and/or may have non-negligible failure probabilities.
[ { "version": "v1", "created": "Thu, 1 May 2008 05:41:09 GMT" } ]
2011-04-13T00:00:00
[ [ "Vaswani", "Namrata", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0805.0065
Paul Cuff
Paul Cuff (Stanford University)
Communication Requirements for Generating Correlated Random Variables
ISIT 2008, 5 pages, 4 eps figures, uses IEEEtran.cls
null
null
null
cs.IT cs.GT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two familiar notions of correlation are rediscovered as extreme operating points for simulating a discrete memoryless channel, in which a channel output is generated based only on a description of the channel input. Wyner's "common information" coincides with the minimum description rate needed. However, when common randomness independent of the input is available, the necessary description rate reduces to Shannon's mutual information. This work characterizes the optimal tradeoff between the amount of common randomness used and the required rate of description.
[ { "version": "v1", "created": "Thu, 1 May 2008 07:34:28 GMT" } ]
2008-05-02T00:00:00
[ [ "Cuff", "Paul", "", "Stanford University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0805.0087
Sebastien Tixeuil
Adnan Vora, Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6), Sylvie Dela\"et (LRI)
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
null
null
null
RR-6529
cs.DC cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes from the universe of arbitrary non-existent fictitious nodes created by the attacker. Similar to failure detectors, we propose to use universe detectors to help nodes determine which universe is real. In this paper, we (i) define several variants of the neighborhood discovery problem under Sybil attack (ii) propose a set of matching universe detectors (iii) demonstrate the necessity of additional topological constraints for the problems to be solvable: node density and communication range; (iv) present SAND -- an algorithm that solves these problems with the help of appropriate universe detectors, this solution demonstrates that the proposed universe detectors are the weakest detectors possible for each problem.
[ { "version": "v1", "created": "Thu, 1 May 2008 11:45:54 GMT" }, { "version": "v2", "created": "Tue, 13 May 2008 08:34:03 GMT" } ]
2009-04-20T00:00:00
[ [ "Vora", "Adnan", "", "LIP6" ], [ "Nesterenko", "Mikhail", "", "LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ], [ "Delaët", "Sylvie", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0805.0092
Oren Somekh
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai (Shitz)
Cellular Systems with Full-Duplex Compress-and-Forward Relaying and Cooperative Base Stations
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595357
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the advantages provided by multicell processing of signals transmitted by mobile terminals (MTs) which are received via dedicated relay terminals (RTs) are studied. It is assumed that each RT is capable of full-duplex operation and receives the transmission of adjacent relay terminals. Focusing on intra-cell TDMA and non-fading channels, a simplified relay-aided uplink cellular model based on a model introduced by Wyner is considered. Assuming a nomadic application in which the RTs are oblivious to the MTs' codebooks, a form of distributed compress-and-forward (CF) scheme with decoder side information is employed. The per-cell sum-rate of the CF scheme is derived and is given as a solution of a simple fixed point equation. This achievable rate reveals that the CF scheme is able to completely eliminate the inter-relay interference, and it approaches a ``cut-set-like'' upper bound for strong RTs transmission power. The CF rate is also shown to surpass the rate of an amplify-and-forward scheme via numerical calculations for a wide range of the system parameters.
[ { "version": "v1", "created": "Thu, 1 May 2008 13:22:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Somekh", "Oren", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0108
Xiaojun Tang
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor
The Gaussian Wiretap Channel with a Helping Interferer
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver in the presence of a passive eavesdropper and with the help of an interferer. The interferer, which does not know the confidential message assists the confidential message transmission by sending a signal that is independent of the transmitted message. An achievable secrecy rate and a Sato-type upper bound on the secrecy capacity are given for the Gaussian WTC-HI. Through numerical analysis, it is found that the upper bound is close to the achievable secrecy rate when the interference is weak for symmetric interference channels, and under more general conditions for asymmetric Gaussian interference channels.
[ { "version": "v1", "created": "Thu, 1 May 2008 16:19:13 GMT" } ]
2008-05-02T00:00:00
[ [ "Tang", "Xiaojun", "" ], [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0120
Stephen Vavasis
Michael Biggs, Ali Ghodsi, Stephen Vavasis
Nonnegative Matrix Factorization via Rank-One Downdate
null
null
null
null
cs.IR cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonnegative matrix factorization (NMF) was popularized as a tool for data mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with nonnegative entries by a product of two low-rank matrices, also with nonnegative entries. We propose an algorithm called rank-one downdate (R1D) for computing a NMF that is partly motivated by singular value decomposition. This algorithm computes the dominant singular values and vectors of adaptively determined submatrices of a matrix. On each iteration, R1D extracts a rank-one submatrix from the dataset according to an objective function. We establish a theoretical result that maximizing this objective function corresponds to correctly classifying articles in a nearly separable corpus. We also provide computational experiments showing the success of this method in identifying features in realistic datasets.
[ { "version": "v1", "created": "Thu, 1 May 2008 17:59:44 GMT" } ]
2008-05-02T00:00:00
[ [ "Biggs", "Michael", "" ], [ "Ghodsi", "Ali", "" ], [ "Vavasis", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0805.0129
Jean-Francois Bercher
Jean-Fran\c{c}ois Bercher (LSS, IGM-LabInfo)
On some entropy functionals derived from R\'enyi information divergence
null
Information Sciences 178, 12 (2008) 2489-2506
10.1016/j.ins.2008.02.003
null
cs.IT cond-mat.other math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the maximum entropy problems associated with R\'enyi $Q$-entropy, subject to two kinds of constraints on expected values. The constraints considered are a constraint on the standard expectation, and a constraint on the generalized expectation as encountered in nonextensive statistics. The optimum maximum entropy probability distributions, which can exhibit a power-law behaviour, are derived and characterized. The R\'enyi entropy of the optimum distributions can be viewed as a function of the constraint. This defines two families of entropy functionals in the space of possible expected values. General properties of these functionals, including nonnegativity, minimum, convexity, are documented. Their relationships as well as numerical aspects are also discussed. Finally, we work out some specific cases for the reference measure $Q(x)$ and recover in a limit case some well-known entropies.
[ { "version": "v1", "created": "Thu, 1 May 2008 19:09:13 GMT" } ]
2008-12-18T00:00:00
[ [ "Bercher", "Jean-François", "", "LSS, IGM-LabInfo" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0131
Pedro Coronel
Pedro Coronel and Markus G\"artner and Helmut B\"olcskei
Diversity-Multiplexing Tradeoff in Selective-Fading Multiple-Access MIMO Channels
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish the optimal diversity-multiplexing (DM) tradeoff of coherent selective-fading multiple-access multiple-input multiple-output (MIMO) channels and provide corresponding code design criteria. As a byproduct, on the conceptual level, we find an interesting relation between the DM tradeoff framework and the notion of dominant error event regions which was first introduced in the AWGN case by Gallager, IEEE Trans. IT, 1985. This relation allows to accurately characterize the error mechanisms in MIMO fading multiple-access channels. In particular, we find that, for a given rate tuple, the maximum achievable diversity order is determined by the error event that dominates the total error probability exponentially in SNR. Finally, we show that the distributed space-time code construction proposed recently by Badr and Belfiore, Int. Zurich Seminar on Commun., 2008, satisfies the code design criteria derived in this paper.
[ { "version": "v1", "created": "Thu, 1 May 2008 19:18:25 GMT" } ]
2008-05-02T00:00:00
[ [ "Coronel", "Pedro", "" ], [ "Gärtner", "Markus", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0149
Guangwu Xu
T. Tony Cai, Guangwu Xu, and Jun Zhang
On Recovery of Sparse Signals via $\ell_1$ Minimization
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article considers constrained $\ell_1$ minimization methods for the recovery of high dimensional sparse signals in three settings: noiseless, bounded error and Gaussian noise. A unified and elementary treatment is given in these noise settings for two $\ell_1$ minimization methods: the Dantzig selector and $\ell_1$ minimization with an $\ell_2$ constraint. The results of this paper improve the existing results in the literature by weakening the conditions and tightening the error bounds. The improvement on the conditions shows that signals with larger support can be recovered accurately. This paper also establishes connections between restricted isometry property and the mutual incoherence property. Some results of Candes, Romberg and Tao (2006) and Donoho, Elad, and Temlyakov (2006) are extended.
[ { "version": "v1", "created": "Thu, 1 May 2008 20:25:27 GMT" } ]
2008-05-05T00:00:00
[ [ "Cai", "T. Tony", "" ], [ "Xu", "Guangwu", "" ], [ "Zhang", "Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0805.0154
Kohtaro Tadaki
Kohtaro Tadaki
The Tsallis entropy and the Shannon entropy of a universal probability
5 pages, to appear in the Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
2008 IEEE International Symposium on Information Theory, Toronto, ON (2008) 2111-2115
10.1109/ISIT.2008.4595362
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the properties of Tsallis entropy and Shannon entropy from the point of view of algorithmic randomness. In algorithmic information theory, there are two equivalent ways to define the program-size complexity K(s) of a given finite binary string s. In the standard way, K(s) is defined as the length of the shortest input string for the universal self-delimiting Turing machine to output s. In the other way, the so-called universal probability m is introduced first, and then K(s) is defined as -log_2 m(s) without reference to the concept of program-size. In this paper, we investigate the properties of the Shannon entropy, the power sum, and the Tsallis entropy of a universal probability by means of the notion of program-size complexity. We determine the convergence or divergence of each of these three quantities, and evaluate its degree of randomness if it converges.
