id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0805.1437 | Oren Somekh | Oren Somekh, Osvalso Simeone, Benjamin M. Zaidel, H. Vincent Poor, and
Shlomo Shamai (Shitz) | On the Spectrum of Large Random Hermitian Finite-Band Matrices | Presented in the "open problems" session of the 2008 Information
Theory and Applications (ITA) workshop, UCSD | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The open problem of calculating the limiting spectrum (or its Shannon
transform) of increasingly large random Hermitian finite-band matrices is
described. In general, these matrices include a finite number of non-zero
diagonals around their main diagonal regardless of their size. Two different
communication setups which may be modeled using such matrices are presented: a
simple cellular uplink channel, and a time varying inter-symbol interference
channel. Selected recent information-theoretic works dealing directly with such
channels are reviewed. Finally, several characteristics of the still unknown
limiting spectrum of such matrices are listed, and some reflections are touched
upon.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 02:06:03 GMT"
}
] | 2008-05-13T00:00:00 | [
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Simeone",
"Osvalso",
"",
"Shitz"
],
[
"Zaidel",
"Benjamin M.",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1442 | Wei Dai | Wei Dai, Youjian (Eugene) Liu, Brian C. Rider and Wen Gao | How Many Users should be Turned On in a Multi-Antenna Broadcast Channel? | IEEE JSAC Special Issue on Exploiting Limited Feedback in Tomorrows
Wireless Communication Networks | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers broadcast channels with L antennas at the base station
and m single-antenna users, where L and m are typically of the same order. We
assume that only partial channel state information is available at the base
station through a finite rate feedback. Our key observation is that the optimal
number of on-users (users turned on), say s, is a function of signal-to-noise
ratio (SNR) and feedback rate. In support of this, an asymptotic analysis is
employed where L, m and the feedback rate approach infinity linearly. We derive
the asymptotic optimal feedback strategy as well as a realistic criterion to
decide which users should be turned on. The corresponding asymptotic throughput
per antenna, which we define as the spatial efficiency, turns out to be a
function of the number of on-users s, and therefore s must be chosen
appropriately. Based on the asymptotics, a scheme is developed for systems with
finite many antennas and users. Compared with other studies in which s is
presumed constant, our scheme achieves a significant gain. Furthermore, our
analysis and scheme are valid for heterogeneous systems where different users
may have different path loss coefficients and feedback rates.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 03:55:54 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jun 2008 23:44:40 GMT"
}
] | 2008-06-18T00:00:00 | [
[
"Dai",
"Wei",
"",
"Eugene"
],
[
"Youjian",
"",
"",
"Eugene"
],
[
"Liu",
"",
""
],
[
"Rider",
"Brian C.",
""
],
[
"Gao",
"Wen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1457 | Nicolas Markey | Patricia Bouyer, Kim G. Larsen, and Nicolas Markey | Model Checking One-clock Priced Timed Automata | 28 pages | Logical Methods in Computer Science, Volume 4, Issue 2 (June 20,
2008) lmcs:828 | 10.2168/LMCS-4(2:9)2008 | null | cs.LO cs.CC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the model of priced (a.k.a. weighted) timed automata, an
extension of timed automata with cost information on both locations and
transitions, and we study various model-checking problems for that model based
on extensions of classical temporal logics with cost constraints on modalities.
We prove that, under the assumption that the model has only one clock,
model-checking this class of models against the logic WCTL, CTL with
cost-constrained modalities, is PSPACE-complete (while it has been shown
undecidable as soon as the model has three clocks). We also prove that
model-checking WMTL, LTL with cost-constrained modalities, is decidable only if
there is a single clock in the model and a single stopwatch cost variable
(i.e., whose slopes lie in {0,1}).
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 08:56:07 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jun 2008 10:43:10 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Bouyer",
"Patricia",
""
],
[
"Larsen",
"Kim G.",
""
],
[
"Markey",
"Nicolas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.1464 | Guillaume Burel | Guillaume Burel (Max Planck Institute for Informatics) | Efficiently Simulating Higher-Order Arithmetic by a First-Order Theory
Modulo | null | Logical Methods in Computer Science, Volume 7, Issue 1 (March 17,
2011) lmcs:861 | 10.2168/LMCS-7(1:3)2011 | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In deduction modulo, a theory is not represented by a set of axioms but by a
congruence on propositions modulo which the inference rules of standard
deductive systems---such as for instance natural deduction---are applied.
Therefore, the reasoning that is intrinsic of the theory does not appear in the
length of proofs. In general, the congruence is defined through a rewrite
system over terms and propositions. We define a rigorous framework to study
proof lengths in deduction modulo, where the congruence must be computed in
polynomial time. We show that even very simple rewrite systems lead to
arbitrary proof-length speed-ups in deduction modulo, compared to using axioms.
As higher-order logic can be encoded as a first-order theory in deduction
modulo, we also study how to reinterpret, thanks to deduction modulo, the
speed-ups between higher-order and first-order arithmetics that were stated by
G\"odel. We define a first-order rewrite system with a congruence decidable in
polynomial time such that proofs of higher-order arithmetic can be linearly
translated into first-order arithmetic modulo that system. We also present the
whole higher-order arithmetic as a first-order system without resorting to any
axiom, where proofs have the same length as in the axiomatic presentation.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 10:42:54 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Apr 2010 10:12:20 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Oct 2010 13:08:40 GMT"
},
{
"version": "v4",
"created": "Thu, 13 Jan 2011 08:25:47 GMT"
},
{
"version": "v5",
"created": "Wed, 16 Mar 2011 20:55:57 GMT"
}
] | 2019-03-14T00:00:00 | [
[
"Burel",
"Guillaume",
"",
"Max Planck Institute for Informatics"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.1473 | Manuel Bodirsky | Manuel Bodirsky and Jan Kara | A Fast Algorithm and Datalog Inexpressibility for Temporal Reasoning | 19 pages, 1 figure | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new tractable temporal constraint language, which strictly
contains the Ord-Horn language of Buerkert and Nebel and the class of AND/OR
precedence constraints. The algorithm we present for this language decides
whether a given set of constraints is consistent in time that is quadratic in
the input size. We also prove that (unlike Ord-Horn) this language cannot be
solved by Datalog or by establishing local consistency.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 13:49:45 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Apr 2009 13:42:13 GMT"
}
] | 2009-04-11T00:00:00 | [
[
"Bodirsky",
"Manuel",
""
],
[
"Kara",
"Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.1480 | Koji Hukushima | Takeshi Hirama and Koji Hukushima | On-line Learning of an Unlearnable True Teacher through Mobile Ensemble
Teachers | 18 pages, 8 figures | null | 10.1143/JPSJ.77.094801 | null | cond-mat.dis-nn cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | On-line learning of a hierarchical learning model is studied by a method from
statistical mechanics. In our model a student of a simple perceptron learns
from not a true teacher directly, but ensemble teachers who learn from the true
teacher with a perceptron learning rule. Since the true teacher and the
ensemble teachers are expressed as non-monotonic perceptron and simple ones,
respectively, the ensemble teachers go around the unlearnable true teacher with
the distance between them fixed in an asymptotic steady state. The
generalization performance of the student is shown to exceed that of the
ensemble teachers in a transient state, as was shown in similar
ensemble-teachers models. Further, it is found that moving the ensemble
teachers even in the steady state, in contrast to the fixed ensemble teachers,
is efficient for the performance of the student.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 15:40:24 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Hirama",
"Takeshi",
""
],
[
"Hukushima",
"Koji",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.1485 | Oren Somekh | Osvaldo Simeone, Oren Somekh, H. Vincent Poor, and Shlomo Shamai
(Shitz) | Distributed MIMO Systems with Oblivious Antennas | In Proc. of the 2008 IEEE International Symposium on Information
Theory (ISIT 2008), Toronto, Ontario, Canada | null | 10.1109/ISIT.2008.4595119 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A scenario in which a single source communicates with a single destination
via a distributed MIMO transceiver is considered. The source operates each of
the transmit antennas via finite-capacity links, and likewise the destination
is connected to the receiving antennas through capacity-constrained channels.
Targeting a nomadic communication scenario, in which the distributed MIMO
transceiver is designed to serve different standards or services, transmitters
and receivers are assumed to be oblivious to the encoding functions shared by
source and destination. Adopting a Gaussian symmetric interference network as
the channel model (as for regularly placed transmitters and receivers),
achievable rates are investigated and compared with an upper bound. It is
concluded that in certain asymptotic and non-asymptotic regimes obliviousness
of transmitters and receivers does not cause any loss of optimality.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 16:53:54 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Simeone",
"Osvaldo",
"",
"Shitz"
],
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1487 | Spyros Sioutas SS | Lagogiannis George, Lorentzos Nikos, Sioutas Spyros, Theodoridis
Evaggelos | A Time Efficient Indexing Scheme for Complex Spatiotemporal Retrieval | 6 pages, 7 figures, submitted to Sigmod Record | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper is concerned with the time efficient processing of spatiotemporal
predicates, i.e. spatial predicates associated with an exact temporal
constraint. A set of such predicates forms a buffer query or a Spatio-temporal
Pattern (STP) Query with time. In the more general case of an STP query, the
temporal dimension is introduced via the relative order of the spatial
predicates (STP queries with order). Therefore, the efficient processing of a
spatiotemporal predicate is crucial for the efficient implementation of more
complex queries of practical interest. We propose an extension of a known
approach, suitable for processing spatial predicates, which has been used for
the efficient manipulation of STP queries with order. The extended method is
supported by efficient indexing structures. We also provide experimental
results that show the efficiency of the technique.
| [
{
"version": "v1",
"created": "Sat, 10 May 2008 17:18:32 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"George",
"Lagogiannis",
""
],
[
"Nikos",
"Lorentzos",
""
],
[
"Spyros",
"Sioutas",
""
],
[
"Evaggelos",
"Theodoridis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.1489 | Soumen Roy | Vladimir Filkov, Zachary M. Saul, Soumen Roy, Raissa M. D'Souza and
Premkumar T. Devanbu | Modeling and verifying a broad array of network properties | To appear in Europhysics Letters | Europhysics Letters, 86 (2009) 28003 | 10.1209/0295-5075/86/28003 | null | cond-mat.stat-mech cs.SE q-bio.QM stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by widely observed examples in nature, society and software, where
groups of already related nodes arrive together and attach to an existing
network, we consider network growth via sequential attachment of linked node
groups, or graphlets. We analyze the simplest case, attachment of the three
node V-graphlet, where, with probability alpha, we attach a peripheral node of
the graphlet, and with probability (1-alpha), we attach the central node. Our
analytical results and simulations show that tuning alpha produces a wide range
in degree distribution and degree assortativity, achieving assortativity values
that capture a diverse set of many real-world systems. We introduce a
fifteen-dimensional attribute vector derived from seven well-known network
properties, which enables comprehensive comparison between any two networks.
Principal Component Analysis (PCA) of this attribute vector space shows a
significantly larger coverage potential of real-world network properties by a
simple extension of the above model when compared against a classic model of
network growth.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 10:09:37 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Mar 2009 15:53:12 GMT"
}
] | 2009-04-30T00:00:00 | [
[
"Filkov",
"Vladimir",
""
],
[
"Saul",
"Zachary M.",
""
],
[
"Roy",
"Soumen",
""
],
[
"D'Souza",
"Raissa M.",
""
],
[
"Devanbu",
"Premkumar T.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0805.1567 | Shai Carmi | Shai Carmi, Zhenhua Wu, Shlomo Havlin, H. Eugene Stanley | Transport in networks with multiple sources and sinks | null | Europhys. Lett. 84, 28005 (2008) | 10.1209/0295-5075/84/28005 | null | cs.DM cond-mat.dis-nn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the electrical current and flow (number of parallel paths)
between two sets of n sources and n sinks in complex networks. We derive
analytical formulas for the average current and flow as a function of n. We
show that for small n, increasing n improves the total transport in the
network, while for large n bottlenecks begin to form. For the case of flow,
this leads to an optimal n* above which the transport is less efficient. For
current, the typical decrease in the length of the connecting paths for large n
compensates for the effect of the bottlenecks. We also derive an expression for
the average flow as a function of n under the common limitation that transport
takes place between specific pairs of sources and sinks.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 00:07:50 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2008 15:40:06 GMT"
}
] | 2008-11-17T00:00:00 | [
[
"Carmi",
"Shai",
""
],
[
"Wu",
"Zhenhua",
""
],
[
"Havlin",
"Shlomo",
""
],
[
"Stanley",
"H. Eugene",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
0805.1593 | Bernd G\"unther | Bernd G\"unther | On the Probability Distribution of Superimposed Random Codes | null | IEEE Trans. Inf. Theory, 54(7):3206--3210, 2008 | 10.1109/TIT.2008.924658 | null | cs.DB cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A systematic study of the probability distribution of superimposed random
codes is presented through the use of generating functions. Special attention
is paid to the cases of either uniformly distributed but not necessarily
independent or non uniform but independent bit structures. Recommendations for
optimal coding strategies are derived.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 08:52:16 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jun 2008 05:30:49 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Günther",
"Bernd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1598 | Peiyush Jain | Peiyush Jain | A Simple In-Place Algorithm for In-Shuffle | 3 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a simple, linear time, in-place algorithm for performing a
2-way in-shuffle which can be used with little modification for certain other
k-way shuffles.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 09:28:18 GMT"
}
] | 2008-05-13T00:00:00 | [
[
"Jain",
"Peiyush",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.1661 | Glenn Hickey | G. Hickey, P. Carmi, A. Maheshwari, N. Zeh | NAPX: A Polynomial Time Approximation Scheme for the Noah's Ark Problem | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Noah's Ark Problem (NAP) is an NP-Hard optimization problem with
relevance to ecological conservation management. It asks to maximize the
phylogenetic diversity (PD) of a set of taxa given a fixed budget, where each
taxon is associated with a cost of conservation and a probability of
extinction. NAP has received renewed interest with the rise in availability of
genetic sequence data, allowing PD to be used as a practical measure of
biodiversity. However, only simplified instances of the problem, where one or
more parameters are fixed as constants, have as of yet been addressed in the
literature. We present NAPX, the first algorithm for the general version of NAP
that returns a $1 - \epsilon$ approximation of the optimal solution. It runs in
$O(\frac{n B^2 h^2 \log^2n}{\log^2(1 - \epsilon)})$ time where $n$ is the
number of species, and $B$ is the total budget and $h$ is the height of the
input tree. We also provide improved bounds for its expected running time.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 15:04:26 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2008 18:57:31 GMT"
}
] | 2008-10-27T00:00:00 | [
[
"Hickey",
"G.",
""
],
[
"Carmi",
"P.",
""
],
[
"Maheshwari",
"A.",
""
],
[
"Zeh",
"N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.1662 | Milos Ivkovic | Milos Ivkovic Shashi Kiran Chilappagari Bane Vasic | Eliminating Trapping Sets in Low-Density Parity Check Codes by using
Tanner Graph Covers | Accepted for publication in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss error floor asympotics and present a method for improving the
performance of low-density parity check (LDPC) codes in the high SNR (error
floor) region.