[ { "version": "v1", "created": "Thu, 1 May 2008 21:32:09 GMT" } ]
2019-09-04T00:00:00
[ [ "Tadaki", "Kohtaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0162
Stefanie Wuhrer
Stefanie Wuhrer, Prosenjit Bose, Chang Shu, Joseph O'Rourke, Alan Brunton
Morphing of Triangular Meshes in Shape Space
Improved experimental results
International Journal of Shape Modeling, 16(1-2):195-212, 2010
10.1142/S0218654310001341
null
cs.CG cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel approach to morph between two isometric poses of the same non-rigid object given as triangular meshes. We model the morphs as linear interpolations in a suitable shape space $\mathcal{S}$. For triangulated 3D polygons, we prove that interpolating linearly in this shape space corresponds to the most isometric morph in $\mathbb{R}^3$. We then extend this shape space to arbitrary triangulations in 3D using a heuristic approach and show the practical use of the approach using experiments. Furthermore, we discuss a modified shape space that is useful for isometric skeleton morphing. All of the newly presented approaches solve the morphing problem without the need to solve a minimization problem.
[ { "version": "v1", "created": "Thu, 1 May 2008 23:08:30 GMT" }, { "version": "v2", "created": "Mon, 2 Jun 2008 20:01:32 GMT" } ]
2011-08-24T00:00:00
[ [ "Wuhrer", "Stefanie", "" ], [ "Bose", "Prosenjit", "" ], [ "Shu", "Chang", "" ], [ "O'Rourke", "Joseph", "" ], [ "Brunton", "Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0805.0173
Martin Dowd
Martin Dowd
A Computer Search for N1L-Configurations
submitted to IEEE Trans. Information Theory. 5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an earlier paper the author defined N1L configurations, and stated a conjecture concerning them which would lead to an improvement by a constant factor to the sphere-packing bound for linear double error correcting codes. Here a computer search is presented, in an effort to gather evidence on the conjecture.
[ { "version": "v1", "created": "Fri, 2 May 2008 03:27:23 GMT" } ]
2008-05-05T00:00:00
[ [ "Dowd", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0184
Youngchul Sung
Youngchul Sung, H. Vincent Poor and Heejung Yu
Information, Energy and Density for Ad Hoc Sensor Networks over Correlated Random Fields: Large Deviations Analysis
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595256
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using large deviations results that characterize the amount of information per node on a two-dimensional (2-D) lattice, asymptotic behavior of a sensor network deployed over a correlated random field for statistical inference is investigated. Under a 2-D hidden Gauss-Markov random field model with symmetric first order conditional autoregression, the behavior of the total information [nats] and energy efficiency [nats/J] defined as the ratio of total gathered information to the required energy is obtained as the coverage area, node density and energy vary.
[ { "version": "v1", "created": "Fri, 2 May 2008 07:36:28 GMT" } ]
2016-11-15T00:00:00
[ [ "Sung", "Youngchul", "" ], [ "Poor", "H. Vincent", "" ], [ "Yu", "Heejung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0192
Xavier Gonze J
X. Gonze (1,2), C.-O. Almbladh (1,3), A. Cucca (1,4), D. Caliste (1,2,5), C. Freysoldt (1,6), M. A. L. Marques (1,7,8), V. Olevano (1,4,9), Y. Pouillon (1,2,10), M.J. Verstraete (1,11) ((1) European Theoretical Spectroscopy Facility, (2) Universit\'e Catholique de Louvain, Louvain-la-Neuve, Belgium (3) University of Lund, Lund, Sweden (4) LSI, CNRS-CEA, Ecole Polytechnique, Palaiseau, France, (5) C.E.A. Grenoble, Grenoble, France, (6) Fritz-Haber-Institut, Berlin, Germany, (7) U. Lyon 1, Villeurbanne, France, (8) U. Coimbra, Coimbra, Portugal, (9) Institut NEEL, CNRS and U. Joseph Fourier, Grenoble, France, (10) Universidad del Pais Vasco UPV/EHU, Donostia-San Sebasti\`an, Spain, (11) U. York, York, United Kingdom)
Specification of an extensible and portable file format for electronic structure and crystallographic data
null
null
null
null
cs.DL cond-mat.mtrl-sci cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to allow different software applications, in constant evolution, to interact and exchange data, flexible file formats are needed. A file format specification for different types of content has been elaborated to allow communication of data for the software developed within the European Network of Excellence "NANOQUANTA", focusing on first-principles calculations of materials and nanosystems. It might be used by other software as well, and is described here in detail. The format relies on the NetCDF binary input/output library, already used in many different scientific communities, that provides flexibility as well as portability accross languages and platforms. Thanks to NetCDF, the content can be accessed by keywords, ensuring the file format is extensible and backward compatible.
[ { "version": "v1", "created": "Fri, 2 May 2008 08:48:26 GMT" } ]
2008-05-05T00:00:00
[ [ "Gonze", "X.", "" ], [ "Almbladh", "C. -O.", "" ], [ "Cucca", "A.", "" ], [ "Caliste", "D.", "" ], [ "Freysoldt", "C.", "" ], [ "Marques", "M. A. L.", "" ], [ "Olevano", "V.", "" ], [ "Pouillon", "Y.", "" ], [ "Verstraete", "M. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "cond-mat.mtrl-sci", "description": "Techniques, synthesis, characterization, structure. Structural phase transitions, mechanical properties, phonons. Defects, adsorbates, interfaces", "span": "(Materials Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0805.0197
Wan Ahmad Tajuddin Wan Abdullah
Saratha Sathasivam (USM), Wan Ahmad Tajuddin Wan Abdullah (Univ. Malaya)
Flatness of the Energy Landscape for Horn Clauses
null
Matematika 23 (2007) 147-156
null
null
cond-mat.dis-nn cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Little-Hopfield neural network programmed with Horn clauses is studied. We argue that the energy landscape of the system, corresponding to the inconsistency function for logical interpretations of the sets of Horn clauses, has minimal ruggedness. This is supported by computer simulations.
[ { "version": "v1", "created": "Fri, 2 May 2008 09:20:11 GMT" } ]
2008-05-05T00:00:00
[ [ "Sathasivam", "Saratha", "", "USM" ], [ "Abdullah", "Wan Ahmad Tajuddin Wan", "", "Univ.\n Malaya" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0805.0200
Joel Goossens
Jo\"el Goossens
(m,k)-firm constraints and DBP scheduling: impact of the initial k-sequence and exact schedulability test
null
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the scheduling of (m,k)-firm synchronous periodic task systems using the Distance Based Priority (DBP) scheduler. We first show three phenomena: (i) choosing, for each task, the initial k-sequence 1^k is not optimal, (ii) we can even start the scheduling from a (fictive) error state (in regard to the initial k-sequence) and (iii) the period of feasible DBP-schedules is not necessarily the task hyper-period. We then show that any feasible DBP-schedule is periodic and we upper-bound the length of that period. Lastly, based on our periodicity result we provide an exact schedulability test.
[ { "version": "v1", "created": "Fri, 2 May 2008 09:32:03 GMT" }, { "version": "v2", "created": "Mon, 8 Sep 2008 09:22:24 GMT" } ]
2008-09-08T00:00:00
[ [ "Goossens", "Joël", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0805.0202
Joao Marques-Silva
Antonio Morgado, Joao Marques-Silva
A Pseudo-Boolean Solution to the Maximum Quartet Consistency Problem
null
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Determining the evolutionary history of a given biological data is an important task in biological sciences. Given a set of quartet topologies over a set of taxa, the Maximum Quartet Consistency (MQC) problem consists of computing a global phylogeny that satisfies the maximum number of quartets. A number of solutions have been proposed for the MQC problem, including Dynamic Programming, Constraint Programming, and more recently Answer Set Programming (ASP). ASP is currently the most efficient approach for optimally solving the MQC problem. This paper proposes encoding the MQC problem with pseudo-Boolean (PB) constraints. The use of PB allows solving the MQC problem with efficient PB solvers, and also allows considering different modeling approaches for the MQC problem. Initial results are promising, and suggest that PB can be an effective alternative for solving the MQC problem.
[ { "version": "v1", "created": "Fri, 2 May 2008 10:06:27 GMT" } ]
2008-12-18T00:00:00
[ [ "Morgado", "Antonio", "" ], [ "Marques-Silva", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0805.0231
Nikolaus Hansen
Nikolaus Hansen (INRIA Futurs)
CMA-ES with Two-Point Step-Size Adaptation
null
null
null
RR-6527
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We combine a refined version of two-point step-size adaptation with the covariance matrix adaptation evolution strategy (CMA-ES). Additionally, we suggest polished formulae for the learning rate of the covariance matrix and the recombination weights. In contrast to cumulative step-size adaptation or to the 1/5-th success rule, the refined two-point adaptation (TPA) does not rely on any internal model of optimality. In contrast to conventional self-adaptation, the TPA will achieve a better target step-size in particular with large populations. The disadvantage of TPA is that it relies on two additional objective function
[ { "version": "v1", "created": "Fri, 2 May 2008 13:55:37 GMT" }, { "version": "v2", "created": "Sat, 3 May 2008 06:16:04 GMT" }, { "version": "v3", "created": "Tue, 13 May 2008 08:17:14 GMT" }, { "version": "v4", "created": "Sun, 18 May 2008 06:38:04 GMT" } ]
2008-12-18T00:00:00
[ [ "Hansen", "Nikolaus", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0805.0241
David G. M. Mitchell
David G. M. Mitchell, Ali E. Pusane, Kamil Sh. Zigangirov, and Daniel J. Costello, Jr
Asymptotically Good LDPC Convolutional Codes Based on Protographs
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595143
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LDPC convolutional codes have been shown to be capable of achieving the same capacity-approaching performance as LDPC block codes with iterative message-passing decoding. In this paper, asymptotic methods are used to calculate a lower bound on the free distance for several ensembles of asymptotically good protograph-based LDPC convolutional codes. Further, we show that the free distance to constraint length ratio of the LDPC convolutional codes exceeds the minimum distance to block length ratio of corresponding LDPC block codes.
[ { "version": "v1", "created": "Fri, 2 May 2008 16:13:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Mitchell", "David G. M.", "" ], [ "Pusane", "Ali E.", "" ], [ "Zigangirov", "Kamil Sh.", "" ], [ "Costello,", "Daniel J.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0268
Yucel Altug
Yucel Altug and M. Kivanc Mihcak
Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG
30 pages, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality'' of information theory.
[ { "version": "v1", "created": "Fri, 2 May 2008 17:25:58 GMT" } ]
2008-05-05T00:00:00
[ [ "Altug", "Yucel", "" ], [ "Mihcak", "M. Kivanc", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0272
Zouheir Rezki Mr.
Z. Rezki and David Haccoun and Fran\c{c}ois Gagnon
Capacity of The Discrete-Time Non-Coherent Memoryless Gaussian Channels at Low SNR
5 pages and 4 figures. To appear in Proceeding of International Symposium on Information Theory (ISIT 2008)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the capacity of a discrete-time memoryless Gaussian channel, where the channel state information (CSI) is neither available at the transmitter nor at the receiver. The optimal capacity-achieving input distribution at low signal-to-noise ratio (SNR) is precisely characterized, and the exact capacity of a non-coherent channel is derived. The derived relations allow to better understanding the capacity of non-coherent channels at low SNR. Then, we compute the non-coherence penalty and give a more precise characterization of the sub-linear term in SNR. Finally, in order to get more insight on how the optimal input varies with SNR, upper and lower bounds on the non-zero mass point location of the capacity-achieving input are given.
[ { "version": "v1", "created": "Fri, 2 May 2008 17:40:03 GMT" } ]
2008-05-05T00:00:00
[ [ "Rezki", "Z.", "" ], [ "Haccoun", "David", "" ], [ "Gagnon", "François", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0307
J\"org P. Dietrich
J. P. Dietrich
Disentangling Visibility and Self-Promotion Bias in the arXiv:astro-ph Positional Citation Effect
Accepted for publication in PASP, minor language corrections to match published version
null
10.1086/589836
null
astro-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We established in an earlier study that articles listed at or near the top of the daily arXiv:astro-ph mailings receive on average significantly more citations than articles further down the list. In our earlier work we were not able to decide whether this positional citation effect was due to author self-promotion of intrinsically more citable papers or whether papers are cited more often simply because they are at the top of the astro-ph listing. Using new data we can now disentangle both effects. Based on their submission times we separate articles into a self-promoted sample and a sample of articles that achieved a high rank on astro-ph by chance and compare their citation distributions with those of articles on lower astro-ph positions. We find that the positional citation effect is a superposition of self-promotion and visibility bias.
[ { "version": "v1", "created": "Fri, 2 May 2008 20:00:06 GMT" }, { "version": "v2", "created": "Wed, 25 Jun 2008 15:42:41 GMT" } ]
2009-11-13T00:00:00
[ [ "Dietrich", "J. P.", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0805.0330
Ranko Lazic
Marcin Jurdzinski and Ranko Lazic
Alternating Automata on Data Trees and XPath Satisfiability
23 pages
null
null
null
cs.LO cs.DB cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data tree is an unranked ordered tree whose every node is labelled by a letter from a finite alphabet and an element ("datum") from an infinite set, where the latter can only be compared for equality. The article considers alternating automata on data trees that can move downward and rightward, and have one register for storing data. The main results are that nonemptiness over finite data trees is decidable but not primitive recursive, and that nonemptiness of safety automata is decidable but not elementary. The proofs use nondeterministic tree automata with faulty counters. Allowing upward moves, leftward moves, or two registers, each causes undecidability. As corollaries, decidability is obtained for two data-sensitive fragments of the XPath query language.
[ { "version": "v1", "created": "Sat, 3 May 2008 00:12:15 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2009 13:21:17 GMT" }, { "version": "v3", "created": "Mon, 1 Mar 2010 15:20:58 GMT" }, { "version": "v4", "created": "Mon, 14 Jun 2010 14:13:49 GMT" } ]
2010-06-15T00:00:00
[ [ "Jurdzinski", "Marcin", "" ], [ "Lazic", "Ranko", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0805.0337
Sudeep Kamath
Sudeep Kamath and D. Manjunath
On Distributed Function Computation in Structure-Free Random Networks
13 pages, 1 figure. Accepted at IEEE International Symposium on Information Theory 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider in-network computation of MAX in a structure-free random multihop wireless network. Nodes do not know their relative or absolute locations and use the Aloha MAC protocol. For one-shot computation, we describe a protocol in which the MAX value becomes available at the origin in $O(\sqrt{n/\log n})$ slots with high probability. This is within a constant factor of that required by the best coordinated protocol. A minimal structure (knowledge of hop-distance from the sink) is imposed on the network and with this structure, we describe a protocol for pipelined computation of MAX that achieves a rate of $\Omega(1/(\log^2 n)).$
[ { "version": "v1", "created": "Mon, 5 May 2008 19:15:21 GMT" } ]
2008-05-06T00:00:00
[ [ "Kamath", "Sudeep", "" ], [ "Manjunath", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0360
Peter Harding Mr
Peter J. Harding, Martyn Amos and Steve Gwynne
Prediction and Mitigation of Crush Conditions in Emergency Evacuations
null
null
null
null
cs.CE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several simulation environments exist for the simulation of large-scale evacuations of buildings, ships, or other enclosed spaces. These offer sophisticated tools for the study of human behaviour, the recreation of environmental factors such as fire or smoke, and the inclusion of architectural or structural features, such as elevators, pillars and exits. Although such simulation environments can provide insights into crowd behaviour, they lack the ability to examine potentially dangerous forces building up within a crowd. These are commonly referred to as crush conditions, and are a common cause of death in emergency evacuations. In this paper, we describe a methodology for the prediction and mitigation of crush conditions. The paper is organised as follows. We first establish the need for such a model, defining the main factors that lead to crush conditions, and describing several exemplar case studies. We then examine current methods for studying crush, and describe their limitations. From this, we develop a three-stage hybrid approach, using a combination of techniques. We conclude with a brief discussion of the potential benefits of our approach.
[ { "version": "v1", "created": "Sat, 3 May 2008 13:00:42 GMT" } ]
2008-05-06T00:00:00
[ [ "Harding", "Peter J.", "" ], [ "Amos", "Martyn", "" ], [ "Gwynne", "Steve", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0805.0375
Petar Popovski
Petar Popovski and Osvaldo Simeone
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
submitted to IEEE Transactions on Information Forensics and Security
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional inteference via scheduling of concurrent downlink transmissions. In this paper, this basic idea is explored from an information-theoretic standpoint by focusing on a two-cell scenario where the involved base stations are connected via a finite-capacity backbone link. A number of transmission strategies are considered that aim at improving uplink confidentiality under constraints on the downlink rate that acts as an interfering signal. The strategies differ mainly in the way the backbone link is exploited by the cooperating downlink- to the uplink-operated base stations. Achievable rates are derived for both the Gaussian (unfaded) and the fading cases, under different assumptions on the channel state information available at different nodes. Numerical results are also provided to corroborate the analysis. Overall, the analysis reveals that a combination of scheduling and base station cooperation is a promising means to improve transmission confidentiality in cellular systems.
[ { "version": "v1", "created": "Sat, 3 May 2008 17:56:21 GMT" } ]
2008-05-06T00:00:00
[ [ "Popovski", "Petar", "" ], [ "Simeone", "Osvaldo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0389
Chaitanya Swamy
Chaitanya Swamy
Algorithms for Probabilistically-Constrained Models of Risk-Averse Stochastic Optimization with Black-Box Distributions
null
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider various stochastic models that incorporate the notion of risk-averseness into the standard 2-stage recourse model, and develop novel techniques for solving the algorithmic problems arising in these models. A key notable feature of our work that distinguishes it from work in some other related models, such as the (standard) budget model and the (demand-) robust model, is that we obtain results in the black-box setting, that is, where one is given only sampling access to the underlying distribution. Our first model, which we call the risk-averse budget model, incorporates the notion of risk-averseness via a probabilistic constraint that restricts the probability (according to the underlying distribution) with which the second-stage cost may exceed a given budget B to at most a given input threshold \rho. We also a consider a closely-related model that we call the risk-averse robust model, where we seek to minimize the first-stage cost and the (1-\rho)-quantile of the second-stage cost. We obtain approximation algorithms for a variety of combinatorial optimization problems including the set cover, vertex cover, multicut on trees, min cut, and facility location problems, in the risk-averse budget and robust models with black-box distributions. We obtain near-optimal solutions that preserve the budget approximately and incur a small blow-up of the probability threshold (both of which are unavoidable). To the best of our knowledge, these are the first approximation results for problems involving probabilistic constraints and black-box distributions. A major component of our results is a fully polynomial approximation scheme for solving the LP-relaxation of the risk-averse problem.
[ { "version": "v1", "created": "Sun, 4 May 2008 03:57:52 GMT" } ]
2008-05-06T00:00:00
[ [ "Swamy", "Chaitanya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0805.0438
Martin Wainwright
Ram Rajagopal, Martin J. Wainwright
Network-based consensus averaging with general noisy channels
Presented in part at the Allerton Conference on Control, Computing, and Communication (September 2007). Appeared as Dept. of Statistics, Technical Report, UC Berkeley
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on the consensus averaging problem on graphs under general noisy channels. We study a particular class of distributed consensus algorithms based on damped updates, and using the ordinary differential equation method, we prove that the updates converge almost surely to exact consensus for finite variance noise. Our analysis applies to various types of stochastic disturbances, including errors in parameters, transmission noise, and quantization noise. Under a suitable stability condition, we prove that the error is asymptotically Gaussian, and we show how the asymptotic covariance is specified by the graph Laplacian. For additive parameter noise, we show how the scaling of the asymptotic MSE is controlled by the spectral gap of the Laplacian.