The method is based on Tanner graph covers that do not have trapping sets
from the original code. The advantages of the method are that it is universal,
as it can be applied to any LDPC code/channel/decoding algorithm and it
improves performance at the expense of increasing the code length, without
losing the code regularity, without changing the decoding algorithm, and, under
certain conditions, without lowering the code rate. The proposed method can be
modified to construct convolutional LDPC codes also.
The method is illustrated by modifying Tanner, MacKay and Margulis codes to
improve performance on the binary symmetric channel (BSC) under the Gallager B
decoding algorithm. Decoding results on AWGN channel are also presented to
illustrate that optimizing codes for one channel/decoding algorithm can lead to
performance improvement on other channels.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 15:06:11 GMT"
}
] | 2008-05-13T00:00:00 | [
[
"Vasic",
"Milos Ivkovic Shashi Kiran Chilappagari Bane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1696 | Manuel Cebrian | Manuel Cebrian, Manuel Alfonseca and Alfonso Ortega | Grammatical Evolution with Restarts for Fast Fractal Generation | 26 pages, 13 figures, Extended version of the paper presented at
ANNIE'04 | null | null | null | cs.NE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a previous work, the authors proposed a Grammatical Evolution algorithm to
automatically generate Lindenmayer Systems which represent fractal curves with
a pre-determined fractal dimension. This paper gives strong statistical
evidence that the probability distributions of the execution time of that
algorithm exhibits a heavy tail with an hyperbolic probability decay for long
executions, which explains the erratic performance of different executions of
the algorithm. Three different restart strategies have been incorporated in the
algorithm to mitigate the problems associated to heavy tail distributions: the
first assumes full knowledge of the execution time probability distribution,
the second and third assume no knowledge. These strategies exploit the fact
that the probability of finding a solution in short executions is
non-negligible and yield a severe reduction, both in the expected execution
time (up to one order of magnitude) and in its variance, which is reduced from
an infinite to a finite value.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 17:55:59 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Oct 2010 15:30:53 GMT"
}
] | 2010-10-18T00:00:00 | [
[
"Cebrian",
"Manuel",
""
],
[
"Alfonseca",
"Manuel",
""
],
[
"Ortega",
"Alfonso",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0805.1715 | Robert Shour | Robert Shour | Isotropy, entropy, and energy scaling | v2 scaling focus; v3 isotropy focus; v4: revises a nat log thm; v5-8:
isotropy and degrees of freedom focus with corrected proofreading; v9-10:
rewrite of v5-8 | null | null | null | cs.IT math.IT nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two principles explain emergence. First, in the Receipt's reference frame,
Deg(S) = 4/3 Deg(R), where Supply S is an isotropic radiative energy source,
Receipt R receives S's energy, and Deg is a system's degrees of freedom based
on its mean path length. S's 1/3 more degrees of freedom relative to R enables
R's growth and increasing complexity. Second, rho(R) = Deg(R) times rho(r),
where rho(R) represents the collective rate of R and rho(r) represents the rate
of an individual in R: as Deg(R) increases due to the first principle, the
multiplier effect of networking in R increases. A universe like ours with
isotropic energy distribution, in which both principles are operative, is
therefore predisposed to exhibit emergence, and, for reasons shown, a
ubiquitous role for the natural logarithm.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 19:24:11 GMT"
},
{
"version": "v10",
"created": "Thu, 3 May 2012 17:59:07 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2008 19:08:39 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Aug 2008 19:43:55 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Dec 2008 14:10:42 GMT"
},
{
"version": "v5",
"created": "Wed, 21 Dec 2011 22:40:43 GMT"
},
{
"version": "v6",
"created": "Thu, 29 Dec 2011 19:26:20 GMT"
},
{
"version": "v7",
"created": "Thu, 5 Jan 2012 17:57:11 GMT"
},
{
"version": "v8",
"created": "Wed, 18 Jan 2012 17:07:42 GMT"
},
{
"version": "v9",
"created": "Wed, 25 Apr 2012 15:47:34 GMT"
}
] | 2012-05-04T00:00:00 | [
[
"Shour",
"Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0805.1727 | Martyn Amos | Martyn Amos and Oliver Don | Swarm-Based Spatial Sorting | Accepted by the Int. J. Intelligent Computing and Cybernetics | null | null | null | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Purpose: To present an algorithm for spatially sorting objects into an
annular structure. Design/Methodology/Approach: A swarm-based model that
requires only stochastic agent behaviour coupled with a pheromone-inspired
"attraction-repulsion" mechanism. Findings: The algorithm consistently
generates high-quality annular structures, and is particularly powerful in
situations where the initial configuration of objects is similar to those
observed in nature. Research limitations/implications: Experimental evidence
supports previous theoretical arguments about the nature and mechanism of
spatial sorting by insects. Practical implications: The algorithm may find
applications in distributed robotics. Originality/value: The model offers a
powerful minimal algorithmic framework, and also sheds further light on the
nature of attraction-repulsion algorithms and underlying natural processes.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 19:46:29 GMT"
}
] | 2008-05-13T00:00:00 | [
[
"Amos",
"Martyn",
""
],
[
"Don",
"Oliver",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0805.1740 | Grenville Croll | Yirsaw Ayalew, Markus Clermont, Roland T. Mittermeir | Detecting Errors in Spreadsheets | 12 Pages, 5 Figures; ISBN: 1 86166 158 4 | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 51-63 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents two complementary strategies for identifying errors in
spreadsheet programs. The strategies presented are grounded on the assumption
that spreadsheets are software, albeit of a different nature than conventional
procedural software. Correspondingly, strategies for identifying errors have to
take into account the inherent properties of spreadsheets as much as they have
to recognize that the conceptual models of 'spreadsheet programmers' differ
from the conceptual models of conventional programmers. Nevertheless, nobody
can and will write a spreadsheet, without having such a conceptual model in
mind, be it of numeric nature or be it of geometrical nature focused on some
layout.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 20:31:41 GMT"
}
] | 2011-02-19T00:00:00 | [
[
"Ayalew",
"Yirsaw",
""
],
[
"Clermont",
"Markus",
""
],
[
"Mittermeir",
"Roland T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0805.1741 | Grenville Croll | Markus Clermont, Christian Hanin, Roland T. Mittermeir | A Spreadsheet Auditing Tool Evaluated in an Industrial Context | 12 Pages, 2 Figures, 4 Tables | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2002 35-47
ISBN 1 86166 182 7 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Amongst the large number of write-and-throw-away spreadsheets developed for
one-time use there is a rather neglected proportion of spreadsheets that are
huge, periodically used, and submitted to regular update-cycles like any
conventionally evolving valuable legacy application software. However, due to
the very nature of spreadsheets, their evolution is particularly tricky and
therefore error-prone. In our strive to develop tools and methodologies to
improve spreadsheet quality, we analysed consolidation spreadsheets of an
internationally operating company for the errors they contain. The paper
presents the results of the field audit, involving 78 spreadsheets with 60,446
non-empty cells. As a by-product, the study performed was also to validate our
analysis tools in an industrial context. The evaluated auditing tool offers the
auditor a new view on the formula structure of the spreadsheet by grouping
similar formulas into equivalence classes. Our auditing approach defines three
similarity criteria between formulae, namely copy, logical and structural
equivalence. To improve the visualization of large spreadsheets, equivalences
and data dependencies are displayed in separated windows that are interlinked
with the spreadsheet. The auditing approach helps to find irregularities in the
geometrical pattern of similar formulas.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 20:40:27 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Clermont",
"Markus",
""
],
[
"Hanin",
"Christian",
""
],
[
"Mittermeir",
"Roland T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0805.1759 | Jon Feldman | Jon Feldman, S. Muthukrishnan | Algorithmic Methods for Sponsored Search Advertising | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern commercial Internet search engines display advertisements along side
the search results in response to user queries. Such sponsored search relies on
market mechanisms to elicit prices for these advertisements, making use of an
auction among advertisers who bid in order to have their ads shown for specific
keywords. We present an overview of the current systems for such auctions and
also describe the underlying game-theoretic aspects. The game involves three
parties--advertisers, the search engine, and search users--and we present
example research directions that emphasize the role of each. The algorithms for
bidding and pricing in these games use techniques from three mathematical
areas: mechanism design, optimization, and statistical estimation. Finally, we
present some challenges in sponsored search advertising.
| [
{
"version": "v1",
"created": "Mon, 12 May 2008 23:19:45 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.1765 | Ilias Diakonikolas | Ilias Diakonikolas, Homin K. Lee, Kevin Matulef, Rocco A. Servedio,
Andrew Wan | Efficiently Testing Sparse GF(2) Polynomials | Full version of ICALP 2008 paper | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give the first algorithm that is both query-efficient and time-efficient
for testing whether an unknown function $f: \{0,1\}^n \to \{0,1\}$ is an
$s$-sparse GF(2) polynomial versus $\eps$-far from every such polynomial. Our
algorithm makes $\poly(s,1/\eps)$ black-box queries to $f$ and runs in time $n
\cdot \poly(s,1/\eps)$. The only previous algorithm for this testing problem
\cite{DLM+:07} used poly$(s,1/\eps)$ queries, but had running time exponential
in $s$ and super-polynomial in $1/\eps$.
Our approach significantly extends the ``testing by implicit learning''
methodology of \cite{DLM+:07}. The learning component of that earlier work was
a brute-force exhaustive search over a concept class to find a hypothesis
consistent with a sample of random examples. In this work, the learning
component is a sophisticated exact learning algorithm for sparse GF(2)
polynomials due to Schapire and Sellie \cite{SchapireSellie:96}. A crucial
element of this work, which enables us to simulate the membership queries
required by \cite{SchapireSellie:96}, is an analysis establishing new
properties of how sparse GF(2) polynomials simplify under certain restrictions
of ``low-influence'' sets of variables.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 00:51:30 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Diakonikolas",
"Ilias",
""
],
[
"Lee",
"Homin K.",
""
],
[
"Matulef",
"Kevin",
""
],
[
"Servedio",
"Rocco A.",
""
],
[
"Wan",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.1785 | Michael Hilker | Michael Hilker | Distributed Self Management for Distributed Security Systems | 12 pages, 3 figures | Proceedings of the 2nd International Conference on Bio-Inspired
Computing: Theories and Applications (BIC-TA 2007), September 2007,
Zhengzhou, China | null | null | cs.MA cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed system as e.g. artificial immune systems, complex adaptive
systems, or multi-agent systems are widely used in Computer Science, e.g. for
network security, optimisations, or simulations. In these systems, small
entities move through the network and perform certain tasks. At some time, the
entities move to another place and require therefore information where to move
is most profitable. Common used systems do not provide any information or use a
centralised approach where a center delegates the entities. This article
discusses whether small information about the neighbours enhances the
performance of the overall system or not. Therefore, two information-protocols
are introduced and analysed. In addition, the protocols are implemented and
tested using the artificial immune system SANA that protects a network against
intrusions.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 06:32:12 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Hilker",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.1786 | Michael Hilker | Michael Hilker | Next Challenges in Bringing Artificial Immune Systems to Production in
Network Security | 7 pages, 1 figure | null | null | null | cs.MA cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The human immune system protects the human body against various pathogens
like e.g. biological viruses and bacteria. Artificial immune systems reuse the
architecture, organization, and workflows of the human immune system for
various problems in computer science. In the network security, the artificial
immune system is used to secure a network and its nodes against intrusions like
viruses, worms, and trojans. However, these approaches are far away from
production where they are academic proof-of-concept implementations or use only
a small part to protect against a certain intrusion. This article discusses the
required steps to bring artificial immune systems into production in the
network security domain. It furthermore figures out the challenges and provides
the description and results of the prototype of an artificial immune system,
which is SANA called.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 06:40:39 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Hilker",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.1787 | Michael Hilker | Michael Hilker and Christoph Schommer | A Network Protection Framework through Artificial Immunity | 24 pages, 2 figures | null | null | null | cs.MA cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current network protection systems use a collection of intelligent components
- e.g. classifiers or rule-based firewall systems to detect intrusions and
anomalies and to secure a network against viruses, worms, or trojans. However,
these network systems rely on individuality and support an architecture with
less collaborative work of the protection components. They give less
administration support for maintenance, but offer a large number of individual
single points of failures - an ideal situation for network attacks to succeed.
In this work, we discuss the required features, the performance, and the
problems of a distributed protection system called {\it SANA}. It consists of a
cooperative architecture, it is motivated by the human immune system, where the
components correspond to artificial immune cells that are connected for their
collaborative work. SANA promises a better protection against intruders than
common known protection systems through an adaptive self-management while
keeping the resources efficiently by an intelligent reduction of redundancies.