[ { "version": "v1", "created": "Sun, 4 May 2008 19:13:55 GMT" } ]
2008-05-06T00:00:00
[ [ "Rajagopal", "Ram", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0444
David Eisenstat
David Eisenstat
Two-enqueuer queue in Common2
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The question of whether all shared objects with consensus number 2 belong to Common2, the set of objects that can be implemented in a wait-free manner by any type of consensus number 2, was first posed by Herlihy. In the absence of general results, several researchers have obtained implementations for restricted-concurrency versions of FIFO queues. We present the first Common2 algorithm for a queue with two enqueuers and any number of dequeuers.
[ { "version": "v1", "created": "Sun, 4 May 2008 21:08:50 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2009 16:54:19 GMT" } ]
2009-04-07T00:00:00
[ [ "Eisenstat", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0805.0455
Leonid Andreev V
Leonid Andreev
From a set of parts to an indivisible whole. Part II: Operations in an open comparative mode
20 pages, 10 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a new method, HGV2C, for pattern analysis. The HGV2C method involves the construction of a computer ego (CE) based on an individual object that can be either a part of the system under analysis or a newly created object based on a certain hypothesis. The CE provides a capability to analyze data from a specific standpoint, e.g. from a viewpoint of a certain object. The CE is constructed from two identical copies of a query object, and its functioning mechanism involves: a hypothesis-parameter (HP) and infothyristor (IT). HP is a parameter that is introduced into an existing set of parameters. The HP value for one of the clones of a query object is set to equal 1, whereas for another clone it is greater than 1. The IT is based on the previously described algorithm of iterative averaging and performs three functions: 1) computation of a similarity matrix for the group of three objects including two clones of a query object and a target object; 2) division of the group into two alternative subgroups; and 3) a successive increase of the HP weight in the totality of all the parameters. Initially, both clones of the query object appear together in one of the subgroups as all of their parameter values, except the HP, are identical. At a certain point of the HP multiplication, one of the clones moves to the group of the target object. A respective number of the HP multiplications represents the dissimilarity (D) between the query and target objects. The product of D multiplied by the difference in HP values of the clones is strictly constant and linearly increases as the difference in HP values of the clones decreases. This new approach to knowledge representation is demonstrated on the example of population pyramids of 220 countries.
[ { "version": "v1", "created": "Mon, 5 May 2008 02:55:38 GMT" } ]
2008-05-06T00:00:00
[ [ "Andreev", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0459
\^Hamed \"Owladeghaffari
Hamed Owladeghaffari
Phase transition in SONFIS&SORST
submitted to :The Sixth International Conference on Rough Sets and Current Trends in Computing; Akron, Ohio, USA,2008
null
10.1007/978-3-540-88425-5_35
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we introduce general frame of MAny Connected Intelligent Particles Systems (MACIPS). Connections and interconnections between particles get a complex behavior of such merely simple system (system in system).Contribution of natural computing, under information granulation theory, are the main topics of this spacious skeleton. Upon this clue, we organize two algorithms involved a few prominent intelligent computing and approximate reasoning methods: self organizing feature map (SOM), Neuro- Fuzzy Inference System and Rough Set Theory (RST). Over this, we show how our algorithms can be taken as a linkage of government-society interaction, where government catches various fashions of behavior: solid (absolute) or flexible. So, transition of such society, by changing of connectivity parameters (noise) from order to disorder is inferred. Add to this, one may find an indirect mapping among financial systems and eventual market fluctuations with MACIPS. Keywords: phase transition, SONFIS, SORST, many connected intelligent particles system, society-government interaction
[ { "version": "v1", "created": "Mon, 5 May 2008 04:19:50 GMT" } ]
2014-07-29T00:00:00
[ [ "Owladeghaffari", "Hamed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0805.0498
Martin Mundhenk
Michael Bauland (Knipp GmbH, Germany), Martin Mundhenk (Univ. Jena, Germany), Thomas Schneider (Univ. of Manchester, UK), Henning Schnoor (Univ. Kiel, Germany), Ilka Schnoor (Univ. Luebeck, Germany), Heribert Vollmer (Univ. Hannover, Germany)
The Tractability of Model-Checking for LTL: The Good, the Bad, and the Ugly Fragments
27 pages, 7 figures
null
null
ECCC Report TR08-028
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a seminal paper from 1985, Sistla and Clarke showed that the model-checking problem for Linear Temporal Logic (LTL) is either NP-complete or PSPACE-complete, depending on the set of temporal operators used. If, in contrast, the set of propositional operators is restricted, the complexity may decrease. This paper systematically studies the model-checking problem for LTL formulae over restricted sets of propositional and temporal operators. For almost all combinations of temporal and propositional operators, we determine whether the model-checking problem is tractable (in P) or intractable (NP-hard). We then focus on the tractable cases, showing that they all are NL-complete or even logspace solvable. This leads to a surprising gap in complexity between tractable and intractable cases. It is worth noting that our analysis covers an infinite set of problems, since there are infinitely many sets of propositional operators.
[ { "version": "v1", "created": "Mon, 5 May 2008 09:48:23 GMT" } ]
2016-09-08T00:00:00
[ [ "Bauland", "Michael", "", "Knipp GmbH, Germany" ], [ "Mundhenk", "Martin", "", "Univ. Jena,\n Germany" ], [ "Schneider", "Thomas", "", "Univ. of Manchester, UK" ], [ "Schnoor", "Henning", "", "Univ.\n Kiel, Germany" ], [ "Schnoor", "Ilka", "", "Univ. Luebeck, Germany" ], [ "Vollmer", "Heribert", "", "Univ. Hannover, Germany" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0805.0501
Christian Senger
Christian Senger, Vladimir Sidorenko, Martin Bossert, Victor Zyablov
Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008. 5 pages, 2 figures
null
10.1109/ISIT.2008.4595300
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one hand and to reduce the complexity of each decoding iteration significantly - while maintaining the decoding performance - on the other.
[ { "version": "v1", "created": "Mon, 5 May 2008 10:12:13 GMT" } ]
2010-04-29T00:00:00
[ [ "Senger", "Christian", "" ], [ "Sidorenko", "Vladimir", "" ], [ "Bossert", "Martin", "" ], [ "Zyablov", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0507
Felice Manganiello
Felice Manganiello, Elisa Gorla and Joachim Rosenthal
Spread Codes and Spread Decoding in Network Coding
null
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
10.1109/ISIT.2008.4595113
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce the class of Spread Codes for the use in random network coding. Spread Codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.
[ { "version": "v1", "created": "Mon, 5 May 2008 10:48:26 GMT" }, { "version": "v2", "created": "Wed, 21 May 2008 13:49:45 GMT" } ]
2016-11-17T00:00:00
[ [ "Manganiello", "Felice", "" ], [ "Gorla", "Elisa", "" ], [ "Rosenthal", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0510
Thomas Blumensath
Thomas Blumensath and Mike E. Davies
Iterative Hard Thresholding for Compressed Sensing
null
null
null
null
cs.IT cs.NA math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present a theoretical analysis of the iterative hard thresholding algorithm when applied to the compressed sensing recovery problem. We show that the algorithm has the following properties (made more precise in the main text of the paper) - It gives near-optimal error guarantees. - It is robust to observation noise. - It succeeds with a minimum number of observations. - It can be used with any sampling operator for which the operator and its adjoint can be computed. - The memory requirement is linear in the problem size. - Its computational complexity per iteration is of the same order as the application of the measurement operator or its adjoint. - It requires a fixed number of iterations depending only on the logarithm of a form of signal to noise ratio of the signal. - Its performance guarantees are uniform in that they only depend on properties of the sampling operator and signal sparsity.
[ { "version": "v1", "created": "Mon, 5 May 2008 12:33:43 GMT" } ]
2008-05-06T00:00:00
[ [ "Blumensath", "Thomas", "" ], [ "Davies", "Mike E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0805.0514
Jens Zumbr\"agel
Jens Zumbragel, Gerard Maze, Joachim Rosenthal
Efficient recovering of operation tables of black box groups and rings
5 pages
null
null
null
cs.IT cs.DM math.GR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People have been studying the following problem: Given a finite set S with a hidden (black box) binary operation * on S which might come from a group law, and suppose you have access to an oracle that you can ask for the operation x*y of single pairs (x,y) you choose. What is the minimal number of queries to the oracle until the whole binary operation is recovered, i.e. you know x*y for all x,y in S? This problem can trivially be solved by using |S|^2 queries to the oracle, so the question arises under which circumstances you can succeed with a significantly smaller number of queries. In this presentation we give a lower bound on the number of queries needed for general binary operations. On the other hand, we present algorithms solving this problem by using |S| queries, provided that * is an abelian group operation. We also investigate black box rings and give lower and upper bounds for the number of queries needed to solve product recovering in this case.
[ { "version": "v1", "created": "Mon, 5 May 2008 12:17:04 GMT" } ]
2008-05-06T00:00:00
[ [ "Zumbragel", "Jens", "" ], [ "Maze", "Gerard", "" ], [ "Rosenthal", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0516
Mich\`ele Wigger
Shraga I. Bross, Amos Lapidoth, Michele A. Wigger
The Gaussian MAC with Conferencing Encoders
5 pages, To be presented at ISIT 2008 in Toronto
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive the capacity region of the Gaussian version of Willems's two-user MAC with conferencing encoders. This setting differs from the classical MAC in that, prior to each transmission block, the two transmitters can communicate with each other over noise-free bit-pipes of given capacities. The derivation requires a new technique for proving the optimality of Gaussian input distributions in certain mutual information maximizations under a Markov constraint. We also consider a Costa-type extension of the Gaussian MAC with conferencing encoders. In this extension, the channel can be described as a two-user MAC with Gaussian noise and Gaussian interference where the interference is known non-causally to the encoders but not to the decoder. We show that as in Costa's setting the interference sequence can be perfectly canceled, i.e., that the capacity region without interference can be achieved.
[ { "version": "v1", "created": "Mon, 5 May 2008 12:20:34 GMT" } ]
2008-05-06T00:00:00
[ [ "Bross", "Shraga I.", "" ], [ "Lapidoth", "Amos", "" ], [ "Wigger", "Michele A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0517
Jerrald Meek
Jerrald Meek
Analysis of the Deterministic Polynomial Time Solvability of the 0-1-Knapsack Problem
14 Pages; The author is delaying submission for publication so that counter arguments may be proposed. ftp://ftp%40micrognu%2ecom:anon%[email protected]/pnenp/knapsack.pdf
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previously the author has demonstrated that a representative polynomial search partition is required to solve a NP-complete problem in deterministic polynomial time. It has also been demonstrated that finding such a partition can only be done in deterministic polynomial time if the form of the problem provides a simple method for producing the partition. It is the purpose of this article to demonstrate that no deterministic polynomial time method exists to produce a representative polynomial search partition for the Knapsack problem.
[ { "version": "v1", "created": "Mon, 5 May 2008 12:34:27 GMT" }, { "version": "v2", "created": "Thu, 8 May 2008 18:03:10 GMT" }, { "version": "v3", "created": "Mon, 25 Aug 2008 15:11:52 GMT" }, { "version": "v4", "created": "Fri, 5 Sep 2008 18:51:28 GMT" }, { "version": "v5", "created": "Sat, 6 Sep 2008 23:13:44 GMT" } ]
2008-09-07T00:00:00
[ [ "Meek", "Jerrald", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0805.0521
Mich\`ele Wigger
Amos Lapidoth, Stefan M. Moser, Michele A. Wigger
On the Capacity of Free-Space Optical Intensity Channels
To be presented at ISIT 2008 in Toronto
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the transmitted optical intensity) and by outputs that are corrupted by additive white Gaussian noise (because in free space the disturbances arise from many independent sources). Due to battery and safety reasons the inputs are simultaneously constrained in both their average and peak power. For a fixed ratio of the average power to the peak power the difference between the upper and the lower bounds tends to zero as the average power tends to infinity, and the ratio of the upper and lower bounds tends to one as the average power tends to zero. The case where only an average-power constraint is imposed on the input is treated separately. In this case, the difference of the upper and lower bound tends to 0 as the average power tends to infinity, and their ratio tends to a constant as the power tends to zero.
[ { "version": "v1", "created": "Mon, 5 May 2008 13:04:23 GMT" } ]
2008-05-06T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Moser", "Stefan M.", "" ], [ "Wigger", "Michele A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0541
Liang Wang
Wang Liang
Climate modification directed by control theory
9 piges,8 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Climate modification measures to counteract global warming receive some more new attentions in these years. Most current researches only discuss the impact of these measures to climate, but how to design such a climate regulator is still unknown. This paper shows the control theory could give the systematic direction for climate modification. But the control analyzing also reveals that climate modifications should only be regarded as a last-ditch measure.
[ { "version": "v1", "created": "Mon, 5 May 2008 14:18:37 GMT" }, { "version": "v2", "created": "Wed, 7 May 2008 07:59:02 GMT" } ]
2008-05-07T00:00:00
[ [ "Liang", "Wang", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0560
Tom Adam Frederic Anderson
Tom Adam Frederic Anderson, Yean-Fu Wen
An Approach to Learning Research with a Wireless Sensor Network in an Outdoor Setting
4 pages, 2 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated collection of environmental data may be accomplished with wireless sensor networks (WSNs). In this paper, a general discussion of WSNs is given for the gathering of data for educational research. WSNs have the capability to enhance the scope of a researcher to include multiple streams of data: environmental, location, cyberdata, video, and RFID. The location of data stored in a database can allow reconstruction of the learning activity for the evaluation of significance at a later time. A brief overview of the technology forms the basis of an exploration of a setting used for outdoor learning.
[ { "version": "v1", "created": "Mon, 5 May 2008 17:04:56 GMT" } ]
2008-05-06T00:00:00
[ [ "Anderson", "Tom Adam Frederic", "" ], [ "Wen", "Yean-Fu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0805.0577
Dominik Seethaler
Dominik Seethaler and Helmut B\"olcskei
Infinity-Norm Sphere-Decoding
Submitted to IEEE Transactions on Information Theory, Nov. 2008 (paper was presented in part at IEEE ISIT 2008, Toronto, ON, Canada, July 2008)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most promising approaches for efficient detection in multiple-input multiple-output (MIMO) wireless systems are based on sphere-decoding (SD). The conventional (and optimum) norm that is used to conduct the tree traversal step in SD is the l-2 norm. It was, however, recently observed that using the l-infinity norm instead reduces the hardware complexity of SD considerably at only a marginal performance loss. These savings result from a reduction in the length of the critical path in the circuit and the silicon area required for metric computation, but are also, as observed previously through simulation results, a consequence of a reduction in the computational (i.e., algorithmic) complexity. The aim of this paper is an analytical performance and computational complexity analysis of l-infinity norm SD. For i.i.d. Rayleigh fading MIMO channels, we show that l-infinity norm SD achieves full diversity order with an asymptotic SNR gap, compared to l-2 norm SD, that increases at most linearly in the number of receive antennas. Moreover, we provide a closed-form expression for the computational complexity of l-infinity norm SD based on which we establish that its complexity scales exponentially in the system size. Finally, we characterize the tree pruning behavior of l-infinity norm SD and show that it behaves fundamentally different from that of l-2 norm SD.
[ { "version": "v1", "created": "Mon, 5 May 2008 17:48:39 GMT" }, { "version": "v2", "created": "Tue, 18 Nov 2008 20:12:27 GMT" } ]
2008-11-18T00:00:00
[ [ "Seethaler", "Dominik", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0585
Jean Gallier
Jean Gallier
Discrete Mathematics for Computer Science, Some Notes
255 pages
null
null
null
cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These are notes on discrete mathematics for computer scientists. The presentation is somewhat unconventional. Indeed I begin with a discussion of the basic rules of mathematical reasoning and of the notion of proof formalized in a natural deduction system ``a la Prawitz''. The rest of the material is more or less traditional but I emphasize partial functions more than usual (after all, programs may not terminate for all input) and I provide a fairly complete account of the basic concepts of graph theory.
[ { "version": "v1", "created": "Mon, 5 May 2008 18:52:00 GMT" } ]
2008-05-06T00:00:00
[ [ "Gallier", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0805.0589
Rahul Vaze
Rahul Vaze and Robert W. Heath Jr
Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay Networks
A part of this paper appears in the proceedings of the IEEE International Symposium on Information Theory 2008, Toronto, Canada 6-11 July 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed space-time block coding is a diversity technique to mitigate the effects of fading in multi-hop wireless networks, where multiple relay stages are used by a source to communicate with its destination. This paper proposes a new distributed space-time block code called the cascaded orthogonal space-time block code (COSTBC) for the case where the source and destination are equipped with multiple antennas and each relay stage has one or more single antenna relays. Each relay stage is assumed to have receive channel state information (CSI) for all the channels from the source to itself, while the destination is assumed to have receive CSI for all the channels. To construct the COSTBC, multiple orthogonal space-time block codes are used in cascade by the source and each relay stage. In the COSTBC, each relay stage separates the constellation symbols of the orthogonal space-time block code sent by the preceding relay stage using its CSI, and then transmits another orthogonal space-time block code to the next relay stage. COSTBCs are shown to achieve the maximum diversity gain in a multi-hop wireless network with flat Rayleigh fading channels. Several explicit constructions of COSTBCs are also provided for two-hop wireless networks with two and four source antennas and relay nodes. It is also shown that COSTBCs require minimum decoding complexity thanks to the connection to orthogonal space-time block codes.
[ { "version": "v1", "created": "Mon, 5 May 2008 19:10:21 GMT" } ]
2008-05-06T00:00:00
[ [ "Vaze", "Rahul", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0612
Andrei Gagarin
Andrei Gagarin, Anush Poghosyan, and Vadim E. Zverovich
Upper bounds for alpha-domination parameters
7 pages; Presented at the 4th East Coast Combinatorial Conference, Antigonish (Nova Scotia, Canada), May 1-2, 2008
Graphs Combin. 25 (2009), no. 4, pp. 513-520
10.1007/s00373-009-0864-6
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we provide a new upper bound for the alpha-domination number. This result generalises the well-known Caro-Roditty bound for the domination number of a graph. The same probabilistic construction is used to generalise another well-known upper bound for the classical domination in graphs. We also prove similar upper bounds for the alpha-rate domination number, which combines the concepts of alpha-domination and k-tuple domination.
[ { "version": "v1", "created": "Mon, 5 May 2008 22:20:55 GMT" } ]
2010-12-24T00:00:00
[ [ "Gagarin", "Andrei", "" ], [ "Poghosyan", "Anush", "" ], [ "Zverovich", "Vadim E.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0805.0615
Yingquan Wu
Yingquan Wu
On Expanded Cyclic Codes
23 pages. Submitted for publication in IEEE Trans. Inform. Theory
null
null
null
cs.IT cs.CC math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We characterize the properties of component codewords of a codeword and particularly identify the precise conditions under which a codeword can be represented by a subbasis. Our developments reveal an alternative while more general view on the subspace subcodes of Reed-Solomon codes. With the new insights, we present an improved lower bound on the minimum distance of an expanded cyclic code by exploiting the generalized concatenated structure. We also show that the fixed-rate binary expanded Reed-Solomon codes are asymptotically "bad", in the sense that the ratio of minimum distance over code length diminishes with code length going to infinity. It overturns the prevalent conjecture that they are "good" codes and deviates from the ensemble of generalized Reed-Solomon codes which asymptotically achieves the Gilbert-Varshamov bound.