We introduce a library of several novel and common used protection components
and evaluate the performance of SANA by a proof-of-concept implementation.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 06:51:35 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Hilker",
"Michael",
""
],
[
"Schommer",
"Christoph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.1788 | Tobias Kretz | Tobias Kretz, Stefan Hengst, Peter Vortisch | Pedestrian Flow at Bottlenecks - Validation and Calibration of Vissim's
Social Force Model of Pedestrian Traffic and its Empirical Foundations | Accepted for presentation at International Symposium of Transport
Simulation 2008 (ISTS08) in Gold Coast, Australia | null | null | null | cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this contribution first results of experiments on pedestrian flow through
bottlenecks are presented and then compared to simulation results obtained with
the Social Force Model in the Vissim simulation framework. Concerning the
experiments it is argued that the basic dependence between flow and bottleneck
width is not a step function but that it is linear and modified by the effect
of a psychological phenomenon. The simulation results as well show a linear
dependence and the parameters can be calibrated such that the absolute values
for flow and time fit to range of experimental results.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 07:24:32 GMT"
}
] | 2008-09-10T00:00:00 | [
[
"Kretz",
"Tobias",
""
],
[
"Hengst",
"Stefan",
""
],
[
"Vortisch",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0805.1798 | Pierre Lescanne | Pierre Lescanne (LIP) | (Mechanical) Reasoning on Infinite Extensive Games | 11 p | null | null | LIP (UMR5668) RR2008-16 | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to better understand reasoning involved in analyzing infinite games
in extensive form, we performed experiments in the proof assistant Coq that are
reported here.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 08:09:51 GMT"
},
{
"version": "v2",
"created": "Tue, 20 May 2008 06:44:06 GMT"
},
{
"version": "v3",
"created": "Thu, 22 May 2008 06:37:33 GMT"
},
{
"version": "v4",
"created": "Wed, 28 May 2008 14:55:37 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Lescanne",
"Pierre",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.1806 | Mark van der Zwaag | J.A. Bergstra, S. Nolst Trenite, M.B. van der Zwaag | Tuplix Calculus Specifications of Financial Transfer Networks | null | null | null | PRG0807 | cs.CE cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the application of Tuplix Calculus in modular financial budget
design. We formalize organizational structure using financial transfer
networks. We consider the notion of flux of money over a network, and a way to
enforce the matching of influx and outflux for parts of a network. We exploit
so-called signed attribute notation to make internal streams visible through
encapsulations. Finally, we propose a Tuplix Calculus construct for the
definition of data functions.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 09:05:41 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Trenite",
"S. Nolst",
""
],
[
"van der Zwaag",
"M. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.1827 | Mireille Bossy | Mireille Bossy (INRIA Sophia Antipolis / INRIA Lorraine / IECN),
Fran\c{c}oise Baude (INRIA Sophia Antipolis), Viet Dung Doan (INRIA Sophia
Antipolis), Abhijeet Gaikwad (INRIA Sophia Antipolis), Ian Stokes-Rees (INRIA
Sophia Antipolis) | Parallel Pricing Algorithms for Multi--Dimensional Bermudan/American
Options using Monte Carlo methods | null | N° RR-6530 (2008) | 10.1016/j.matcom.2010.08.005 | RR-6530 | cs.DC cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present two parallel Monte Carlo based algorithms for
pricing multi--dimensional Bermudan/American options. First approach relies on
computation of the optimal exercise boundary while the second relies on
classification of continuation and exercise values. We also evaluate the
performance of both the algorithms in a desktop grid environment. We show the
effectiveness of the proposed approaches in a heterogeneous computing
environment, and identify scalability constraints due to the algorithmic
structure.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 12:34:04 GMT"
}
] | 2014-02-18T00:00:00 | [
[
"Bossy",
"Mireille",
"",
"INRIA Sophia Antipolis / INRIA Lorraine / IECN"
],
[
"Baude",
"Françoise",
"",
"INRIA Sophia Antipolis"
],
[
"Doan",
"Viet Dung",
"",
"INRIA Sophia\n Antipolis"
],
[
"Gaikwad",
"Abhijeet",
"",
"INRIA Sophia Antipolis"
],
[
"Stokes-Rees",
"Ian",
"",
"INRIA\n Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0805.1844 | John Sidles | John A. Sidles, Joseph L. Garbini, Lee E. Harrell, Alfred O. Hero,
Jonathan P. Jacky, Joseph R. Malcomb, Anthony G. Norman, Austin M. Williamson | Practical recipes for the model order reduction, dynamical simulation,
and compressive sampling of large-scale open quantum systems | 104 pages, 13 figures, 2 tables | null | 10.1088/1367-2630/11/6/065002 | null | quant-ph cs.IT math.IT math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents numerical recipes for simulating high-temperature and
non-equilibrium quantum spin systems that are continuously measured and
controlled. The notion of a spin system is broadly conceived, in order to
encompass macroscopic test masses as the limiting case of large-j spins. The
simulation technique has three stages: first the deliberate introduction of
noise into the simulation, then the conversion of that noise into an equivalent
continuous measurement and control process, and finally, projection of the
trajectory onto a state-space manifold having reduced dimensionality and
possessing a Kahler potential of multi-linear form. The resulting simulation
formalism is used to construct a positive P-representation for the thermal
density matrix. Single-spin detection by magnetic resonance force microscopy
(MRFM) is simulated, and the data statistics are shown to be those of a random
telegraph signal with additive white noise. Larger-scale spin-dust models are
simulated, having no spatial symmetry and no spatial ordering; the
high-fidelity projection of numerically computed quantum trajectories onto
low-dimensionality Kahler state-space manifolds is demonstrated. The
reconstruction of quantum trajectories from sparse random projections is
demonstrated, the onset of Donoho-Stodden breakdown at the Candes-Tao sparsity
limit is observed, a deterministic construction for sampling matrices is given,
and methods for quantum state optimization by Dantzig selection are given.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 14:39:57 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Sidles",
"John A.",
""
],
[
"Garbini",
"Joseph L.",
""
],
[
"Harrell",
"Lee E.",
""
],
[
"Hero",
"Alfred O.",
""
],
[
"Jacky",
"Jonathan P.",
""
],
[
"Malcomb",
"Joseph R.",
""
],
[
"Norman",
"Anthony G.",
""
],
[
"Williamson",
"Austin M.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0805.1854 | Alexandre Noma | Alexandre Noma, Ana B. V. Graciano, Luis Augusto Consularo, Roberto M.
Cesar-Jr, Isabelle Bloch | A New Algorithm for Interactive Structural Image Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel algorithm for the problem of structural image
segmentation through an interactive model-based approach. Interaction is
expressed in the model creation, which is done according to user traces drawn
over a given input image. Both model and input are then represented by means of
attributed relational graphs derived on the fly. Appearance features are taken
into account as object attributes and structural properties are expressed as
relational attributes. To cope with possible topological differences between
both graphs, a new structure called the deformation graph is introduced. The
segmentation process corresponds to finding a labelling of the input graph that
minimizes the deformations introduced in the model when it is updated with
input information. This approach has shown to be faster than other segmentation
methods, with competitive output quality. Therefore, the method solves the
problem of multiple label segmentation in an efficient way. Encouraging results
on both natural and target-specific color images, as well as examples showing
the reusability of the model, are presented and discussed.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 13:39:19 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 13:45:56 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Noma",
"Alexandre",
""
],
[
"Graciano",
"Ana B. V.",
""
],
[
"Consularo",
"Luis Augusto",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
],
[
"Bloch",
"Isabelle",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.1857 | Aaron Wagner | Saurabha Tavildar, Pramod Viswanath, and Aaron B. Wagner | The Gaussian Many-Help-One Distributed Source Coding Problem | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Jointly Gaussian memoryless sources are observed at N distinct terminals. The
goal is to efficiently encode the observations in a distributed fashion so as
to enable reconstruction of any one of the observations, say the first one, at
the decoder subject to a quadratic fidelity criterion. Our main result is a
precise characterization of the rate-distortion region when the covariance
matrix of the sources satisfies a "tree-structure" condition. In this
situation, a natural analog-digital separation scheme optimally trades off the
distributed quantization rate tuples and the distortion in the reconstruction:
each encoder consists of a point-to-point Gaussian vector quantizer followed by
a Slepian-Wolf binning encoder. We also provide a partial converse that
suggests that the tree structure condition is fundamental.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 13:47:13 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Tavildar",
"Saurabha",
""
],
[
"Viswanath",
"Pramod",
""
],
[
"Wagner",
"Aaron B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.1877 | Francesca Martelli | Maurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli | Perfect tag identification protocol in RFID networks | There is a technical error | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Radio Frequency IDentification (RFID) systems are becoming more and more
popular in the field of ubiquitous computing, in particular for objects
identification. An RFID system is composed by one or more readers and a number
of tags. One of the main issues in an RFID network is the fast and reliable
identification of all tags in the reader range. The reader issues some queries,
and tags properly answer. Then, the reader must identify the tags from such
answers. This is crucial for most applications. Since the transmission medium
is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or
limit the number of tags transmission collisions. We propose a protocol which,
under some assumptions about transmission techniques, always achieves a 100%
perfomance. It is based on a proper recursive splitting of the concurrent tags
sets, until all tags have been identified. The other approaches present in
literature have performances of about 42% in the average at most. The
counterpart is a more sophisticated hardware to be deployed in the manufacture
of low cost tags.
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 15:51:47 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Jul 2022 12:07:16 GMT"
}
] | 2022-07-04T00:00:00 | [
[
"Bonuccelli",
"Maurizio A.",
""
],
[
"Lonetti",
"Francesca",
""
],
[
"Martelli",
"Francesca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.1886 | Vadim Zaliva | Vadim Zaliva | Platform-Independent Firewall Policy Representation | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we will discuss the design of abstract firewall model along
with platform-independent policy definition language. We will also discuss the
main design challenges and solutions to these challenges, as well as examine
several differences in policy semantics between vendors and how it could be
mapped to our platform-independent language. We will also touch upon a
processing model, describing the mechanism by which an abstract policy could be
compiled into a concrete firewall policy syntax. We will discuss briefly some
future research directions, such as policy optimization and validation
| [
{
"version": "v1",
"created": "Tue, 13 May 2008 17:14:16 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Zaliva",
"Vadim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.1968 | Jian Tan | Predrag R. Jelenkovic, Xiaozhu Kang, Jian Tan | Heavy-Tailed Limits for Medium Size Jobs and Comparison Scheduling | 26 pages, 2 figures | null | null | null | cs.PF cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the conditional sojourn time distributions of processor sharing
(PS), foreground background processor sharing (FBPS) and shortest remaining
processing time first (SRPT) scheduling disciplines on an event where the job
size of a customer arriving in stationarity is smaller than exactly k>=0 out of
the preceding m>=k arrivals. Then, conditioning on the preceding event, the
sojourn time distribution of this newly arriving customer behaves
asymptotically the same as if the customer were served in isolation with a
server of rate (1-\rho)/(k+1) for PS/FBPS, and (1-\rho) for SRPT, respectively,
where \rho is the traffic intensity. Hence, the introduced notion of
conditional limits allows us to distinguish the asymptotic performance of the
studied schedulers by showing that SRPT exhibits considerably better asymptotic
behavior for relatively smaller jobs than PS/FBPS.
Inspired by the preceding results, we propose an approximation to the SRPT
discipline based on a novel adaptive job grouping mechanism that uses relative
size comparison of a newly arriving job to the preceding m arrivals.
Specifically, if the newly arriving job is smaller than k and larger than m-k
of the previous m jobs, it is routed into class k. Then, the classes of smaller
jobs are served with higher priorities using the static priority scheduling.
The good performance of this mechanism, even for a small number of classes m+1,
is demonstrated using the asymptotic queueing analysis under the heavy-tailed
job requirements. We also discuss refinements of the comparison grouping
mechanism that improve the accuracy of job classification at the expense of a
small additional complexity.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 05:00:12 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Jelenkovic",
"Predrag R.",
""
],
[
"Kang",
"Xiaozhu",
""
],
[
"Tan",
"Jian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.1974 | Aiswarya Cyriac | Aiswarya Cyriac, K. Murali Krishnan | Lower Bound for the Communication Complexity of the Russian Cards
Problem | 5 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper it is shown that no public announcement scheme that can be
modeled in Dynamic Epistemic Logic (DEL) can solve the Russian Cards Problem
(RCP) in one announcement. Since DEL is a general model for any public
announcement scheme we conclude that there exist no single announcement
solution to the RCP. The proof demonstrates the utility of DEL in proving lower
bounds for communication protocols. It is also shown that a general version of
RCP has no two announcement solution when the adversary has sufficiently large
number of cards.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 06:31:48 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Dec 2008 05:15:01 GMT"
}
] | 2008-12-24T00:00:00 | [
[
"Cyriac",
"Aiswarya",
""
],
[
"Krishnan",
"K. Murali",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.1981 | Novella Bartolini | N. Bartolini, A. Massini, S. Silvestri | P&P protocol: local coordination of mobile sensors for self-deployment | Technical report | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of mobile sensors is of great relevance for a number of strategic
applications devoted to monitoring critical areas where sensors can not be
deployed manually. In these networks, each sensor adapts its position on the
basis of a local evaluation of the coverage efficiency, thus permitting an
autonomous deployment.
Several algorithms have been proposed to deploy mobile sensors over the area
of interest. The applicability of these approaches largely depends on a proper
formalization of rigorous rules to coordinate sensor movements, solve local
conflicts and manage possible failures of communications and devices.
In this paper we introduce P&P, a communication protocol that permits a
correct and efficient coordination of sensor movements in agreement with the
PUSH&PULL algorithm. We deeply investigate and solve the problems that may
occur when coordinating asynchronous local decisions in the presence of an
unreliable transmission medium and possibly faulty devices such as in the
typical working scenario of mobile sensor networks.