[ { "version": "v1", "created": "Mon, 5 May 2008 22:51:12 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2008 16:53:04 GMT" } ]
2008-07-08T00:00:00
[ [ "Wu", "Yingquan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0805.0642
\^Hamed \"Owladeghaffari
Hamed Owladeghaffari
Order to Disorder Transitions in Hybrid Intelligent Systems: a Hatch to the Interactions of Nations -Governments
submitted to:The 2008 IEEE International Conference on Granular Computing (GrC 2008)
null
null
null
cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, under general frame of MAny Connected Intelligent Particles Systems (MACIPS), we reproduce two new simple subsets of such intelligent complex network, namely hybrid intelligent systems, involved a few prominent intelligent computing and approximate reasoning methods: self organizing feature map (SOM), Neuro-Fuzzy Inference System and Rough Set Theory (RST). Over this, we show how our algorithms can be construed as a linkage of government-society interaction, where government catches various fashions of behavior: solid (absolute) or flexible. So, transition of such society, by changing of connectivity parameters (noise) from order to disorder is inferred. Add to this, one may find an indirect mapping among financial systems and eventual market fluctuations with MACIPS.
[ { "version": "v1", "created": "Tue, 6 May 2008 04:22:36 GMT" } ]
2010-01-10T00:00:00
[ [ "Owladeghaffari", "Hamed", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0648
Mathieu Bredif
Mathieu Br\'edif, Dider Boldo, Marc Pierrot-Deseilligny, Henri Ma\^itre
3D Building Model Fitting Using A New Kinetic Framework
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hides to its user the combinatorial complexity of determining or maintaining the polyhedron topology, allowing the design of a simple variational optimization. This new kinetic framework allows the manipulation of a bounded polyhedron with simple faces by specifying the target plane equations of each of its faces. It proceeds by evolving continuously from the polyhedron defined by its initial topology and its initial plane equations to a polyhedron that is as topologically close as possible to the initial polyhedron but with the new plane equations. This kinetic framework handles internally the necessary topological changes that may be required to keep the faces simple and the polyhedron bounded. For each intermediate configurations where the polyhedron looses the simplicity of its faces or its boundedness, the simplest topological modification that is able to reestablish the simplicity and the boundedness is performed.
[ { "version": "v1", "created": "Tue, 6 May 2008 06:34:31 GMT" } ]
2008-12-18T00:00:00
[ [ "Brédif", "Mathieu", "" ], [ "Boldo", "Dider", "" ], [ "Pierrot-Deseilligny", "Marc", "" ], [ "Maître", "Henri", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0805.0650
Gesine Milde
Lutz Prechelt
Plat_Forms -- a contest: The web development platform comparison
9 pages
null
null
Technical Report TR-B-06-11
cs.SE
http://creativecommons.org/licenses/by/3.0/
"Plat_Forms" is a competition in which top-class teams of three programmers compete to implement the same requirements for a web-based system within 30 hours, each team using a different technology platform (Java EE, .NET, PHP, Perl, Python, or Ruby on Rails). The results will provide new insights into the real (rather than purported) pros, cons, and emergent properties of each platform. The evaluation will analyze many aspects of each solution, both external (usability, functionality, reliability, performance, etc.) and internal (structure, understandability, flexibility, etc.).
[ { "version": "v1", "created": "Tue, 6 May 2008 06:53:01 GMT" } ]
2008-05-07T00:00:00
[ [ "Prechelt", "Lutz", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0805.0697
Tshilidzi Marwala
Meir Perez and Tshilidzi Marwala
Stochastic Optimization Approaches for Solving Sudoku
13 pages
null
10.1016/j.eswa.2012.04.019
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the Sudoku problem is solved using stochastic search techniques and these are: Cultural Genetic Algorithm (CGA), Repulsive Particle Swarm Optimization (RPSO), Quantum Simulated Annealing (QSA) and the Hybrid method that combines Genetic Algorithm with Simulated Annealing (HGASA). The results obtained show that the CGA, QSA and HGASA are able to solve the Sudoku puzzle with CGA finding a solution in 28 seconds, while QSA finding a solution in 65 seconds and HGASA in 1.447 seconds. This is mainly because HGASA combines the parallel searching of GA with the flexibility of SA. The RPSO was found to be unable to solve the puzzle.
[ { "version": "v1", "created": "Tue, 6 May 2008 11:06:49 GMT" } ]
2012-04-25T00:00:00
[ [ "Perez", "Meir", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0805.0730
Amy Glen
Amy Glen, Florence Lev\'e, Gw\'ena\"el Richomme
Quasiperiodic and Lyndon episturmian words
33 pages; minor changes
Theoretical Computer Science 409 (2008) 578-600
10.1016/j.tcs.2008.09.056
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently the second two authors characterized quasiperiodic Sturmian words, proving that a Sturmian word is non-quasiperiodic if and only if it is an infinite Lyndon word. Here we extend this study to episturmian words (a natural generalization of Sturmian words) by describing all the quasiperiods of an episturmian word, which yields a characterization of quasiperiodic episturmian words in terms of their "directive words". Even further, we establish a complete characterization of all episturmian words that are Lyndon words. Our main results show that, unlike the Sturmian case, there is a much wider class of episturmian words that are non-quasiperiodic, besides those that are infinite Lyndon words. Our key tools are morphisms and directive words, in particular "normalized" directive words, which we introduced in an earlier paper. Also of importance is the use of "return words" to characterize quasiperiodic episturmian words, since such a method could be useful in other contexts.
[ { "version": "v1", "created": "Tue, 6 May 2008 14:22:03 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2008 12:44:33 GMT" } ]
2010-03-16T00:00:00
[ [ "Glen", "Amy", "" ], [ "Levé", "Florence", "" ], [ "Richomme", "Gwénaël", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0805.0740
Luca Venturino
Antonio De Maio, Marco Lops, Luca Venturino
Diversity-Integration Trade-offs in MIMO Detection
null
IEEE Transactions on Signal Processing, Vol. 56, no. 10, pp. 5051-5061, October 2008
10.1109/TSP.2008.928693
null
cs.OH cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a MIMO detection problem is considered. At first, we derive the Generalized Likelihood Ratio Test (GLRT) for arbitrary transmitted signals and arbitrary time-correlation of the disturbance. Then, we investigate design criteria for the transmitted waveforms in both power-unlimited and power-limited systems and we study the interplay among the rank of the optimized code matrix, the number of transmit diversity paths and the amount of energy integrated along each path. The results show that increasing the rank of the code matrix allows generating a larger number of diversity paths at the price of reducing the average signal-to-clutter level along each path.
[ { "version": "v1", "created": "Tue, 6 May 2008 10:26:43 GMT" } ]
2022-03-09T00:00:00
[ [ "De Maio", "Antonio", "" ], [ "Lops", "Marco", "" ], [ "Venturino", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0747
Daniel Lemire
Hazel Webb, Owen Kaser, Daniel Lemire
Pruning Attribute Values From Data Cubes with Diamond Dicing
null
null
null
TR-08-011 (UNB Saint John)
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data stored in a data warehouse are inherently multidimensional, but most data-pruning techniques (such as iceberg and top-k queries) are unidimensional. However, analysts need to issue multidimensional queries. For example, an analyst may need to select not just the most profitable stores or--separately--the most profitable products, but simultaneous sets of stores and products fulfilling some profitability constraints. To fill this need, we propose a new operator, the diamond dice. Because of the interaction between dimensions, the computation of diamonds is challenging. We present the first diamond-dicing experiments on large data sets. Experiments show that we can compute diamond cubes over fact tables containing 100 million facts in less than 35 minutes using a standard PC.
[ { "version": "v1", "created": "Tue, 6 May 2008 15:45:15 GMT" } ]
2008-05-07T00:00:00
[ [ "Webb", "Hazel", "" ], [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0805.0766
Jon Feldman
Gagan Aggarwal, Jon Feldman, S. Muthukrishnan and Martin Pal
Sponsored Search Auctions with Markovian Users
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sponsored search involves running an auction among advertisers who bid in order to have their ad shown next to search results for specific keywords. Currently, the most popular auction for sponsored search is the "Generalized Second Price" (GSP) auction in which advertisers are assigned to slots in the decreasing order of their "score," which is defined as the product of their bid and click-through rate. In the past few years, there has been significant research on the game-theoretic issues that arise in an advertiser's interaction with the mechanism as well as possible redesigns of the mechanism, but this ranking order has remained standard. From a search engine's perspective, the fundamental question is: what is the best assignment of advertisers to slots? Here "best" could mean "maximizing user satisfaction," "most efficient," "revenue-maximizing," "simplest to interact with," or a combination of these. To answer this question we need to understand the behavior of a search engine user when she sees the displayed ads, since that defines the commodity the advertisers are bidding on, and its value. Most prior work has assumed that the probability of a user clicking on an ad is independent of the other ads shown on the page. We propose a simple Markovian user model that does not make this assumption. We then present an algorithm to determine the most efficient assignment under this model, which turns out to be different than that of GSP. A truthful auction then follows from an application of the Vickrey-Clarke-Groves (VCG) mechanism. Further, we show that our assignment has many of the desirable properties of GSP that makes bidding intuitive. At the technical core of our result are a number of insights about the structure of the optimal assignment.
[ { "version": "v1", "created": "Tue, 6 May 2008 18:05:23 GMT" } ]
2008-05-07T00:00:00
[ [ "Aggarwal", "Gagan", "" ], [ "Feldman", "Jon", "" ], [ "Muthukrishnan", "S.", "" ], [ "Pal", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0805.0782
Michael Hilker
Michael Hilker and Christoph Schommer
A new queueing strategy for the Adversarial Queueing Theory
8 pages, 1 figure, ps-trix
Proceedings, IPSI-2005, December 2005, Bled, Slovenia
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies are researched in this model and better results are performed by alternative queueing strategies, e.g. LIS (Longest In System). This article introduces a new queueing protocol called interval-strategy that is concerned with the reduction from dynamic to static routing. We discuss the maximum system time for a packet and estimate with up-to-date results how this can be achieved. We figure out the maximum amount of time where a packet can spend in the network (i.e. worst case system time), and argue that the universal instability of the presented interval-strategy can be reached through these results. When a large group of queueing strategies is used for queueing, we prove that the interval-strategy will be universally unstable. Finally, we calculate the maximum time of the static routing to reach an universal stable and polynomial - in detail linear - bounded interval-strategy. Afterwards we close - in order to check this upper bound - with up-to-date results about the delivery times in static routing.
[ { "version": "v1", "created": "Tue, 6 May 2008 19:25:41 GMT" }, { "version": "v2", "created": "Wed, 7 May 2008 15:37:23 GMT" } ]
2008-05-07T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0805.0783
Lars Birkedal
Lars Birkedal and Hongseok Yang
Relational Parametricity and Separation Logic
null
Logical Methods in Computer Science, Volume 4, Issue 2 (May 15, 2008) lmcs:825
10.2168/LMCS-4(2:6)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Separation logic is a recent extension of Hoare logic for reasoning about programs with references to shared mutable data structures. In this paper, we provide a new interpretation of the logic for a programming language with higher types. Our interpretation is based on Reynolds's relational parametricity, and it provides a formal connection between separation logic and data abstraction.
[ { "version": "v1", "created": "Tue, 6 May 2008 19:27:14 GMT" }, { "version": "v2", "created": "Thu, 15 May 2008 12:44:50 GMT" } ]
2015-07-01T00:00:00
[ [ "Birkedal", "Lars", "" ], [ "Yang", "Hongseok", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0805.0785
Michael Hilker
Michael Hilker and Christoph Schommer
AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies
5 pages, 2 figures
Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC2006), July 2006, Canterbury, United Kingdom
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If a computer node is infected by a virus, worm or a backdoor, then this is a security risk for the complete network structure where the node is associated. Existing Network Intrusion Detection Systems (NIDS) provide a certain amount of support for the identification of such infected nodes but suffer from the need of plenty of communication and computational power. In this article, we present a novel approach called AGNOSCO to support the identification of infected nodes through the usage of artificial ant colonies. It is shown that AGNOSCO overcomes the communication and computational power problem while identifying infected nodes properly.
[ { "version": "v1", "created": "Tue, 6 May 2008 19:47:11 GMT" }, { "version": "v2", "created": "Wed, 7 May 2008 15:33:35 GMT" } ]
2008-05-07T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0805.0802
Zesheng Chen
Zesheng Chen and Chuanyi Ji
An Information-Theoretical View of Network-Aware Malware Attacks
14 pages, extension from a preliminary version appeared in IEEE INFOCOM 2007
null
null
null
cs.CR cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulnerability, and (c) defense, i.e., challenges for fighting the threats. We first study five large data sets and observe consistent clustered vulnerable-host distributions. We then present a new metric, referred to as the non-uniformity factor, which quantifies the unevenness of a vulnerable-host distribution. This metric is essentially the Renyi information entropy and better characterizes the non-uniformity of a distribution than the Shannon entropy. Next, we analyze the propagation speed of network-aware malwares in view of information theory. In particular, we draw a relationship between Renyi entropies and randomized epidemic malware-scanning algorithms. We find that the infection rates of malware-scanning methods are characterized by the Renyi entropies that relate to the information bits in a non-unform vulnerable-host distribution extracted by a randomized scanning algorithm. Meanwhile, we show that a representative network-aware malware can increase the spreading speed by exactly or nearly a non-uniformity factor when compared to a random-scanning malware at an early stage of malware propagation. This quantifies that how much more rapidly the Internet can be infected at the early stage when a malware exploits an uneven vulnerable-host distribution as a network-wide vulnerability. Furthermore, we analyze the effectiveness of defense strategies on the spread of network-aware malwares. Our results demonstrate that counteracting network-aware malwares is a significant challenge for the strategies that include host-based defense and IPv6.
[ { "version": "v1", "created": "Tue, 6 May 2008 20:37:10 GMT" }, { "version": "v2", "created": "Mon, 8 Sep 2008 15:17:34 GMT" } ]
2008-09-08T00:00:00
[ [ "Chen", "Zesheng", "" ], [ "Ji", "Chuanyi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0805.0845
Samuel Mimram
Samuel Mimram (PPS)
Presentation of a Game Semantics for First-Order Propositional Logic
null
null
null
null
cs.LO math.CT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Game semantics aim at describing the interactive behaviour of proofs by interpreting formulas as games on which proofs induce strategies. In this article, we introduce a game semantics for a fragment of first order propositional logic. One of the main difficulties that has to be faced when constructing such semantics is to make them precise by characterizing definable strategies - that is strategies which actually behave like a proof. This characterization is usually done by restricting to the model to strategies satisfying subtle combinatory conditions such as innocence, whose preservation under composition is often difficult to show. Here, we present an original methodology to achieve this task which requires to combine tools from game semantics, rewriting theory and categorical algebra. We introduce a diagrammatic presentation of definable strategies by the means of generators and relations: those strategies can be generated from a finite set of ``atomic'' strategies and that the equality between strategies generated in such a way admits a finite axiomatization. These generators satisfy laws which are a variation of bialgebras laws, thus bridging algebra and denotational semantics in a clean and unexpected way.
[ { "version": "v1", "created": "Wed, 7 May 2008 06:53:47 GMT" } ]
2008-12-18T00:00:00
[ [ "Mimram", "Samuel", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0805.0849
Michael Hilker
Michael Hilker and Christoph Schommer
SANA - Network Protection through artificial Immunity
5 pages
Proceedings of the 2nd International Workshop on Theory of Computer Viruses (TCV 2007), May 2007, Nancy, France
null
null
cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection components. They give less administration support for maintenance, but offer a large number of individual single points of failures - an ideal situation for network attacks to succeed. In this work, we discuss the required features, the performance, and the problems of a distributed protection system called SANA. It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work. SANA promises a better protection against intruders than common known protection systems through an adaptive self-management while keeping the resources efficiently by an intelligent reduction of redundant tasks. We introduce a library of several novel and common used protection components and evaluate the performance of SANA by a proof-of-concept implementation.
[ { "version": "v1", "created": "Wed, 7 May 2008 07:13:32 GMT" } ]
2008-05-08T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0805.0850
Michael Hilker
Michael Hilker and Christoph Schommer
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems
4 pages
Proceedings of the 3rd International Workshop on Theory of Computer Viruses (TCV 2008), May 2008, Nancy, France
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.
[ { "version": "v1", "created": "Wed, 7 May 2008 14:13:32 GMT" } ]
2008-05-08T00:00:00
[ [ "Hilker", "Michael", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0805.0851
Sebastien Tixeuil
Samuel Bernard (LIP6), St\'ephane Devismes (LRI), Maria Gradinariu Potop-Butucaru (LIP6, INRIA Rocquencourt), S\'ebastien Tixeuil (LIP6)
Bounds for self-stabilization in unidirectional networks
null
null
null
RR-6524
cs.DS cs.CC cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it in some arbitrary global state, the systems recovers from this catastrophic situation without external intervention in finite time. Unidirectional networks preclude many common techniques in self-stabilization from being used, such as preserving local predicates. In this paper, we investigate the intrinsic complexity of achieving self-stabilization in unidirectional networks, and focus on the classical vertex coloring problem. When deterministic solutions are considered, we prove a lower bound of $n$ states per process (where $n$ is the network size) and a recovery time of at least $n(n-1)/2$ actions in total. We present a deterministic algorithm with matching upper bounds that performs in arbitrary graphs. When probabilistic solutions are considered, we observe that at least $\Delta + 1$ states per process and a recovery time of $\Omega(n)$ actions in total are required (where $\Delta$ denotes the maximal degree of the underlying simple undirected graph). We present a probabilistically self-stabilizing algorithm that uses $\mathtt{k}$ states per process, where $\mathtt{k}$ is a parameter of the algorithm. When $\mathtt{k}=\Delta+1$, the algorithm recovers in expected $O(\Delta n)$ actions. When $\mathtt{k}$ may grow arbitrarily, the algorithm recovers in expected O(n) actions in total. Thus, our algorithm can be made optimal with respect to space or time complexity.