Simulation results show the performance of our protocol under a range of
operative settings, including conflict situations, irregularly shaped target
areas, and node failures.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 06:50:58 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 18:40:32 GMT"
}
] | 2009-06-03T00:00:00 | [
[
"Bartolini",
"N.",
""
],
[
"Massini",
"A.",
""
],
[
"Silvestri",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.2015 | Christos Dimitrakakis | Christos Dimitrakakis and Michail G. Lagoudakis | Algorithms and Bounds for Rollout Sampling Approximate Policy Iteration | 14 pages, presented at EWRL'08 | null | null | IAS-UVA-08-03 | stat.ML cs.LO math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several approximate policy iteration schemes without value functions, which
focus on policy representation using classifiers and address policy learning as
a supervised learning problem, have been proposed recently. Finding good
policies with such methods requires not only an appropriate classifier, but
also reliable examples of best actions, covering the state space sufficiently.
Up to this time, little work has been done on appropriate covering schemes and
on methods for reducing the sample complexity of such methods, especially in
continuous state spaces. This paper focuses on the simplest possible covering
scheme (a discretized grid over the state space) and performs a
sample-complexity comparison between the simplest (and previously commonly
used) rollout sampling allocation strategy, which allocates samples equally at
each state under consideration, and an almost as simple method, which allocates
samples only as needed and requires significantly fewer samples.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 11:20:29 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jul 2008 14:26:35 GMT"
}
] | 2009-12-30T00:00:00 | [
[
"Dimitrakakis",
"Christos",
""
],
[
"Lagoudakis",
"Michail G.",
""
]
] | [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0805.2027 | Christos Dimitrakakis | Christos Dimitrakakis and Michail G. Lagoudakis | Rollout Sampling Approximate Policy Iteration | 18 pages, 2 figures, to appear in Machine Learning 72(3). Presented
at EWRL08, to be presented at ECML 2008 | null | 10.1007/s10994-008-5069-3 | null | cs.LG cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several researchers have recently investigated the connection between
reinforcement learning and classification. We are motivated by proposals of
approximate policy iteration schemes without value functions which focus on
policy representation using classifiers and address policy learning as a
supervised learning problem. This paper proposes variants of an improved policy
iteration scheme which addresses the core sampling problem in evaluating a
policy through simulation as a multi-armed bandit machine. The resulting
algorithm offers comparable performance to the previous algorithm achieved,
however, with significantly less computational effort. An order of magnitude
improvement is demonstrated experimentally in two standard reinforcement
learning domains: inverted pendulum and mountain-car.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 11:19:19 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Jul 2008 17:36:33 GMT"
}
] | 2008-07-06T00:00:00 | [
[
"Dimitrakakis",
"Christos",
""
],
[
"Lagoudakis",
"Michail G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2045 | Ciro Cattuto | Ciro Cattuto, Dominik Benz, Andreas Hotho, Gerd Stumme | Semantic Analysis of Tag Similarity Measures in Collaborative Tagging
Systems | 5 pages, 2 figures | null | null | null | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social bookmarking systems allow users to organise collections of resources
on the Web in a collaborative fashion. The increasing popularity of these
systems as well as first insights into their emergent semantics have made them
relevant to disciplines like knowledge extraction and ontology learning. The
problem of devising methods to measure the semantic relatedness between tags
and characterizing it semantically is still largely open. Here we analyze three
measures of tag relatedness: tag co-occurrence, cosine similarity of
co-occurrence distributions, and FolkRank, an adaptation of the PageRank
algorithm to folksonomies. Each measure is computed on tags from a large-scale
dataset crawled from the social bookmarking system del.icio.us. To provide a
semantic grounding of our findings, a connection to WordNet (a semantic lexicon
for the English language) is established by mapping tags into synonym sets of
WordNet, and applying there well-known metrics of semantic similarity. Our
results clearly expose different characteristics of the selected measures of
relatedness, making them applicable to different subtasks of knowledge
extraction such as synonym detection or discovery of concept hierarchies.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 14:10:02 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Cattuto",
"Ciro",
""
],
[
"Benz",
"Dominik",
""
],
[
"Hotho",
"Andreas",
""
],
[
"Stumme",
"Gerd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0805.2063 | Genta Ito | Genta Ito | Replication via Invalidating the Applicability of the Fixed Point
Theorem | 26 pages, 2 figures | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a construction of a certain infinite complete partial order (CPO)
that differs from the standard construction used in Scott's denotational
semantics. In addition, we construct several other infinite CPO's. For some of
those, we apply the usual Fixed Point Theorem (FPT) to yield a fixed point for
every continuous function $\mu:2\to 2$ (where 2 denotes the set $\{0,1\}$),
while for the other CPO's we cannot invoke that theorem to yield such fixed
points. Every element of each of these CPO's is a binary string in the
monotypic form and we show that invalidation of the applicability of the FPT to
the CPO that Scott's constructed yields the concept of replication.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 13:45:16 GMT"
},
{
"version": "v2",
"created": "Wed, 28 May 2008 16:41:37 GMT"
}
] | 2008-05-28T00:00:00 | [
[
"Ito",
"Genta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.2068 | Alexander Shraer | Christian Cachin, Idit Keidar, Alexander Shraer | Fork Sequential Consistency is Blocking | 7 pages, 3 figures | null | null | CCIT 697 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider an untrusted server storing shared data on behalf of clients. We
show that no storage access protocol can on the one hand preserve sequential
consistency and wait-freedom when the server is correct, and on the other hand
always preserve fork sequential consistency.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 14:23:53 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Cachin",
"Christian",
""
],
[
"Keidar",
"Idit",
""
],
[
"Shraer",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.2081 | Genta Ito | Genta Ito | Least change in the Determinant or Permanent of a matrix under
perturbation of a single element: continuous and discrete cases | 15 pages, 1 figure | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We formulate the problem of finding the probability that the determinant of a
matrix undergoes the least change upon perturbation of one of its elements,
provided that most or all of the elements of the matrix are chosen at random
and that the randomly chosen elements have a fixed probability of being
non-zero. Also, we show that the procedure for finding the probability that the
determinant undergoes the least change depends on whether the random variables
for the matrix elements are continuous or discrete.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 15:01:46 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Ito",
"Genta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2083 | Genta Ito | Genta Ito | Approximate formulation of the probability that the Determinant or
Permanent of a matrix undergoes the least change under perturbation of a
single element | 11 pages, 3 figures | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an earlier paper, we discussed the probability that the determinant of a
matrix undergoes the least change upon perturbation of one of its elements,
provided that most or all of the elements of the matrix are chosen at random
and that the randomly chosen elements have a fixed probability of being
non-zero. In this paper, we derive approximate formulas for that probability by
assuming that the terms in the permanent of a matrix are independent of one
another, and we apply that assumption to several classes of matrices. In the
course of deriving those formulas, we identified several integer sequences that
are not listed on Sloane's Web site.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 15:05:44 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Ito",
"Genta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2105 | Michal Demetrian | Martin Nehez, Daniel Olejar, Michal Demetrian | On Emergence of Dominating Cliques in Random Graphs | to appear in Proc. 2nd Int. Conf. on Math. and Applications in
Information Technology, Lahore Univ. of Management, Lahore, Pakistan, 2008 | null | null | null | math.CO cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | Emergence of dominating cliques in Erd\"os-R\'enyi random graph model
${\bbbg(n,p)}$ is investigated in this paper. It is shown this phenomenon
possesses a phase transition. Namely, we have argued that, given a constant
probability $p$, an $n$-node random graph $G$ from ${\bbbg(n,p)}$ and for $r= c
\log_{1/p} n$ with $1 \leq c \leq 2$, it holds: (1) if $p > 1/2$ then an
$r$-node clique is dominating in $G$ almost surely and, (2) if $p \leq (3 -
\sqrt{5})/2$ then an $r$-node clique is not dominating in $G$ almost surely.
The remaining range of probability $p$ is discussed with more attention. A
detailed study shows that this problem is answered by examination of
sub-logarithmic growth of $r$ upon $n$.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 16:25:27 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Nehez",
"Martin",
""
],
[
"Olejar",
"Daniel",
""
],
[
"Demetrian",
"Michal",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2135 | Alexander A. Sherstov | Alexander A. Sherstov | Communication Lower Bounds Using Dual Polynomials | 35 pages. Invited survey for The Bulletin of the European Association
for Theoretical Computer Science (EATCS) | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Representations of Boolean functions by real polynomials play an important
role in complexity theory. Typically, one is interested in the least degree of
a polynomial p(x_1,...,x_n) that approximates or sign-represents a given
Boolean function f(x_1,...,x_n). This article surveys a new and growing body of
work in communication complexity that centers around the dual objects, i.e.,
polynomials that certify the difficulty of approximating or sign-representing a
given function. We provide a unified guide to the following results, complete
with all the key proofs:
(1) Sherstov's Degree/Discrepancy Theorem, which translates lower bounds on
the threshold degree of a Boolean function into upper bounds on the discrepancy
of a related function;
(2) Two different methods for proving lower bounds on bounded-error
communication based on the approximate degree: Sherstov's pattern matrix method
and Shi and Zhu's block composition method;
(3) Extension of the pattern matrix method to the multiparty model, obtained
by Lee and Shraibman and by Chattopadhyay and Ada, and the resulting improved
lower bounds for DISJOINTNESS;
(4) David and Pitassi's separation of NP and BPP in multiparty communication
complexity for k=(1-eps)log n players.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 18:52:06 GMT"
}
] | 2008-05-15T00:00:00 | [
[
"Sherstov",
"Alexander A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2170 | Jerrald Meek | Jerrald Meek | Independence of P vs. NP in regards to oracle relativizations | 14 Pages;
ftp://ftp%40micrognu.com:anon%[email protected]/pnenp/oracle.pdf | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the third article in a series of four articles dealing with the P vs.
NP question. The purpose of this work is to demonstrate that the methods used
in the first two articles of this series are not affected by oracle
relativizations. Furthermore, the solution to the P vs. NP problem is actually
independent of oracle relativizations.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 21:10:55 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2008 18:30:31 GMT"
},
{
"version": "v3",
"created": "Tue, 20 May 2008 18:57:59 GMT"
},
{
"version": "v4",
"created": "Wed, 21 May 2008 19:45:03 GMT"
},
{
"version": "v5",
"created": "Sat, 23 Aug 2008 00:37:44 GMT"
},
{
"version": "v6",
"created": "Thu, 4 Sep 2008 02:45:30 GMT"
}
] | 2008-09-04T00:00:00 | [
[
"Meek",
"Jerrald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2179 | Gilles Champenois | Gilles Champenois | Mnesors for databases | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We add commutativity to axioms defining mnesors and substitute a bitrop for
the lattice. We show that it can be applied to relational database querying:
set union, intersection and selection are redifined only from the mnesor
addition and the granular multiplication. Union-compatibility is not required.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 22:01:31 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2008 13:52:24 GMT"
},
{
"version": "v3",
"created": "Sun, 24 May 2009 17:22:02 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Dec 2009 16:45:10 GMT"
}
] | 2009-12-15T00:00:00 | [
[
"Champenois",
"Gilles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.2185 | Shervan Fashandi | Shervan Fashandi, Shahab Oveis Gharan and Amir K. Khandani | Path Diversity over Packet Switched Networks: Performance Analysis and
Rate Allocation | 44 pages, 15 eps files. University of Waterloo Technical Report | null | null | Technical Report UW-E&CE#2008-09 | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Path diversity works by setting up multiple parallel connections between the
end points using the topological path redundancy of the network. In this paper,
\textit{Forward Error Correction} (FEC) is applied across multiple independent
paths to enhance the end-to-end reliability. Network paths are modeled as
erasure Gilbert-Elliot channels. It is known that over any erasure channel,
\textit{Maximum Distance Separable} (MDS) codes achieve the minimum probability
of irrecoverable loss among all block codes of the same size. Based on the
adopted model for the error behavior, we prove that the probability of
irrecoverable loss for MDS codes decays exponentially for an asymptotically
large number of paths. Then, optimal rate allocation problem is solved for the
asymptotic case where the number of paths is large. Moreover, it is shown that
in such asymptotically optimal rate allocation, each path is assigned a
positive rate \textit{iff} its quality is above a certain threshold. The
quality of a path is defined as the percentage of the time it spends in the bad
state. Finally, using dynamic programming, a heuristic suboptimal algorithm
with polynomial runtime is proposed for rate allocation over a finite number of
paths. This algorithm converges to the asymptotically optimal rate allocation
when the number of paths is large. The simulation results show that the
proposed algorithm approximates the optimal rate allocation (found by
exhaustive search) very closely for practical number of paths, and provides
significant performance improvement compared to the alternative schemes of rate
allocation.
| [
{
"version": "v1",
"created": "Wed, 14 May 2008 23:36:50 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Fashandi",
"Shervan",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2189 | Grenville Croll | Ying Chen, Hock Chuan Chan | Visual Checking of Spreadsheets | 11 Pages, 5 Figures | Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2000 75-85
ISBN:1 86166 158 4 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The difference between surface and deep structures of a spreadsheet is a
major cause of difficulty in checking spreadsheets. After a brief survey of
current methods of checking (or debugging) spreadsheets, new visual methods of
showing the deep structures are presented. Illustrations are given on how these
visual methods can be employed in various interactive local and global
debugging strategies.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 00:27:15 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Chen",
"Ying",
""
],
[
"Chan",
"Hock Chuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0805.2199 | Navin Kashyap | Navin Kashyap | Constraint Complexity of Realizations of Linear Codes on Arbitrary
Graphs | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2030492 | null | cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graphical realization of a linear code C consists of an assignment of the
coordinates of C to the vertices of a graph, along with a specification of
linear state spaces and linear ``local constraint'' codes to be associated with
the edges and vertices, respectively, of the graph. The $\k$-complexity of a
graphical realization is defined to be the largest dimension of any of its
local constraint codes. $\k$-complexity is a reasonable measure of the
computational complexity of a sum-product decoding algorithm specified by a
graphical realization. The main focus of this paper is on the following
problem: given a linear code C and a graph G, how small can the $\k$-complexity
of a realization of C on G be? As useful tools for attacking this problem, we
introduce the Vertex-Cut Bound, and the notion of ``vc-treewidth'' for a graph,
which is closely related to the well-known graph-theoretic notion of treewidth.
Using these tools, we derive tight lower bounds on the $\k$-complexity of any
realization of C on G. Our bounds enable us to conclude that good
error-correcting codes can have low-complexity realizations only on graphs with
large vc-treewidth. Along the way, we also prove the interesting result that
the ratio of the $\k$-complexity of the best conventional trellis realization
of a length-n code C to the $\k$-complexity of the best cycle-free realization
of C grows at most logarithmically with codelength n. Such a logarithmic growth
rate is, in fact, achievable.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 02:26:48 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Kashyap",
"Navin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2286 | Yejun Zhou | Yejun Zhou, Hui Li and Jianfeng Ma | Secure Network Coding Against the Contamination and Eavesdropping
Adversaries | 6 pages, 3 figures | null | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an algorithm that targets contamination and
eavesdropping adversaries. We consider the case when the number of independent
packets available to the eavesdropper is less than the multicast capacity of
the network. By means of our algorithm every node can verify the integrity of
the received packets easily and an eavesdropper is unable to get any meaningful
information about the source. We call it practical security if an eavesdropper
is unable to get any meaningful information about the source.We show that, by
giving up a small amount of overall capacity, our algorithm achieves achieves
the practically secure condition at a probability of one. Furthermore, the
communication overhead of our algorithm are negligible compared with previous
works, since the transmission of the hash values and the code coefficients are
both avoided.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 12:39:53 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Zhou",
"Yejun",
""
],
[
"Li",
"Hui",
""
],
[
"Ma",
"Jianfeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0805.2303 | Richard Moot | Richard Moot (LaBRI, Inria Futurs) | Graph Algorithms for Improving Type-Logical Proof Search | null | Dans Categorial grammars - an efficient tool for natural language
processing - June 2004 - Categorial grammars - an efficient tool for natural
language processing, Montpellier : France (2004) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Proof nets are a graph theoretical representation of proofs in various
fragments of type-logical grammar. In spite of this basis in graph theory,
there has been relatively little attention to the use of graph theoretic
algorithms for type-logical proof search. In this paper we will look at several
ways in which standard graph theoretic algorithms can be used to restrict the
search space. In particular, we will provide an O(n4) algorithm for selecting
an optimal axiom link at any stage in the proof search as well as a O(kn3)
algorithm for selecting the k best proof candidates.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 13:30:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Moot",
"Richard",
"",
"LaBRI, Inria Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.2308 | \^Hamed \"Owladeghaffari | H.Owladeghaffari | Toward Fuzzy block theory | 8 PAGES,7 FIGURES | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study, fundamentals of fuzzy block theory, and its application in
assessment of stability in underground openings, has surveyed. Using fuzzy
topics and inserting them in to key block theory, in two ways, fundamentals of
fuzzy block theory has been presented. In indirect combining, by coupling of
adaptive Neuro Fuzzy Inference System (NFIS) and classic block theory, we could
extract possible damage parts around a tunnel. In direct solution, some
principles of block theory, by means of different fuzzy facets theory, were
rewritten.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 13:43:26 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Owladeghaffari",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.2311 | David Sevilla | John McKay and David Sevilla | Aplicacion de la descomposicion racional univariada a monstrous
moonshine (in Spanish) | 6 pages, In Spanish | Proceedings of the 2004 Encuentro de Algebra Computacional y
Aplicaciones (EACA), p. 289-294. ISBN 84-688-6988-04 | null | null | math.NT cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper shows how to use Computational Algebra techniques, namely the
decomposition of rational functions in one variable, to explore a certain set
of modular functions, called replicable functions, that arise in Monstrous
Moonshine. In particular, we have computed all the rational relations with
coefficients in Z between pairs of replicable functions.
-----
En este articulo mostramos como usar tecnicas de Algebra Computacional,
concretamente la descomposcion de funciones racionales univariadas, para
estudiar un cierto conjunto de funciones modulares, llamadas funciones
replicables, que aparecen en Monstrous Moonshine. En concreto, hemos calculado
todas las relaciones racionales con coeficientes en Z entre pares de funciones
replicables.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 14:02:45 GMT"
}
] | 2009-04-19T00:00:00 | [
[
"McKay",
"John",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0805.2324 | Zhang Yu | Zhang Yu, Shi Zhong-ke, Wang Run-quan | A multilateral filtering method applied to airplane runway image | 8 pages, 5 figures, 4 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By considering the features of the airport runway image filtering, an
improved bilateral filtering method was proposed which can remove noise with
edge preserving. Firstly the steerable filtering decomposition is used to
calculate the sub-band parameters of 4 orients, and the texture feature matrix
is then obtained from the sub-band local median energy. The texture similar,
the spatial closer and the color similar functions are used to filter the
image.The effect of the weighting function parameters is qualitatively analyzed
also. In contrast with the standard bilateral filter and the simulation results
for the real airport runway image show that the multilateral filtering is more
effective than the standard bilateral filtering.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 13:15:08 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Yu",
"Zhang",
""
],
[
"Zhong-ke",
"Shi",
""
],
[
"Run-quan",
"Wang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.2331 | David Sevilla | Jaime Gutierrez, Rosario Rubio, David Sevilla | Computing the fixing group of a rational function | 8 pages | Proceedings of the 5th International workshop on Computer Algebra
in Scientific Computing (CASC), p. 159-164, Instituet fuer Informatik,
Technische Universitaet Muenchen, 2002. ISBN 3-9808546-0-4 | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let G=Aut_K (K(x)) be the Galois group of the transcendental degree one pure
field extension K(x)/K. In this paper we describe polynomial time algorithms
for computing the field Fix(H) fixed by a subgroup H < G and for computing the
fixing group G_f of a rational function f in K(x).
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 14:58:18 GMT"
}
] | 2009-04-19T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Rubio",
"Rosario",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0805.2338 | David Sevilla | Jaime Gutierrez, Rosario Rubio, David Sevilla | Unirational fields of transcendence degree one and functional
decomposition | 17 pages (single column) | Proceedings of the 2001 International Symposium on Symbolic and
Algebraic Computation (ISSAC), p. 167-175, ACM, New York, 2001. ISBN
1-58113-417-7 | null | null | cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an algorithm to compute all unirational fields of
transcendence degree one containing a given finite set of multivariate rational
functions. In particular, we provide an algorithm to decompose a multivariate
rational function f of the form f=g(h), where g is a univariate rational
function and h a multivariate one.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 15:19:44 GMT"
}
] | 2009-04-19T00:00:00 | [
[
"Gutierrez",
"Jaime",
""
],
[
"Rubio",
"Rosario",
""
],
[
"Sevilla",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0805.2362 | Andreas Maurer | Andreas Maurer | An optimization problem on the sphere | null | null | null | null | cs.LG cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove existence and uniqueness of the minimizer for the average geodesic
distance to the points of a geodesically convex set on the sphere. This implies
a corresponding existence and uniqueness result for an optimal algorithm for
halfspace learning, when data and target functions are drawn from the uniform
distribution.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 17:25:03 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Maurer",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0805.2368 | Alex Smola J | Arthur Gretton, Karsten Borgwardt, Malte J. Rasch, Bernhard Scholkopf,
Alexander J. Smola | A Kernel Method for the Two-Sample Problem | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a framework for analyzing and comparing distributions, allowing us
to design statistical tests to determine if two samples are drawn from
different distributions. Our test statistic is the largest difference in
expectations over functions in the unit ball of a reproducing kernel Hilbert
space (RKHS). We present two tests based on large deviation bounds for the test
statistic, while a third is based on the asymptotic distribution of this
statistic. The test statistic can be computed in quadratic time, although
efficient linear time approximations are available. Several classical metrics
on distributions are recovered when the function space used to compute the
difference in expectations is allowed to be more general (eg. a Banach space).
We apply our two-sample tests to a variety of problems, including attribute
matching for databases using the Hungarian marriage method, where they perform
strongly. Excellent performance is also obtained when comparing distributions
over graphs, for which these are the first such tests.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 17:46:53 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Gretton",
"Arthur",
""
],
[
"Borgwardt",
"Karsten",
""
],
[
"Rasch",
"Malte J.",
""
],
[
"Scholkopf",
"Bernhard",
""
],
[
"Smola",
"Alexander J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.2379 | Kirill Yurkov | Boris Kudryashov and Kirill Yurkov | Linear code-based vector quantization for independent random variables | 16 pages, 3 figures | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we analyze the rate-distortion function R(D) achievable using
linear codes over GF(q), where q is a prime number.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 19:05:46 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Kudryashov",
"Boris",
""
],
[
"Yurkov",
"Kirill",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2421 | Martin Gairing | Martin Gairing | Malicious Bayesian Congestion Games | 18 pages, submitted to WAOA'08 | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce malicious Bayesian congestion games as an
extension to congestion games where players might act in a malicious way. In
such a game each player has two types. Either the player is a rational player
seeking to minimize her own delay, or - with a certain probability - the player
is malicious in which case her only goal is to disturb the other players as
much as possible.
We show that such games do in general not possess a Bayesian Nash equilibrium
in pure strategies (i.e. a pure Bayesian Nash equilibrium). Moreover, given a
game, we show that it is NP-complete to decide whether it admits a pure
Bayesian Nash equilibrium. This result even holds when resource latency
functions are linear, each player is malicious with the same probability, and
all strategy sets consist of singleton sets. For a slightly more restricted
class of malicious Bayesian congestion games, we provide easy checkable
properties that are necessary and sufficient for the existence of a pure
Bayesian Nash equilibrium.
In the second part of the paper we study the impact of the malicious types on
the overall performance of the system (i.e. the social cost). To measure this
impact, we use the Price of Malice. We provide (tight) bounds on the Price of
Malice for an interesting class of malicious Bayesian congestion games.
Moreover, we show that for certain congestion games the advent of malicious
types can also be beneficial to the system in the sense that the social cost of
the worst case equilibrium decreases. We provide a tight bound on the maximum
factor by which this happens.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 23:00:44 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jun 2008 19:02:21 GMT"
}
] | 2008-06-05T00:00:00 | [
[
"Gairing",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.2422 | Wenwen Jiang | Wenwen Jiang, Jian-Kang Zhang and Kon Max Wong | Transceiver Pair Designs for Multiple Access Channels under Fixed Sum
Mutual Information using MMSE Decision Feedback Detection | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the joint design of the transceivers for a
multiple access Multiple Input and Multiple Output (MIMO) system having
Inter-Symbol Interference (ISI) channels. The system we consider is equipped
with the Minimum Mean Square Error (MMSE) Decision-Feedback (DF) detector.
Traditionally, transmitter designs for this system have been based on
constraints of either the transmission power or the
signal-to-interference-and-noise ratio (SINR) for each user. Here, we explore a
novel perspective and examine a transceiver design which is based on a fixed
sum mutual information constraint and minimizes the arithmetic average of mean
square error of MMSE-decision feedback detection. For this optimization
problem, a closed-form solution is obtained and is achieved if and only if the
averaged sum mutual information is uniformly distributed over each active
subchannel. Meanwhile, the mutual information of the currently detected user is
uniformly distributed over each individual symbol within the block signal of
the user, assuming all the previous user signals have been perfectly detected.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 23:05:50 GMT"
}
] | 2008-05-19T00:00:00 | [
[
"Jiang",
"Wenwen",
""
],
[
"Zhang",
"Jian-Kang",
""
],
[
"Wong",
"Kon Max",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2423 | Pulkit Grover | Pulkit Grover and Anant Sahai | Green Codes: Energy-Efficient Short-Range Communication | Accepted at International Symposium on Information Theory (ISIT) 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A green code attempts to minimize the total energy per-bit required to
communicate across a noisy channel. The classical information-theoretic
approach neglects the energy expended in processing the data at the encoder and
the decoder and only minimizes the energy required for transmissions. Since
there is no cost associated with using more degrees of freedom, the
traditionally optimal strategy is to communicate at rate zero.
In this work, we use our recently proposed model for the power consumed by
iterative message passing. Using generalized sphere-packing bounds on the
decoding power, we find lower bounds on the total energy consumed in the
transmissions and the decoding, allowing for freedom in the choice of the rate.
We show that contrary to the classical intuition, the rate for green codes is
bounded away from zero for any given error probability. In fact, as the desired
bit-error probability goes to zero, the optimizing rate for our bounds
converges to 1.
| [
{
"version": "v1",
"created": "Thu, 15 May 2008 23:49:27 GMT"
}
] | 2008-05-19T00:00:00 | [
[
"Grover",
"Pulkit",
""
],
[
"Sahai",
"Anant",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2427 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane Vasic, Michael W.