[ { "version": "v1", "created": "Wed, 7 May 2008 07:39:14 GMT" }, { "version": "v2", "created": "Tue, 13 May 2008 08:06:10 GMT" } ]
2009-09-29T00:00:00
[ [ "Bernard", "Samuel", "", "LIP6" ], [ "Devismes", "Stéphane", "", "LRI" ], [ "Potop-Butucaru", "Maria Gradinariu", "", "LIP6, INRIA Rocquencourt" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0805.0854
EDA Publishing Association
M. Worgull, M. Heckele, T. Mappes, B. Matthis, G. Tosello, T. Metz, J. Gavillet (LETI), P. Koltay, H. N. Hansen
Sub-$\mu$ structured Lotus Surfaces Manufacturing
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sub-micro structured surfaces allow modifying the behavior of polymer films or components. Especially in micro fluidics a lotus-like characteristic is requested for many applications. Structure details with a high aspect ratio are necessary to decouple the bottom and the top of the functional layer. Unlike to stochastic methods, patterning with a LIGA-mold insert it is possible to structure surfaces very uniformly or even with controlled variations (e.g. with gradients). In this paper we present the process chain to realize polymer sub-micro structures with minimum lateral feature size of 400 nm and up to 4 micrometers high.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:39:11 GMT" } ]
2008-12-18T00:00:00
[ [ "Worgull", "M.", "", "LETI" ], [ "Heckele", "M.", "", "LETI" ], [ "Mappes", "T.", "", "LETI" ], [ "Matthis", "B.", "", "LETI" ], [ "Tosello", "G.", "", "LETI" ], [ "Metz", "T.", "", "LETI" ], [ "Gavillet", "J.", "", "LETI" ], [ "Koltay", "P.", "" ], [ "Hansen", "H. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0855
EDA Publishing Association
C. Serre, A. P\'erez-Rodrigueza, N. Fondevilla, E. Martincic (IEF), J.R. Morante, J. Montserrat, J. Esteve
Linear and Non Linear Behaviour of Mechanical Resonators for Optimized Inertial Electromagnetic Microgenerators
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The need for wearable or abandoned microsystems, as well as the trend to a lower power consumption of electronic devices, make miniaturized renewable energy generators a viable alternative to batteries. Among the different alternatives, an interesting option is the use of inertial microgenerators for energy scavenging from vibrations present in the environment. These devices constitute perpetual energy sources without the need for refilling, thus being well suited for abandoned sensors, wireless systems or microsystems which must be embedded within the structure, without outside physical connections. Different electromagnetic energy scavenging devices have been described in the literature [1,2,3], based on the use of a velocity damped resonator, which is well suited for harvesting of vibrational energy induced by the operation of machines. These vibrations are characterized by a well defined frequency (in the range between few Hz's and few kHz's) and low displacement amplitudes. Adjusting the resonant frequency of the system to that of the vibrations allows amplification of these low amplitude displacements. Moreover, for these applications, the use of an electromagnetic device has the potential advantages of a good level of compatibility with Si Microsystem technology, as well as the possibility of relatively high electromechanical coupling with simple designs.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:39:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Serre", "C.", "", "IEF" ], [ "Pérez-Rodrigueza", "A.", "", "IEF" ], [ "Fondevilla", "N.", "", "IEF" ], [ "Martincic", "E.", "", "IEF" ], [ "Morante", "J. R.", "" ], [ "Montserrat", "J.", "" ], [ "Esteve", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0856
EDA Publishing Association
Zhen-Zhun Shu, Ming-Li Ke, Guan-Wei Chen, Ray Hua Horng, Chao-Chih Chang, Jean-Yih Tsai, Chung-Ching Lai, Ji-Liang Chen
Design And Fabrication of Condenser Microphone Using Wafer Transfer And Micro-electroplating Technique
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel fabrication process, which uses wafer transfer and micro-electroplating technique, has been proposed and tested. In this paper, the effects of the diaphragm thickness and stress, the air-gap thickness, and the area ratio of acoustic holes to backplate on the sensitivity of the condenser microphone have been demonstrated since the performance of the microphone depends on these parameters. The microphone diaphragm has been designed with a diameter and thickness of 1.9 mm and 0.6 $\mu$m, respectively, an air-gap thickness of 10 $\mu$m, and a 24% area ratio of acoustic holes to backplate. To obtain a lower initial stress, the material used for the diaphragm is polyimide. The measured sensitivities of the microphone at the bias voltages of 24 V and 12 V are -45.3 and -50.2 dB/Pa (at 1 kHz), respectively. The fabricated microphone shows a flat frequency response extending to 20 kHz.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:41:02 GMT" } ]
2008-12-18T00:00:00
[ [ "Shu", "Zhen-Zhun", "" ], [ "Ke", "Ming-Li", "" ], [ "Chen", "Guan-Wei", "" ], [ "Horng", "Ray Hua", "" ], [ "Chang", "Chao-Chih", "" ], [ "Tsai", "Jean-Yih", "" ], [ "Lai", "Chung-Ching", "" ], [ "Chen", "Ji-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0857
EDA Publishing Association
L. Juhasz, A. Vass-Varnai, Veronika Timar-Horvath, Marc Desmulliez, Resh Dhariwal
Porous Alumina Based Capacitive MEMS RH Sensor
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of a joint research and development project at the BME and HWU is to produce a cheap, reliable, low-power and CMOS-MEMS process compatible capacitive type relative humidity (RH) sensor that can be incorporated into a state-of-the-art, wireless sensor network. In this paper we discuss the preparation of our new capacitive structure based on post-CMOS MEMS processes and the methods which were used to characterize the thin film porous alumina sensing layer. The average sensitivity is approx. 15 pF/RH% which is more than a magnitude higher than the values found in the literature. The sensor is equipped with integrated resistive heating, which can be used for maintenance to reduce drift, or for keeping the sensing layer at elevated temperature, as an alternative method for temperature-dependence cancellation.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:41:41 GMT" } ]
2008-12-18T00:00:00
[ [ "Juhasz", "L.", "" ], [ "Vass-Varnai", "A.", "" ], [ "Timar-Horvath", "Veronika", "" ], [ "Desmulliez", "Marc", "" ], [ "Dhariwal", "Resh", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0858
EDA Publishing Association
R. R. Mansour, S. Fouladi, M. Bakeri-Kassem
Integrated RF MEMS/CMOS Devices
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A maskless post-processing technique for CMOS chips is developed that enables the fabrication of RF MEMS parallel-plate capacitors with a high quality factor and a very compact size. Simulations and measured results are presented for several MEMS/CMOS capacitors. A 2-pole coupled line tunable bandpass filter with a center frequency of 9.5 GHz is designed, fabricated and tested. A tuning range of 17% is achieved using integrated variable MEMS/CMOS capacitors with a quality factor exceeding 20. The tunable filter occupies a chip area of 1.2 x 2.1 mm2.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:42:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Mansour", "R. R.", "" ], [ "Fouladi", "S.", "" ], [ "Bakeri-Kassem", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0859
EDA Publishing Association
D. Flynn, Marc Desmulliez
Design Methodology and Manufacture of a Microinductor
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Potential core materials to supersede ferrite in the 0.5-10 MHz frequency range are investigated. The performance of electrodeposited nickel-iron, cobalt-iron-copper alloys and the commercial alloy Vitrovac 6025 have been assessed through their inclusion within a custom-made solenoid microinductor. Although the present inductor, at 500 KHz, achieves 77% power efficiency for 24.7W/cm3 power density, an optimized process predicts a power efficiency of 97% for 30.83W/cm3 power density. The principle issues regarding microinductor design and performance are discussed.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:43:13 GMT" } ]
2008-12-18T00:00:00
[ [ "Flynn", "D.", "" ], [ "Desmulliez", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0860
EDA Publishing Association
Jens Georg Kaufmann, Marc Desmulliez, D. Price
Megasonic Enhanced Electrodeposition
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel way of filling high aspect ratio vertical interconnection (microvias) with an aspect ratio of >2:1 is presented. High frequency acoustic streaming at megasonic frequencies enables the decrease of the Nernst-diffusion layer down to the sub-micron range, allowing thereby conformal electrodeposition in deep grooves. Higher throughput and better control over the deposition properties are possible for the manufacturing of interconnections and metal-based MEMS.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:43:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Kaufmann", "Jens Georg", "" ], [ "Desmulliez", "Marc", "" ], [ "Price", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0861
EDA Publishing Association
Jack Hoyd-Gigg Ng, Marc Desmulliez, Aongus Mccarthy, Himanshu Suyal, Kevin Prior, Duncan P. Hand
UV Direct-Writing of Metals on Polyimide
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conductive micro-patterned copper tracks were fabricated by UV direct-writing of a nanoparticle silver seed layer followed by selective electroless copper deposition. Silver ions were first incorporated into a hydrolyzed polyimide surface layer by wet chemical treatment. A photoreactive polymer coating, methoxy poly(ethylene glycol) (MPEG) was coated on top of the substrate prior to UV irradiation. Electrons released through the interaction between the MPEG molecules and UV photons allowed the reduction of the silver ions across the MPEG/doped polyimide interface. The resultant silver seed layer has a cluster morphology which is suitable for the initiation of electroless plating. Initial results showed that the deposited copper tracks were in good agreement with the track width on the photomask and laser direct-writing can also fabricate smaller line width metal tracks with good accuracy. The facile fabrication presented here can be carried out in air, at atmospheric pressure, and on contoured surfaces.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:44:24 GMT" } ]
2008-12-18T00:00:00
[ [ "Ng", "Jack Hoyd-Gigg", "" ], [ "Desmulliez", "Marc", "" ], [ "Mccarthy", "Aongus", "" ], [ "Suyal", "Himanshu", "" ], [ "Prior", "Kevin", "" ], [ "Hand", "Duncan P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0805.0862
EDA Publishing Association
X.-C. Shan, S.H. Ling, H. P. Maw, C. W. Lu, Y. C. Lam
Micro Embossing of Ceramic Green Substrates for Micro Devices
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multilayered ceramic substrates with embedded micro patterns are becoming increasingly important, for example, in harsh environment electronics and microfluidic devices. Fabrication of these embedded micro patterns, such as micro channels, cavities and vias, is a challenge. This study focuses on the process of patterning micro features on ceramic green substrates using micro embossing. A ceramic green tape that possessed near-zero shrinkage in the x-y plane was used, six layers of which were laminated as the embossing substrate. The process parameters that impact on the pattern fidelity were investigated and optimized in this study. Micro features with line-width as small as several micrometers were formed on the ceramic green substrates. The dynamic thermo-mechanical analysis indicated that extending the holding time at certain temperature range would harden the green substrates with little effect on improving the embossing fidelity. Ceramic substrates with embossed micro patterns were obtain d after co-firing. The embedded micro channels were also obtained by laminating the green tapes on the embossed substrates.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:45:07 GMT" } ]
2008-12-18T00:00:00
[ [ "Shan", "X. -C.", "" ], [ "Ling", "S. H.", "" ], [ "Maw", "H. P.", "" ], [ "Lu", "C. W.", "" ], [ "Lam", "Y. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]