Marcellin | On Trapping Sets and Guaranteed Error Correction Capability of LDPC
Codes and GLDPC Codes | 17 pages. Submitted to IEEE Transactions on Information Theory. Parts
of this work have been accepted for presentation at the International
Symposium on Information Theory (ISIT'08) and the International Telemetering
Conference (ITC'08) | null | 10.1109/TIT.2010.2040962 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The relation between the girth and the guaranteed error correction capability
of $\gamma$-left regular LDPC codes when decoded using the bit flipping (serial
and parallel) algorithms is investigated. A lower bound on the size of variable
node sets which expand by a factor of at least $3 \gamma/4$ is found based on
the Moore bound. An upper bound on the guaranteed error correction capability
is established by studying the sizes of smallest possible trapping sets. The
results are extended to generalized LDPC codes. It is shown that generalized
LDPC codes can correct a linear fraction of errors under the parallel bit
flipping algorithm when the underlying Tanner graph is a good expander. It is
also shown that the bound cannot be improved when $\gamma$ is even by studying
a class of trapping sets. A lower bound on the size of variable node sets which
have the required expansion is established.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 00:50:19 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Nguyen",
"Dung Viet",
""
],
[
"Vasic",
"Bane",
""
],
[
"Marcellin",
"Michael W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2438 | Russell O'Connor | Russell O'Connor | Certified Exact Transcendental Real Number Computation in Coq | This paper is to be part of the proceedings of the 21st International
Conference on Theorem Proving in Higher Order Logics (TPHOLs 2008) | Ait Mohamed, C. Munoz, and S. Tahar (Eds.): TPHOLs 2008, LNCS
5170, pp. 246-261, 2008 | 10.1007/978-3-540-71067-7_21 | null | cs.LO cs.MS cs.NA | http://creativecommons.org/licenses/publicdomain/ | Reasoning about real number expressions in a proof assistant is challenging.
Several problems in theorem proving can be solved by using exact real number
computation. I have implemented a library for reasoning and computing with
complete metric spaces in the Coq proof assistant and used this library to
build a constructive real number implementation including elementary real
number functions and proofs of correctness. Using this library, I have created
a tactic that automatically proves strict inequalities over closed elementary
real number expressions by computation.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 18:02:24 GMT"
}
] | 2010-08-04T00:00:00 | [
[
"O'Connor",
"Russell",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0805.2440 | \^Hamed \"Owladeghaffari | Hamed Owladeghaffari, Majid Ejtemaei, Mehdi Irannajad | Analysis of hydrocyclone performance based on information granulation
theory | 8th. World Congress on Computational Mechanics (WCCM8) 5th. European
Congress on Computational Methods in Applied Sciences and Engineering
(ECCOMAS 2008) 2008 Venice, Italy | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes application of information granulation theory, on the
analysis of hydrocyclone perforamance. In this manner, using a combining of
Self Organizing Map (SOM) and Neuro-Fuzzy Inference System (NFIS), crisp and
fuzzy granules are obtained(briefly called SONFIS). Balancing of crisp granules
and sub fuzzy granules, within non fuzzy information (initial granulation), is
rendered in an open-close iteration. Using two criteria, "simplicity of rules
"and "adaptive threoshold error level", stability of algorithm is guaranteed.
Validation of the proposed method, on the data set of the hydrocyclone is
rendered.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 05:11:24 GMT"
}
] | 2008-05-19T00:00:00 | [
[
"Owladeghaffari",
"Hamed",
""
],
[
"Ejtemaei",
"Majid",
""
],
[
"Irannajad",
"Mehdi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.2537 | Patrick Henry | Patrick Henry, Christian Bassac (LaBRI) | A toolkit for a generative lexicon | poster - 6 pages | Dans A toolkit for a Generative Lexicon - Fourth International
Workshop on Generative Approaches to the Lexicon, PARIS : France (2007) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe the conception of a software toolkit designed for
the construction, maintenance and collaborative use of a Generative Lexicon. In
order to ease its portability and spreading use, this tool was built with free
and open source products. We eventually tested the toolkit and showed it
filters the adequate form of anaphoric reference to the modifier in endocentric
compounds.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 13:58:44 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Henry",
"Patrick",
"",
"LaBRI"
],
[
"Bassac",
"Christian",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0805.2620 | Krishnendu Chatterjee | Krishnendu Chatterjee, Thomas A. Henzinger and Nir Piterman | Algorithms for B\"uchi Games | 11 Pages, Published in GDV 06 (Games in Design and Verification) | null | null | null | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical algorithm for solving B\"uchi games requires time $O(n\cdot m)$
for game graphs with $n$ states and $m$ edges. For game graphs with constant
outdegree, the best known algorithm has running time $O(n^2/\log n)$. We
present two new algorithms for B\"uchi games. First, we give an algorithm that
performs at most $O(m)$ more work than the classical algorithm, but runs in
time O(n) on infinitely many graphs of constant outdegree on which the
classical algorithm requires time $O(n^2)$. Second, we give an algorithm with
running time $O(n\cdot m\cdot\log\delta(n)/\log n)$, where $1\le\delta(n)\le n$
is the outdegree of the game graph. Note that this algorithm performs
asymptotically better than the classical algorithm if $\delta(n)=O(\log n)$.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 20:38:54 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Henzinger",
"Thomas A.",
""
],
[
"Piterman",
"Nir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.2622 | Krishnendu Chatterjee | Krishnendu Chatterjee, Rupak Majumdar and Thomas A. Henzinger | Stochastic Limit-Average Games are in EXPTIME | 15 Pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The value of a finite-state two-player zero-sum stochastic game with
limit-average payoff can be approximated to within $\epsilon$ in time
exponential in a polynomial in the size of the game times polynomial in
logarithmic in $\frac{1}{\epsilon}$, for all $\epsilon>0$.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 20:55:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Majumdar",
"Rupak",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.2627 | Alp Arslan Bayrakci | Alp Arslan Bayrakci, Alper Demir, Serdar Tasiran | Fast Monte Carlo Estimation of Timing Yield: Importance Sampling with
Stochastic Logical Effort (ISLE) | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the nano era in integrated circuit fabrication technologies, the
performance variability due to statistical process and circuit parameter
variations is becoming more and more significant. Considerable effort has been
expended in the EDA community during the past several years in trying to cope
with the so-called statistical timing problem. Most of this effort has been
aimed at generalizing the static timing analyzers to the statistical case. In
this paper, we take a pragmatic approach in pursuit of making the Monte Carlo
method for timing yield estimation practically feasible. The Monte Carlo method
is widely used as a golden reference in assessing the accuracy of other timing
yield estimation techniques. However, it is generally believed that it can not
be used in practice for estimating timing yield as it requires too many costly
full circuit simulations for acceptable accuracy. In this paper, we present a
novel approach to constructing an improvedMonte Carlo estimator for timing
yield which provides the same accuracy as the standard Monte Carlo estimator,
but at a cost of much fewer full circuit simulations. This improved estimator
is based on a novel combination of a variance reduction technique, importance
sampling, and a stochastic generalization of the logical effort formalism for
cheap but approximate delay estimation. The results we present demonstrate that
our improved yield estimator achieves the same accuracy as the standard Monte
Carlo estimator at a cost reduction reaching several orders of magnitude.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 21:54:08 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2008 22:20:48 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Bayrakci",
"Alp Arslan",
""
],
[
"Demir",
"Alper",
""
],
[
"Tasiran",
"Serdar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.2629 | Xiang-Gen Xia Prof. | Xiaoyong Guo and Xiang-Gen Xia | On Full Diversity Space-Time Block Codes with Partial Interference
Cancellation Group Decoding | 45 pages, 3 figures, partially appeared in the International Symp. on
Information Theory (ISIT), Toronto, Canada, July 6-11, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a partial interference cancellation (PIC) group
decoding for linear dispersive space-time block codes (STBC) and a design
criterion for the codes to achieve full diversity when the PIC group decoding
is used at the receiver. A PIC group decoding decodes the symbols embedded in
an STBC by dividing them into several groups and decoding each group separately
after a linear PIC operation is implemented. It can be viewed as an
intermediate decoding between the maximum likelihood (ML) receiver that decodes
all the embedded symbols together, i.e., all the embedded symbols are in a
single group, and the zero-forcing (ZF) receiver that decodes all the embedded
symbols separately and independently, i.e., each group has and only has one
embedded symbol, after the ZF operation is implemented. Our proposed design
criterion for the PIC group decoding to achieve full diversity is an
intermediate condition between the loosest ML full rank criterion of codewords
and the strongest ZF linear independence condition of the column vectors in the
equivalent channel matrix. We also propose asymptotically optimal (AO) group
decoding algorithm, which is an intermediate decoding between the MMSE decoding
algorithm and the ML decoding algorithm. The design criterion for the PIC group
decoding applies to the AO group decoding algorithm. It is well-known that the
symbol rate for a full rank linear STBC can be full, i.e., n_t for n_t transmit
antennas. It has been recently shown that its rate is upper bounded by 1 if a
code achieves full diversity with a linear receiver. The intermediate criterion
proposed in this paper provides the possibility for codes of rates between n_t
and 1 that achieve full diversity with a PIC group decoding. This therefore
provides a complexity-performance-rate tradeoff.
| [
{
"version": "v1",
"created": "Fri, 16 May 2008 22:18:15 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Guo",
"Xiaoyong",
""
],
[
"Xia",
"Xiang-Gen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2630 | Kamesh Munagala | Sudipto Guha and Kamesh Munagala | Sequential Design of Experiments via Linear Programming | The results and presentation in this paper are subsumed by the
article "Approximation algorithms for Bayesian multi-armed bandit problems"
http://arxiv.org/abs/1306.3525 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The celebrated multi-armed bandit problem in decision theory models the basic
trade-off between exploration, or learning about the state of a system, and
exploitation, or utilizing the system. In this paper we study the variant of
the multi-armed bandit problem where the exploration phase involves costly
experiments and occurs before the exploitation phase; and where each play of an
arm during the exploration phase updates a prior belief about the arm. The
problem of finding an inexpensive exploration strategy to optimize a certain
exploitation objective is NP-Hard even when a single play reveals all
information about an arm, and all exploration steps cost the same.
We provide the first polynomial time constant-factor approximation algorithm
for this class of problems. We show that this framework also generalizes
several problems of interest studied in the context of data acquisition in
sensor networks. Our analyses also extends to switching and setup costs, and to
concave utility objectives.
Our solution approach is via a novel linear program rounding technique based
on stochastic packing. In addition to yielding exploration policies whose
performance is within a small constant factor of the adaptive optimal policy, a
nice feature of this approach is that the resulting policies explore the arms
sequentially without revisiting any arm. Sequentiality is a well-studied
concept in decision theory, and is very desirable in domains where multiple
explorations can be conducted in parallel, for instance, in the sensor network
context.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 22:48:22 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jun 2013 15:13:17 GMT"
}
] | 2013-06-19T00:00:00 | [
[
"Guha",
"Sudipto",
""
],
[
"Munagala",
"Kamesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.2641 | Seyed Abolfazl Motahari | Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani | On the Capacity of the Diamond Half-Duplex Relay Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a diamond-shaped dual-hop communication system consisting a
source, two parallel half-duplex relays and a destination. In a single antenna
configuration, it has been previously shown that a two-phase node-scheduling
algorithm, along with the decode and forward strategy can achieve the capacity
of the diamond channel for a certain symmetric channel gains [1]. In this
paper, we obtain a more general condition for the optimality of the scheme in
terms of power resources and channel gains. In particular, it is proved that if
the product of the capacity of the simultaneously active links are equal in
both transmission phases, the scheme achieves the capacity of the channel.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 01:01:31 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Bagheri",
"Hossein",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2646 | Ilias Diakonikolas | Ilias Diakonikolas, Mihalis Yannakakis | Small Approximate Pareto Sets for Bi-objective Shortest Paths and Other
Problems | submitted full version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the problem of computing a minimum set of solutions that
approximates within a specified accuracy $\epsilon$ the Pareto curve of a
multiobjective optimization problem. We show that for a broad class of
bi-objective problems (containing many important widely studied problems such
as shortest paths, spanning tree, and many others), we can compute in
polynomial time an $\epsilon$-Pareto set that contains at most twice as many
solutions as the minimum such set. Furthermore we show that the factor of 2 is
tight for these problems, i.e., it is NP-hard to do better. We present upper
and lower bounds for three or more objectives, as well as for the dual problem
of computing a specified number $k$ of solutions which provide a good
approximation to the Pareto curve.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 06:10:19 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Diakonikolas",
"Ilias",
""
],
[
"Yannakakis",
"Mihalis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.2671 | Spyros Sioutas SS | Spyros Sioutas | Finger Indexed Sets: New Approaches | 13 pages, 1 figure, Submitted to Journal of Universal Computer
Science (J.UCS) | null | null | null | cs.DS cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the particular case we have insertions/deletions at the tail of a given
set S of $n$ one-dimensional elements, we present a simpler and more concrete
algorithm than that presented in [Anderson, 2007] achieving the same (but also
amortized) upper bound of $O(\sqrt{logd/loglogd})$ for finger searching
queries, where $d$ is the number of sorted keys between the finger element and
the target element we are looking for. Furthermore, in general case we have
insertions/deletions anywhere we present a new randomized algorithm achieving
the same expected time bounds. Even the new solutions achieve the optimal
bounds in amortized or expected case, the advantage of simplicity is of great
importance due to practical merits we gain.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 14:05:12 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Sioutas",
"Spyros",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0805.2675 | Ying Jun Zhang Ph.D. | Liping Qian, Ying Jun Zhang, Jianwei Huang | MAPEL: Achieving Global Optimality for a Non-convex Wireless Power
Control Problem | null | null | null | null | cs.NI cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Achieving weighted throughput maximization (WTM) through power control has
been a long standing open problem in interference-limited wireless networks.
The complicated coupling between the mutual interferences of links gives rise
to a non-convex optimization problem. Previous work has considered the WTM
problem in the high signal to interference-and-noise ratio (SINR) regime, where
the problem can be approximated and transformed into a convex optimization
problem through proper change of variables. In the general SINR regime,
however, the approximation and transformation approach does not work. This
paper proposes an algorithm, MAPEL, which globally converges to a global
optimal solution of the WTM problem in the general SINR regime. The MAPEL
algorithm is designed based on three key observations of the WTM problem: (1)
the objective function is monotonically increasing in SINR, (2) the objective
function can be transformed into a product of exponentiated linear fraction
functions, and (3) the feasible set of the equivalent transformed problem is
always normal although not necessarily convex. The MAPLE algorithm finds the
desired optimal power control solution by constructing a series of polyblocks
that approximate the feasible SINR region in increasing precision. Furthermore,
by tuning the approximation factor in MAPEL, we could engineer a desirable
tradeoff between optimality and convergence time. MAPEL provides an important
benchmark for performance evaluation of other heuristic algorithms targeting
the same problem. With the help of MAPEL, we evaluate the performance of
several respective algorithms through extensive simulations.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 15:04:38 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2008 12:01:51 GMT"
}
] | 2008-06-10T00:00:00 | [
[
"Qian",
"Liping",
""
],
[
"Zhang",
"Ying Jun",
""
],
[
"Huang",
"Jianwei",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0805.2681 | Spyros Sioutas SS | Spyros Sioutas, Dimitrios Sofotassios, Kostas Tsichlas, Dimitrios
Sotiropoulos, Panayiotis Vlamos | Canonical polygon Queries on the plane: a New Approach | 7 pages, 9 figures, Accepted for publication in Journal of Computers
(JCP), http://www.informatik.uni-trier.de/~ley/db/journals/jcp/index.html | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The polygon retrieval problem on points is the problem of preprocessing a set
of $n$ points on the plane, so that given a polygon query, the subset of points
lying inside it can be reported efficiently.
It is of great interest in areas such as Computer Graphics, CAD applications,
Spatial Databases and GIS developing tasks. In this paper we study the problem
of canonical $k$-vertex polygon queries on the plane. A canonical $k$-vertex
polygon query always meets the following specific property: a point retrieval
query can be transformed into a linear number (with respect to the number of
vertices) of point retrievals for orthogonal objects such as rectangles and
triangles (throughout this work we call a triangle orthogonal iff two of its
edges are axis-parallel).
We present two new algorithms for this problem. The first one requires
$O(n\log^2{n})$ space and $O(k\frac{log^3n}{loglogn}+A)$ query time. A simple
modification scheme on first algorithm lead us to a second solution, which
consumes $O(n^2)$ space and $O(k \frac{logn}{loglogn}+A)$ query time, where $A$
denotes the size of the answer and $k$ is the number of vertices.
The best previous solution for the general polygon retrieval problem uses
$O(n^2)$ space and answers a query in $O(k\log{n}+A)$ time, where $k$ is the
number of vertices. It is also very complicated and difficult to be implemented
in a standard imperative programming language such as C or C++.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 16:00:09 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 10:23:50 GMT"
}
] | 2009-07-30T00:00:00 | [
[
"Sioutas",
"Spyros",
""
],
[
"Sofotassios",
"Dimitrios",
""
],
[
"Tsichlas",
"Kostas",
""
],
[
"Sotiropoulos",
"Dimitrios",
""
],
[
"Vlamos",
"Panayiotis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0805.2684 | Christof Teuscher | Christof Teuscher, Natali Gulbahce, Thimo Rohlf | Assessing Random Dynamical Network Architectures for Nanoelectronics | 8 pages, 6 figures, IEEE/ACM Symposium on Nanoscale Architectures,
NANOARCH 2008, Anaheim, CA, USA, Jun 12-13, 2008 | null | 10.1109/NANOARCH.2008.4585787 | LA-UR-08-2190 | cs.AR cond-mat.dis-nn nlin.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Independent of the technology, it is generally expected that future nanoscale
devices will be built from vast numbers of densely arranged devices that
exhibit high failure rates. Other than that, there is little consensus on what
type of technology and computing architecture holds most promises to go far
beyond today's top-down engineered silicon devices. Cellular automata (CA) have
been proposed in the past as a possible class of architectures to the von
Neumann computing architecture, which is not generally well suited for future
parallel and fine-grained nanoscale electronics. While the top-down engineered
semi-conducting technology favors regular and locally interconnected
structures, future bottom-up self-assembled devices tend to have irregular
structures because of the current lack precise control over these processes. In
this paper, we will assess random dynamical networks, namely Random Boolean
Networks (RBNs) and Random Threshold Networks (RTNs), as alternative computing
architectures and models for future information processing devices. We will
illustrate that--from a theoretical perspective--they offer superior properties
over classical CA-based architectures, such as inherent robustness as the
system scales up, more efficient information processing capabilities, and
manufacturing benefits for bottom-up designed devices, which motivates this
investigation. We will present recent results on the dynamic behavior and
robustness of such random dynamical networks while also including manufacturing
issues in the assessment.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 16:22:27 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Teuscher",
"Christof",
""
],
[
"Gulbahce",
"Natali",
""
],
[
"Rohlf",
"Thimo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
] |
0805.2690 | Mikhail Konnik | M.V. Konnik, E.A. Manykin, S.N. Starikov | Increasing Linear Dynamic Range of Commercial Digital Photocamera Used
in Imaging Systems with Optical Coding | unnecessary figures were removed; typos corrected | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Methods of increasing linear optical dynamic range of commercial photocamera
for optical-digital imaging systems are described. Use of such methods allows
to use commercial photocameras for optical measurements. Experimental results
are reported.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 17:15:26 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Konnik",
"M. V.",
""
],
[
"Manykin",
"E. A.",
""
],
[
"Starikov",
"S. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0805.2691 | Kohtaro Tadaki | Kohtaro Tadaki | Equivalent characterizations of partial randomness for a recursively
enumerable real | 19 pages, LaTeX2e, no figures | null | null | null | cs.IT cs.CC math.IT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A real number \alpha is called recursively enumerable if there exists a
computable, increasing sequence of rational numbers which converges to \alpha.
The randomness of a recursively enumerable real \alpha can be characterized in
various ways using each of the notions; program-size complexity, Martin-L\"{o}f
test, Chaitin's \Omega number, the domination and \Omega-likeness of \alpha,
the universality of a computable, increasing sequence of rational numbers which
converges to \alpha, and universal probability. In this paper, we generalize
these characterizations of randomness over the notion of partial randomness by
parameterizing each of the notions above by a real number T\in(0,1]. We thus
present several equivalent characterizations of partial randomness for a
recursively enumerable real number.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 17:44:34 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0805.2701 | Vladimir Shpilrain | Vladimir Shpilrain and Alexander Ushakov | An authentication scheme based on the twisted conjugacy problem | 7 pages | ACNS 2008, Lecture Notes Comp. Sc. 5037 (2008), 366-372 | null | null | math.GR cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conjugacy search problem in a group $G$ is the problem of recovering an
$x \in G$ from given $g \in G$ and $h=x^{-1}gx$. The alleged computational
hardness of this problem in some groups was used in several recently suggested
public key exchange protocols, including the one due to Anshel, Anshel, and
Goldfeld, and the one due to Ko, Lee et al. Sibert, Dehornoy, and Girault used
this problem in their authentication scheme, which was inspired by the
Fiat-Shamir scheme involving repeating several times a three-pass
challenge-response step.
In this paper, we offer an authentication scheme whose security is based on
the apparent hardness of the twisted conjugacy search problem, which is: given
a pair of endomorphisms (i.e., homomorphisms into itself) phi, \psi of a group
G and a pair of elements w, t \in G, find an element s \in G such that t =
\psi(s^{-1}) w \phi(s) provided at least one such s exists. This problem
appears to be very non-trivial even for free groups. We offer here another
platform, namely, the semigroup of all 2x2 matrices over truncated one-variable
polynomials over F_2, the field of two elements, with transposition used
instead of inversion in the equality above.
| [
{
"version": "v1",
"created": "Sat, 17 May 2008 21:08:46 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.2705 | Valerio Lucarini | Valerio Lucarini | Three-dimensional Random Voronoi Tessellations: From Cubic Crystal
Lattices to Poisson Point Processes | 18 pages, 7 figures | J. Stat. Phys., 134, 185-206 (2009) | 10.1007/s10955-008-9668-y | null | cond-mat.stat-mech cond-mat.dis-nn cond-mat.other cs.CG math-ph math.MP nlin.PS physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perturb the SC, BCC, and FCC crystal structures with a spatial Gaussian
noise whose adimensional strength is controlled by the parameter a, and analyze
the topological and metrical properties of the resulting Voronoi Tessellations
(VT). The topological properties of the VT of the SC and FCC crystals are
unstable with respect to the introduction of noise, because the corresponding
polyhedra are geometrically degenerate, whereas the tessellation of the BCC
crystal is topologically stable even against noise of small but finite
intensity. For weak noise, the mean area of the perturbed BCC and FCC crystals
VT increases quadratically with a. In the case of perturbed SCC crystals, there
is an optimal amount of noise that minimizes the mean area of the cells.
Already for a moderate noise (a>0.5), the properties of the three perturbed VT
are indistinguishable, and for intense noise (a>2), results converge to the
Poisson-VT limit. Notably, 2-parameter gamma distributions are an excellent
model for the empirical of of all considered properties. The VT of the
perturbed BCC and FCC structures are local maxima for the isoperimetric
quotient, which measures the degre of sphericity of the cells, among space
filling VT. In the BCC case, this suggests a weaker form of the recentluy
disproved Kelvin conjecture. Due to the fluctuations of the shape of the cells,
anomalous scalings with exponents >3/2 is observed between the area and the
volumes of the cells, and, except for the FCC case, also for a->0. In the
Poisson-VT limit, the exponent is about 1.67. As the number of faces is
positively correlated with the sphericity of the cells, the anomalous scaling
is heavily reduced when we perform powerlaw fits separately on cells with a
specific number of faces.
| [
{
"version": "v1",
"created": "Sun, 18 May 2008 00:36:52 GMT"
}
] | 2011-10-11T00:00:00 | [
[
"Lucarini",
"Valerio",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "nlin.PS",
"description": "Pattern formation, coherent structures, solitons",
"span": "(Pattern Formation and Solitons)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0805.2739 | Salvatore Mele | Rolf-Dieter Heuer, Annette Holtkamp, Salvatore Mele | Innovation in Scholarly Communication: Vision and Projects from
High-Energy Physics | Based on a keynote talk of Rolf-Dieter Heuer at APE2008,
International Conference on "Academic Publishing in Europe", Berlin, January
22nd-23rd 2008 | Inform.Serv.Use 28:83-96,2008 | 10.3233/ISU-2008-0570 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Having always been at the forefront of information management and open
access, High-Energy Physics (HEP) proves to be an ideal test-bed for
innovations in scholarly communication including new information and
communication technologies. Three selected topics of scholarly communication in
High-Energy Physics are presented here: A new open access business model,
SCOAP3, a world-wide sponsoring consortium for peer-reviewed HEP literature;
the design, development and deployment of an e-infrastructure for information
management; and the emerging debate on long-term preservation, re-use and
(open) access to HEP data.
| [
{
"version": "v1",
"created": "Sun, 18 May 2008 17:38:14 GMT"
}
] | 2009-08-18T00:00:00 | [
[
"Heuer",
"Rolf-Dieter",
""
],
[
"Holtkamp",
"Annette",
""
],
[
"Mele",
"Salvatore",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0805.2749 | Victor Yodaiken | Victor Yodaiken | State and history in operating systems | A method based on sequence dependent functions is used to specify and
understand the operation of process switch in UNIX like systems | null | null | null | cs.SE cs.DC | http://creativecommons.org/licenses/by/3.0/ | A method of using recursive functions to describe state change is applied to
process switching in UNIX-like operating systems.
| [
{
"version": "v1",
"created": "Sun, 18 May 2008 19:44:21 GMT"
}
] | 2008-05-20T00:00:00 | [
[
"Yodaiken",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.2752 | Constantinos Panagiotakopoulos | Constantinos Panagiotakopoulos and Petroula Tsampouka | The Margitron: A Generalised Perceptron with Margin | 18 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We identify the classical Perceptron algorithm with margin as a member of a
broader family of large margin classifiers which we collectively call the
Margitron. The Margitron, (despite its) sharing the same update rule with the
Perceptron, is shown in an incremental setting to converge in a finite number
of updates to solutions possessing any desirable fraction of the maximum
margin. Experiments comparing the Margitron with decomposition SVMs on tasks
involving linear kernels and 2-norm soft margin are also reported.
| [
{
"version": "v1",
"created": "Sun, 18 May 2008 20:07:22 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Panagiotakopoulos",
"Constantinos",
""
],
[
"Tsampouka",
"Petroula",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.2775 | Afshin Rostamizadeh | Corinna Cortes, Mehryar Mohri, Michael Riley, Afshin Rostamizadeh | Sample Selection Bias Correction Theory | 16 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a theoretical analysis of sample selection bias
correction. The sample bias correction technique commonly used in machine
learning consists of reweighting the cost of an error on each training point of
a biased sample to more closely reflect the unbiased distribution. This relies
on weights derived by various estimation techniques based on finite samples. We
analyze the effect of an error in that estimation on the accuracy of the
hypothesis returned by the learning algorithm for two estimation techniques: a
cluster-based estimation technique and kernel mean matching. We also report the
results of sample bias correction experiments with several data sets using
these techniques. Our analysis is based on the novel concept of distributional
stability which generalizes the existing concept of point-based stability. Much
of our work and proof techniques can be used to analyze other importance
weighting techniques and their effect on accuracy when using a distributionally
stable algorithm.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 02:55:08 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Cortes",
"Corinna",
""
],
[
"Mohri",
"Mehryar",
""
],
[
"Riley",
"Michael",
""
],
[
"Rostamizadeh",
"Afshin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0805.2785 | Alwen Tiu | Alwen Tiu and Dale Miller | Proof Search Specifications of Bisimulation and Modal Logics for the
pi-Calculus | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We specify the operational semantics and bisimulation relations for the
finite pi-calculus within a logic that contains the nabla quantifier for
encoding generic judgments and definitions for encoding fixed points. Since we
restrict to the finite case, the ability of the logic to unfold fixed points
allows this logic to be complete for both the inductive nature of operational
semantics and the coinductive nature of bisimulation. The nabla quantifier
helps with the delicate issues surrounding the scope of variables within
pi-calculus expressions and their executions (proofs). We illustrate several
merits of the logical specifications permitted by this logic: they are natural
and declarative; they contain no side-conditions concerning names of variables
while maintaining a completely formal treatment of such variables; differences
between late and open bisimulation relations arise from familar logic
distinctions; the interplay between the three quantifiers (for all, exists, and
nabla) and their scopes can explain the differences between early and late
bisimulation and between various modal operators based on bound input and
output actions; and proof search involving the application of inference rules,
unification, and backtracking can provide complete proof systems for one-step
transitions, bisimulation, and satisfaction in modal logic. We also illustrate
how one can encode the pi-calculus with replications, in an extended logic with
induction and co-induction.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 04:33:28 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2008 06:03:46 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Feb 2009 03:50:01 GMT"
}
] | 2009-02-16T00:00:00 | [
[
"Tiu",
"Alwen",
""
],
[
"Miller",
"Dale",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0805.2797 | Mikl\'os Pint\'er | M. Pinter | Young's axiomatization of the Shapley value - a new proof | 11 pages | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider Young (1985)'s characterization of the Shapley value, and give a
new proof of this axiomatization. Moreover, as applications of the new proof,
we show that Young (1985)'s axiomatization of the Shapley value works on
various well-known subclasses of TU games.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 07:11:04 GMT"
},
{
"version": "v2",
"created": "Sun, 3 May 2009 09:53:25 GMT"
},
{
"version": "v3",
"created": "Sat, 10 Mar 2012 13:32:00 GMT"
}
] | 2012-03-13T00:00:00 | [
[
"Pinter",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0805.2812 | Mark Flanagan | Mark F. Flanagan | Codeword-Independent Performance of Nonbinary Linear Codes Under
Linear-Programming and Sum-Product Decoding | 5 pages, Proceedings of the 2008 IEEE International Symposium on
Information Theory, Toronto, ON, Canada, July 6-11, 2008 | null | 10.1109/ISIT.2008.4595238 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A coded modulation system is considered in which nonbinary coded symbols are
mapped directly to nonbinary modulation signals. It is proved that if the
modulator-channel combination satisfies a particular symmetry condition, the
codeword error rate performance is independent of the transmitted codeword. It
is shown that this result holds for both linear-programming decoders and
sum-product decoders. In particular, this provides a natural modulation mapping
for nonbinary codes mapped to PSK constellations for transmission over
memoryless channels such as AWGN channels or flat fading channels with AWGN.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 08:41:40 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2854 | Feng Xia | Feng Xia, Longhua Ma, Jinxiang Dong and Youxian Sun | Network QoS Management in Cyber-Physical Systems | To appear in The 2008 Int.Conf. on Embedded Software and Systems
(ICESS), Chengdu, China, July 2008 | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Technical advances in ubiquitous sensing, embedded computing, and wireless
communication are leading to a new generation of engineered systems called
cyber-physical systems (CPS). CPS promises to transform the way we interact
with the physical world just as the Internet transformed how we interact with
one another. Before this vision becomes a reality, however, a large number of
challenges have to be addressed. Network quality of service (QoS) management in
this new realm is among those issues that deserve extensive research efforts.
It is envisioned that wireless sensor/actuator networks (WSANs) will play an
essential role in CPS. This paper examines the main characteristics of WSANs
and the requirements of QoS provisioning in the context of cyber-physical
computing. Several research topics and challenges are identified. As a sample
solution, a feedback scheduling framework is proposed to tackle some of the
identified challenges. A simple example is also presented that illustrates the
effectiveness of the proposed solution.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 12:49:11 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Ma",
"Longhua",
""
],
[
"Dong",
"Jinxiang",
""
],
[
"Sun",
"Youxian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.2855 | Ed Summers | Ed Summers, Antoine Isaac, Clay Redding, Dan Krech | LCSH, SKOS and Linked Data | Submission for the Dublin Core 2008 conference in Berlin | Web Semantics: Science, Services and Agents on the World Wide Web,
Volume 20, May 2013, Pages 35-49, ISSN 1570-8268 | 10.1016/j.websem.2013.05.001 | null | cs.DL cs.IR | http://creativecommons.org/licenses/publicdomain/ | A technique for converting Library of Congress Subject Headings MARCXML to
Simple Knowledge Organization System (SKOS) RDF is described. Strengths of the
SKOS vocabulary are highlighted, as well as possible points for extension, and
the integration of other semantic web vocabularies such as Dublin Core. An
application for making the vocabulary available as linked-data on the Web is
also described.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 13:11:41 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jun 2008 18:25:51 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Jul 2008 12:57:39 GMT"
}
] | 2013-10-09T00:00:00 | [
[
"Summers",
"Ed",
""
],
[
"Isaac",
"Antoine",
""
],
[
"Redding",
"Clay",
""
],
[
"Krech",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0805.2864 | Jocelyne Troccaz | Pierre Mozer (TIMC), Michael Baumann (TIMC), G. Chevreau (TIMC),
Jocelyne Troccaz (TIMC) | Fusion d'images: application au contr\^ole de la distribution des
biopsies prostatiques | null | Progr\`es en Urologie 18, 1 (2008) F15-F18 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is about the application of a 3D ultrasound data fusion technique
to the 3D reconstruction of prostate biopies in a reference volume. The method
is introduced and its evaluation on a series of data coming from 15 patients is
described.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 13:31:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Mozer",
"Pierre",
"",
"TIMC"
],
[
"Baumann",
"Michael",
"",
"TIMC"
],
[
"Chevreau",
"G.",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0805.2891 | Miroslava Sotakova | Shai Ben-David, Tyler Lu, David Pal, Miroslava Sotakova | Learning Low-Density Separators | 15 pages, 1 figure | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a novel, basic, unsupervised learning problem - learning the lowest
density homogeneous hyperplane separator of an unknown probability
distribution. This task is relevant to several problems in machine learning,
such as semi-supervised learning and clustering stability. We investigate the
question of existence of a universally consistent algorithm for this problem.
We propose two natural learning paradigms and prove that, on input unlabeled
random samples generated by any member of a rich family of distributions, they
are guaranteed to converge to the optimal separator for that distribution. We
complement this result by showing that no learning algorithm for our task can
achieve uniform learning rates (that are independent of the data generating
distribution).
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 17:55:08 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2009 18:25:33 GMT"
}
] | 2009-01-22T00:00:00 | [
[
"Ben-David",
"Shai",
""
],
[
"Lu",
"Tyler",
""
],
[
"Pal",
"David",
""
],
[
"Sotakova",
"Miroslava",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0805.2938 | Wojciech Mazurczyk | Wojciech Mazurczyk and Krzysztof Szczypiorski | Steganography of VoIP Streams | 18 pages, 9 figures, content changed, accepted to The 3rd
International Symposium on Information Security (IS'08), Monterrey, Mexico,
November 10-11, 2008 (Proceedings will be published by Springer LNCS) | null | null | null | cs.MM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper concerns available steganographic techniques that can be used for
creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart
from characterizing existing steganographic methods we provide new insights by
presenting two new techniques. The first one is network steganography solution
which exploits free/unused protocols' fields and is known for IP, UDP or TCP
protocols but has never been applied to RTP (Real-Time Transport Protocol) and
RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second
method, called LACK (Lost Audio Packets Steganography), provides hybrid
storage-timing covert channel by utilizing delayed audio packets. The results
of the experiment, that was performed to estimate a total amount of data that
can be covertly transferred during typical VoIP conversation phase, regardless
of steganalysis, are also included in this paper.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 20:46:38 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Aug 2008 10:40:57 GMT"
}
] | 2008-08-25T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0805.2949 | Fotis Georgatos Drs | Fotis Georgatos, John Kouvakis, John Kouretis | Performability Aspects of the Atlas Vo; Using Lmbench Suite | 14 pages, 7 figures; Particular attention should be given to graph
int64mul; A related presentation on the subject matter is available by the
authors upon request | null | null | null | cs.PF cs.CE cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ATLAS Virtual Organization is grid's largest Virtual Organization which
is currently in full production stage. Hereby a case is being made that a user
working within that VO is going to face a wide spectrum of different systems,
whose heterogeneity is enough to count as "orders of magnitude" according to a
number of metrics; including integer/float operations, memory throughput
(STREAM) and communication latencies. Furthermore, the spread of performance
does not appear to follow any known distribution pattern, which is demonstrated
in graphs produced during May 2007 measurements. It is implied that the current
practice where either "all-WNs-are-equal" or, the alternative of SPEC-based
rating used by LCG/EGEE is an oversimplification which is inappropriate and
expensive from an operational point of view, therefore new techniques are
needed for optimal grid resources allocation.
| [
{
"version": "v1",
"created": "Mon, 19 May 2008 19:45:31 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Georgatos",
"Fotis",
""
],
[
"Kouvakis",
"John",
""
],
[
"Kouretis",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0805.2995 | Deniz Gunduz | Deniz Gunduz, Elza Erkip, H. Vincent Poor | Lossless Compression with Security Constraints | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4594958 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secure distributed data compression in the presence of an eavesdropper is
explored. Two correlated sources that need to be reliably transmitted to a
legitimate receiver are available at separate encoders. Noise-free, limited
rate links from the encoders to the legitimate receiver, one of which can also
be perfectly observed by the eavesdropper, are considered. The eavesdropper
also has its own correlated observation. Inner and outer bounds on the
achievable compression-equivocation rate region are given. Several different
scenarios involving the side information at the transmitters as well as
multiple receivers/eavesdroppers are also considered.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 02:23:42 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Erkip",
"Elza",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.2996 | Deniz Gunduz | Deniz Gunduz, Elza Erkip, Andrea J. Goldsmith, H. Vincent Poor | Lossy Source Transmission over the Relay Channel | Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008 | null | 10.1109/ISIT.2008.4595359 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lossy transmission over a relay channel in which the relay has access to
correlated side information is considered. First, a joint source-channel
decode-and-forward scheme is proposed for general discrete memoryless sources
and channels. Then the Gaussian relay channel where the source and the side
information are jointly Gaussian is analyzed. For this Gaussian model, several
new source-channel cooperation schemes are introduced and analyzed in terms of
the squared-error distortion at the destination. A comparison of the proposed
upper bounds with the cut-set lower bound is given, and it is seen that joint
source-channel cooperation improves the reconstruction quality significantly.
Moreover, the performance of the joint code is close to the lower bound on
distortion for a wide range of source and channel parameters.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 02:45:47 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Erkip",
"Elza",
""
],
[
"Goldsmith",
"Andrea J.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3005 | Dapo Omidiran | Dapo Omidiran, Martin J. Wainwright | High-dimensional subset recovery in noise: Sparsified measurements
without loss of statistical efficiency | null | null | null | null | stat.ML cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of estimating the support of a vector $\beta^* \in
\mathbb{R}^{p}$ based on observations contaminated by noise. A significant body
of work has studied behavior of $\ell_1$-relaxations when applied to
measurement matrices drawn from standard dense ensembles (e.g., Gaussian,
Bernoulli). In this paper, we analyze \emph{sparsified} measurement ensembles,
and consider the trade-off between measurement sparsity, as measured by the
fraction $\gamma$ of non-zero entries, and the statistical efficiency, as
measured by the minimal number of observations $n$ required for exact support
recovery with probability converging to one. Our main result is to prove that
it is possible to let $\gamma \to 0$ at some rate, yielding measurement
matrices with a vanishing fraction of non-zeros per row while retaining the
same statistical efficiency as dense ensembles. A variety of simulation results
confirm the sharpness of our theoretical predictions.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 05:22:12 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Omidiran",
"Dapo",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0805.3058 | Silvano Di Zenzo | Silvano Di Zenzo | A New Structural Property of SAT | 31 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review a minimum set of notions from our previous paper on structural
properties of SAT at arXiv:0802.1790 that will allow us to define and discuss
the "complete internal independence" of a decision problem. This property is
strictly stronger than the independence property that was called "strong
internal independence" in cited paper. We show that SAT exhibits this property.
We argue that this form of independence of a decision problem is the strongest
possible for a problem. By relying upon this maximally strong form of internal
independence, we reformulate in more strict terms the informal remarks on
possible exponentiality of SAT that concluded our previous paper. The net
result of that reformulation is a hint for a proof for SAT being exponential.
We conjecture that a complete proof of that proposition can be obtained by
strictly following the line of given hint of proof.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 12:07:51 GMT"
}
] | 2008-05-21T00:00:00 | [
[
"Di Zenzo",
"Silvano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0805.3059 | Feng Xia | Feng Xia, Youxian Sun, Yu-Chu Tian, Moses Tade, Jinxiang Dong | Fuzzy Feedback Scheduling of Resource-Constrained Embedded Control
Systems | To appear in International Journal of Innovative Computing,
Information and Control | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The quality of control (QoC) of a resource-constrained embedded control
system may be jeopardized in dynamic environments with variable workload. This
gives rise to the increasing demand of co-design of control and scheduling. To
deal with uncertainties in resource availability, a fuzzy feedback scheduling
(FFS) scheme is proposed in this paper. Within the framework of feedback
scheduling, the sampling periods of control loops are dynamically adjusted
using the fuzzy control technique. The feedback scheduler provides QoC
guarantees in dynamic environments through maintaining the CPU utilization at a
desired level. The framework and design methodology of the proposed FFS scheme
are described in detail. A simplified mobile robot target tracking system is
investigated as a case study to demonstrate the effectiveness of the proposed
FFS scheme. The scheme is independent of task execution times, robust to
measurement noises, and easy to implement, while incurring only a small
overhead.
| [
{
"version": "v1",
"created": "Tue, 20 May 2008 12:09:06 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Xia",
"Feng",
""
],
[
"Sun",
"Youxian",
""
],
[
"Tian",
"Yu-Chu",
""
],
[
"Tade",
"Moses",
""
],
[
"Dong",
"Jinxiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.